8
More security for your data RUAG Cyber Security

EW3 Broschüre Cyber Security en · It is critical that your company can quickly recognise a threat, adapt to the situation and predict future threats as accurately as possible. To

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: EW3 Broschüre Cyber Security en · It is critical that your company can quickly recognise a threat, adapt to the situation and predict future threats as accurately as possible. To

More security for your data

RUAG Cyber Security

Page 2: EW3 Broschüre Cyber Security en · It is critical that your company can quickly recognise a threat, adapt to the situation and predict future threats as accurately as possible. To

Cyber attacks can harm your company’s reputation

The security of data and ICT infrastructure has been a critical success factor for some time now. Cyber security has become an issue for top management and is considered a matter of the highest priority. This is because they know that once confidence in the security and availability of ICT systems has been lost, it has far-reaching impact on the reputation and the value of the organisation.

Top management deals with the issue of cyber security as amatter of the highest priority. Is it your top priority too?

More security in cyberspace

The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making support. Tailored to your requirements.

We live in a globally networked information and communication society. This presents numer-ous opportunities as well as huge risks. Protection from cyber threats is a very important and wide-ranging issue. Cyber attacks over networks, manipulation, espionage and cyber terrorism are issues that are increasingly making headlines. The aim of cyber criminals is to gain access to confidential data, to compromise data integrity and the correct functioning of network infrastructures, as well as to limit, disrupt or even block their availability. The rapid pace at which attacks are developing and the various forms they take pose a significant challenge when it comes to predicting and countering cyber threats.

Page 3: EW3 Broschüre Cyber Security en · It is critical that your company can quickly recognise a threat, adapt to the situation and predict future threats as accurately as possible. To

Asymmetric threat situations

The world of cyber crime is asymmetric, as attacks involve the use of cutting-edge methods and technologies to find and exploit weak points, while defending parties have to constantly adapt their security setup and cannot afford to allow a single gap to emerge.

Furthermore, cyber weapons today are easily accessible and proliferated. Perpetrators include lone wolves seeking recognition, political activists, criminal organisations attempting to commit fraud or blackmail, as well as government-sponsored cyber espionage or ideologically motivated terrorists. They tend to aim at damaging and destabilising the security and infra-structure of the country, economy and society – at least temporarily.

Who is particularly at risk?Companies and organisations with high security requirements, in particular, depend on having an efficient and proactive security setup to effectively counter cyber attacks: – Telecommunications companies and Internet service providers

– Energy companies – Transport companies – Financial services providers

– Government authorities and organisations that perform security-related duties (emergency services)

– Armed Forces – Trading companies

There is not just ONE security solution. Effectively countering cyber attacks requires a basic understanding of the current situation and possible developments (situational awareness). It is critical that your company can quickly recognise a threat, adapt to the situation and predict future threats as accurately as possible.

To ensure that countries, businesses and society can defend themselves against cyber-threats, they must understand their network environment at all times. Or, better still, be able to anticipate threats and create an effective cyber-threat forecast.

Page 4: EW3 Broschüre Cyber Security en · It is critical that your company can quickly recognise a threat, adapt to the situation and predict future threats as accurately as possible. To

The RUAG Cyber Security Portfolio consists of services and solutions to protect your infra-structure and analyse incidents in cyberspace. The RUAG Traffic Analyzer Workbench is a specialised solution which detects and counters cyber threats. Its fully integrated compo-nents include the RUAG Traffic Sensor, RUAG Traffic Monitor and RUAG Traffic Visualizer. The modular structure of the RUAG Traffic Analyzer Workbench ensures the simple integra-tion of third-party components. RUAG also works in collaboration with leading international partners to offer security solutions such as SCADA systems (supervisory control and data acquisition).

The diverse range of available services supports you in designing, planning and imple-menting your individual security solution. It provides clear benefits in the areas of strategy development, auditing, security design, integration, simulation and training in a realistic ICT environment.

What makes the RUAG Cyber Security Portfoliounique?

Detecting and eliminating unwanted network traffic quickly and in good time requires leading-edge technologies and solutions. The forecast offered by the RUAG Cyber Security Portfolio allows customers to accurately identify likely future threats by extrapolating large data sets. This one-of-a-kind feature is the result of RUAG’s research into cyber security. The experts in the research units have many years of experience in Cyber Security solutions for the military, government authorities and businesses. They share experience and expertise with leading forensics experts, universities and cyber security professionals around the world.

RUAG Cyber Security Portfolio

Every organisation has specific security requirements, which is why cyber security solutions must always be adaptable and easily adjusted to customers’ cyber defence needs.

Page 5: EW3 Broschüre Cyber Security en · It is critical that your company can quickly recognise a threat, adapt to the situation and predict future threats as accurately as possible. To

RUAG Traffic Sensor

RUAG Traffic Monitor

RUAG Traffic Visualizer

Forecast & Decision Support

Simulation/Security Check

Cyber Security Training

ResearchRUAG Cyber Security Research creates the foundation for solutions based on state-of-the-art knowledge and development.– Global cooperation with forensic experts, universities, governments and people in the cyber security industry– Research unit with many years of experience in cyber security solutions for the military, government authorities and businesses.

