SlideShare a Scribd company logo
1
Cybersecurity Solution Provider
European Leader
LEADERSHIP
CEO & Co-Founder
Jean-Nicolas Piotrowski
Former BNP Paribas CISO
ITrust, your cybersecurity expert
10 years experience in cybersecurity
35 collaborators and 30 Data Scientists in labs
More than 200 public and private clients
100% growth/year
VP Business
David Ofer
IT Engineer
PhD in Management, HEC
20 years of experience in High tech
business development
CFO & Co-Founder
Henri Piotrowski
Supaéro Engineer, former AIRBUS-ATR CEO
Paris, Toulouse (headquarters), New York,
Colombus, Shanghai (ongoing)
Value proposal
Covers all cybersecurity activities in all sectors
Leading solutions
International
Cybersecurity as a Service
Shareholders and financial aid
100% French simplified joint-stock company / 483.352 € share capital / 3,3 M€ owner equity
Private and institutional investors (NewAlpha, Nestadio, Crédit Agricole, Caisse d’Epargne)
Supported by the French state:
Financial aid through BPI and the Deposits and Consignments Fund (reimboursable R&D financing)
Financing through the « Investment for the Future » programme
Partners
Prizes & Associates
ITrust, your cybersecurity expert
A company worthy of our attention:
ITrust declares war on hacking
Translation (FR-EN)
of article retrieved from the
<LesEchos.fr> online newspaper &
published by Laurent Marcaillou,
Toulouse, 25.02.2015
“ITrust started its missions in IT security within
Airbus, Toulouse, in 2007. With this expertise, the
young company designed the IKare software, able to
scan an information system in order to detect
potential weaknesses and manage security. Launched
in 2012 , this solution minimizes the duration of an
audit concerning an information system. Its sales
were doubled in 2014 after registering roughly 1,030
new clients.
The enterprise, with only 25 employees, also doubled
its turnover to 1,3 million euro and envisions another
two-fold increase in its turnover for the year 2015.
Among its clients, we will stumble upon giants such
as: Total, Air France, Airbus, Bull [...]”
Articles in press
about ITrust & its solutions
ITrust presents an unequaled
software an European Level
“The Toulouse-based enterprise ITrust, specialized
in IT security, is on the verge of unveiling a new, yet
to be seen cybersecurity software.
ITrust’s CEO, Jean‐Nicolas Piotrowski, was present
at the International Cybercrime Forum to present
this exciting innovation.
Q: Why is your new product considered a
breakthrough among existing IT security solutions?
R: We’ve been working on IT-Tude for 7 years now:
it’s a groundbreaking technology that enables
people to detect weak signals hinting at unknown
viruses, otherwise known as APTs (Advanced
Persistent Threats).”
Translation (FR-EN)
of article retrieved from the
<Tribune> online newspaper and
published by Valentin Dohin,
29.01.2015
Articles in press
about ITrust & its solutions
A French security solution
on a French cloud
“Developed by the Secure Virtual Cloud
(SVC) consortium, this 3-year project
worth 14 mil. Euro is led by the
Toulouse-based start-up ITrust and nine
other partners, of which we will
mention the IT Research Institute of
Toulouse (IRIT), The System Analysis and
Architecture Laboratory (LAAS) and Bull.
Founded in 2007, ITrust distributes
IKare, a vulnerability management
software proposed in cloud mode for
real-time monitoring, or through
licensing bit by bit. Its interest?[...]”
Translation (FR-EN)
of article retrieved from the
<L’Usine Nouvelle> online
newspaper and published by
Ridha Loukll, 20.09.2012
Articles in press
about ITrust & its solutions
Defence & aero
Bank
Health & pharma
Public sector
Insurance & social protection
Transport & logistics
Education Energy &
utilities
Food industry
Client references
More than 100 clients in Europe – 300 000 continuously supervised IPs
15 million stolen credit cards
Target Credit Cards &
Customer Info Hacked (2013)
“US discount retailer Target found 40
million of its customer accounts were
hacked during November 27 and
December 15, 2013.
