3e International - Cyber and IT Security PDF Brochure

14

Transcript of 3e International - Cyber and IT Security PDF Brochure

2 3

4 Introduction 6 30 years of experience

8 Penetration Testing10 Secure Communications12 Personal Operating Security14 Managing your threats

16 Digital Forensics18 Computer and Mobile Phone Monitoring20 Feel at ease

22 Focused around you24 ContactCONTENTS

54

Whether you are jetting across the Atlantic, sailing around the Mediterranean or dining out in Central London; if you require our assistance, we will be there.

We are able to deploy any number of our team of specialists worldwide at a moment’s notice, enabling you to live and work with complete peace of mind.

Peace of mind –the ultimate luxury

6 7

The 3e International team are drawn from Government, Intelligence and Specialist Military backgrounds.

All of whom have been trained and operated to the highest echelons within the UK and worldwide.

With a combined active experience of 30 years, the 3e International team provide a professional and personal service to international corporations, private individuals and high profile celebrities with specific and varied requirements.

3 YEARS OFEXPERIENCE

An exclusive team of experts

8 9

Penetration testing exposes weaknesses in a company’s security measures and procedures.

Cyber penetration testing:

• Online open source information gathering can reveal vast amounts of information about a company or person that can be detrimental to their security.

• Online intrusion assessment. 3e can expose an organisations’ weaknesses to hacking over the internet. ‘Hacking’ can be used to retrieve sensitive company or personal information or launch a denial of service attack against their organisation.

• Wireless infiltration/ intelligence gathering. This technique involves remotely attacking a router in order to obtain sensitive data which would allow for further breaches in their cyber security. Note: this service can only be conducted with the legal owner’s permission.

Physical penetration testing:

• Covert physical surveillance conducted against key employees or people can often reveal valuable intelligence.

• Physical infiltration to test and negate present physical security procedures such as access control in order to gain entry into restricted or controlled areas such as senior executive offices, board rooms, server rooms.

• Assessment of overall physical security countermeasures.

• Evaluation of response process, speed, and effectiveness to a breach incident.

• Social engineering is the act of influencing someone to obtain confidential and privileged information, or to gain access to restricted resources and premises.

Designed to test and compromise security

Penetration Testing

Identifying strength and strengthening any weakness

Secure Communications

10 11

When privacy is crucial

We can provide techniques and solutions to ensure sensitive data remains secure whether on a laptop or mobile phone.

Laptop

• Hidden and encrypted drives that will keep data hidden and undetectable. The encryption will ensure that the data is not retrievable if stolen or lost.

• Encrypted emails: ensuring that communications from your device are protected.

• Malware resilience to negate infection of malware attacks from a range of sources.

Mobile Phones

• 3e can provide a truly secure voice, video and text communications which include real time geo-locating.

Embedding solutions to keep sensitive information under wraps

12 13

3e can provide bespoke cyber security training and advice to companies and individuals that are easy to use, effective and suited to their IT capabilities.

Online Investigation:Our online investigations team utilise their extensive operational experience and techniques to analyse data and information from the internet for intelligence and risk assessment purposes.

Online/open source intelligence gathering

• Analysis of online information can be used to ascertain what information is openly available about yourself or your company.

• Online data analysis to conduct an in-depth investigation against a subject often for Due Diligence reporting purposes.

Geolocating

• Modern techniques that can provide the physical location of a person via their internet and mobile phone use.

Revealing what is out there, waiting to be discovered

Personal Operating Security

Uncover and utilise the data you need

14 15

MANAGING YOUR THREATS

Penetration Testing

With smarter methods being deployed constantly, the security of your systems is vital. Penetration testing seeks to highlight any weaknesses in your company’s security, with the aim to tighten the areas most at risk.

Secure Communications

Ensuring that sensitive data remains secure through the most intelligent methods leaves you with the peace of mind you need to continue progressing as an organisation.

Personal Operating Security

Our online investigations team utilise their extensive operational experience to uncover the availability of data. Using modern techniques to pinpoint the details that are of interest.

16 17

We store vast amounts of data and information, both commercial and personal on computers, tablets and mobile phones. Loss or compromise of any of these devices can have a huge effect on our businesses and personal life.

In case of a lost, stolen or compromised device, an assessment of that device can be conducted to determine what information could be extracted and used, which would allow us to implement the necessary changes to security procedures.

Malicious software• Examination of devices

in order to identify any possible implants, Trojans, spyware or malicious software.

Source integrity verification• This is the ability to

confirm if the source of an email corresponds with the claims of the sender, identifies bogus emails used to extract sensitive information.

Data Recovery• Often used on devices

discovered during an investigation or on former employees company PC’s and mobile phones, the retrieval of hard and soft media can be extracted to provide intelligence such as call logs, text messages, emails, websites, locations, voicemails, photographs & videos.

The safety and security of your office is our focus

Digital Forensics

Managing your needs when issues arise

Computer and Mobile Phone Monitoring

18 19

Stay informed in matters of interest

Monitoring of computers and mobile phones can be conducted both covertly and overtly.

Monitoring will provide:

• Live monitoring

• Key word triggers

• Internet activity

• Emails

• Chat

• Documents produced

• Mobile phone text messages, emails and internet browsing

• GPS locations

3e will also supply analytical and full technical support services.

For safety, peace of mind or commercial protection

20 21

FEEL AT EASE

Digital ForensicsThrough digital forensics, 3e are able to help you to prepare for the unknown. Recovering data from lost, stolen or compromised files as well as ensuring that malicious software is detected.

We store vast amounts of data on our devices and the retrieval of this data can be extracted through soft and hard media, allowing for a quick response to any unpredicted incidents.

Computer and Mobile Phone Monitoring

Monitoring of computers and mobile phones can be both covertly and overtly carried out. Providing information around the use of key words, internet activity, emails, documents, messaging and location, which can be beneficial to the ongoing wellbeing of the organisation.

22

From the smallest task to the most complex investigation, the 3e International team ensures that the very best service is always delivered with integrity, discretion and understanding.

The best way to deal with threats is ultimately the avoidance of them – whether they’re threats to yourself, your loved ones or your assets.

To discuss how we can successfully plan and execute the avoidance of any risks or threats you may be facing now or in the future, contact a member of the 3e International team to arrange a meeting at a time and location convenient to you.

Intelligent protection tailored around your lifestyleFOCUSED

AROUND YOU

23

24

+44 (0) 207 043 9890

32 Curzon Street, Mayfair,London W1J 7TS

Morgan House, Gilbert Drive,Boston, Lincolnshire PE21 7TQ

E. [email protected]. 3e-intl.com

Contact

3e International is a trading style of 3e Global Ltd.Company No. 9049429

3e-intl.com