1. P R O D U C T O V E R V I E W
Platform that Provides a 361º Threat Visibility of Your Enterprise
NetSecurity Corporation is a cyber security, computer
forensics, and training company. Our mission is to protect,
defend, and recover valuable assets from the most advanced
cyber attack. Since 2004, we continue to provide
unparalleled innovation, world-class quality, customer-focused,
and timely solutions to government agencies and corporations.
2. The Threat Landscape
Cyber attacks and data breaches continue to be on
the rise, with attackers constantly crafting their
techniques to fly below the radar of defensive
measures
Sophisticated attackers are leveraging malware-less
techniques to infiltrate their targets
Human susceptibility makes bypassing security
measures trivial
Expert Threat Responders and Security Analysts are
very expensive and difficult to retain
Due to the voluminous amount of alerts received by
Security Analysts, they are unable to quickly validate
or respond to actionable threat intelligence
Most solutions only address threats to Windows
platform with no visibility into the threats hidden in
Mac OS, Linux, Unix, logs, and network traffic
2
According to Verizon
2015 DBIR:
“75% of attacks spread from
Victim 0 to Victim 1 within 24
hours. "
"In 60% of cases, attackers
are able to compromise an
organization within minutes."
"70–90% of malware
samples are unique to an
organization.“
According to Ponemon
Institute:
“An average of 395 hours
($1.27 million each year) is
wasted each week detecting
and containing malware
because of false positives
and/or false negatives.”
3. Insider Threat
Data Breach
Rouge Employee Social Engineering
Malware
Advanced Persistent Threat (APT)
Cyber Attacks
Denial of Service
Keylogger
Ransomware
Reconnaissance
Remote Access Tool (RAT)
Rootkit
Spam
Phishing Email
Spyware
SQL Injection
Targeted Attack
Zero-day Exploit
PII Leakage
Network Sniffing
Hackers
Headaches
Breach Investigation
Attack Prevention
Threat Response
Situational Awareness
Risk Mitigation
Peace of Mind
Threat Hunting
Breach Detection
Actionable Threat Intelligence
Data Loss Prevention
Trojan
4. Platform that Provides a 361º Threat Visibility of Your Enterprise
Data
Source
Threat
Intelligence
Feed
Data
Analytics
Actionable
Intelligence
Threat
Mitigation
5.
6. +TR Capabilities / Differentiators
Sweeps hundreds of enterprise endpoints
simultaneously for malware, malware
behaviors, and attackers tools and tactics
Captures live network packets and
collects netflow data for deep forensics
analysis
Provides situational awareness, threat
visibility, and contextual intelligence that
helps you thwart attacks before
intellectual property leaves your
organization
Detects targeted attacks at the early
stage of the attack life cycle
Detects dormant (hibernating) and
memory-resident malware
Provides a 361º view of the threat faced
by your organization
Combines capabilities of traditional
computer, malware, memory, network,
and log forensics tools into one platform
Provides threat intelligence capability
that produces and consumes threat feeds
Deploys to run for few days or many
years in a small or very large network
Used by Internal Security Teams,
Professional Services Firms, or Consultants
Costs a fraction of other products that
only provide partial solution to the
advanced threat problem
Capabilities Summary Key Differentiators
6
7.
8. Data & Forensic Analytics
Behavior Rules
Behavior-based indicators of malware and
threat actors
Attackers’ tools and tactics
Malware-less techniques
Signatures
Signature of known or unknown malware
Anti-Virus signatures, IPS rules, IoCs, YARA, etc.
Threat Intelligence (Internal/External)
File Hashes/Names/Paths
C&C IP Addresses, URLs, Domain Names,
Email Addresses
User Agents, Mutexes, etc.
Analytics Engine
Combines Behavior Rules, Signatures, Threat
Intelligence
Produces Actionable Threat Intelligence
8
Threat Data
Behavior
Rules
Signatures
Threat
Intelligence
Feed
Actionable
Threat
Intelligence
9. Benefits of ThreatResponder®
Reduce the cost associated with
hiring and retaining expert Threat
Responders and Analysts by >75%
Gain situational awareness of threat
campaigns, enabling you to make
quick and better informed decisions
Prevent, detect, and respond to an
attack or data breach quickly and
reduce the risk of bad reputation or
data loss
Investigate threat data from both
online and offline systems,
eliminating the need to invest in more
technologies that may not work
together to provide desired results
Acquire evidence in a forensically-
sound manner to withstand legal
scrutiny
Receive various procurement options
that allow you to deploy the
technology to run for a few days or
many decades!
Analyze potentially sensitive files or
targeted malware within the
ThreatResponder® platform, ensuring
your privacy
Enjoy a quality software that is
proudly Developed in America, with
Headquarters in Dulles, Virginia –
outside Washington, DC
9
10. DEMO / PROOF OF CONCEPT (POC)
Corporate Information
Toll Free: 1-855-NETSECURITY
Telephone: +1-703-444-9009
Email: 911@netsecurity.com
Web: www.threatresponder.com
Government Data
SBA Certified 8(a) SDB
SAM Registration: Yes
DUNS: 122657005
CAGE Code: 3CJJ4
GSA Schedule Contract (# GS-35F-0288Y)
Seaport-e Contract (# N00178-07-D-5205)
Contacts
James Perry, Jr., Vice President of Sales
Chance Butler, EnCE, Director of Cyber
Operations
10
SELECT CUSTOMERS
SELECT CUSTOMERS