VERINT Cyber...
Transcript of VERINT Cyber...
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 1
Intelligence Powered Security TM
VERINT Cyber Intelligence
Daniel Vitlis
November 2017
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 2 Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 2
Verint is a global provider of security and intelligence
data mining software that helps governments, critical
infrastructure providers and enterprises to neutralize
and prevent terror, crime and cyber threats
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 3
Security Solutions Built on Powerful Foundations
$1+ Billion Revenue in NASDAQ
5000 Employees
$1B R&D Investment over 10 years
6 R&D Centers
15 Global Offices
700+ Patents
Actionable
Intelligence
Intelligence
Powered
Security
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 4
Understanding the Need for a Comprehensive Solution
Intelligence
Needs/Tasks
Technology + Methodology
Security
Challenges
Organization
&
User Type
Law Enforcement
National Security
National Intelligence
Critical Infrastructure
Military & Special Forces
Enterprise
Collection Assessment Operation
Terror Border
Protection Cyber
Attacks Illegal
Immigration Violence &
Crime Poaching
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 5
Technology developed in-
house based on intelligence
domain expertise
Network
Intelligence
Tactical
Intelligence
Web
Intelligence
Satellite
Intelligence
Lawful Interception
Compliance
Advance Content
Extraction
Cyber
Security
Situational
Awareness
Intelligence
Fusion
Comprehensive & Unified Intelligence Comprehensive & Unified Intelligence
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 6
Intelligence Powered Cyber Security
© 2017 Verint Systems Inc. All Rights Reserved Worldwide 7 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 7
Scour the open, deep and dark web for • Planned and ongoing
campaigns
• Exploit and vulnerability commerce
• Indicators of system breach and data leaks
The Surface Googleland
The Deep Web -Co
The Dark Web Tor, Darknets, Dark Markets
#1 Extend Beyond the Organization
#2 Holistic kill chain coverage
#3 Automate the Hunt
#4 Simplify SOC Operations
© 2017 Verint Systems Inc. All Rights Reserved Worldwide 8
Malware Attacks: Attackers WILL Eventually Bypass Every Prevention Method
© 2017 Verint Systems Inc. All Rights Reserved Worldwide 9 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 9
Built-in detection engines and forensics working in unison • Monitor Network and Endpoints
• Endpoint Detection
• Command and Control
• Lateral Movement
• Behavioral Analytics
• Proactive Forensics
#2 Holistic
Kill Chain Coverage
#3 Automate the Hunt
#4 Simplify SOC Operations
#1 Extend Beyond the Organization
© 2017 Verint Systems Inc. All Rights Reserved Worldwide 10 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 10
#3
Automate the Hunt
#4 Simplify SOC Operations
#1 Extend Beyond the Organization
#2 Holistic Kill Chain Coverage
1. Extract Leads
2. Create an Intelligence
Map
3. Expand the Map
4. Evaluate The Findings
5. Decide on next step
File Analysis
Endpoint Analysis
Command & Control
Network & Lateral
Movement
Automated Investigation
Attack patterns
& profiles
Incident Storylines
Multi Vector Detection
Forensics
© 2017 Verint Systems Inc. All Rights Reserved Worldwide 11 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 11
#4 Simplify
SOC Operations
#3 Automate the Hunt
Reduce the number of security tools, accelerate analyst onboarding and lower the skills barrier
• Single pane of glass
• Prioritize incidents
• Orchestrated response
#1 Extend Beyond the Organization
#2 Holistic Kill Chain Coverage
© 2017 Verint Systems Inc. All Rights Reserved Worldwide 12
Government Office
Global Enterprise
National Scale
Critical Infrastructure
Intelligence Powered Cyber Security
TPS Cyber Threat
Protection System
iSOC Intelligence-Driven
Security Operation Center
NDC National Cyber Defense Center
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 13
Thank you