Complicate, detect, respond: stopping cyber attacks with identity analytics
NormShieldBrochure
1. sdfsdfsdfsdfsdfsdf
Feeding each types of
notifications into
a unified & prioritized
alarm center for actions
Monitoring deep web and
paste portals seeking valuables
Checking possible
fraudulent domain
changes against
phishing or malware
Monitoring asset status against
reputation sources
Reputation Monitoring
Unified Alarm Center
Keeping an eye on social media,
harvesting security related big data
Fraudulent
Domain
Monitoring
Data Leakage Tracking Social Media Tracking
Giving heads-up through
passive vulnerability
notifications without scanning
NoScan Early Alerts
Producing fine-grained
notifications when
a change occurs in
your perimeter
Supporting various vulnerability sources
with flexible aggregation
Unified Vulnerability Management
Continuous
Network
Monitoring
NormShield
Unified Vulnerability &
Cyber Intelligence Management
2. Technology quickly changes and evolves with time passing.
So does the security posture of a system. Keeping a system
secure is a hard task to tackle and there are numerous
approaches applied. NormShield is both an on-demand and
on-premises vulnerability assessment, management and
cyber threat intelligence solution with an affordable price.
With NormShield;
NormShield Solution
Your assets are defined through simple and easy
to understand interfaces and prioritized by you.
Your assets are scanned against vulnerability catego-
ries including but not limited to OWASP Top 10.
Your assets are scanned with more than one
security scanners and findings are managed
from a centralized dashboard.
The false-positive elimination is processed by
security experts leaving you with false-positive
free vulnerabilities.
Vulnerability categorization and normalization
processes are handled with ease in order to
provide uniformity through out the system.
Critical vulnerabilities are fed into SIEM
solutions in your SOC scope.
The scans are scheduled in a flexible manner and
managed according to your company's needs.
DNS, SSL, domain and service information
belonging to your assets are constantly monito-
red and any changes are notified through
alarms.
Data at rest is secured through asymmetric
encryption at the database level.
Dashboard includes quality and meaningful
graphs about including but not limited to SLA
and KPI.
Fraudulent domain names, asset reputation,
data leakage and social media monitoring is
handled constantly with cyber threat intelligen-
ce module.
NormShield
Unified Vulnerability &
Cyber Intelligence Management
3. Centralized Alarms
All of the operative analysis, search, supress and delete
actions on alarms produced by NormShield cyber threat
intelligence and vulnerability scanning sources are handled
from a single interface.
Asset Reputation Mon.
Assets are continuously checked against several sources of
reputation lists which include hacked, malware emitting,
forcefully used for phishing web sites, urls, ip addresses and
smtp servers. If any of those blacklist reputation lists contain
company's assets, NormShield produces alarms.
Social Media Monitoring
Hackers love social media, too. And why not, it's the best
media for strong PR. Most successful or planned hacks are
publicized in social media. The company brand is being
tracked by NormShield through social media against
successful or scheduled hack attempts.
Tracking Data Leaks
NormShield searches against several paste tool data houses
and underground hacked and then publicized databases for
possible sensitive data leakages. From credit card numbers
to email addresses, or domain names are being searched
through vast amount of disclosed data, and if any matches
occur alarms will be produced for possible actions
Unified Vulnerability Man.
Smart normalization and classifications on vulnerabilities
are implemented in order to ease security professionals'
lifes. Additionaly, security professionals can produce
triggers according to various vulnerability related fields and
notification channels to get informed if any new specific
vulnerabilities are detected.
Passive Security Alarms
By keeping and maintaining asset detail and new vulnerabi-
lity correlations, alarms are generated without any need of
actual scanning.
Sistemininiz Güvenlik Zaafiyeti Risk Haritası
Fraudulent Domain Mon.
Possible fraudulent domains are monitored by NormShield
and alarms are produced when any domain registration
change occurs. Modern attacks like CryptoLocker involve in
client side security awareness. However, corporates' brand
trust is being actively exploited in these scenarios.
NormShield
Unified Vulnerability &
Cyber Intelligence Management
Constant Asset Monitoring
In spite of all the precautions, both web sites and
twitter/instagram/facebook etc. social accounts might be
defaced. Social accounts and corporate web sites are being
tracked both proactively through realtime polling and
passively through defacement archive lists by the
NormShield. Early alerts are key to quick actions.
4. Contact
19 Mayıs Mah. İnönü Cad.
Çetinkaya İş Merkezi No:92 Kat:4
+90 (216) 474 0038
About Us
NormShield Security was founded in 2014 by a team of experts
and consultants in the information security. It serves unified
vulnerability management, cyber intelligence and consulting.
http://www.normshield.com
info@normshield.com
01
02
04
05
06
07
08
11
09
10
REPUTATION
DEEP WEB
VULN FEEDS
CYBER INTELLIGENCE SOURCES
VULN
SCANS
SSL
MALWARE SCANS
PASTE SITES
NETWORK SCANS
SOCIAL MEDIA
DOMAIN
NormShield
Unified Vulnerability &
Cyber Intelligence Management