Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
MITIGATE CYBER RISK BEFORE, DURING AND AFTER INCIDENTSTRANSFORM YOUR DISASTER RECOVERY SITE INTO A VIRTUAL CYBER RANGE
Prove Your Preparedness. Defend Yourself. Increase Your Confidence.
Identify what’s real, important, and dangerous
Benefits to End-Users, Consulting Firms, and Systems Integrators
CyberVR™ delivers simulation and sandboxing capabilities that end-users with different cyber risk management experience use to accelerate their development and improve their security posture.
For consulting firms and systems integrators, CyberVRTM is a unique tool offering built-in content and authoring capabilities. With CyberVR™, organizations can accelerate the pace at which their clients improve risk posture and verify their ability to reduce times to detection, containment and recovery—all while reducing operational costs and improving compliance.
VM2020 brings cutting-edge technology and cyber resilience content to enterprise risk management to let you realistically simulate the impact, remediation, and recovery from cyber threats – all using existing business continuity infrastructure and processes. With CyberVR™, you can manipulate near-exact copies of a virtualized datacenter to identify your cybersecurity strengths and weaknesses. CyberVR™ helps you quickly recover operations should controls fail while maintaining critical evidence required for forensics and insurance.
• Hunt for threats without impacting production
• Exploit vulnerabilities to describe cyber risks in a business context
• Assess risks of remediation steps and patches on business processes
• Conduct cyber war-games using near-exact copies of production systems
• Accelerate triage and threat containment
• Exercise full-scale recovery without additional IT resources
• Practice forensic techniques that satisfy insurance companies
• Improve the alignment of your business continuity and cyber resilience teams
S O L U T I O N B R I E F
CyberVR™
VM2020 Solutions | [email protected] | +1 954-282-5135
BusinessApplicationsD
uring
Before
After
Threat Hunting
Exploitation
Patching
War Games
Recovery
Containment
Triage
Lessons Learned
Forensics
Vulnerability Remediation
Testing
Before Cyber Incidents Occur: Prepare for Effective Defense
Feature Description
Threat Hunting and Vulnerability Assessments
Automatically deploy fully functional yet isolated copies of production systems. Safely launch built-in and third-party full-scale threat hunting tasks and obtain reports. Built-in capabilities include OpenVAS and Microsoft Baseline Security Analyzer.
ExploitationSafely exploit vulnerabilities to help describe cyber risks to executives in a precise business context. Validate tools and controls while developing skills, confidence and situational awareness of employees and contractors. The Metasploit mass exploitation framework can be automatically deployed by CyberVRTM.
Remediation and Patch Testing
Take advantage of the infinite maintenance windowTM and application instrumentation provided by CyberVRTM to reduce the time it takes to safely remediate vulnerabilities and prevent unintended consequences. Built-in functionality includes a mass credential re-issue exercise and built-in integration with Windows Server Update Services.
War Games and Tabletops
Enhance tabletop exercises with realistic simulations that build muscle memory and help reduce unnecessary improvisation during a real attack. Test the effectiveness of internal processes and third-party contractors.
During Cyber Incidents: Be Ready to React and Recover Quickly
Feature Description
TriageAutomatically deploy multiple points in time of your datacenter environment to identify root causes and assess damage. Augment tools and instrumentation in the triage environment to enhance diagnostic capabilities even when production systems are down.
Containment Select containment options, test actions for full-scale effectiveness, and avoid unintended consequences.
Recovery Fast recovery of the full environment to the desired point in time without destroying evidence required for forensics.
After Cyber Incidents: Analyze, Learn and Improve Your Defense
Feature Description
Forensics Automatically deploy desired full-scale point-in-time copies of environments with specialized tools and processes to determine the event sequence and failed controls that allowed the threat to materialize.
Lessons Learned Analyze and document findings of all previous activities to determine corrective actions and test their effectiveness with the help of CyberVRTM.
VM2020 Solutions | [email protected] | +1 954-282-5135
CyberVRTM in ActionBusiness applications and services are at the core of CyberVR™.
Find out when and why business services stop operating as a consequence of prevention, detection, exploitation, remediation, or recoverability tasks. CyberVRTM detects application status during simulations by using built-in or third-party instrumentation.
PROD VMs
FULLY ISOLATED NETWORK
Network
Primary Site Disaster Recovery Site
PROD Network
Full copy of PROD VMs with self contained
network and full backupsPoint-in-time
restorations of full drill environment
Teams for drills: Incident response, pen testers, security teams
Integrated instrumenation, exploits, scans, and application validations
Multi-RPO Replicas
VM2020 Solutions | [email protected] | +1 954-282-5135
Contact us for a demo and to help you select the CyberVRTM plan that works best for you.
CyberVR™
Key components of the CyberVR TM Simulation Platform
Component Description
Primary Site Site/Datacenter/Cluster where the production VMs run
Disaster Recovery Site Secondary/Target site where the production VMs are backed-up/replicated to
Multi-RPO ReplicasRemote backups or snapshots, that are fully independent from each other, and can be quickly restored to full VMs without impacting the integrity of the underlying data or the physical capacity of the storage
Full PROD VMRestored copies of the production VMs with embedded yet isolated networking to provide the networks needed by the VMs to communicate with each other. Local snapshots of th VMs are conducted during simulations making possible fast point-in-time restorations used during multi-path drill execution.
New Machine Group A point in time restoration of any group of VMs that was instantiated for a CyberVRTM simulation
InstrumentationPre-packaged content that can be deployed to any simulation, including but not limited to: OpenVAS, Metasploit, MBSA, amongst others. Additionally, CyberVRTM automatically performs any user-defined application health check during the lifecycle of any simulation.
ParticipantsMulti-disciplinary teams can safely connect to the isolated networks using the CyberVRTM screens or through the vCenter client. CyberVRTM takes advantage of native vSphere functionality to ensure flexible and safe access when needed.