SlideShare a Scribd company logo
SCALAR
SECURITY
APRIL 2015
www.scalar.ca
Earlier this month, we had over 150 people join us in Toronto and
Vancouver as our technical team demonstrated some of the best
security defence technologies on the market today. We focused on
defence in three key areas:
ENDPOINT APPLICATION NETWORK
WHY?
We studied the
Canadian market
and…
Believe they are winning the Cyber Security war
Suffered a breach leading to loss or disclosure of
sensitive data
Average annual number of attacks
Average cost to address a security breach
41%
46%
34
$200,000
High performing
organization have 25%
less breaches by…
DEFENDING
DEFEND THE
.
.
.
DEFEND THE ENDPOINT
WHY BROMIUM?
Open anything,
from anyone,
anywhere…
ANY CO. PLC
THEM vs US
Prioritize Focus
The key security
threat channels are
Web and Email.
The key threat
vectors are web-
links and
downloaded files.
Your security posture
is significantly
improved by negating
the key security issues
of users clicking
malicious web-links
and opening infected
attachments.
&
Endpoint Isolation Technology
Untrusted user tasks and any malware
are isolated in a super-efficient micro-VM.
All micro-VMs destroyed, eliminating
all traces of malware with them.
Interested in learning
more about ?
Contact us here.
DEFEND THE APPLICATION
WHY WHITEHAT?
Application security testing
leader with over 30,000 sites
under management
• Integrates into your development process
• Directly connects to source code repository
• Designed for Agile
• Your code stays onsite
• Verified vulnerabilities avoid false positives
• Assesses partial code, as often as needed
SAST – “Sentinel Source” Static Testing
• Assesses both iOS and Android applications
• Tests native mobile code and server-side APIs
• Identifies critical vulnerabilities including OWASP Mobile Top 10
• Verified findings:
• Zero false positives reduce overhead for developers
• Results prioritized by risk
• Covers traffic analysis between client and server-side
Sentinel Mobile – Secure Mobile Devices
•Non-intrusive, non-disruptive, 24x7 coverage
•Meets and exceeds PCI 6.5/6.6 requirements
•Full service and support included in all offerings
•Unlimited retests, integration support, and
remediation guidance at no additional charge
•Persistent, consistent testing and results
DAST – Dynamic Application Testing
Application Security Lifecycle
Integrated
Application
Security Lifecycle
Software
Development
Lifecycle
SAST
Continuous Testing
• Full SDLC coverage: training, development, QA, and production
• Stop using Tiger teams!
Expert hands-on guidance from the Threat Research Center
• 100% verified vulnerabilities, 0 false positives
• 150+ security engineers available by phone/email/WebEx
Retest, Retest, Retest
• Trending of vulnerabilities across time and continuous assessment
of deployment
How to Remediate Vulnerabilities
Baseline Edition (Static Webpages)
• Unauthenticated, Verified Results
Standard Edition (Directed/Opportunistic)
• Custom configured logins and multi-step sequences
• Comprehensive coverage for technical vulnerabilities
Sentinel PE (Fully Targeted / High Risk)
• Ideal for high impact sites with sensitive user and financial information
• Technical and business logic vulnerabilities, complete WASC v2
How Deep to Test?
• Web & PDF Based
• Bi-Directional XML API
• Integration with popular technologies like Jira, Archer, F5 & Imperva
Flexible Reporting
Interested in learning
more about ?
Contact us here.
DEFEND THE NETWORK
WHY LOGRHYTHM?
Global leader in security intelligence
and analytics empowering
organizations to rapidly detect,
respond, and neutralize cyber threats.
Retail Cyber Crime Module
• New processes
• New authentications
• New FIM access events
• Any FIM modification event
• Any DLD activity
• New common event
• New network activity
Use Case: Detect compromised back office systems
Details: Identify suspicious changes on back office systems and the
network activity they generate
AIE Rules look for:
Data Classification
LogRhythm not only structures incoming data, but adds contextual
information such as:
• Classification
• Common Event
• Risk Score
Reduces time required for analysis and ensure query results are complete
Provides deep intelligence on more than 600 different systems, devices,
apps, databases, etc…
• 20-30 added each quarter
Scenario Building Blocks
Log Observed
Log Not Observed
Log Not Observed Scheduled
Threshold Observed
Threshold Not Observed
Threshold Not Observed
Scheduled
Unique Value Observed
Unique Value
Not Observed
Unique Value Not Observed
Scheduled
Whitelist
Trend
Statistical
The Platform for Security IntelligenceInput Analytics Output
Privileged User Monitoring
• New admin activity
• Mass object deletion
• Users added to privileged group
• Recently disabled privileged
account activity
Use Case: Detect a rogue administrator account
Details: Identify when a privileged user is abusing authority,
indicating either insider threat activity or compromised credentials
AIE Rules look for:
Analytics Modules
• Industry experts
• Machine data intelligence
• Security compliance
• Advanced Threat Research
Rapid-Time
to-Value
Knowledge
• Embedded expertise
• Ready-to-use content
• Frequent, automatic
updates
• Knowledge aligned to
organizational goals
• Quick benefit recognition
• Ongoing additional value
Interested in learning
more about ?
Contact us here.
Is your company High Performing?
Find out in our 2015 Security Study
.
Download here.
facebook.com/scalardecisions
@scalardecisions linkedin.com/company/scalar-decisions
slideshare.net/scalardecisions
Connect with us!

