The internet of things will undoubtedly lead to a smarter, more connected future. But if there’s anything acting as a threat to this future, it’s the security of your networks. A report from Mozilla expects at least 30 Billion devices will be installed by 2020. Thats almost 4 devices per person on earth. Are you making preparations for the future?
EVERY COMPANY IS A TARGET
Ransom ware, malicious code, social engineering, data breaches. These are words we are hearing on a daily basis. Every company is a target. Cyber attacks are not limited to Social media giants, large multinational corporations and governments; small or big your company is a potential victim. You owe it to your clients, and users, to keep your information and networks safe.
ARE YOU PROTECTED?
As reported by FIN24 there are 13 842 attempted cyberattacks in South Africa per day.
That translates to 577 attacks per hour or 9.6 per second!
CAN YOU AFFORD TO
HAVE A SECURITY BREACH
According to an IBM study:
SA companies loose an average of R36 Mil every time they get hacked. The cost is rising year on year with previous years being 2017 - R32Mil & 2016 - R26.6Mil
If you’re unable to detect and mitigate an attack, you could face significant losses, in the form of:
Direct theft (money, data or intellectual property)
Lost business and productivity
Poor customer experience and customer churn
Reputation damage from bad publicity
Potential lawsuits or service level agreement penalties
Business continuity is affected
High cost of resourced needed to address the attack
ZERO DAY VULNERABILITIES
Security specialists are constantly on the watch for so-called "zero day" vulnerabilities--flaws in their code that hackers find and exploit before the first day companies become aware of them. But the term "zero-day" doesn't capture just how early hackers' head-starts often are:
Day zero, it seems, often lasts between 150-300 days depending on the industry.
COMMON THREATS COMPANIES ENCOUNTER
Ransomware is a type of malicious software, or malware, designed to deny access to a computer system, or data, until a ransom is paid.
Social engineering is the art of tricking / persuading individuals to divulge privileged information to attackers
Cryptojacking is an emerging form of malware that hides on your device and steals its computing resources in order to mine for online currencies like bitcoin
Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms & Trojan horses.
Email phishing is a serious threat and responsible for a large percentage of security breaches
Data theft can hurt businesses and consumers in a variety of ways. They are a costly expense that can damage lives and reputations.
WHAT WE OFFER
DETECT ATTACKS AND BLOCK THEM IN REAL TIME
FORENSICS ON A CLICK
TAILOR MADE SOLUTIONS FOR YOUR BUSINESS
DEVELOPED FOR SOUTH AFRICAN THREATS, AS WELL AS INTERNATIONAL THREATS
ACTIVE TRAPS AND HONEY POTS TO STUDY AND PREVENT
REAL TIME CORRELATION WITH THREAT
INTEGRATES WITH 60+ ANTIVIRUS PLATFORMS AND THREAT BOOKS - EAST & WEST
LOW HARDWARE COSTS. RENTAL OPTIONS AVAILABLE
Optimised architecture for real time processing; If the hardware and connection allows, we can perform 5,000 proxy events per second against 1,000,000 threat indicators in REAL TIME.
Integrated support for Virus Total (around 60 western antivirus engines) and Threat Book (Asian service with around 30 eastern antivirus engines).
Our platform creates digital clones as active traps (we make digital clones of your device/service, and learn in real time who tries to attack it, and HOW they attack it; protecting you against even unknown threats).
Our platform offers java script engine to implement ANY correlation script logic for real time or historical correlation.
All data has anonymization/pseudonymization integrated.
We offer real time auto remediation; we integrate automatic action scripts that will be executed at your firewall or domain controller to remediate detected threat.
Allows you track visually any of your systems/ employees.
Learn about your specific network architecture and possible vulnerabilities.
Drill down to minute detail on any event. Because breach detection records have detailed information on network intrusions, you’ll be able to analyse the events leading up to a security breach and be in a position to manage its impact. You can also use this information to understand how the breach took place in order to implement additional security measures.
All data logs are collected and in stored in raw format to comply with GDPR regulations.
Speed, Speed, Speed. Our software architecture provides for incredible detection and response times. These precious milli seconds are worth their weight in gold when attacks are implemented.
Rules and multiple alerts can be set for differing threats.
Our platform performs automatic noise events elimination (to eliminate from consideration events that were previously identified as non-threats).
REAL TIME ATTACKS AND THREAT INTELLIGENCE
We place digital clones of your devices around the world, at your external IP, and inside your network, in order to protect you in real time against new attackers and learn how do they attack you. In 2018 we had ~13000 attacks per day per system (9 attacks every minute) with ~ 2.4% uploaded tools not detected by ANY antivirus (0/60)
FORENSICS ON A CLICK
Drill down to process hierarchy analyses. In addition to standard text logs & process trees;
SOTERIA SOLUTIONS offers a visual reconstruction (“forensics on a click”) Its a unique feature our platform offers which no other SIEM offers. It does it visually, like in a 3D movie, with all additional information including object host, execution privileges level, and many others.