- 360° Managed Cybersecurity is an integrated platform that provides comprehensive cybersecurity protection through features like attack prevention, threat detection, security assessments, and a security operations center.
- Small and medium enterprises are increasingly targeted by cyberattacks, with many lacking preparedness for risks associated with remote working.
- The platform addresses security challenges across multiple attack vectors and provides visibility through a single pane of glass with customizable policies, alerts, and monthly reporting.
5. Ø 65% of SMEs were victims of cyber incidents in the past year.
Ø Close to 40% of cyberattacks in Singapore target SMEs
Ø 40% of all breaches involved customer records
Ø 53% of cyber incidents in the past 12 months were caused by employees
Source: Chubb 2019, CSA Singapore, The Straits Times 17 Jan 19
Cyber Landscape
7. Singapore Cyber Events
High volume of cyber attacks in Singapore in 2019
- 3 most common form of cyber attacks
- 48% negative financial impact, 83% reported damage to reputation
Source: Today, 1 October 2020
Singapore recorded the highest drive-by download attack volume in Asia Pacific
- 3.9 times higher than the 2019 global and regional average
Source: Microsoft, 17 June 2020
• Fileless Attack • Malware• Ransomware
8. Hackers need only
one entry point to
gain access to
seize control of
your network
Cybersecurity in the
Age of Covid-19
Increased Security Risk From
Remote Working
Many Organizations Were
Unprepared
Employees May Utilize
Personal Computers For Work
Global Phishing Campaign
Targeting SG Companies
13. Attack Prevention - DDoS
DDoS Protection On-Demand
- Mitigate against cyber attacks
- Route clean traffic back to your network
14. Customers
Internal Staff
Internet
Launch thousands
of Bots to attack
Cyber
Attacker
Victim
Business
Server
Service
Offline
Attack
Traffic
Server
Overwhelmed
due to
congestion
Unable to
respond
Genuine
Traffic
DDoS - Distributed Denial of Service
17. Attack Prevention – Next Generation Firewall
List of Features
ü Intrusion Prevention System
ü Anti-Spam & Anti-Virus (ASAV)
ü Application Control
ü Web Filtering
ü DNS Filtering- Botnet
18. Intrusion Prevention System (IPS)
ü Leading Threat Intelligence
ü Virtual Patching
Internet
Attacks
Internal
Network
Web
Server
19. Application Control
Internet
Social Media
Movie Streaming
Gaming
Etc……
ü Prioritization of application optimizes
bandwidth usage on your network
ü Visibility and control of thousands of
applications
ü Block or restricting access to risky
applications Access
Denied
Internal Staff
20. Web Filtering
Internal Staff
ü Blocking access to malicious
websites
ü Prevent malware downloads
from malicious websites
ü Policy-based controls with highly
granular blocking and filtering
Internet
www.xxx.com
URL Filter Blocking
21. ü Detect and filter spam,
reducing spam volume at
perimeter
ü Protecting against the latest
viruses, spyware, and other
content-level threats
ü Inspect email traffic in/out,
tagged or dropped off
suspicious email
Anti-Spam & Anti-Virus
31. Connectivity Diagram – Company With Other ISP
Internet
eSentinel™
COMPANY
Other
Internet Service
Providers(ISP) IP Tunnel
32. Shared Responsibility Model – What is Your Part?
CUSTOMER
RESPONSIBILITY FOR SECURITY
“IN” THE CLOUD
Cloud Service Provider
RESPONSIBILITY FOR
SECURITY “OF” THE CLOUD
Customer Applications & Content
Network
Security
Identity &
Access
Control
Operating
System /
Platform
Data
Encryption
Cloud Platform
Physical
Infrastructure
Network
Infrastructure
Virtualization
Layer
33. Connectivity Diagram – Company Using Cloud Services
Internet
COMPANY
Other
Internet Service
Providers(ISP)
IP Tunnel
Public Cloud
Private Cloud
eSentinel™
38. Ø Extension to Your IT Dept
Ø Opex Model Available
Ø 24/7 Support Helpdesk
Ø 24/7 Monitoring
Ø Alert Notificcation
Ø Monthly Reporting
Managed Service
Network
Cybersecurity
System
BUSINESS FOCUS
not technology
41. HOW CYBER RESILIENT IS
YOUR BUSINESS?
___________________
ONE-TIME
COMPLIMENTARY
VULNERABILITY ASSESSMENT
SCAN CODE TO FIND OUT
vulnerabilityassessment.netpluz.asia
42. HOW CYBER RESILIENT IS
YOUR BUSINESS?
___________________
vulnerabilityassessment.netpluz.asia