More Related Content

PDF
Cloud Perspectives - Ottawa Seminar - Oct 6
PDF
Optimize IT Infrastructure
PDF
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
PDF
Scalar cloud study2016_slideshare
PDF
Scalar - a brief introduction
PDF
Keys to success and security in the cloud
PPTX
Jack Nichelson - Information Security Metrics - Practical Security Metrics
PDF
Ofer Maor - Security Automation in the SDLC - Real World Cases
Cloud Perspectives - Ottawa Seminar - Oct 6
Optimize IT Infrastructure
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar cloud study2016_slideshare
Scalar - a brief introduction
Keys to success and security in the cloud
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Ofer Maor - Security Automation in the SDLC - Real World Cases

What's hot (20)

PPTX
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
PPSX
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
PDF
CSA Introduction 2013 David Ross
PPTX
Security and governance in the cloud
PPTX
NIST Cybersecurity Framework (CSF) on the Public Cloud
PDF
CASB — Your new best friend for safe cloud adoption?
PDF
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
PDF
Robert Hurlbut - Threat Modeling for Secure Software Design
PPTX
Runecast Analyzer Overview
PDF
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
PPTX
CASB: Securing your cloud applications
PDF
Cloud security: Accelerating cloud adoption
PPTX
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
PPTX
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
PDF
Issa symc la 5min mr
PDF
How to Keep your Atlassian Cloud Secure
 
PDF
Biznet Gio Presentation - Database Security
PDF
Enterprise policy-management
PDF
Managing risk and vulnerabilities in a business context
PDF
Accelerating OT - A Case Study
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
CSA Introduction 2013 David Ross
Security and governance in the cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
CASB — Your new best friend for safe cloud adoption?
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
Robert Hurlbut - Threat Modeling for Secure Software Design
Runecast Analyzer Overview
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
CASB: Securing your cloud applications
Cloud security: Accelerating cloud adoption
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Issa symc la 5min mr
How to Keep your Atlassian Cloud Secure
 
Biznet Gio Presentation - Database Security
Enterprise policy-management
Managing risk and vulnerabilities in a business context
Accelerating OT - A Case Study
Ad

Similar to Scalar Security Roadshow April 2015 (20)

PDF
Complete Endpoint protection
 
PDF
MID_SIEM_Boubker_EN
PDF
DS_Sentinel_4pg_031513
PPT
Smart security solutions for SMBs
PPT
Core.co.enterprise.deck.06.16.10
PPTX
CSO CXO Series Breakfast
PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
 
PPTX
Cyber Security in the market place: HP CTO Day
PPTX
IBM Relay 2015: Securing the Future
 
