heimdal the cyberthreat security suite
play

Heimdal - The Cyberthreat Security Suite - We protect what others - PowerPoint PPT Presentation

Heimdal - The Cyberthreat Security Suite - We protect what others cant About Heimdal Security Part of the best in the Devised by world Driven by experienced Cyber Threat space champions experts Heimdal Security is part of the best in The


  1. Heimdal - The Cyberthreat Security Suite - We protect what others can’t

  2. About Heimdal Security Part of the best in the Devised by world Driven by experienced Cyber Threat space champions experts Heimdal Security is part of the best in The Heimdal Security software was Since its incorporation in early 2014, devised in 2011 by the 19 th and 20 th Team cyber risk protection with a proven track Heimdal has driven by experts in cyber record from FBI, Europol, US DOJ and a Defcon CTF World Champions in hacking. security and cyber security development. active partnership in the No More Heimdal is now used to protect This includes specialists from security Ransom project. We deliver market- organizations and users across the world organizations such as BitDefender, BullGuard leading threat intelligence to against advanced attacks, wherever they and Secunia . We are now one of the world’s organizations and users around the world. may go. fastest growing security platforms. Our ground-breaking intelligence alerts have been featured in media such as: Our ground-breaking intelligence alerts have been featured in media such as:

  3. Endorsed by Leading Organizations The power of Heimdal is the intelligence At Heimdal, we gather our leading intelligence from a variety of sources in order to combat cyber threats: - Reverse engineering malware - Zero hour monitoring - Penetrating and infiltrating malware infrastructure - Attack analysis - Sinkholing - Cracking Domain generation algorithms (DGA’s) - Domain monitoring - Crawling the darkest places of the internet

  4. Why Heimdal ? And what can it do ? 2 nd generation threat tool The current threatscape is unseen or unknown malware Heimdal matches on your systems vicious with 2 unique technologies the threatscape and - Get vulnerable software up- to-date at worlds quickest market challenges time to update, reducing 85% Threat types are complex and the of attack risk according to goals typically financially orientated Cisco Opposed to all other endpoint products, - Attack protection and C&C 3 rd party software - Heimdal does not focus on the code of the one way or the other. protection for APT’s, deployment and threat, making it the only threat type Ransomware, Trojans maintenance autonomous endpoint suite in the market. - Polymorphic malware attack Directly Financial / Organized Crime: - Reduced response time to Heimdal focuses on closing vulnerabilities protection - Email attacks, DDOS or Drive-by-attacks infections with e-mail alerts and mitigating exploits, whilst blocking - Protection being included in targeting to deliver Ransomware, Trojans, - Data compliance and IT audit incoming attacks, botnets, data leakage botnets and having your Botnets, Social Media hijacking or Black reporting and command & control server systems work as zombies Market Cyber-crime toolkits for capturing - Reducing IT maintenance communication . - Preventing data leakage , credentials or ransoming financial means. time and manpower time exfiltration and data theft of company information Social / Political Groups: Heimdal covers a broad palette - Link protection for spear- - Website Hacking, Email or Drive-by-attacks Working holistically on any Windows™ or IT security problems for SMB’s phishing, whaling and targeting to expose the party or to deliver device and agnostic of any operating to Entreprise. malicious redirecting Trojans / APT type malware to steal system processes it will detect malware - Protection against drive-by- credentials or sensitive information over inn ways that no other endpoint Heimdal is code autonomous attacks and Zero-hour time. protection can. and does not care about exploits Analyzing all HTTP, HTTPS and DNS traffic whether attacks are Exploit kits, - Code autonomous Exploit kit Government / States-ponsored: with Machine-Learning-Detection ensures Ransomware or APT’s. protection against Rig , that Heimdal discovers even hidden 2 nd - Infrastructure attacks, Email attacks, DDOS Neutrino generation malware systems. Heimdal or Drive-by-attacks targeting to bring down Let us tell you - Compromise prediction on works proactively to detect APT’s, infrastructure or deliver Trojans / APT type endpoints Ransomware’s, Botnet’s and Trojan’s, malware to steal military strategy, trade more! - Malware traffic pattern whilst blocking them until removed. secrets or intelectual property scanning identifying yet

