4

Cyber Analytics and Forensics End-to-End Cyber ... - IAI · Nimbus – Cloud Based Interception L aw f ulI n t er cp io sm g y db v (web-mail, file sharing, social networks, instant

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cyber Analytics and Forensics End-to-End Cyber ... - IAI · Nimbus – Cloud Based Interception L aw f ulI n t er cp io sm g y db v (web-mail, file sharing, social networks, instant

ELTA Systems [email protected]

Cyber Analytics and ForensicsTackling Cyber challenges via advanced analytics capabilities as a stepping stone towards tacking the "Attribution Challenge"

Identity Resolution: IAI provides analytical capabilities, for correlating cyberspace activities, and the virtual identities that perform them to a singular physical entity.

Geo-location Resolution:Geo-location Resolution: IAI provides analytical capabilities, to resolve the geo-location challenge, based on a variety of data sources and analysis tools. IAI provides, in near real-time, a pinpoint physical geo-location of a virtual entity, to a high degree of probability.

TAME™ GuardAdvanced statistical anomaly detection engines for early detection of: Advanced Persistent Threats (APTs) Zero-day Malware

End-to-End Cyber CentersIncorporating proprietary IAI’s sensors, data processing and data analytics capabilities

IIAI has designed a modular, open-platform architecture and framework, IIAI has designed a modular, open-platform architecture and framework, incorporating intelligence, cyber security & early warning into a single framework. This allows building a comprehensive cyber situational awareness picture, and intervening and acting in cyberspace.

Cyber early warning center Cyber intelligence center Cyber security operations center Incorporating all relevant activity & contextual data sources: IT security, wireless networks, SCADA networks, social networks, cloud based services networks, cellular networks, OSINT and customer sources Flexible, ontology based, data modeling and processing Multi engine analytics Create a single, holistic, point of view at the organizational, sectorial and national level Customized workflow for Intelligence, early warning, Cyber ops, and forensics

CYBERFrom Sensors to Centers

Taking CYBER Solutions to Next Level

Where Courage Meets TechnologyWhere CourageMeets Technology

5/19

Page 2: Cyber Analytics and Forensics End-to-End Cyber ... - IAI · Nimbus – Cloud Based Interception L aw f ulI n t er cp io sm g y db v (web-mail, file sharing, social networks, instant

Accessibility Solutions

Productizing Hacking, Delivering Intelligence and Insight

Conceptus – Social Network Intelligence & Influence Passive intelligence collection, digital HUMINT, soft power projection Penetrating closed groups and areas of interest Automation of large scale collection and influence operations

Nimbus – Cloud Based InterceptionNimbus – Cloud Based Interception Lawful Interception solution for monitoring encrypted cloud based services (web-mail, file sharing, social networks, instant messaging and more) Applied either in a strategic and/or tactical interception mode

SCADA Monitoring Monitoring ICS/SCADA controllers Detecting abnormals behaviour Centralized management and reporting

Cyber & Cellular Off the Air Interception

Combining the Cellular & Cyber media to identify, geo-locate and intercept targets

Orbis: Stand-off Cellular Interception and Monitoring Modular system for off-the-air cellular interception, monitoring and geo-location Integrated Direction Finding (DF) capabilities within the system, providing accurate geo-location geo-location Designed for various types of deployments, tactical, portable, vehicular & airborne

CyFi – an tactical probe for monitoring secure WiFi hotspots Gaining access to secure hotspots: WEP, WPA, WPA2 Active mode: Actively routing (and intervening in) target’s traffic Fully integrated with Nimbus and Orbis

Capability buildup, Training, Testing, Simulation & Forensics

Combining the Cellular & Cyber media to identify, geo-locate and intercept targets

TAME™ Range Cyber "War Game" trainer with: Real Cyber attack trainings on configurable isolated organization IT & ICT networks Field tested Cyber defense methodology, certification levels and threat response performance assessment Multi-team role playing scenarios (e.g., SOC, CERT, IT, CISO) Built-in features of Red-team Blue-team Cyber war game & security tools Test-bed