PPTX
SAM05_Barber PW (7-9-15)
PDF
Cybersecurity update 12
PPTX
Karunia Wijaya - Proactive Incident Handling
PPTX
Managed Security Services from Symantec
PDF
Week 09_Cyber security u.pdf
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
PPTX
5 Steps to Reduce Your Window of Vulnerability
PDF
Many products-no-security (1)
PPTX
Enterprise under attack dealing with security threats and compliance
PPTX
Cyber Security protection by MultiPoint Ltd.
PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
Complete Endpoint protection
 
MID_SIEM_Boubker_EN
DS_Sentinel_4pg_031513
Smart security solutions for SMBs
Core.co.enterprise.deck.06.16.10
CSO CXO Series Breakfast
Automating Critical Security Controls for Threat Remediation and Compliance
 
Cyber Security in the market place: HP CTO Day
IBM Relay 2015: Securing the Future
 
SAM05_Barber PW (7-9-15)
Cybersecurity update 12
Karunia Wijaya - Proactive Incident Handling
Managed Security Services from Symantec
Week 09_Cyber security u.pdf
How to Solve Your Top IT Security Reporting Challenges with AlienVault
5 Steps to Reduce Your Window of Vulnerability
Many products-no-security (1)
Enterprise under attack dealing with security threats and compliance
Cyber Security protection by MultiPoint Ltd.
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
Ad

More from Scalar Decisions (20)

PPTX
La transformation numérique de Scalar
PDF
Digital Transformation
PDF
2017 Scalar Security Study Summary
PDF
2016 Scalar Security Study Roadshow
PDF
Résumé de l’étude sur la sécurité de Scalar 2016
PDF
Executive Summary of the 2016 Scalar Security Study
PDF
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
PDF
Web scale with-nutanix_rev
PDF
Cloudforms Workshop
PDF
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
PDF
XtremIO
PDF
Hyperconverged Infrastructure: The Leading Edge of Virtualization
PDF
The road to clustered data ontap.
PDF
The Cyber Security Readiness of Canadian Organizations
PDF
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
PDF
Cyber Security trends and tactics for 2015
PDF
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
PDF
Scalar Security Roadshow - Toronto Presentation
PDF
Scalar Security Roadshow - Ottawa Presentation
La transformation numérique de Scalar
Digital Transformation
2017 Scalar Security Study Summary
2016 Scalar Security Study Roadshow
Résumé de l’étude sur la sécurité de Scalar 2016
Executive Summary of the 2016 Scalar Security Study
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Web scale with-nutanix_rev
Cloudforms Workshop
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
XtremIO
Hyperconverged Infrastructure: The Leading Edge of Virtualization
The road to clustered data ontap.
The Cyber Security Readiness of Canadian Organizations
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
Cyber Security trends and tactics for 2015
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Ottawa Presentation

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation theory and applications.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
KodekX | Application Modernization Development
 
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
Encapsulation theory and applications.pdf
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KodekX | Application Modernization Development
 
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
NewMind AI Monthly Chronicles - July 2025
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation_ Review paper, used for researhc scholars
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf

