VERINT Cyber...
Transcript of VERINT Cyber...
![Page 1: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map](https://reader031.fdocuments.us/reader031/viewer/2022011923/605ad79e2de7a370ab1e2e78/html5/thumbnails/1.jpg)
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 1
Intelligence Powered Security TM
VERINT Cyber Intelligence
Daniel Vitlis
November 2017
![Page 2: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map](https://reader031.fdocuments.us/reader031/viewer/2022011923/605ad79e2de7a370ab1e2e78/html5/thumbnails/2.jpg)
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 2 Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 2
Verint is a global provider of security and intelligence
data mining software that helps governments, critical
infrastructure providers and enterprises to neutralize
and prevent terror, crime and cyber threats
![Page 3: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map](https://reader031.fdocuments.us/reader031/viewer/2022011923/605ad79e2de7a370ab1e2e78/html5/thumbnails/3.jpg)
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 3
Security Solutions Built on Powerful Foundations
$1+ Billion Revenue in NASDAQ
5000 Employees
$1B R&D Investment over 10 years
6 R&D Centers
15 Global Offices
700+ Patents
Actionable
Intelligence
Intelligence
Powered
Security
![Page 4: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map](https://reader031.fdocuments.us/reader031/viewer/2022011923/605ad79e2de7a370ab1e2e78/html5/thumbnails/4.jpg)
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 4
Understanding the Need for a Comprehensive Solution
Intelligence
Needs/Tasks
Technology + Methodology
Security
Challenges
Organization
&
User Type
Law Enforcement
National Security
National Intelligence
Critical Infrastructure
Military & Special Forces
Enterprise
Collection Assessment Operation
Terror Border
Protection Cyber
Attacks Illegal
Immigration Violence &
Crime Poaching
![Page 5: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map](https://reader031.fdocuments.us/reader031/viewer/2022011923/605ad79e2de7a370ab1e2e78/html5/thumbnails/5.jpg)
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 5
Technology developed in-
house based on intelligence
domain expertise
Network
Intelligence
Tactical
Intelligence
Web
Intelligence
Satellite
Intelligence
Lawful Interception
Compliance
Advance Content
Extraction
Cyber
Security
Situational
Awareness
Intelligence
Fusion
Comprehensive & Unified Intelligence Comprehensive & Unified Intelligence
![Page 6: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map](https://reader031.fdocuments.us/reader031/viewer/2022011923/605ad79e2de7a370ab1e2e78/html5/thumbnails/6.jpg)
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 6
Intelligence Powered Cyber Security
![Page 7: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map](https://reader031.fdocuments.us/reader031/viewer/2022011923/605ad79e2de7a370ab1e2e78/html5/thumbnails/7.jpg)
© 2017 Verint Systems Inc. All Rights Reserved Worldwide 7 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 7
Scour the open, deep and dark web for • Planned and ongoing
campaigns
• Exploit and vulnerability commerce
• Indicators of system breach and data leaks
The Surface Googleland
The Deep Web -Co
The Dark Web Tor, Darknets, Dark Markets
#1 Extend Beyond the Organization
#2 Holistic kill chain coverage
#3 Automate the Hunt
#4 Simplify SOC Operations
![Page 8: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map](https://reader031.fdocuments.us/reader031/viewer/2022011923/605ad79e2de7a370ab1e2e78/html5/thumbnails/8.jpg)
© 2017 Verint Systems Inc. All Rights Reserved Worldwide 8
Malware Attacks: Attackers WILL Eventually Bypass Every Prevention Method
![Page 9: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map](https://reader031.fdocuments.us/reader031/viewer/2022011923/605ad79e2de7a370ab1e2e78/html5/thumbnails/9.jpg)
© 2017 Verint Systems Inc. All Rights Reserved Worldwide 9 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 9
Built-in detection engines and forensics working in unison • Monitor Network and Endpoints
• Endpoint Detection
• Command and Control
• Lateral Movement
• Behavioral Analytics
• Proactive Forensics
#2 Holistic
Kill Chain Coverage
#3 Automate the Hunt
#4 Simplify SOC Operations
#1 Extend Beyond the Organization
![Page 10: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map](https://reader031.fdocuments.us/reader031/viewer/2022011923/605ad79e2de7a370ab1e2e78/html5/thumbnails/10.jpg)
© 2017 Verint Systems Inc. All Rights Reserved Worldwide 10 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 10
#3
Automate the Hunt
#4 Simplify SOC Operations
#1 Extend Beyond the Organization
#2 Holistic Kill Chain Coverage
1. Extract Leads
2. Create an Intelligence
Map
3. Expand the Map
4. Evaluate The Findings
5. Decide on next step
File Analysis
Endpoint Analysis
Command & Control
Network & Lateral
Movement
Automated Investigation
Attack patterns
& profiles
Incident Storylines
Multi Vector Detection
Forensics
![Page 11: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map](https://reader031.fdocuments.us/reader031/viewer/2022011923/605ad79e2de7a370ab1e2e78/html5/thumbnails/11.jpg)
© 2017 Verint Systems Inc. All Rights Reserved Worldwide 11 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 11
#4 Simplify
SOC Operations
#3 Automate the Hunt
Reduce the number of security tools, accelerate analyst onboarding and lower the skills barrier
• Single pane of glass
• Prioritize incidents
• Orchestrated response
#1 Extend Beyond the Organization
#2 Holistic Kill Chain Coverage
![Page 12: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map](https://reader031.fdocuments.us/reader031/viewer/2022011923/605ad79e2de7a370ab1e2e78/html5/thumbnails/12.jpg)
© 2017 Verint Systems Inc. All Rights Reserved Worldwide 12
Government Office
Global Enterprise
National Scale
Critical Infrastructure
Intelligence Powered Cyber Security
TPS Cyber Threat
Protection System
iSOC Intelligence-Driven
Security Operation Center
NDC National Cyber Defense Center
![Page 13: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map](https://reader031.fdocuments.us/reader031/viewer/2022011923/605ad79e2de7a370ab1e2e78/html5/thumbnails/13.jpg)
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 13
Thank you