Across the US, during Black Friday, the
Target stores were targeted and
customer names, credit cards, debit
cards, and CVV values of several
customers were hacked. The retail
major said that other information such
as addresses, PIN, social security
numbers, etc., were not hacked
however. “
Extract from the “Recent Hacking
Incidents Around the World“ article
retrieved from the <MapsOfWorld>
online newspaper , published
01.09.2014
Authorities suspect perpetrator
is based in the United States
“According to the LaTribune.fr, The National
Information System Security Agency (ANSSI)
launched an investigation in order to establish
whether or not Airbus Helicopters fell victim to a
hacking incident that might be linked to an
important call for tenders in Poland. The online
newspaper quotes relevant sources when
indicating that the perpetrator is most likely
based in the United States. The American
companies Sikorsky and Boeing are at the present
moment involved in a full-blown commercial
battle on Polish territory with the European
manufacturer. [...]”
Translation (FR-EN) of article
retrieved from the <L’Usine
Digitale> online newspaper and
published by Julien Bonnet,
13.11.2014
Airbus Helicopters, victim
of a cyber-attack
Biggest heist of the century
hits the banking sector
“A band of Russian, Ukrainian and Chinese
criminals discovered a way to hack into
several banking institutions by infiltrating
their networks. The losses recorded after
the attacks, which were launched in 2013
and continue to this day, amount to a
billion euro.
We are potentially witnessing the biggest
heist of the century. The Russian
Cybersecurity Expert, Kaspersky, released
Monday a report revealing that, since
2013, over a hundred banks had been
hacked by 2.0 thieves.”
Translation (FR-EN)
of article retrieved from the
<FranceSoir.fr> online newspaper
and published 16.02.2015
Banks: more than a billion dollars
stolen by hackers
Sony Pictures Hack:
Co-chairmain Amy Pascal resigns
“Amy Pascal, Co-chairman of Sony Pictures,
finally announced her resignation.
The group was hacked at the end of
November and the attackers leaked some
of Mrs. Pascal’s emails, containing racist
content directed towards President Barack
Obama.
Having tarnished the studio’s reputation,
the scandal quickly reached international
proportions. In other words, the Co-
chairman’s departure was to be expected.”
Translation (FR-EN)
of article retrieved from the
<LePoint> online newspaper and
published 05.02.2015
Hacking & its human consequences
Cybersecurity Solution Provider
Expertise – Products – Security Operations Center
EXPERTISE
Expertise
Consulting
Pentest
Darknet
Training
This is the core business of ITrust.
Our Security Consultants test the
resistance of your architecture, be
it externally or internally, and
accompany you in order to help
you secure your computer network
in the long term.
SOLUTIONS
vulnerability scanner
behavioral analytics
framework & AI
Our engineers are constantly
developing new tools to facilitate
the management, analysis and
understanding of vulnerabilities
and cyber attacks.
SOC as a Service
Managed and/or
SaaS and/or
OEM and/or
On Premise and/or
ITrust manages the entire security
process of companies that wish to
outsource their cybersecurity.
Our Security Operations Center
integrates advanced reporting and is
based on our two leading products.
Vulnerability management
Risk & Report
Vulnerability scanning tool
The implementation of IKare can lead to a 90% reduction of
vulnerabilities on the network it is deployed on. 90% is also
the rate of success of our penetration tests (auditing)
performed at our clients. IKare allows the identification and
correction of their security flaws.
TOP 10 uncovered Covered
security flaws by IKare
“Wordy” systems
Weak passwords
Permissions and access rights
Inter-domain trust
Databases
with default passwords
“Wordy” DNS serves
Sharing confidential files
Poorly configured
protocols
Abandoned development
servers
Non-rectified known vulnerabilities
Vulnerability coverage rate of the
top 10 vulnerability by technology type:
99% of security flaws
could be easily rectified...
…but these issues cannot be addressed by an antivirus & firewalls!
