cybersecurity & compliance automation platform delivered in - - PowerPoint PPT Presentation

cybersecurity compliance automation platform
SMART_READER_LITE
LIVE PREVIEW

cybersecurity & compliance automation platform delivered in - - PowerPoint PPT Presentation

cybersecurity & compliance automation platform delivered in software as a service model plug&play cybersecurity plug&play compliance Defenselayers company purpose Defenselayers is an innovative, global cybersecurity startup. We


slide-1
SLIDE 1

cybersecurity & compliance automation platform

delivered in software as a service model

plug&play cybersecurity plug&play compliance

slide-2
SLIDE 2

Defenselayers is an innovative, global cybersecurity startup. We secure applications both in private and public clouds, applications which are built using application containers technology (Docker, Kubernetes environment). We protect applications during development as well as in production environment. This is why we say we are DevSecOps native company. Defenselayers is a cloud native company, providing application containers native cybersecurity services. Apart of securing application containers we assure in some extent compliance with GDPR, NIS and PCIDSS standards. Our mission is to reduce complex and expensive cybersecurity services usually provided by expensive specialists into automated, simple to use and affordable Software-as-a-Service. We do it through our Plug&Play Cybersecurity Automation Platform.

Defenselayers – company purpose

slide-3
SLIDE 3

Defenselayers’ response to market trends

Business is moving to a cloud. With growing cloud adoption new software development ways appeared: microservices and application containers. Advantages of cloud computing, however, come with a cost – cybersecurity challenges. At the same time it is more difficult to find experienced cybersecurity experts and they are more and more expensive. In 2020 cybersecurity talent gap is expected to reach 3,5 mln positions globally. This is where Defenselayers comes to the stage. By providing a platform which automates cybersecurity of microservices encapsulated in application containers we allow to solve problem of cybersecurity talent gap and reduce software development costs at the same time. Application containers market is quite young, but it grows rapidly and is expected to grow further. There are very few truly application containers native cybersecurity tools. Cybersecurity of application containers is recognized as one the most necessary solutions these days.

slide-4
SLIDE 4

Source: CBInsights

Container security is recognized by CB Insights as the most necessary out of all cybersecurity industry trends.

Container security

slide-5
SLIDE 5

Defenselayers secure container vision

Cybersecurity standards & best practices automatically implemented Compliance regulations automatically implemented Cybersecurity and compliance layers constantly kept updated

PLUG&PLAY CYBERSECURITY PLUG&PLAY COMPLIANCE

Increased level of security Shorter time-to-market Lower software development costs Faster software development cycle Savings on cybersecurity and compliance resources Savings on cybersecurity tools plug&play cybersecurity plug&play compliance

To reduce complex and expensive cybersecurity services to plug&play commodity….

slide-6
SLIDE 6

How we do it?

Defenselayers produce OCI compliant application containers with pre-encapsulated and pre-hardened standard technologies (operating systems, databases, application servers, interpreters etc.). We plan to develop containers with hundreds of different technologies. Developer encapsulates his microservice into Defenselayers container (note that no change to microservice is required). Central Defenselayers Platform monitors such container and constantly updates it when new vulnerabilities appear. Customers pay periodic fee for application container monitoring and updating security layers of the container.

slide-7
SLIDE 7

Defenselayers provides your microservices with out-of-the-box secure containerized technology stack just by one click.

Secure Technology Stack

slide-8
SLIDE 8

Defenselayers – General Roadmap

Stage 1

  • hardening and settings done to meet compliance regulations
  • assure that all components put into container image before it leaves
  • ur “factory” could be trusted
  • 17 technologies pre-encapsulated in Defenselayers Secure Containers

Stage 2

  • more security tests
  • n-line container monitoring
  • Further technologies encapsulated
  • Defenselayers e-store

plug&play cybersecurity plug&play compliance

slide-9
SLIDE 9

Stage 1 - Defenselayers Secure Container preparation process

Executable binaries hardening Recompilation of main components Removal of insecure modules Removal of insecure functionality Removal of insecure components Removal of unused components Secure configuration of included components Shell Network services Daemons Other component Secure configuration Removal of default accounts Secure application accounts Secure environment variables settings File system access rights hardening More strict access rights UMASK Vulnerability scanning Malware scanning Integrity protection of every binary and configuration component Complete manifest of all components inside container image

plug&play cybersecurity plug&play compliance

slide-10
SLIDE 10

Stage 1 – How Defenselayers Secure Container addresses compliance

GDPR Secure by default, out-of-the-box = privacy by default privacy by design (Art. 25) Security testing and vulnerability management (Art 32 1 c-d) Incident management requires integrity control (Art. 33, 34) NIS Directive Incident management and reporting requires integrity control (Art. 14) Vulnerability & patch management (Art. 14, Art. 16) PCI DSS Security/hardening requirements for CardHolder Data Environment (CDE) (Req 3, 4) Integrity control (Req 6) Vulnerability scanning (Req 5, Req 6, Req 11) Malware scanning (Req 5) Patch management (Req 11) Secure TLS and other encryption protocols/algorithms (Req 3, Req 4) System hardening / development of secure networks, systems and applications (Req 2, Req 6) Financial sector regulations Risk based hardening approach Operation Risk value reduction Vulnerability scanning Malware scanning Patch management

slide-11
SLIDE 11

Defenselayers Secure Containers – technology encapsulation roadmap Ready To Use Ready by the end of 2020

  • Alpine
  • Nginx
  • Apache
  • SFTP/SSH
  • Python
  • Go
  • Redis
  • Django
  • Flask
  • Postgress
  • Nodejs
  • PHP
  • Java
  • MongoDB
  • MySQL
  • Pytest
  • Gunicorn
  • RabbitMQ
slide-12
SLIDE 12

Stage 1 – Scope of Defenselayers Services

Unlimited license for Defenselayers Secure Containers Scope of services Constant monitoring of Defenselayers Secure Containers cybersecurity status Providing customers with information about new vulnerabilities Providing customers with new versions of Defenselayers Secure Containers free from vulnerabilities

plug&play cybersecurity plug&play compliance

slide-13
SLIDE 13

THANK YOU

info@defenslayers.com