SlideShare a Scribd company logo
1
Cyber Security for Digital-Era
AI, Machine Learning, Dynamic Threat Models for Proactive
Threat Detection and Elimination
Erich Berger
Executive, Secure Design
Kevin Stillman
CISO, State University of NY
Lalit Shinde
EVP Security, Seceon
Outline of the Presentation
2
Why should CxOs pay particular attention to Cyber Security
Seceon’s Approach, Key Features/Technologies and Complete Solution
Real world Examples, Benefits, Value Proposition to Enterprises
Challenges faced by Cyber Security Experts, Tools and Solutions
Why should CxO’s pay attention to Cyber Security?
 Cost of Data Breach is not just lost Data, but the impact on Reputation,
Brand and Business Revenue
 Cyber attack puts not just you, but your customers, partners and
employees at risk
 Breaches have hefty cost associated with them – it’s a financial burden
 Your Cyber hygiene affects everyone that you connect with
 Legal aspects of Cyber Regulations – Compliance is one of the most
important aspect in several regulated industries
3Source: Ponemon 2016 Cost of Data Breach Study Report
Cost of Data Breach at a glance – 2016
 $4 million is the average total cost of data breach
 29% increase in total cost of data breach since 2013
 $158 is the average cost per lost or stolen record – For Healthcare industry,
it’s $355, most among all, for Education it’s $246 and for Banking it’s $221
per stolen record
 Regulated industries, such as healthcare and financial services, have the
most costly data breaches because of fines and the higher than average
rate of lost business and customers.
 15% increase in per capita cost since 2013
4Source: Ponemon 2016 Cost of Data Breach Study Report
5
Biggest Security Threats to Organizations
Source: UBM Ponemon HPE 2016 Cyber Security Trends Report
Challenges: Cost of MTTI and MTTC
6
MTTI – Mean Time To Identify
MTTC – Mean Time To Contain
US $M
US $M
Source: Ponemon 2016 Cost of Data Breach Study Report
Challenges: Most Security Products Fall Short
7Source: Verizon 2016 Data Breach Investigation Report
Stealing Credentials happens
in minutes
95% Data Extraction happens
within 24 hours
Data Breaches – Why Automated Real-Time solution is a must?
 Today’s approaches are reactive than proactive
 Despite the investment and focus over past 3 years organizations are losing ground
 The attacks are smarter and faster
 The smart people based centric approach is too slow, too complicated and too expensive
 A new fully automated comprehensive threat detect and response system is required
 One that Detects threats in Minutes, Fully deploys & protects in a few hours and does not need rule or signature updates
Challenges: Operational Cost of Investigations
8
Flows/Logs Troubleshooting
Activity
Type
Flow/Log
Instances
Comments
NG FW generates events/logs around
an instance of an infected device
attempting to connect to a bad web site.
North-South
Activity
444
NG FW is resetting connections from
the device over time and is not
correlating these "non critical flagged"
instances
Device is also performing IP Sweeps
East- West
Activity
135
Few separate instances across the
internal network
Device is also performing IP Port scans
East- West
Activity
92
Few separate instances across the
internal network
Device needs to be identified Internal Activity 1
What device is it? who or what group it
belongs to?
Total Activity 672 Total instances to investigate
Consider an example where a device is infected with a Malware
9
Seceon’s Approach to Cyber Security
Traditional Security Approach Seceon OTM Security Approach
 Reactive Approach
 Tools are highly specialized, but work in
Silos with no comprehensive visibility
 High CapEx with 20+ Security Tools
 High OpEx with 1M+ events/logs per day –
almost 80% require follow up
