Post on 11-Apr-2017
transcript
We prevent cyber
incidents
LIMA Active Network Defense
Active Network Defense Analyses
Protect against newly discovered cyber security
threats.
Before they are compromised.
Protect your company assets.
Secure your network from both internal and external
threats.
Scalable cyber Security.
Real-time detection and enforcement of up to 5 million
threat indicators.
LIMA Active Network Defense
ARCHITECTS IN SAFETY
AND INTELLIGENCE
2 LIMA Active Network Defense
How to fully, timely, effectively
operationalize threat intelligence?
- lengthy reports
- volume of reports
- manual / automatic
- limitations of firewall
The problem
LIMA Active Network Defense 3 Example of 1 of the 10.000 iSight reports per year
LIMA Active Network Defense
LIMA Active Network Defense 4
The Advanced Cyber Threat TM (ACT)
Service dynamically updates policies
from partner sources.
RuleGate ® is an Active Network
Defense appliance able to block and
alert events in real-time.
QuickThreat ® visualizes active
inbound and outbound cyber threats,
with context, in real-time.
• 5 Million Threat Indicators – Alert, Block, or Allow network traffic in real-
time based on operationalized threat intelligence
• Up to 10Gb/s Network Speed – Line Rate throughput ensures the network
operates with no degradation in performance
• Ultra Low Latence – With latency less than 10 microseconds, there
is no noticeable loss of network performance
• Dynamic Policy Enforcement – Policies update without interruption in service
or security
• Instant Data Correlation – Instantly correlate the internal host to the
outside threat
LIMA Active Network Defense
LIMA Active Network Defense 5
RuleGate ® Threat Intel Security Layer RuleGate ® Firewall Proxy IDS/IPS/FE
Web Traffic Acceptable Use / Corporate Policy
Non-Web Acceptable Use / Corportate Policy
Stateful Traffic Filtering
Network Segmentation
Layer 3 Routing / NAT
Malware Signature Inspection
Malware Detonation
High Speed, Dynamic, Scaled Enforcement
Real Time per packet Monitoring & Logging
Internal Host Correlation (All Traffic)
Compliance Assurance (OFAC, ITAR, etc.)
Risk Orchestration: Allow, Alert, Log, Branch, Divert, Block Host, Block Threat
LIMA Active Network Defense 6
Threat Intelligence Partners
• Open Intelligence Platform
• Fully Integrated: Automatic Updates & Application
• Vendor Multi-Attribution
• Unique Risk Profiles
• Technology Integrations – Malware Detection
– Threat Intelligence Platforms
– SIEM Tools
LIMA Active Network Defense 7
Commercial Intelligence
Enterprise Intelligence
Industry Intelligence
WHY GROUP 2000?
LIMA Active Network Defense 8
Group 2000 is an independent Global Solutions Provider of Interception and Intelligence Services
Group 2000 delivers and preserves essential and reliable interception knowledge.
Group 2000 has global experience in the public and telecommunications domain.
Group 2000 minimizes complexity delivering end to end solutions.
Group 2000 has technology partnerships with leading suppliers.
Group 2000 is an active member of ETSI and GSMA.
Group 2000 LIMA solutions are modular and scalable to support the largest networks.