VERINT Cyber...

13
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 1 Intelligence Powered Security TM VERINT Cyber Intelligence Daniel Vitlis November 2017

Transcript of VERINT Cyber...

Page 1: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map

Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 1

Intelligence Powered Security TM

VERINT Cyber Intelligence

Daniel Vitlis

November 2017

Page 2: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map

Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 2 Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 2

Verint is a global provider of security and intelligence

data mining software that helps governments, critical

infrastructure providers and enterprises to neutralize

and prevent terror, crime and cyber threats

Page 3: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map

Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 3

Security Solutions Built on Powerful Foundations

$1+ Billion Revenue in NASDAQ

5000 Employees

$1B R&D Investment over 10 years

6 R&D Centers

15 Global Offices

700+ Patents

Actionable

Intelligence

Intelligence

Powered

Security

Page 4: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map

Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 4

Understanding the Need for a Comprehensive Solution

Intelligence

Needs/Tasks

Technology + Methodology

Security

Challenges

Organization

&

User Type

Law Enforcement

National Security

National Intelligence

Critical Infrastructure

Military & Special Forces

Enterprise

Collection Assessment Operation

Terror Border

Protection Cyber

Attacks Illegal

Immigration Violence &

Crime Poaching

Page 5: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map

Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 5

Technology developed in-

house based on intelligence

domain expertise

Network

Intelligence

Tactical

Intelligence

Web

Intelligence

Satellite

Intelligence

Lawful Interception

Compliance

Advance Content

Extraction

Cyber

Security

Situational

Awareness

Intelligence

Fusion

Comprehensive & Unified Intelligence Comprehensive & Unified Intelligence

Page 6: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map

Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 6

Intelligence Powered Cyber Security

Page 7: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map

© 2017 Verint Systems Inc. All Rights Reserved Worldwide 7 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 7

Scour the open, deep and dark web for • Planned and ongoing

campaigns

• Exploit and vulnerability commerce

• Indicators of system breach and data leaks

The Surface Googleland

The Deep Web -Co

The Dark Web Tor, Darknets, Dark Markets

#1 Extend Beyond the Organization

#2 Holistic kill chain coverage

#3 Automate the Hunt

#4 Simplify SOC Operations

Page 8: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map

© 2017 Verint Systems Inc. All Rights Reserved Worldwide 8

Malware Attacks: Attackers WILL Eventually Bypass Every Prevention Method

Page 9: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map

© 2017 Verint Systems Inc. All Rights Reserved Worldwide 9 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 9

Built-in detection engines and forensics working in unison • Monitor Network and Endpoints

• Endpoint Detection

• Command and Control

• Lateral Movement

• Behavioral Analytics

• Proactive Forensics

#2 Holistic

Kill Chain Coverage

#3 Automate the Hunt

#4 Simplify SOC Operations

#1 Extend Beyond the Organization

Page 10: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map

© 2017 Verint Systems Inc. All Rights Reserved Worldwide 10 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 10

#3

Automate the Hunt

#4 Simplify SOC Operations

#1 Extend Beyond the Organization

#2 Holistic Kill Chain Coverage

1. Extract Leads

2. Create an Intelligence

Map

3. Expand the Map

4. Evaluate The Findings

5. Decide on next step

File Analysis

Endpoint Analysis

Command & Control

Network & Lateral

Movement

Automated Investigation

Attack patterns

& profiles

Incident Storylines

Multi Vector Detection

Forensics

Page 11: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map

© 2017 Verint Systems Inc. All Rights Reserved Worldwide 11 © 2017 Verint Systems Inc. All Rights Reserved Worldwide 11

#4 Simplify

SOC Operations

#3 Automate the Hunt

Reduce the number of security tools, accelerate analyst onboarding and lower the skills barrier

• Single pane of glass

• Prioritize incidents

• Orchestrated response

#1 Extend Beyond the Organization

#2 Holistic Kill Chain Coverage

Page 12: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map

© 2017 Verint Systems Inc. All Rights Reserved Worldwide 12

Government Office

Global Enterprise

National Scale

Critical Infrastructure

Intelligence Powered Cyber Security

TPS Cyber Threat

Protection System

iSOC Intelligence-Driven

Security Operation Center

NDC National Cyber Defense Center

Page 13: VERINT Cyber Intelligencecontenidos.ceoe.es/CEOE/...documents-file-592-presentacion-de-verint.p… · #2 Holistic Kill Chain Coverage 1. Extract Leads 2. Create an Intelligence Map

Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 13

Thank you