PowerPoint Presentation

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

VSERV INFOSYSTEMS VSERV INFOSYSTEMS PRIVATE LIMITED Your demands, our innovations COMPANY PROFILE www.vservit.com.

Scene 2 (7s)

Vserv Infosystems Pvt Limited, is a Cyber Security Services provider company , we are dealing into Cyber Compliance , Cyber Audit , Cyber Forensics , Cyber Certification , Data Protection , Cyber Insurance , VAPT and all.

Scene 3 (35s)

Our Value Proposition. VSERV Infosystems is committed to deliver excellent services to our Customers. Vserv is striving for quality and continuous process improvement in all aspects of its activities. Our aim is to ensure that through established standards and measurements the level of Quality of our services exceeds our customer expectations..

Scene 4 (59s)

1 ,538.78 Our Organization Strategy 65,54 7492 28161 98.45 CUSTOMER FIRST DIFFERENTIATED DELIVERY SUSTAINABLE GROWTH COLLABORATIVE PARTNERSHIP FOCUS ON SERVICE OFFERINGS 201.55 „,1.097.95 26,717.43 7,534.44 12,512.54 LEADERSHIP COMMITMENT.

Scene 5 (1m 11s)

Main Services. 0 1 . Cy b er Sec u rity. Corporate Cyber Security Planning Implementation and 24*7 continuous monitoring Security Incident Event Management (SIEM) Server data & log analysis.

Scene 6 (1m 48s)

Advanced Training on Standard Operating Procedures.

Scene 7 (2m 15s)

7. w w w . vs er v i t . c om. w w w . vs er v i t . c om.

Scene 8 (2m 51s)

THRE A TS P IK E WIRE 7 IN 1 INTEGRATED CLOUD BASED SOLUTION FOR ….

Scene 9 (3m 7s)

FACILITIES …. 7 IN 1 SOLUTION PACKAGE ZERO HARDWARE COST INSTANT DEPLOYMENT JUST LIKE MAGGIE EFFECTIVE IN 2 MINUTES S T A R T W ORKING IMMEDI A TE L Y R OUND TH E CLOCK CLO U D BASE D MONI T ORING L O GS VISIBL E AS L E G A L EVIDENCE INSTANT SANDBOXING OF INFECTED MACHINE UNIQUE IN MARKET N O EXTERNAL ANT I - VI R U S NEEDED.

Scene 10 (3m 25s)

EMPLOYEE PRODUCTIVITY. Records interactive sessions of users, further facilitating security investigations by providing insight into their desktop activity Historic view of users active windows provides an overview of their interactive sessions, providing an i n sight i n to t h eir p r oduct i vity a nd f u r t h er faci l i t a t i ng f o r en sic i n v esti g a tio n s U s er Dur a t i on Rec o r din g f or S pe ndin g t i me on pa r t i cul a r fi le Able to see the Employee Real Time Activities for Analysis of Employee Productivity Able to Record Screen Activities of Employees for Analysis Abl e to T ra c k a l l S c he du l ed p r oce s s of Pa r t i cu l ar sy s tem.

Scene 11 (3m 54s)

EMPLOYEE PRODUCTIVITY. SCREEN SCR AP E R. DURATION MONITORING ON PARTICULAR ACTIVITY.

Scene 12 (4m 5s)

A R TIFICIAL INTELLIGENCE – MACHINE LEARNING (AI-ML) BASED MALWARE PROTECTION & CYBER SECURITY.

Scene 13 (4m 36s)

Host Intrusion Cloud Services Appliance udit & Compliance Enforcement Antivirus Auditing & Enforcement po •ng Dashboard Endpoint Security Management Spyware Blocking/ Removal Inventory patch Managem Application Blocking Correction Control Management Antivirus Add—On Network Access.

Scene 14 (4m 46s)

CYBER FORENSICS. T h r eatSp i k e generates metadata a b out Net w ork T raffic in c ludin g DNS, H T T P , S M TP ,SMB etc..Queries can be run on this metadata via the web portal to analyze user or device activity. Traffic Recording can be downloaded for any circuit facilitating deep forensics investigation. Forensics Artifacts of Likely Security breach always Available. S a v es t i mes & Reso u r ce s f or co s t l y f o r e n s ics A n a l ysi s . D i sk F o r e n s ics A v a i l a b l e . Hash Values are available for each Files. P C AP Fi l es A v a i l a b l e f or Deep f o r e n s ics I n v est i ga t i o n . New query engine allows analysts to search through millions of results within seconds All users Activities are available for Deep Forensics during any Security Incidents Location can be Detected for Investigation Screen Scraper Available for Investigating Screen Recordings.

