TeamT5 Introduction Tsai Sung-Ting ( TT ) Global Customers Client - - PowerPoint PPT Presentation

teamt5 introduction
SMART_READER_LITE
LIVE PREVIEW

TeamT5 Introduction Tsai Sung-Ting ( TT ) Global Customers Client - - PowerPoint PPT Presentation

TeamT5 Introduction Tsai Sung-Ting ( TT ) Global Customers Client / Partner regions Japan, Taiwan, ASEAN, Korea, US 50+ Clients Government agencies Leading CTI Firms Security vendors MSSP Telecom / ISP


slide-1
SLIDE 1

TeamT5 Introduction

Tsai Sung-Ting ( TT )

slide-2
SLIDE 2

Global Customers

Client / Partner regions

  • Japan, Taiwan, ASEAN, Korea, US

50+ Clients

  • Government agencies
  • Leading CTI Firms
  • Security vendors
  • MSSP
  • Telecom / ISP
  • Accounting firms / Financial sectors
  • Semiconductor / Manufacturing
  • International Trading
slide-3
SLIDE 3

TeamT5 Solutions

Elegant Threat Hunting Technology Uncover hidden threats

  • Threat hunting platform and service.
  • Incident response, malware analysis, and forensics.
  • Threat mitigation and consulting service.

World-leading Threat Intelligence Know your enemies

  • Tracking and monitoring to 100+ cyber attack groups.
  • Leader in espionage threat research, especially threats from Asia.
  • Not only tracking and analyzing, we are also hunting actors.
slide-4
SLIDE 4

WORLD-LEADING CTI RESEARCH

slide-5
SLIDE 5

TeamT5 Threat Intelligence

Many people are talking about Threat Intelligence,

we actually do it.

10+ years experience Language & Culture Hunting Actors Threat Visibility Analysis Automation

slide-6
SLIDE 6

THE SOLUTION TO MODERN THREATS

slide-7
SLIDE 7

An elegant threat hunting solution

Elegant and Efficient

l

Light-weight with high detection rate

l

Low cost, less efforts

l

Low risk, non-intrusive

On premise Orchestration

  • SIEM Integration
  • HTTP Restful API

Auto Investigation

  • Infection Timeline
  • Lateral movement analysis

Threat Hunting

  • Behavior Modeling
  • Threat Intelligence
  • Outlier
slide-8
SLIDE 8

Use Case (1) – Threat Hunting Tool

Powerful remote forensics

  • Compromise assessment on risks
  • Incident response, especially cyber

espionage

  • Auditing riskware, shadow IT

(unauthorized servers) Simple and efficient

  • Simply bring a server to IR-site
  • Dispatch scanner using AD or existing

mechanism

  • IR Scan 2000+ PC per hour / per

server

  • Centralized Dashboard & Reports

from server Target clients

  • CSIRT team of large enterprises
  • MSSP, SOC, *-ISAC, CERT service

providers

  • Computer Auditing or Accounting

firms

  • Cybersecurity insurance

Identify infected computers instantly

  • Much more efficient than

traditional incident response.

  • Automatic investigation, log

analysis, malware analysis.

slide-9
SLIDE 9

Use Case (2) – Endpoint Protection

Daily endpoint health check

  • Installed dedicated ThreatSonar

server

  • Regular scan (e.g. 1 time / day)
  • Dashboard shows high level

suspicious PC

  • If threats detected, start investigation

with information provided by ThreatSonar. Target clients

  • Enterprises, especially with oversea

subsidiaries

  • Financial firms with ATM, need on-

premise

  • Cybersecurity insurance companies
  • Who need lightweight endpoint

visibility

slide-10
SLIDE 10

Fusion of Threat Hunting & Threat Intelligence

T5 Intelligence