 Investigation and Incident Response
 90% take an hour or longer to identify
 90% take a day or longer (many times
months) to respond
 Challenges
 Lack of Integration among Tools
 Knowledge/Skill of investigation and
Response is costly
 Proactive Approach
 Moving from Point Tools to Complete
Predictive Analysis Solution
 Comprehensive Visibility across all Asset
Groups – Devices, Applications, Network,
Employees, Customers etc.
 Automated Detection and Remediation
 Predictive Threat Detection using AI, ML
and Behavioral Threat Models
 Automated Remediation within near Real
Time
 Automated Correlation
 Contextual based Single Line Alerts
 Rapid Deployment with Automated DevOps
model and Open API
Seceon OTM Platform Overview
10
Adaptive Visualization
• Comprehensive view of all assets and threats
• Fully automated solution that is easiest to deploy
• Allows drill down of threats with all details
Detect Threats that Matter
• Detects known as well as unknown threats
• Provides comprehensive information of the threats
• Indicates all compromised assets and potential targets
Contain Threats in Real Time
• Immediate corrective action in real time
• Automatic notification through email/text if required
• Provides actionable analytics
Built-in Security
Threat Modeling
Parse
Dynamic
Reduction
Behavior Analysis
Threat Correlation
Threat Intelligence
UniversalCollectionBus
Unstructured
Data
Unstructured
Data
Store
Storage Engine
Search
Rapid Search
Agent
Analytics
Analytics Engine
Big Data Store &
Search
Real-time Threat
Detection
Real-time
Analytics
Predictive
Modeling
Outputs
Built-in Advanced
Correlation
Built-in ML
Engine
Built-in Data
Model Engine
Platform Security Engine
Structured
Data
Parse
Dynamic
Reduction
Parse
Dynamic
Reduction
Seceon’s Scalable – Fast Analytics Processing
Platform
Distributed Data Ingest (CCE) Fast Parallel Processing Architecture (APE)
Closed Loop Threat Containment
Threat
Containment
Use Case – Compromised Credentials
12
• Compromised Credentials Account for 75% of data theft
• Most traditional security solutions are blind to almost all forms of compromised credentials
• Seceon detects all forms of compromised credential use in real-time for external or insider source
verify
User “A”
Credentials
Directory
User: “A”
“Credentials – User A”
Host Name: “Bob’s PC”
 No threat
 No threat  Threat Indicator
 No threat
User: “A”
“Credentials – User A”
Host Name: “Joe’s PC”
DB
High Value
Assets
SIEM
Learn User behavior based on geolocation, computer
Used, time of logins, assets accessed, etc.. etc.
Use Case – Ransomware
13
• Criminal Malware like Ransomware made it to top cyber security concern in 2016
• Ransomware had millions of different strains and families affecting large enterprises, as well as SMBs
• Seceon detects all forms of Ransomware using layered approach of predictive analytics in real-time
User “A” receives Email and cl
icks on a innocuous link
 Threat Indicator 1
 No threat
Bad Reputation URL
Malware Downloaded
Command and Control
Network Scan for other v
ulnerable hosts
 Threat Indicator 2
High Value
Assets
Infection Propagation
 Threat Indicator 3
 Stops threats – automatically
 Disable compromised credentials
 Set filters on firewalls and switches
 Block, rate limit or redirect traffic
 Detects a full range of threats
 Compromised Credentials
 Insider threats
 Brute force attacks
 DDoS attack (all forms)
 Malware, BOTs, APTs Ransomware…
14
Seceon OTM Key Features
 Policy monitoring and enforcement
 Protect critical resources
 Restricting access to only select groups
 Alert and stop upon attempt
 Visualizes impact of attacks
 On applications, users
 On the network
 Provides traffic trend monitoring
Thank you
For further info about Seceon please write to : meghna.jaiswal@jktech.com

More Related Content

PPTX
Cybersecurity Training for Nonprofits
PDF
ICION 2016 - Cyber Security Governance
PPTX
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
PPTX
Topic11
PPTX
2021 Nonprofit Cybersecurity Incident Report
PPTX
The State Of Information and Cyber Security in 2016
PPT
Challenges in implementating cyber security
PDF
Introduction to Cybersecurity
Cybersecurity Training for Nonprofits
ICION 2016 - Cyber Security Governance
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Topic11
2021 Nonprofit Cybersecurity Incident Report
The State Of Information and Cyber Security in 2016
Challenges in implementating cyber security
Introduction to Cybersecurity

What's hot (18)

PDF
Top Cyber Security Trends for 2016
PPTX
Information & Cyber Security Risk
PDF
CSE 2016 Future of Cyber Security by Matthew Rosenquist
PDF
The Cyber Security Landscape: An OurCrowd Briefing for Investors
PDF
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
PPT
Breaking down the cyber security framework closing critical it security gaps
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
PDF
Insights into cyber security and risk
 
PDF
Cybersecurity | Risk. Impact. Innovations.
PPT
Avoiding data breach using security intelligence and big data to stay out of ...
PDF
Cloud computing security infrastructure
PPTX
Cyber security
PPTX
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
PPTX
Top 5 Cybersecurity Trends in 2021 and Beyond
PPTX
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
PPTX
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
PDF
IT Security - Guidelines
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Top Cyber Security Trends for 2016
Information & Cyber Security Risk
CSE 2016 Future of Cyber Security by Matthew Rosenquist
The Cyber Security Landscape: An OurCrowd Briefing for Investors
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
Breaking down the cyber security framework closing critical it security gaps
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Insights into cyber security and risk
 
Cybersecurity | Risk. Impact. Innovations.
Avoiding data breach using security intelligence and big data to stay out of ...
Cloud computing security infrastructure
Cyber security
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Top 5 Cybersecurity Trends in 2021 and Beyond
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IT Security - Guidelines
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Ad

Viewers also liked (7)

PPTX
To use the concept of Data Mining and machine learning concept for Cyber secu...
PDF
Machine learning approach to anomaly detection in cyber security
PPTX
When Cyber Security Meets Machine Learning
KEY
Machine Learning on Big Data
PPTX
Introduction to Machine Learning
PDF
10 more lessons learned from building Machine Learning systems
PDF
Build Features, Not Apps
To use the concept of Data Mining and machine learning concept for Cyber secu...
Machine learning approach to anomaly detection in cyber security
When Cyber Security Meets Machine Learning
Machine Learning on Big Data
Introduction to Machine Learning
10 more lessons learned from building Machine Learning systems
Build Features, Not Apps
Ad

Similar to Cyber Security for Digital-Era (20)

PDF
Webinar - Feel Secure with revolutionary OTM Solution
PDF
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
PDF
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
PDF
Security Breakout Session
PDF
Microsoft Avanced Threat Analytics
PDF
Aon Ransomware Response and Mitigation Strategies
PPTX
Cyber-Espionage: Understanding the Advanced Threat Landscape
PPTX
Cognitive Computing in Security with AI
PDF
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
PPTX
Cyber Security protection by MultiPoint Ltd.
PDF
Exploration Draft Document- CEM Machine Learning & AI Project 2018
PPT
Security Considerations in Process Control and SCADA Environments
PPTX
Managing security threats in today’s enterprise
PDF
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
PPT
Key Strategies to Address Rising Application Risk in Your Enterprise
PDF
Custom defense - Blake final
PDF
OSB50: Operational Security: State of the Union
PPTX
AMP_Security_ Malware Protection Presentatiion
PPTX
Cybersecurity - Sam Maccherola
PDF
2010 Sc World Congress Nyc
Webinar - Feel Secure with revolutionary OTM Solution
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
Security Breakout Session
Microsoft Avanced Threat Analytics
Aon Ransomware Response and Mitigation Strategies
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cognitive Computing in Security with AI
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cyber Security protection by MultiPoint Ltd.
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Security Considerations in Process Control and SCADA Environments
Managing security threats in today’s enterprise
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Key Strategies to Address Rising Application Risk in Your Enterprise
Custom defense - Blake final
OSB50: Operational Security: State of the Union
AMP_Security_ Malware Protection Presentatiion
Cybersecurity - Sam Maccherola
2010 Sc World Congress Nyc

More from JK Tech (20)

PDF
Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...
PDF
Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?
PDF
Bulletproof Your QAD ERP to Cloud | JK Tech Webinar
PDF
Application Modernization to Accelerate Business Growth | JK Tech Webinar
PDF
Modernise Your Applications to Accelerate Digital Transformation | Webinar
PDF
[Webinar] - Digital Transformation Journey in Dairy Industry
PDF
[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...
PDF
[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...
PDF
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
PDF
[Webinar] - Intelligent Automation: Enabling Bots with Brain
PDF
[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...
PDF
[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...
PDF
[Webinar] - Using RPA to Accelerate the Benefits from Shared Services
PDF
[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft
PPTX
[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function
PPTX
Webinar (UK/Europe) - Demystifying SAP S/4HANA & Test Automation
PPTX
Webinar (UK/Europe) - Demystifying SAP S/4HANA
PPTX
Demystifying SAP S/4HANA
PPTX
Webinar - Loyalty Reward Points Using Blockchain
PPTX
Driving Process Improvement Through Automation | Webinar
Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...
Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?
Bulletproof Your QAD ERP to Cloud | JK Tech Webinar
Application Modernization to Accelerate Business Growth | JK Tech Webinar
Modernise Your Applications to Accelerate Digital Transformation | Webinar
[Webinar] - Digital Transformation Journey in Dairy Industry
[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...
[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] - Intelligent Automation: Enabling Bots with Brain
[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...
[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...
[Webinar] - Using RPA to Accelerate the Benefits from Shared Services
[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft
[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function
Webinar (UK/Europe) - Demystifying SAP S/4HANA & Test Automation
Webinar (UK/Europe) - Demystifying SAP S/4HANA
Demystifying SAP S/4HANA
Webinar - Loyalty Reward Points Using Blockchain
Driving Process Improvement Through Automation | Webinar