Cyber Research & Forensics Lab Cyber research lab for Computer Emergency Response Team (CERT) functions Full range of analysis, diagnostic, recovery and forensics tools Novel automated environment & investigation tools for malware assessment Simulation of real life complex scenarios through operations research and impact analysis

Page 3: Cyber Analytics and Forensics End-to-End Cyber ... - IAI · Nimbus – Cloud Based Interception L aw f ulI n t er cp io sm g y db v (web-mail, file sharing, social networks, instant

ELTA Systems [email protected]

Cyber Analytics and ForensicsTackling Cyber challenges via advanced analytics capabilities as a stepping stone towards tacking the "Attribution Challenge"

Identity Resolution: IAI provides analytical capabilities, for correlating cyberspace activities, and the virtual identities that perform them to a singular physical entity.

Geo-location Resolution:Geo-location Resolution: IAI provides analytical capabilities, to resolve the geo-location challenge, based on a variety of data sources and analysis tools. IAI provides, in near real-time, a pinpoint physical geo-location of a virtual entity, to a high degree of probability.

TAME™ GuardAdvanced statistical anomaly detection engines for early detection of: Advanced Persistent Threats (APTs) Zero-day Malware

End-to-End Cyber CentersIncorporating proprietary IAI’s sensors, data processing and data analytics capabilities

IAI has designed a modular, open-platform architecture and framework, IAI has designed a modular, open-platform architecture and framework, incorporating intelligence, cyber security & early warning into a single framework. This allows building a comprehensive cyber situational awareness picture, and intervening and acting in cyberspace.

Cyber early warning center Cyber intelligence center Cyber security operations center Incorporating all relevant activity & contextual data sources: IT security, wireless networks, SCADA networks, social networks, cloud based services networks, cellular networks, OSINT and customer sources Flexible, ontology based, data modeling and processing Multi engine analytics Create a single, holistic, point of view at the organizational, sectorial and national level Customized workflow for Intelligence, early warning, Cyber ops, and forensics

CYBERFrom Sensors to Centers

Taking CYBER Solutions to Next Level

Where Courage Meets TechnologyWhere CourageMeets Technology

5/19

Page 4: Cyber Analytics and Forensics End-to-End Cyber ... - IAI · Nimbus – Cloud Based Interception L aw f ulI n t er cp io sm g y db v (web-mail, file sharing, social networks, instant

ELTA Systems [email protected]

Cyber Analytics and ForensicsTackling Cyber challenges via advanced analytics capabilities as a stepping stone towards tacking the "Attribution Challenge"

Identity Resolution: IAI provides analytical capabilities, for correlating cyberspace activities, and the virtual identities that perform them to a singular physical entity.

Geo-location Resolution:Geo-location Resolution: IAI provides analytical capabilities, to resolve the geo-location challenge, based on a variety of data sources and analysis tools. IAI provides, in near real-time, a pinpoint physical geo-location of a virtual entity, to a high degree of probability.

TAME™ GuardAdvanced statistical anomaly detection engines for early detection of: Advanced Persistent Threats (APTs) Zero-day Malware

End-to-End Cyber CentersIncorporating proprietary IAI’s sensors, data processing and data analytics capabilities

IAI has designed a modular, open-platform architecture and framework, IAI has designed a modular, open-platform architecture and framework, incorporating intelligence, cyber security & early warning into a single framework. This allows building a comprehensive cyber situational awareness picture, and intervening and acting in cyberspace.

Cyber early warning center Cyber intelligence center Cyber security operations center Incorporating all relevant activity & contextual data sources: IT security, wireless networks, SCADA networks, social networks, cloud based services networks, cellular networks, OSINT and customer sources Flexible, ontology based, data modeling and processing Multi engine analytics Create a single, holistic, point of view at the organizational, sectorial and national level Customized workflow for Intelligence, early warning, Cyber ops, and forensics

CYBERFrom Sensors to Centers

Taking CYBER Solutions to Next Level

Where Courage Meets TechnologyWhere CourageMeets Technology

5/19