7
© 2014 Cybereason Inc. All rights reserved. Terminate Hacking Operations February 2014

Cybereason: Terminate Hacking Operations

Embed Size (px)

DESCRIPTION

Cybereason delivers a proprietary technology platform that automatically uncovers malicious operations (Malops™) and reconstructs them as a clear image of a cyberattack in context. This enables enterprises to discover sophisticated targeted threats at a very early stage, disrupt them at the stem and significantly reduce the costs and damages caused by such attacks. Cybereason is headquartered in Cambridge, MA with offices in Tel Aviv, Israel. For more information, please visit www.cybereason.com, www.twitter.com/Cybereason, www.facebook.com/Cybereason, and www.linkedin.com/company/Cybereason.

Citation preview

Page 1: Cybereason: Terminate Hacking Operations

© 2014 Cybereason Inc. All rights reserved.

Terminate Hacking Operations February 2014

Page 2: Cybereason: Terminate Hacking Operations

© 2014 Cybereason Inc. All rights reserved.

Founded by veteran cyber security experts

!   Members of Elite Military Cybersecurity Unit

!   Hacking Operations & Forensics

!   Reverse engineering & Malware analysis

!   Cryptography & Evasion

!   Proven track record at Security and SaaS companies – Veracode, DataPower (IBM)

!   Productizing and Go-to-market expertise

!   Successful deployments at large enterprises

Joined by experienced executives

!   Medal of Honor from Israeli head of intelligence corps

!   Excellence in research and academic achievements

Prestigious awards & recognition

CTO CEO Yonatan Striem-Amit Lior Div

CVO Yossi Naar

VP Products Ashish Larivee

VP Sales & Marketing Mark Taber

The team

VP R&D Yonatan Perry

Page 3: Cybereason: Terminate Hacking Operations

© 2014 Cybereason Inc. All rights reserved.

   

The attack phases

Critical resource

Penetration

Hacking operation

Critical resource

C&C

Recon

Spread

Damage

Breach

Page 4: Cybereason: Terminate Hacking Operations

© 2014 Cybereason Inc. All rights reserved.

Hacking operation & Malops ™

Sec. Min. Hrs. Days Weeks Months

Damage

Time

Antivirus Firewall Sandbox IDS ...

Incident Response

Penetration Hacking operation

Breach Detected

ê

Malop™

Page 5: Cybereason: Terminate Hacking Operations

© 2014 Cybereason Inc. All rights reserved.

July 10, 2012

Almost every Fortune 500

company has been hacked and

likely won’t even know it until

6 months after the breach.

Cyber attacks - Everyone's problem

$66M In damage

Aurora

360,000 Credit Cards

Nuclear & Military

Data Taken

$6.7M In damage

$172M In damage

$30M In damage

$225M In damage

$2.6M In damage

70,000 Sites hacked

2.7M Confidential

E-mails

Page 6: Cybereason: Terminate Hacking Operations

© 2014 Cybereason Inc. All rights reserved.

Continuous Malop™ Detection

Monitoring

Enhancement

Big data analytics

Evidence

Suspicions

Malop™

  Cross  Customer  Cloud  Intelligence

External    Intelligence    Sources

Element  Profiles

Cybereason  LABS

Page 7: Cybereason: Terminate Hacking Operations

© 2014 Cybereason Inc. All rights reserved.

you. Thank www.cybereason.com  www.facebook.com/Cybereason  www.linkedin.com/company/cybereason  www.twiHer.com/cybereason