Recently uploaded (20)

PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
KodekX | Application Modernization Development
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PDF
cuic standard and advanced reporting.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Cloud computing and distributed systems.
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Advanced IT Governance
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Unlocking AI with Model Context Protocol (MCP)
20250228 LYD VKU AI Blended-Learning.pptx
GamePlan Trading System Review: Professional Trader's Honest Take
KodekX | Application Modernization Development
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
cuic standard and advanced reporting.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Cloud computing and distributed systems.
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Understanding_Digital_Forensics_Presentation.pptx
Advanced IT Governance

Cyber Security for Digital-Era

  • 1. 1 Cyber Security for Digital-Era AI, Machine Learning, Dynamic Threat Models for Proactive Threat Detection and Elimination Erich Berger Executive, Secure Design Kevin Stillman CISO, State University of NY Lalit Shinde EVP Security, Seceon
  • 2. Outline of the Presentation 2 Why should CxOs pay particular attention to Cyber Security Seceon’s Approach, Key Features/Technologies and Complete Solution Real world Examples, Benefits, Value Proposition to Enterprises Challenges faced by Cyber Security Experts, Tools and Solutions
  • 3. Why should CxO’s pay attention to Cyber Security?  Cost of Data Breach is not just lost Data, but the impact on Reputation, Brand and Business Revenue  Cyber attack puts not just you, but your customers, partners and employees at risk  Breaches have hefty cost associated with them – it’s a financial burden  Your Cyber hygiene affects everyone that you connect with  Legal aspects of Cyber Regulations – Compliance is one of the most important aspect in several regulated industries 3Source: Ponemon 2016 Cost of Data Breach Study Report
  • 4. Cost of Data Breach at a glance – 2016  $4 million is the average total cost of data breach  29% increase in total cost of data breach since 2013  $158 is the average cost per lost or stolen record – For Healthcare industry, it’s $355, most among all, for Education it’s $246 and for Banking it’s $221 per stolen record  Regulated industries, such as healthcare and financial services, have the most costly data breaches because of fines and the higher than average rate of lost business and customers.  15% increase in per capita cost since 2013 4Source: Ponemon 2016 Cost of Data Breach Study Report
  • 5. 5 Biggest Security Threats to Organizations Source: UBM Ponemon HPE 2016 Cyber Security Trends Report
  • 6. Challenges: Cost of MTTI and MTTC 6 MTTI – Mean Time To Identify MTTC – Mean Time To Contain US $M US $M Source: Ponemon 2016 Cost of Data Breach Study Report
  • 7. Challenges: Most Security Products Fall Short 7Source: Verizon 2016 Data Breach Investigation Report Stealing Credentials happens in minutes 95% Data Extraction happens within 24 hours Data Breaches – Why Automated Real-Time solution is a must?  Today’s approaches are reactive than proactive  Despite the investment and focus over past 3 years organizations are losing ground  The attacks are smarter and faster  The smart people based centric approach is too slow, too complicated and too expensive  A new fully automated comprehensive threat detect and response system is required  One that Detects threats in Minutes, Fully deploys & protects in a few hours and does not need rule or signature updates
  • 8. Challenges: Operational Cost of Investigations 8 Flows/Logs Troubleshooting Activity Type Flow/Log Instances Comments NG FW generates events/logs around an instance of an infected device attempting to connect to a bad web site. North-South Activity 444 NG FW is resetting connections from the device over time and is not correlating these "non critical flagged" instances Device is also performing IP Sweeps East- West Activity 135 Few separate instances across the internal network Device is also performing IP Port scans East- West Activity 92 Few separate instances across the internal network Device needs to be identified Internal Activity 1 What device is it? who or what group it belongs to? Total Activity 672 Total instances to investigate Consider an example where a device is infected with a Malware