IKare –
Positioning
Automated Vulnerability & Security Audit tool
Values Accessible and intuitive
Simple and modern
Tailored reporting to management
Best practices
The fruit of the cybersecurity experience of our consultants
Why? ALM : Up-to-date systems
IT : Supervision and Dashboard
DG : Risk Assesment - legal
Use Virtual machine or server in your information system
Cloud mode: from ITrust servers
Ready to deploy and operational in a few minutes
Deployement No agents needed for installation
Automated network discovery
Ready to integrate in the information system
Assets French Cloud (not restricted by the Patriot Act)
Service and proximity
R&D with LaaS, IRIT and TSoE
IKare Vulnerability Management
Product positioning
• Vulnerability audit in real-time
• Proactive security issues identification
• Infrastructure and applications automated discovery
• Correlation and supervision
Vulnerability detection becomes more reliable. These engines limit the number of false positives and allow
the detection of abnormal behaviors.
• Responsibility area determination
• Security alerts
• Virtual groups ensuring decision-making concerning security
• Trending, security evolution in time
• Business unit management
IKare functions
IKare: simple & intuitive interface
A major breakthrough
“BEHAVIORAL ANALYSIS IS THE MOST PLAUSIBLE SOLUTION FOR UNKNOWN VIRUS”
NSA VICE CHAIRMAN 2012
“The next Pearl Harbor we might be
confronted with could very well be a
cyber attack”
– Leon Panetta, US Secretary of Defense
& former CIA Director (August 2011
Senate Hearing)
Behavioral analysis
can boost cybersecurity
“Behavioral analysis is the most
plausible solution for unknown viruses”
– NSA Director , 2012
ITrust Company Overview EN
21
A groundbreaking technology
• Protects your infrastructures against APTs, viruses & unknown attacks
• Detects malicious behaviors within your information system
• Identifies weak signals in order to anticipate performance problems,
but is also capable of identifying stealth attacks
• Avoids data extraction
• Avoids resource depletion within your information system
Reveelium
Anomaly Detection Platform
Reveelium is a complete anomaly detection and prevention platform:
 It relies on your existing infrastructures (« Plug and play »);
 Automatically detects, analyses and prioritizes anomalies, grading them according to their
potential risk;
Predicts performance or security issues with the use of machine
learning technologies.
Reveelium
Product principle
1. A weak signal analysis
built on our research and partnerships with mathematical laboratories.
2. A logical correlator
built on the experience of our engineers and security consultants.
3. A shared knowledge base
Reveelium is a unique combination of 3 scanning engines:
An innovating 3D-technology
• What is an anomaly?
– Weird condition/nonsensical sample/deviation from the norm
– Data inconsistency not matching with any normal behavior
(either observed or learned)
• How do we detect it?
– By using Machine Learning technologies
– By building profiles of normal behaviors
– By identifying deviations from the norm
Anomaly detection
Machine learning
Huge data volumes learning
Normal behaviors learning with a minimum of human interaction
& Statistical and preventive analysis
Validating learning
Identifying nonsensical / missing samples
Identifying seasonalities
Identifying abnormal behaviors
Reveelium engines
is not a new concept, but Reveelium repurposes it in the
scope of automatic learning applied to supervised systems.
Learning VS correlation…
… why not use both,
for better qualified results:
• Eliminating false positives
• Correlating external data sources
in order to fine-tune the decision-making process
• System expert
Post-treatment results
Anomaly detection engines
Reveelium: APT Threat Module
Use case demonstration
Reveelium: APT Threat Module
Use case demonstration
Plugin SIEM or through application
VM Standalone
External VM SaaS or on the premises
Covers the entire supervision platform: logging, log correlation, alert correlation
POC Model
Similar to a plugin for enterprise applications, journals, XML
data, meant to search for professional anomalies and all
abnormal behaviors alike (AS, IAM, Messaging…)
Plug and play on a supervision platform
No need to be a security consultant or Data Scientist!