  5. Software Management Heimdal has a unique, client-based 2-Way Tracking device-to-infrastructure communication, Mitigate exploits, close vulnerabilities and install Traffic Scanning Engine which detects and our enables you to detect and software from anywhere in the world. Heimdal mitigate 2 nd generation malware strains, regardless blocks network communication to can with zero setup, automatically , silently and mitigate Zero Hour exploits, Ransomware of the attack vector. Using Machine Learning on-the-fly manage manage your software from C&C’s, malware backbones, next -gen (MLD), Indicators of compromise/attack (IOC/IOA) secure servers anywhere on the globe. attacks and data leakage . and Network forensics Heimdal has a unique add- This is a key security measure as exploits are Heimdal is the traffic scanning solution for on to any other form of endpoint security. used in 85% of all attacks* . any business to build protection beyond Our technology is accredited in takedowns of In depth reporting on vulnerabilities and the edge of the firewall and perimeter. Ransomware by the US DOJ, the FBI and Europol . updates is included. Works in any Windows environment Heimdal is compatible with any Windows client environment from Windows 7 to 10. Heimdal can also work on VM Ware and Hyper V hosted environments. Enjoy a safer environment! *Data supported by US CERT - https://www.us-cert.gov/ncas/alerts/TA15-119A?hootPostID=b6821137ae5173095390bd502ae04892

  6. Why Heimdal 1. Patches 99,5% of security-critical software Heimdal patches Java 7 / 8, Acrobat Reader, Acrobat Flash, Quicktime, VLC Player, Silverlight and many other applications, covering 99% of security-critical software apps. Heimdal works automatically and silently, without interrupting the user. 2. to block malicious traffic Dangerous Internet traffic can be used to infect your workstations and network. This makes scanning and blocking malicious traffic a core security component. Making use of HTTP/HTTPS/DNS Heimdal protects your workstations against the most modern attacks with DNS alone being 91,3% of Hackers attack angles. 3. is a supplement for Antivirus, which is reactive Antivirus looks for files and actions, whereas Heimdal looks at Internet traffic. Therefore, what Heimdal covers and antivirus products cover varies greatly. Heimdal prevents cyber criminals from taking data from your workstations and moving it out of your network.

  7. Heimdal’s Software Management In-depth Heimdal’s patch & install engine – key benefits Advantages 1. Automatic deployment/redeployment of patches 1. Less time spent on following up 2. Silent software installation and on-the-fly 2. Less time spent on building images, packages and no reboots 3. Silent patching without user interruption 3. Increased productivity and less time spent on support 4. HTTPS deliver from Heimdal servers anywhere in the world 4. Secure packages and updated machines – anytime/anywhere 5. Covers both feature and security patches 5. Ensures you are always covered 6. Patch release to install time of less the 4 hours avg. 6. Quick exploit kit protection 7. Integrates with the active directory without any setup 7. Ensures minimal deployment overhead 8. Configurable what you want installed and patched 8. Can be customized to fit your organization ’ s needs 9. Version management included 9. Choose what specific versions to run 10. Un-installation of software supported 10. Can remove unwanted software from your machines 11. Scheduling of updates according to PC clock 11. Updates always fit to employees in their time zone

  8. Heimdal Exploit protection Heimdal Anti-Exploit Software Protection Heimdal offers protection where antivirus products give up. Software exploits, especially in Adobe Flash and Oracle Java, are a common path of attack. Overall, software exploits account for 85% of attack angles. Antivirus products and firewalls cannot shield you from these attacks, as no file is executed on the PC. Heimdal protects you both by keeping your software up to date, and by blocking malicious traffic.

  9. Heimdal Data Protection Heimdal Banking Trojan/Data Protection Heimdal offers protection where antivirus products give up. Banking Trojans and data stealers are often delivered through a morphed Zeus infection, which has a low 2,25% antivirus detection rate. This means that cyber criminals are often successful in bypassing Antivirus defenses with their attacks. Heimdal blocks access to the Zeus / Data Trojan servers, thus ensuring banking funds or data is not lost even though your are infected.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend