Upload
others
View
5
Download
0
Embed Size (px)
Citation preview
ELTA Systems [email protected]
Cyber Analytics and ForensicsTackling Cyber challenges via advanced analytics capabilities as a stepping stone towards tacking the "Attribution Challenge"
Identity Resolution: IAI provides analytical capabilities, for correlating cyberspace activities, and the virtual identities that perform them to a singular physical entity.
Geo-location Resolution:Geo-location Resolution: IAI provides analytical capabilities, to resolve the geo-location challenge, based on a variety of data sources and analysis tools. IAI provides, in near real-time, a pinpoint physical geo-location of a virtual entity, to a high degree of probability.
TAME™ GuardAdvanced statistical anomaly detection engines for early detection of: Advanced Persistent Threats (APTs) Zero-day Malware
End-to-End Cyber CentersIncorporating proprietary IAI’s sensors, data processing and data analytics capabilities
IIAI has designed a modular, open-platform architecture and framework, IIAI has designed a modular, open-platform architecture and framework, incorporating intelligence, cyber security & early warning into a single framework. This allows building a comprehensive cyber situational awareness picture, and intervening and acting in cyberspace.
Cyber early warning center Cyber intelligence center Cyber security operations center Incorporating all relevant activity & contextual data sources: IT security, wireless networks, SCADA networks, social networks, cloud based services networks, cellular networks, OSINT and customer sources Flexible, ontology based, data modeling and processing Multi engine analytics Create a single, holistic, point of view at the organizational, sectorial and national level Customized workflow for Intelligence, early warning, Cyber ops, and forensics
CYBERFrom Sensors to Centers
Taking CYBER Solutions to Next Level
Where Courage Meets TechnologyWhere CourageMeets Technology
5/19
Accessibility Solutions
Productizing Hacking, Delivering Intelligence and Insight
Conceptus – Social Network Intelligence & Influence Passive intelligence collection, digital HUMINT, soft power projection Penetrating closed groups and areas of interest Automation of large scale collection and influence operations
Nimbus – Cloud Based InterceptionNimbus – Cloud Based Interception Lawful Interception solution for monitoring encrypted cloud based services (web-mail, file sharing, social networks, instant messaging and more) Applied either in a strategic and/or tactical interception mode
SCADA Monitoring Monitoring ICS/SCADA controllers Detecting abnormals behaviour Centralized management and reporting
Cyber & Cellular Off the Air Interception
Combining the Cellular & Cyber media to identify, geo-locate and intercept targets
Orbis: Stand-off Cellular Interception and Monitoring Modular system for off-the-air cellular interception, monitoring and geo-location Integrated Direction Finding (DF) capabilities within the system, providing accurate geo-location geo-location Designed for various types of deployments, tactical, portable, vehicular & airborne
CyFi – an tactical probe for monitoring secure WiFi hotspots Gaining access to secure hotspots: WEP, WPA, WPA2 Active mode: Actively routing (and intervening in) target’s traffic Fully integrated with Nimbus and Orbis
Capability buildup, Training, Testing, Simulation & Forensics
Combining the Cellular & Cyber media to identify, geo-locate and intercept targets
TAME™ Range Cyber "War Game" trainer with: Real Cyber attack trainings on configurable isolated organization IT & ICT networks Field tested Cyber defense methodology, certification levels and threat response performance assessment Multi-team role playing scenarios (e.g., SOC, CERT, IT, CISO) Built-in features of Red-team Blue-team Cyber war game & security tools Test-bed
Cyber Research & Forensics Lab Cyber research lab for Computer Emergency Response Team (CERT) functions Full range of analysis, diagnostic, recovery and forensics tools Novel automated environment & investigation tools for malware assessment Simulation of real life complex scenarios through operations research and impact analysis
ELTA Systems [email protected]
Cyber Analytics and ForensicsTackling Cyber challenges via advanced analytics capabilities as a stepping stone towards tacking the "Attribution Challenge"
Identity Resolution: IAI provides analytical capabilities, for correlating cyberspace activities, and the virtual identities that perform them to a singular physical entity.
Geo-location Resolution:Geo-location Resolution: IAI provides analytical capabilities, to resolve the geo-location challenge, based on a variety of data sources and analysis tools. IAI provides, in near real-time, a pinpoint physical geo-location of a virtual entity, to a high degree of probability.
TAME™ GuardAdvanced statistical anomaly detection engines for early detection of: Advanced Persistent Threats (APTs) Zero-day Malware
End-to-End Cyber CentersIncorporating proprietary IAI’s sensors, data processing and data analytics capabilities
IAI has designed a modular, open-platform architecture and framework, IAI has designed a modular, open-platform architecture and framework, incorporating intelligence, cyber security & early warning into a single framework. This allows building a comprehensive cyber situational awareness picture, and intervening and acting in cyberspace.
Cyber early warning center Cyber intelligence center Cyber security operations center Incorporating all relevant activity & contextual data sources: IT security, wireless networks, SCADA networks, social networks, cloud based services networks, cellular networks, OSINT and customer sources Flexible, ontology based, data modeling and processing Multi engine analytics Create a single, holistic, point of view at the organizational, sectorial and national level Customized workflow for Intelligence, early warning, Cyber ops, and forensics
CYBERFrom Sensors to Centers
Taking CYBER Solutions to Next Level
Where Courage Meets TechnologyWhere CourageMeets Technology
5/19
ELTA Systems [email protected]
Cyber Analytics and ForensicsTackling Cyber challenges via advanced analytics capabilities as a stepping stone towards tacking the "Attribution Challenge"
Identity Resolution: IAI provides analytical capabilities, for correlating cyberspace activities, and the virtual identities that perform them to a singular physical entity.
Geo-location Resolution:Geo-location Resolution: IAI provides analytical capabilities, to resolve the geo-location challenge, based on a variety of data sources and analysis tools. IAI provides, in near real-time, a pinpoint physical geo-location of a virtual entity, to a high degree of probability.
TAME™ GuardAdvanced statistical anomaly detection engines for early detection of: Advanced Persistent Threats (APTs) Zero-day Malware
End-to-End Cyber CentersIncorporating proprietary IAI’s sensors, data processing and data analytics capabilities
IAI has designed a modular, open-platform architecture and framework, IAI has designed a modular, open-platform architecture and framework, incorporating intelligence, cyber security & early warning into a single framework. This allows building a comprehensive cyber situational awareness picture, and intervening and acting in cyberspace.
Cyber early warning center Cyber intelligence center Cyber security operations center Incorporating all relevant activity & contextual data sources: IT security, wireless networks, SCADA networks, social networks, cloud based services networks, cellular networks, OSINT and customer sources Flexible, ontology based, data modeling and processing Multi engine analytics Create a single, holistic, point of view at the organizational, sectorial and national level Customized workflow for Intelligence, early warning, Cyber ops, and forensics
CYBERFrom Sensors to Centers
Taking CYBER Solutions to Next Level
Where Courage Meets TechnologyWhere CourageMeets Technology
5/19