can be delivered through
private or public cloud by
Saas or OnPremise
Delivery models
• Risk management policies
• Justifying the existence of a cyber attack
• Ability to assess proof for a filed complaint
• Security level history up until the moment of the attack
• Legal investigation – forensic computing
• Cyber-insurance
• Limited criminal risk
• Pro-active defense process
Legal outlook
Thank you
Contact
ITrust Headquarters
55 Avenue l’Occitane, BP 67303
31673 Labege Cedex
Telephone: +33 (0)5 67 34 67 80
Email: sales@itrust.fr
International Office:
24 rue Firmin Gillot
75015 Paris
www.itrust.fr/en
www.ikare-monitoring.com
www.reveelium.com/en

More Related Content

PDF
European Cyber Security Perspectives 2016
PDF
Financier Worldwide - Cyber Security annual review
PDF
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
PPTX
Vulnerability Intelligence - Standing Still in a world full of change
PDF
The Proactive Approach to Cyber Security
PPT
The Changing Security Landscape
PDF
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
PDF
Ten Expert Tips on Internet of Things Security
European Cyber Security Perspectives 2016
Financier Worldwide - Cyber Security annual review
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Vulnerability Intelligence - Standing Still in a world full of change
The Proactive Approach to Cyber Security
The Changing Security Landscape
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
Ten Expert Tips on Internet of Things Security

What's hot (19)

PDF
Cyber Security at CTX15, London
PPT
Securing Systems of Engagement
PDF
Top firewall companies 2020 converted
PPTX
netwealth and Sense Of Security webinar: What you need to know about cyber se...
PPT
Smarter Cyber Security
PDF
Key Findings from the 2015 IBM Cyber Security Intelligence Index
PPT
Presentazione Security Challenga 12/9/16 Bologna
PDF
The ever increasing threat of cyber crime
PPTX
Cyber Security Professionals Viewed via Supply Chain
PPTX
106 Threat defense and information security development trends
PDF
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
PDF
40 under 40 in cybersecurity. top cyber news magazine
PDF
PDF
Using international standards to improve Asia-Pacific cyber security
PPTX
cybersecurity strategy planning in the banking sector
PDF
Cyber security money men
PPTX
IoT Security Awareness Training : Tonex Training
PPT
December ISSA Meeting Executive Security Presentation
PPTX
Summer internship - Cybersecurity
Cyber Security at CTX15, London
Securing Systems of Engagement
Top firewall companies 2020 converted
netwealth and Sense Of Security webinar: What you need to know about cyber se...
Smarter Cyber Security
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Presentazione Security Challenga 12/9/16 Bologna
The ever increasing threat of cyber crime
Cyber Security Professionals Viewed via Supply Chain
106 Threat defense and information security development trends
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
40 under 40 in cybersecurity. top cyber news magazine
Using international standards to improve Asia-Pacific cyber security
cybersecurity strategy planning in the banking sector
Cyber security money men
IoT Security Awareness Training : Tonex Training
December ISSA Meeting Executive Security Presentation
Summer internship - Cybersecurity
Ad

Viewers also liked (6)

PDF
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
PDF
Cybersecurity with AI - Ashrith Barthur
PDF
CyberSecurity Vision: 2017-2027 & Beyond!
PDF
Cyber Security 2017 Challenges
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PDF
2017 Cybersecurity Predictions
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity with AI - Ashrith Barthur
CyberSecurity Vision: 2017-2027 & Beyond!
Cyber Security 2017 Challenges
Cyber Risk Management in 2017: Challenges & Recommendations
2017 Cybersecurity Predictions
Ad

Similar to ITrust Company Overview EN (20)

PDF
THE SIGNIFICANCE OF CYBERSECURITY
PDF
Cybersecurity - Poland.pdf
PPTX
220715_Cybersecurity: What's at stake?
PPTX
IT Security and Wire Fraud Awareness Slide Deck
PPT
Out of the Blue: Responding to New Zero-Day Threats
PDF
Check point presentation june 2014
PDF
Hacking 04 2011
PPTX
SITSecure Audits
PDF
Cybersecurity | Risk. Impact. Innovations.