  • 9. 9 Seceon’s Approach to Cyber Security Traditional Security Approach Seceon OTM Security Approach  Reactive Approach  Tools are highly specialized, but work in Silos with no comprehensive visibility  High CapEx with 20+ Security Tools  High OpEx with 1M+ events/logs per day – almost 80% require follow up  Investigation and Incident Response  90% take an hour or longer to identify  90% take a day or longer (many times months) to respond  Challenges  Lack of Integration among Tools  Knowledge/Skill of investigation and Response is costly  Proactive Approach  Moving from Point Tools to Complete Predictive Analysis Solution  Comprehensive Visibility across all Asset Groups – Devices, Applications, Network, Employees, Customers etc.  Automated Detection and Remediation  Predictive Threat Detection using AI, ML and Behavioral Threat Models  Automated Remediation within near Real Time  Automated Correlation  Contextual based Single Line Alerts  Rapid Deployment with Automated DevOps model and Open API
  • 10. Seceon OTM Platform Overview 10 Adaptive Visualization • Comprehensive view of all assets and threats • Fully automated solution that is easiest to deploy • Allows drill down of threats with all details Detect Threats that Matter • Detects known as well as unknown threats • Provides comprehensive information of the threats • Indicates all compromised assets and potential targets Contain Threats in Real Time • Immediate corrective action in real time • Automatic notification through email/text if required • Provides actionable analytics
  • 11. Built-in Security Threat Modeling Parse Dynamic Reduction Behavior Analysis Threat Correlation Threat Intelligence UniversalCollectionBus Unstructured Data Unstructured Data Store Storage Engine Search Rapid Search Agent Analytics Analytics Engine Big Data Store & Search Real-time Threat Detection Real-time Analytics Predictive Modeling Outputs Built-in Advanced Correlation Built-in ML Engine Built-in Data Model Engine Platform Security Engine Structured Data Parse Dynamic Reduction Parse Dynamic Reduction Seceon’s Scalable – Fast Analytics Processing Platform Distributed Data Ingest (CCE) Fast Parallel Processing Architecture (APE) Closed Loop Threat Containment Threat Containment
  • 12. Use Case – Compromised Credentials 12 • Compromised Credentials Account for 75% of data theft • Most traditional security solutions are blind to almost all forms of compromised credentials • Seceon detects all forms of compromised credential use in real-time for external or insider source verify User “A” Credentials Directory User: “A” “Credentials – User A” Host Name: “Bob’s PC”  No threat  No threat  Threat Indicator  No threat User: “A” “Credentials – User A” Host Name: “Joe’s PC” DB High Value Assets SIEM Learn User behavior based on geolocation, computer Used, time of logins, assets accessed, etc.. etc.
  • 13. Use Case – Ransomware 13 • Criminal Malware like Ransomware made it to top cyber security concern in 2016 • Ransomware had millions of different strains and families affecting large enterprises, as well as SMBs • Seceon detects all forms of Ransomware using layered approach of predictive analytics in real-time User “A” receives Email and cl icks on a innocuous link  Threat Indicator 1  No threat Bad Reputation URL Malware Downloaded Command and Control Network Scan for other v ulnerable hosts  Threat Indicator 2 High Value Assets Infection Propagation  Threat Indicator 3
  • 14.  Stops threats – automatically  Disable compromised credentials  Set filters on firewalls and switches  Block, rate limit or redirect traffic  Detects a full range of threats  Compromised Credentials  Insider threats  Brute force attacks  DDoS attack (all forms)  Malware, BOTs, APTs Ransomware… 14 Seceon OTM Key Features  Policy monitoring and enforcement  Protect critical resources  Restricting access to only select groups  Alert and stop upon attempt  Visualizes impact of attacks  On applications, users  On the network  Provides traffic trend monitoring
  • 15. Thank you For further info about Seceon please write to : meghna.jaiswal@jktech.com