Image

Threats Management

What is it?

Threats Management is a network security category specifically oriented today's new breed of cyber attacks. Web based, e-mails, malware, phishing, DDOS, social engineering, just too mention the most common, all fall within this category.

Networking

Every computer or IT device uses to run services and applications on assigned ports. The most common ports, which your computer is using right now while you reading this page, is port 80 (http) or port 443 (https) if the connection is encrypted. Traditional firewalls perimeter security measures, based upon blocking or access control of ports, are not good enough to protect against advanced persistent threats. This is because hackers just need one port open (http) in order to start an attack or exploit the vulnerability of your computer and consequently whatever is connected to your network.

UTM (Unified Threats Management) appliance

Opportunity

  • Predictable profile-based pricing, allowing a standard five ports HTTP, HTTPS, DNS, SMTP, IMAP configuration as needed to meet basic client's business needs.

About the offering

  • It provides a PFSense UTM appliance with pre-configured five standard ports, including FW rules and one VPN pre-configured user.

Deal characteristics

  • Typical clients are in the 10-5000 users range;

  • Clients with annual revenue is higher than $1 million;

  • Clients with homogenous compute requirements;

  • Typical deal cost is between $2,500 and $20,000;

  • Link to the product

    https://www.pfsense.org/hardware/

Client benefits

  • Cost savings as the product is based upon Open Source software;

  • Predictable product roadmap;

  • Compatibility with additional UTM applications available at fraction of commercial products.

Spamming

According the Free Dictionary http://www.thefreedictionary.com/spamming  is the act of sending unsolicited e-mail, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups; junk e-mail. However, things are more complicate than that because spammers and hackers often co-operate or they share the fruits of their activities. If you still believe that spamming is a simple annoyance, then you are probably wrong and you should read additional information in this page. 

Spamming is one the best means for deploying a Stage 1 attack "Initial intrusion through system exploitation". System exploits are typically delivered through the Web (remote exploit), or through the e-mail (local exploit) as an attachment. A fictitious company e-mail purposely sent for mass infection can include Phishing content or link to a hacking remote control centre. Company users, unaware that the e-mail is fake, click on the link or on the attachment and deploy the Stage 2 of the attack "Malware is installed in the compromised system".                           

Opportunity

  •  Second line of defense for e-mail aiming to reduce spamming but also Phishing attacks risks mitigation.

About the offering

  • The offering consists on implementing a PKI, where the user can exchange encrypted e-mails internally and non encrypted e-mail externally. Alternatively, the other method consists in implementing e-mail server configuration of anti-spamming software and rules.

Deal characteristics

  •  Typical clients are in the 10-5000 users range;
  • Clients with annual revenue is higher than $5 million;
  • Clients with homogenous compute requirements;

  •  Typical deal cost is between $15,000 and $50,000

Client benefits

  •  Cost savings as the product is based upon Open Source software;

  •  Predictable product roadmap;

    Compatibility with Open Source based UTM applications.

© Copyright 2018 Finance. All Rights Reserved. © Copyright 2018 Rokeby Technologies Ltd. All Rights Reserved.