PDF
2010 6 Things u need 2 know in 2010 Whitepaper Final
PDF
Kaspersky - Apresentação Corporativa
PPTX
Security Minded - Ransomware Awareness
PPTX
Most notable apt_ attacks_of_2015_and_2016 predictions
PPTX
APT or not - does it make a difference if you are compromised?
PDF
Sophos security-threat-report-2014-na
PDF
Cyber security for ia and risk 150601
PDF
Scansafe Annual Global Threat Report 2009
PPTX
Global threat landscape
PDF
Top Security Trends for 2013
PPTX
Carm presentation new logo may 14
THE SIGNIFICANCE OF CYBERSECURITY
Cybersecurity - Poland.pdf
220715_Cybersecurity: What's at stake?
IT Security and Wire Fraud Awareness Slide Deck
Out of the Blue: Responding to New Zero-Day Threats
Check point presentation june 2014
Hacking 04 2011
SITSecure Audits
Cybersecurity | Risk. Impact. Innovations.
2010 6 Things u need 2 know in 2010 Whitepaper Final
Kaspersky - Apresentação Corporativa
Security Minded - Ransomware Awareness
Most notable apt_ attacks_of_2015_and_2016 predictions
APT or not - does it make a difference if you are compromised?
Sophos security-threat-report-2014-na
Cyber security for ia and risk 150601
Scansafe Annual Global Threat Report 2009
Global threat landscape
Top Security Trends for 2013
Carm presentation new logo may 14

More from ITrust - Cybersecurity as a Service (20)

DOCX
IT security : a five-legged sheep
DOCX
Petya, pire que WannaCry ?
DOCX
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
PDF
Manifeste ResistanceCYBER 29.05.17
DOCX
Advanced persistent threats, entre mythe et réalité
DOCX
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
DOCX
Artificial intelligence and machine learning: ultimate game changers
PDF
Manifeste ResistanceCYBER 19.05.17
PDF
Manifeste ResistanceCYBER 18.05.17
PDF
Manifeste ResistanceCYBER 17.05.17
PDF
Manifeste ResistanceCYBER 15.05.17
DOCX
Passer de la détection d’anomalies à la détection de menaces
DOCX
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
DOCX
L’étrange histoire d’un piratage en Angleterre
DOCX
Ignorance is bliss, but not for MongoDB
DOCX
Cisco WebEx vulnerability: it’s a kind of magic
PDF
ITrust Company Overview FR
PDF
SOC OEM - Datasheet FR
PDF
SOC OEM - Datasheet EN
PDF
Reveelium Technical Overview - Datasheet FR
IT security : a five-legged sheep
Petya, pire que WannaCry ?
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
Manifeste ResistanceCYBER 29.05.17
Advanced persistent threats, entre mythe et réalité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Artificial intelligence and machine learning: ultimate game changers
Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 15.05.17
Passer de la détection d’anomalies à la détection de menaces
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
L’étrange histoire d’un piratage en Angleterre
Ignorance is bliss, but not for MongoDB
Cisco WebEx vulnerability: it’s a kind of magic
ITrust Company Overview FR
SOC OEM - Datasheet FR
SOC OEM - Datasheet EN
Reveelium Technical Overview - Datasheet FR

Recently uploaded (20)

PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
AI in Product Development-omnex systems
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
top salesforce developer skills in 2025.pdf
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
ai tools demonstartion for schools and inter college
PPTX
Transform Your Business with a Software ERP System
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPT
Introduction Database Management System for Course Database
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Nekopoi APK 2025 free lastest update
PDF
Digital Strategies for Manufacturing Companies
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Softaken Excel to vCard Converter Software.pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
AI in Product Development-omnex systems
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
ManageIQ - Sprint 268 Review - Slide Deck
PTS Company Brochure 2025 (1).pdf.......