Scene 15 (5m 25s)

Cybercrime & Digital Evidence Consulting Digital Forensics Lab Setup Computer & Network Forensics CYBER FORENSICS Cyber forensics involves the investigations Of computer-related crimes by providing electronic evidence to support in criminal prosecution of these electronic facilitated crimes. Data Mobile Forensics Expert Witness & Litigations Support Recovery Others.

Scene 16 (5m 38s)

GOVERNANCE & REGULATORY COMPLIANCE. ThreatSpike can be used to measure compliance of devices against baseline standards (e.g. CIS) and to harden their configuration Able to use the agent to stop hardening the baseline of our OS Configuration ThreatSpike can be used to measure compliance of devices against baseline standards (e.g. CIS) Real-time Compliance monitoring against Industry standards baseline standard including CIS Baseline Standards can be met using the Device Compliance control which allow various OS Functionality (e.g. Disk encryption, Bluetooth to enable /disabled on device) V arious Comp l ian c e Fr a m e w ork f or d i f f e r en t zon es A vaila b le.

Scene 17 (6m 9s)

IN COMPLIANCE Compliance, Risk Assessment, Review & Monitoring Compliance Resources Regulatory Compliance Framework Culture Training Policies & Procedures Key Compliance Processes & Communications.

Scene 18 (6m 19s)

ASSET MANAGEMENT. ThreatSpike Monitors endpoint activity & configuration in order to provide information supportive asset management & inventory.

Scene 19 (6m 37s)

Managing Information Verification and audit Asset management planning Asset Management Status accounting and reporting configuration Item Identification Complete control.

Scene 20 (6m 45s)

INFORMATION COLLECTED INCLUDES: ASSET MANAGEMENT.

Scene 21 (7m 2s)

EN D POINT P R O T E CTION & RES O NSE (ED R ). ThreatSpike can Monitor & block dangerous process activity in order to mitigate hacker & malware threats.

Scene 22 (7m 22s)

EN D POINT P R O T E CTION & RES O NSE (ED R ). OS System API activity Monitors for x64/x86 processes Key Activities recorded including each file read , wr i te , & p r o c ess c r eati o n a s w e l l a s susp i c i ous activities such as screen buffer access keyboard hookin g & s c hedu l e task c r eation Ransomware heuristics detect & mitigate malicious process activity EDR enforces policies such as application whitelisting’s.

Scene 23 (7m 54s)

LOCAL FIREWALL. ThreatSpike agents have an ability to apply traffic policies that dictate what connections can be established and which protocols are allowed Local firewall allows granular control over what protocols and connections can be established to and from devices Provides an ability to restrict transfer of particular files Provides an effective way of minimising the spread of malware in case of an infection Policies can be applied to both devices as well as users. This allowing for creation of custom controls for users with different roles Support for over 30 different protocols.

Scene 24 (8m 22s)

IDS/IPS. ThreatSpike parses network traffic in real time, applying detection signatures for known attacks on common protocols. On detection of a threat, a machine can be isolated immediately to stop the threat: Web based attack signatures are used to mitigate threats such as Cross Site Scripting (XSS), directory traversal and SQL injection Indicators of Compromise (IOC) are pulled in from threat intelligence services and used to mitigate known malware threats Detection Signatures are used to identify use of common hacking tools and approaches (e.g. Metasploit , Responder) Inline traffic analysis allow attacks to be blocked in real-time and then if machine is source of attack it can be isolated.

Scene 25 (8m 54s)

ROGUE DEVICE DETECTION. ThreatSpike agents have an ability to identify rogue devices connected to the network which can then be investigated and removed: When devices connect to the local network, they broadcast a DHCP request which is picked up by agents or sensor Devices are uniquely identified by MAC address or hostname Suspicious devices (wrong naming convention, wrong Active Directory domain membership, new vendor), are automatically reported on by security operations team.

Scene 26 (9m 18s)

SECURITY MONITORING. Agents record interactive sessions of users, further facilitating security investigations by providing insight into their desktop activity Historic view of users active windows provides an overview of their interactive sessions, providing an insight into their productivity and further facilitating forensic investigations..

Scene 27 (9m 35s)

USB CONTROL. Removable media write control allows agents to intercept and block all USB file writes that did not go through an approval process and get an explicit approval/exception. Configurable workflows ensure that all USB copies are reviewed Custom DLP rules ensure that confidential information doesn’t leave the company undetected Audit record of all file transfers even if the USB media write control is not enabled.

Scene 28 (9m 58s)

VULNERABILITY MANAGEMENT. ThreatSpike Wire provides the ability to detect and mitigate vulnerabilities: Vulnerabilities are detected within inhouse and vendor provided applications by monitoring compo n ent i n teracti o n s . Re p o r ts a r e p r o vided on fai l i n g cont r ols ( e .g. ha r d disk enc r ypt i o n ) ThreatSpike analysts confirm findings and provide r emedi ati o n adv ice.