Scalar Security Roadshow April 2015

  • 2. Earlier this month, we had over 150 people join us in Toronto and Vancouver as our technical team demonstrated some of the best security defence technologies on the market today. We focused on defence in three key areas: ENDPOINT APPLICATION NETWORK
  • 3. WHY? We studied the Canadian market and…
  • 4. Believe they are winning the Cyber Security war Suffered a breach leading to loss or disclosure of sensitive data Average annual number of attacks Average cost to address a security breach 41% 46% 34 $200,000
  • 5. High performing organization have 25% less breaches by… DEFENDING
  • 8. WHY BROMIUM? Open anything, from anyone, anywhere…
  • 10. Prioritize Focus The key security threat channels are Web and Email. The key threat vectors are web- links and downloaded files. Your security posture is significantly improved by negating the key security issues of users clicking malicious web-links and opening infected attachments. &
  • 11. Endpoint Isolation Technology Untrusted user tasks and any malware are isolated in a super-efficient micro-VM. All micro-VMs destroyed, eliminating all traces of malware with them.
  • 12. Interested in learning more about ? Contact us here.
  • 14. WHY WHITEHAT? Application security testing leader with over 30,000 sites under management
  • 15. • Integrates into your development process • Directly connects to source code repository • Designed for Agile • Your code stays onsite • Verified vulnerabilities avoid false positives • Assesses partial code, as often as needed SAST – “Sentinel Source” Static Testing
  • 16. • Assesses both iOS and Android applications • Tests native mobile code and server-side APIs • Identifies critical vulnerabilities including OWASP Mobile Top 10 • Verified findings: • Zero false positives reduce overhead for developers • Results prioritized by risk • Covers traffic analysis between client and server-side Sentinel Mobile – Secure Mobile Devices
  • 17. •Non-intrusive, non-disruptive, 24x7 coverage •Meets and exceeds PCI 6.5/6.6 requirements •Full service and support included in all offerings •Unlimited retests, integration support, and remediation guidance at no additional charge •Persistent, consistent testing and results DAST – Dynamic Application Testing
  • 18. Application Security Lifecycle Integrated Application Security Lifecycle Software Development Lifecycle SAST
  • 19. Continuous Testing • Full SDLC coverage: training, development, QA, and production • Stop using Tiger teams! Expert hands-on guidance from the Threat Research Center • 100% verified vulnerabilities, 0 false positives • 150+ security engineers available by phone/email/WebEx Retest, Retest, Retest • Trending of vulnerabilities across time and continuous assessment of deployment How to Remediate Vulnerabilities
  • 20. Baseline Edition (Static Webpages) • Unauthenticated, Verified Results Standard Edition (Directed/Opportunistic) • Custom configured logins and multi-step sequences • Comprehensive coverage for technical vulnerabilities Sentinel PE (Fully Targeted / High Risk) • Ideal for high impact sites with sensitive user and financial information • Technical and business logic vulnerabilities, complete WASC v2 How Deep to Test?
  • 21. • Web & PDF Based • Bi-Directional XML API • Integration with popular technologies like Jira, Archer, F5 & Imperva Flexible Reporting
  • 22. Interested in learning more about ? Contact us here.
  • 24. WHY LOGRHYTHM? Global leader in security intelligence and analytics empowering organizations to rapidly detect, respond, and neutralize cyber threats.
  • 25. Retail Cyber Crime Module • New processes • New authentications • New FIM access events • Any FIM modification event • Any DLD activity • New common event • New network activity Use Case: Detect compromised back office systems Details: Identify suspicious changes on back office systems and the network activity they generate AIE Rules look for:
  • 26. Data Classification LogRhythm not only structures incoming data, but adds contextual information such as: • Classification • Common Event • Risk Score Reduces time required for analysis and ensure query results are complete Provides deep intelligence on more than 600 different systems, devices, apps, databases, etc… • 20-30 added each quarter
  • 27. Scenario Building Blocks Log Observed Log Not Observed Log Not Observed Scheduled Threshold Observed Threshold Not Observed Threshold Not Observed Scheduled Unique Value Observed Unique Value Not Observed Unique Value Not Observed Scheduled Whitelist Trend Statistical
  • 28. The Platform for Security IntelligenceInput Analytics Output
  • 29. Privileged User Monitoring • New admin activity • Mass object deletion • Users added to privileged group • Recently disabled privileged account activity Use Case: Detect a rogue administrator account Details: Identify when a privileged user is abusing authority, indicating either insider threat activity or compromised credentials AIE Rules look for:
  • 30. Analytics Modules • Industry experts • Machine data intelligence • Security compliance • Advanced Threat Research Rapid-Time to-Value Knowledge • Embedded expertise • Ready-to-use content • Frequent, automatic updates • Knowledge aligned to organizational goals • Quick benefit recognition • Ongoing additional value
  • 31. Interested in learning more about ? Contact us here.
  • 32. Is your company High Performing? Find out in our 2015 Security Study . Download here.