How to Migrate SBCGlobal Email to Yahoo Easily
top salesforce developer skills in 2025.pdf
How to Choose the Right IT Partner for Your Business in Malaysia
ai tools demonstartion for schools and inter college
Transform Your Business with a Software ERP System
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Introduction Database Management System for Course Database
Design an Analysis of Algorithms I-SECS-1021-03
Nekopoi APK 2025 free lastest update
Digital Strategies for Manufacturing Companies
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025

ITrust Company Overview EN

  • 2. LEADERSHIP CEO & Co-Founder Jean-Nicolas Piotrowski Former BNP Paribas CISO ITrust, your cybersecurity expert 10 years experience in cybersecurity 35 collaborators and 30 Data Scientists in labs More than 200 public and private clients 100% growth/year VP Business David Ofer IT Engineer PhD in Management, HEC 20 years of experience in High tech business development CFO & Co-Founder Henri Piotrowski Supaéro Engineer, former AIRBUS-ATR CEO Paris, Toulouse (headquarters), New York, Colombus, Shanghai (ongoing) Value proposal Covers all cybersecurity activities in all sectors Leading solutions International Cybersecurity as a Service
  • 3. Shareholders and financial aid 100% French simplified joint-stock company / 483.352 € share capital / 3,3 M€ owner equity Private and institutional investors (NewAlpha, Nestadio, Crédit Agricole, Caisse d’Epargne) Supported by the French state: Financial aid through BPI and the Deposits and Consignments Fund (reimboursable R&D financing) Financing through the « Investment for the Future » programme Partners Prizes & Associates ITrust, your cybersecurity expert
  • 4. A company worthy of our attention: ITrust declares war on hacking Translation (FR-EN) of article retrieved from the <LesEchos.fr> online newspaper & published by Laurent Marcaillou, Toulouse, 25.02.2015 “ITrust started its missions in IT security within Airbus, Toulouse, in 2007. With this expertise, the young company designed the IKare software, able to scan an information system in order to detect potential weaknesses and manage security. Launched in 2012 , this solution minimizes the duration of an audit concerning an information system. Its sales were doubled in 2014 after registering roughly 1,030 new clients. The enterprise, with only 25 employees, also doubled its turnover to 1,3 million euro and envisions another two-fold increase in its turnover for the year 2015. Among its clients, we will stumble upon giants such as: Total, Air France, Airbus, Bull [...]” Articles in press about ITrust & its solutions
  • 5. ITrust presents an unequaled software an European Level “The Toulouse-based enterprise ITrust, specialized in IT security, is on the verge of unveiling a new, yet to be seen cybersecurity software. ITrust’s CEO, Jean‐Nicolas Piotrowski, was present at the International Cybercrime Forum to present this exciting innovation. Q: Why is your new product considered a breakthrough among existing IT security solutions? R: We’ve been working on IT-Tude for 7 years now: it’s a groundbreaking technology that enables people to detect weak signals hinting at unknown viruses, otherwise known as APTs (Advanced Persistent Threats).” Translation (FR-EN) of article retrieved from the <Tribune> online newspaper and published by Valentin Dohin, 29.01.2015 Articles in press about ITrust & its solutions
  • 6. A French security solution on a French cloud “Developed by the Secure Virtual Cloud (SVC) consortium, this 3-year project worth 14 mil. Euro is led by the Toulouse-based start-up ITrust and nine other partners, of which we will mention the IT Research Institute of Toulouse (IRIT), The System Analysis and Architecture Laboratory (LAAS) and Bull. Founded in 2007, ITrust distributes IKare, a vulnerability management software proposed in cloud mode for real-time monitoring, or through licensing bit by bit. Its interest?[...]” Translation (FR-EN) of article retrieved from the <L’Usine Nouvelle> online newspaper and published by Ridha Loukll, 20.09.2012 Articles in press about ITrust & its solutions
  • 7. Defence & aero Bank Health & pharma Public sector Insurance & social protection Transport & logistics Education Energy & utilities Food industry Client references More than 100 clients in Europe – 300 000 continuously supervised IPs