Security Strategies and ConceptsBlueprint for the targeted protection of the ICT infrastructure and process control technology (PCT).– Guidance for security strategies with support for design and implementation – Information security and data protection: transport, storage and processing of information on secure ICT infrastructures

Secure ICT ArchitectureClient-specific, robust and reliable security solutions– Implementation of security in the existing ICT infrastructure– Maintain capabilities – design, implementation and monitoring of improved security solutions

Simulation and Security CheckMonitors continuously and closely the security set-up– Rapid identification of weak points or gaps and how to fix them– Simulation of cyber attacks

Cyber Security TrainingIn cyber security training IT specialists, employees and management staff are trained in how to respond to all types of cyber emergencies– The training includes automatic and recurring cyber attacks in a realistic environment– It makes it possible to train for procedures in a real situation and prevent emergencies from occurring by raising awareness

Secure ICT Architecture

Security Strategies and Concepts

RUAG Cyber Security Management Information Syste

m

Solutions and Components

Services

Research

R

UAG Cyber Security Management Information System

V

alid

atio

n

P

rote

ctio

n

RUAG Traffic SensorThe RUAG Traffic Sensor analyzes the network traffic data and enriches it with information.– Forms the basis of the solutions from the RUAG Traffic Analyzer Workbench– Can be used by specialists for many types of complex analyses

RUAG Traffic Monitor The RUAG Traffic Monitor offers a flexible solution for analyzing network traffic.– Alerts and reports, consistent with the threat situation – Provides robust rules for analysis, which can be expanded with client-specific requirements

RUAG Traffic VisualizerThe RUAG Traffic Visualizer is a graphical interface for forensic analyses, no matter how large the data traffic is.– The immediate display of partial results allows for more rapid and exact analysis results– The analysis results can be used as rules in the RUAG Traffic Monitor

RUAG Cyber Security Management Information System*Central communication platform for management decision support – Visualizes threats and quickly recognizes the connections– Makes it possible to introduce targeted measures

* Under development

RU

AG

Tra

ffic

An

alys

er W

ork

ben

ch

RUAG Traffic Analyzer Workbench

Validation Pro

te

ction

Page 6: EW3 Broschüre Cyber Security en · It is critical that your company can quickly recognise a threat, adapt to the situation and predict future threats as accurately as possible. To

Strong defence against cyber attacks

Predicting and visualising unusual and suspicious network traffic is the key to defending against previously unseen incidents in an effective and timely manner. With the RUAG Cyber Security Portfolio, you can analyse and eval-uate your network traffic as well as detect and address suspicious network connections at an early stage.

Page 7: EW3 Broschüre Cyber Security en · It is critical that your company can quickly recognise a threat, adapt to the situation and predict future threats as accurately as possible. To

Your benefit at management level

– Protection of your company’s/organisation’s reputation and value thanks to enhanced security awareness and proactive risk management

– Protection of the company’s values (corporate security) thanks to increased security and availability of data

– Improved compliance with regulatory demands with regard to regulations and assessment of the overall risk situation

– Lean and efficient management process in the event of security incidents

Your benefit at operational level

– The system can be easily adapted to your specific environment by creating and applying your own rules

– Numerous available plug-ins and rules to detect security problems, which are regularly updated to meet the latest requirements

– Faster and targeted response to cyber attacks

Your benefit at analytical level

– Use of complex preconfigured algorithms to analyse network anomalies in a faster and simpler manner

– A wide range of tools to visualise your network traffic in order to support your analysts. There is no limit to the amount of data sets that can be visualised.

– Import and export functionalities for data sets from a wide range of sources mean you can learn from the patterns of cyber attacks identified by others or forward suspicious network data to RUAG’s cyber experts for comprehensive analysis

– Mathematical models for determining the likelihood of events (forecast)

The comprehensive RUAG Cyber Security Portfolio meets the requirements of a proactive, flexible and effective cyber security system. It ensures compliance with the most stringent security standards with regard to handling of your data and network infrastructures.

Page 8: EW3 Broschüre Cyber Security en · It is critical that your company can quickly recognise a threat, adapt to the situation and predict future threats as accurately as possible. To

03.1

5

cyber.ruag.com

Security is based on trust. RUAG Defence offers world-leading services and products for the defence and security industry, including reconnaissance, communication and management systems as well as virtual and live simulators. RUAG’s experts have many years of experience in cyber security solutions for the military, government authorities and businesses. The combined use of both civil and military technology opens up opportunities for both customer segments. RUAG’s in-house research activities ensure groundbreaking innovation and unique know-how. As a Swiss company, we embody the typical Swiss values of independence, reliability, security and stability.

Visit our Website

RUAG Schweiz AG | RUAG DefenceAllmendstrasse 86 | 3602 Thun | SwitzerlandPhone +41 33 228 22 65 | Fax +41 33 228 47 83 [email protected]

RUAG is an international technology group operating in the fields of aerospace and defence. Its holding company is located in Berne, Switzerland. RUAG has production sites in Switzerland, Germany, Sweden, France, Austria, Hungary, Australia and the USA. The company employs some 8,200 people worldwide, including 414 trainees in 23 different occupations.