Scene 29 (10m 18s)

W E B A CCE S S CONT R OL. Web filtering control allows ThreatSpike agents to intercept and block users accessing websites based on their classification Websites are classified dynamically based on their content. This eliminates the need for continuous maintenance of whitelists and ensures that even newly added or unknown domains are always classified Control can be applied to both users and machines, allowing the creation of custom policies for different users or user groups.

Scene 30 (10m 46s)

GDPR REQUIREMENT FIT Criteria A n ti- Vi r us Data At Rest Log Mo n itori Behaviour al A nal y sis V u ln e ra b ili ty D a ta Loss P e n e trati on T h r e atSp ike Protectio n ng Scanning Preventio n Testing Identify Data No Yes No No No Yes Yes Yes Identify Consent No No No No No No No Yes Identify Requirement No No No No No No No Yes Identify Erasure No Yes No No No No Yes Yes Identify Data Locations No Yes No No No Yes Yes Yes Identify Access Requirement No Yes No No No No Partial Yes Identify Access Rights No Yes No No No No Yes Yes Identify Accesses No Yes Yes Yes No No No Yes Identify Uncontrolled Data No Yes Yes No No No Yes Yes.

Scene 31 (11m 19s)

Criteria A n t i - Vir u s Data At Rest Prote c ti on Log Moni t o ri ng B e hav i o u r al Analysis Vulnera b i l i t y Scanning Da t a L o ss Pre v en ti on P e net r a tio n Testing ThreatSpike Iden t ify 3 r d Par t y Compliance No No No No No No No Yes Secure Network, Systems and Data Yes Yes No No No No No Yes Manage Or Destroy Data No No No No No No No No Pre v ent U n au t horis e d Transfers No No No No No Yes No Yes Con t inuo u s l y moni t or systems and data No Yes Yes Yes No No No Yes Iden t ify Con tr ol Failures No No Yes Yes No No Yes Yes Evalua t e C urr ent Vulnerabilities No No No No Yes No Yes Yes Evalua t e N e w Vulnera b i l i t ies No No No Yes No No Yes Yes Ensure CIA of Systems No No No No No No Yes Yes E n su r e Da t a Availability No No Yes No No No No No.

Scene 32 (12m 0s)

32. w w w . vs er v i t . c om. w w w . vs er v i t . c om.

Scene 33 (12m 15s)

Cybrocheck Technology. SNORT (IDS/IPS) Combining the benefits of signature, protocol, and anomaly-based inspection. SSD/HDD is strongly recommended ARPWATCH displays a list of gysterns on the network that have attempted to talk to or through Firewall SQUID GUARD A high performanc e web proxy URL filter. SSD/HDD recommend VPN CLIENT EXPORT Generates pre- configured VPN configuration files for clients, Windows Client installers with configurations bundled, and Mac OS X IPSEC PROFILE WIZARD Creates IPsec configuration profiles for Apple devices (iOS and OS X) and IPsec import script bundles for Windows devices. PFBLOCKER firewall rules. e.g. by country, by domain name, etc. Manages IPv11/v6 List Sources into 'Deny, Permit or Match' formats. GeolP database by MaxMind (GeolP).

Scene 34 (12m 40s)

Who can Utilize Cybrocheck. HOME OR REMOTE WORKER 'The COVID pandemic has changed our world forever. An extraordinary number of office workers are now home-bound - many permanently. The need for improved firewall, router and VPN perforrnance at affordable prices will only rise. Educational institutions from K-12 to colleges and universities - always with tight budgets - depend upon Cybrocheck to manage complex student, faculty and administrative secure networking needs. EDUCATION BUSINESSES Businesses of all sizes and in every vertical use Cybræheck - especially those who expect features found in enterprise-class solutions, at budget-friendly consumer / SMB level price points. Local municipalities, state agencies, federal defense and non-defense agencies and departments all rely upon Cybrocheck for its robust feature set, resilience and reliable performance. GOVERMENT.

Scene 35 (13m 11s)

Attack Prevention. 35. w w w . vs er v i t . c om.

Scene 36 (13m 19s)

A c h i e v e m e n t s. 260+ Compliance. 250+ Customer.

Scene 37 (13m 32s)

Our Clients. 37. w w w . vs er v i t . c om. w w w . vs er v i t . c om.

Scene 38 (13m 40s)

FLEXIBILITY. Flexible in terms of contractual r eq ui r emen ts and delivery models.

Scene 39 (14m 5s)

Contact Us Head Office : B-135, Sector-2, Noida - 201301 , Uttar Pradesh, India Phone : 0120-420 4864 Website : www.vservit.com For Service write to: customercare@vservitcom I For Sales write to: [email protected] www.facetmk.com/vservit O httcw.//twitter.com/vservit Copyright O Vserv Infosystems Private Limited.