  • 8. 15 million stolen credit cards Target Credit Cards & Customer Info Hacked (2013) “US discount retailer Target found 40 million of its customer accounts were hacked during November 27 and December 15, 2013. Across the US, during Black Friday, the Target stores were targeted and customer names, credit cards, debit cards, and CVV values of several customers were hacked. The retail major said that other information such as addresses, PIN, social security numbers, etc., were not hacked however. “ Extract from the “Recent Hacking Incidents Around the World“ article retrieved from the <MapsOfWorld> online newspaper , published 01.09.2014
  • 9. Authorities suspect perpetrator is based in the United States “According to the LaTribune.fr, The National Information System Security Agency (ANSSI) launched an investigation in order to establish whether or not Airbus Helicopters fell victim to a hacking incident that might be linked to an important call for tenders in Poland. The online newspaper quotes relevant sources when indicating that the perpetrator is most likely based in the United States. The American companies Sikorsky and Boeing are at the present moment involved in a full-blown commercial battle on Polish territory with the European manufacturer. [...]” Translation (FR-EN) of article retrieved from the <L’Usine Digitale> online newspaper and published by Julien Bonnet, 13.11.2014 Airbus Helicopters, victim of a cyber-attack
  • 10. Biggest heist of the century hits the banking sector “A band of Russian, Ukrainian and Chinese criminals discovered a way to hack into several banking institutions by infiltrating their networks. The losses recorded after the attacks, which were launched in 2013 and continue to this day, amount to a billion euro. We are potentially witnessing the biggest heist of the century. The Russian Cybersecurity Expert, Kaspersky, released Monday a report revealing that, since 2013, over a hundred banks had been hacked by 2.0 thieves.” Translation (FR-EN) of article retrieved from the <FranceSoir.fr> online newspaper and published 16.02.2015 Banks: more than a billion dollars stolen by hackers
  • 11. Sony Pictures Hack: Co-chairmain Amy Pascal resigns “Amy Pascal, Co-chairman of Sony Pictures, finally announced her resignation. The group was hacked at the end of November and the attackers leaked some of Mrs. Pascal’s emails, containing racist content directed towards President Barack Obama. Having tarnished the studio’s reputation, the scandal quickly reached international proportions. In other words, the Co- chairman’s departure was to be expected.” Translation (FR-EN) of article retrieved from the <LePoint> online newspaper and published 05.02.2015 Hacking & its human consequences
  • 12. Cybersecurity Solution Provider Expertise – Products – Security Operations Center EXPERTISE Expertise Consulting Pentest Darknet Training This is the core business of ITrust. Our Security Consultants test the resistance of your architecture, be it externally or internally, and accompany you in order to help you secure your computer network in the long term. SOLUTIONS vulnerability scanner behavioral analytics framework & AI Our engineers are constantly developing new tools to facilitate the management, analysis and understanding of vulnerabilities and cyber attacks. SOC as a Service Managed and/or SaaS and/or OEM and/or On Premise and/or ITrust manages the entire security process of companies that wish to outsource their cybersecurity. Our Security Operations Center integrates advanced reporting and is based on our two leading products.
  • 13. Vulnerability management Risk & Report Vulnerability scanning tool
  • 14. The implementation of IKare can lead to a 90% reduction of vulnerabilities on the network it is deployed on. 90% is also the rate of success of our penetration tests (auditing) performed at our clients. IKare allows the identification and correction of their security flaws. TOP 10 uncovered Covered security flaws by IKare “Wordy” systems Weak passwords Permissions and access rights Inter-domain trust Databases with default passwords “Wordy” DNS serves Sharing confidential files Poorly configured protocols Abandoned development servers Non-rectified known vulnerabilities Vulnerability coverage rate of the top 10 vulnerability by technology type: 99% of security flaws could be easily rectified... …but these issues cannot be addressed by an antivirus & firewalls!
  • 15. IKare – Positioning Automated Vulnerability & Security Audit tool Values Accessible and intuitive Simple and modern Tailored reporting to management Best practices The fruit of the cybersecurity experience of our consultants Why? ALM : Up-to-date systems IT : Supervision and Dashboard DG : Risk Assesment - legal Use Virtual machine or server in your information system Cloud mode: from ITrust servers Ready to deploy and operational in a few minutes Deployement No agents needed for installation Automated network discovery Ready to integrate in the information system Assets French Cloud (not restricted by the Patriot Act) Service and proximity R&D with LaaS, IRIT and TSoE IKare Vulnerability Management Product positioning
  • 16. • Vulnerability audit in real-time • Proactive security issues identification • Infrastructure and applications automated discovery • Correlation and supervision Vulnerability detection becomes more reliable. These engines limit the number of false positives and allow the detection of abnormal behaviors. • Responsibility area determination • Security alerts • Virtual groups ensuring decision-making concerning security • Trending, security evolution in time • Business unit management IKare functions
  • 17. IKare: simple & intuitive interface
  • 18. A major breakthrough “BEHAVIORAL ANALYSIS IS THE MOST PLAUSIBLE SOLUTION FOR UNKNOWN VIRUS” NSA VICE CHAIRMAN 2012
  • 19. “The next Pearl Harbor we might be confronted with could very well be a cyber attack” – Leon Panetta, US Secretary of Defense & former CIA Director (August 2011 Senate Hearing) Behavioral analysis can boost cybersecurity “Behavioral analysis is the most plausible solution for unknown viruses” – NSA Director , 2012
  • 22. • Protects your infrastructures against APTs, viruses & unknown attacks • Detects malicious behaviors within your information system • Identifies weak signals in order to anticipate performance problems, but is also capable of identifying stealth attacks • Avoids data extraction • Avoids resource depletion within your information system Reveelium Anomaly Detection Platform
  • 23. Reveelium is a complete anomaly detection and prevention platform:  It relies on your existing infrastructures (« Plug and play »);  Automatically detects, analyses and prioritizes anomalies, grading them according to their potential risk; Predicts performance or security issues with the use of machine learning technologies. Reveelium Product principle
  • 24. 1. A weak signal analysis built on our research and partnerships with mathematical laboratories. 2. A logical correlator built on the experience of our engineers and security consultants. 3. A shared knowledge base Reveelium is a unique combination of 3 scanning engines: An innovating 3D-technology
  • 25. • What is an anomaly? – Weird condition/nonsensical sample/deviation from the norm – Data inconsistency not matching with any normal behavior (either observed or learned) • How do we detect it? – By using Machine Learning technologies – By building profiles of normal behaviors – By identifying deviations from the norm Anomaly detection
  • 26. Machine learning Huge data volumes learning Normal behaviors learning with a minimum of human interaction & Statistical and preventive analysis Validating learning Identifying nonsensical / missing samples Identifying seasonalities Identifying abnormal behaviors Reveelium engines is not a new concept, but Reveelium repurposes it in the scope of automatic learning applied to supervised systems.
  • 27. Learning VS correlation… … why not use both, for better qualified results: • Eliminating false positives • Correlating external data sources in order to fine-tune the decision-making process • System expert Post-treatment results
  • 29. Reveelium: APT Threat Module Use case demonstration
  • 30. Reveelium: APT Threat Module Use case demonstration
  • 31. Plugin SIEM or through application VM Standalone External VM SaaS or on the premises Covers the entire supervision platform: logging, log correlation, alert correlation POC Model Similar to a plugin for enterprise applications, journals, XML data, meant to search for professional anomalies and all abnormal behaviors alike (AS, IAM, Messaging…) Plug and play on a supervision platform No need to be a security consultant or Data Scientist! can be delivered through private or public cloud by Saas or OnPremise Delivery models
  • 32. • Risk management policies • Justifying the existence of a cyber attack • Ability to assess proof for a filed complaint • Security level history up until the moment of the attack • Legal investigation – forensic computing • Cyber-insurance • Limited criminal risk • Pro-active defense process Legal outlook
  • 33. Thank you Contact ITrust Headquarters 55 Avenue l’Occitane, BP 67303 31673 Labege Cedex Telephone: +33 (0)5 67 34 67 80 Email: sales@itrust.fr International Office: 24 rue Firmin Gillot 75015 Paris www.itrust.fr/en www.ikare-monitoring.com www.reveelium.com/en