Sunteți pe pagina 1din 4

The CyberObserver Solution

“As defenders we have access to an extraordinary array of security tools and technology,
security standards, training and classes, certifications, vulnerability databases, guidance, best
practices, catalogs of security controls, and countless security checklists, benchmarks, and
recommendations.” But all of this technology, information, and oversight has become a
veritable “Fog of More”. The Council on CyberSecurity 2014

"Organizations are failing at early breach detection, with more than 92% of breaches
undetected by the breached organization. The situation can be improved with stronger threat
intelligence, the addition of behavior profiling and better analytics.” Gartner 2014

In the chaotic cyber-security arena, what is needed is a single tool to create and manage security
eco-systems; a tool which automatically/semi-automatically and continuously builds updated
views based on the technology, the processes and the people in the organization; a tool that
assesses the security status of all security domains and elements, and reports them in one, clear
easy-to-read format.

CyberObserver clears the cybersecurity fog of more to deliver effective, enterprise-wide


cyber-protection.

CYBER DEFENSE STATUS

CyberObserver CISO main screen

CyberObserver Ltd Office: 972.4.6895203


Confidential Business
10 Shakham st. Fax : 972.4.6891584
Caesarea Industrial Park Mail : info@cyber-observer.com
Caesarea, Israel 3088900
CyberObserver is a powerful, comprehensive and easy-to-use management solution that
enables security domain managers, Chief Security Officers (CISO) and executives to effectively
secure their organizations against cyber-threats. Developed by cybersecurity experts,
CyberObserver uses patented core engine and Critical Security Controls (CSCs) measurements
to present a clear picture of enterprise-wide cybersecurity eco-system status and preparedness
at any given moment, alerting to breaches and threats as they arise and actions to be taken to
secure critical infrastructures across the security eco-system.

Cybersecurity Domains
CyberObserver automatically builds domain-based cyber security eco-systems. The system's
pre-defined security domains include:
 Account Management
 Malware Defenses
 Secure Network
 Secure Configuration
 Secure Application
 Data security
 Incident Management
 Security Assessment
 Physical Security

Additional domains can easily be added by the user to the CyberObserver system.
CyberObserver also provides views and CSC measurements of the functional viability of security
tools and security processes.

Critical Security Controls (CSCs)


Critical Security Controls (CSCs) are the most fundamental data, processes and actions that
every enterprise should employ in order to prevent, alert, and respond to the attacks that are
plaguing enterprises today.

CyberObserver's methodology is based on continuously implementing, retrieving and analyzing


CSCs from all relevant data sources existing in the organization. CSCs are customized to meet
the needs of each organization, and quantified to establish baselines for each domain and for
overall security within the cyber eco-system.

CyberObserver's CSC database is based on recommendations from cybersecurity industry


leaders including: NIST, ENISA, ISO, NERC-CIP, the Council on CyberSecurity and more, as well
as requests from CISO's and the company's knowledge on how to effectively manage the
complicated cyber security eco-system. The CSC database is updated continuously based on
new threats, relevant information, tools and intelligence received from cybersecurity agencies.

CyberObserver Ltd Office: 972.4.6895203


Confidential Business
10 Shakham st. Fax : 972.4.6891584
Caesarea Industrial Park Mail : info@cyber-observer.com
Caesarea, Israel 3088900
Automatically Build a Cyber-secure Enterprise Eco-System
CyberObserver automatically builds and assesses a security eco-system based on an
enterprise's existing cybersecurity infrastructure. It then quantifies baseline security and
vulnerability levels in various domains and customizes Critical Security Controls to
ensure continuous and robust enterprise protection.

Evaluate Security Status in Real-Time


Once the existing cybersecurity eco-system is defined and in place, CyberObserver
monitors and delivers alerts regarding deviations, security breaches, potential risks and
threats, in specific areas and as they relate to other systems across the enterprise.
Security status across the enterprise is quantified and presented in clear, easy-to-read
infographic views.

Gain Comprehensive Coverage from Security Threats


CyberObserver not only identifies threats, but also alerts to areas of vulnerability within
the enterprise which compromise its security eco-system. These can include alerts
regarding improperly functioning infrastructure in the face of emerging threats, or
deviations from proper security processes operation. CyberObserver also evaluates
each domain in the security eco-system across three spheres: Technology, Processes
and People. Based on the security eco-system installed, any suspicious activity across
these spheres is detected, analyzed for potential inter-relatedness, and reported.

Proactive Cyber Security Approach


Effective cyber defense ideally prevent an incident from taking place. The best action is
a pre-emptive and proactive approach. CyberObserver utilizes a proactive mindset and
approach in order to protect the enterprise's infrastructure and sensitive corporate data
from attack before the attackers strike. CyberObserver's proactive cybersecurity
approach provides actionable intelligence so you can recognize vulnerabilities and
potential attack vectors and mitigate them before attackers gain a foothold in your
network. Proactive Cybersecurity puts you firmly in control of your security eco-system.

Maintain Cybersecurity in a Constantly Changing Environment


CyberObserver enables security professionals to maintain management control in a
highly dynamic environment, where new technologies are constantly being introduced,
along with new and unexpected threats. Data collected is provided in a clear, real time,
role-based views, which provide easy to read depictions of the security status of each
entity and domain and the inter-relationships between them. Alarms are set to alert
relevant personnel, with follow-up features to ensure that timely action is taken.

CyberObserver solution is compliant with US President Executive Order 13636 issued on


February 2013 which relates to “improving critical infrastructure CyberSecurity” by creating a
framework to help organizations manage CyberSecurity risks.

CyberObserver Ltd Office: 972.4.6895203


Confidential Business
10 Shakham st. Fax : 972.4.6891584
Caesarea Industrial Park Mail : info@cyber-observer.com
Caesarea, Israel 3088900
Product stage
CyberObserver solution is installed in 3 beta customers. Our first general availability will
be released on August 7th, 2015.
There is a pipeline of customers that are waiting for the release version.

Current financing
2012 Cyber Observer was established, 3 founders
7/2012 Raised $400k
11/2014 Patents: ISRAEL 216647, US Pat. Pen. 14360934, 14296468
12/2014 3 Beta (High-tech Co. Bank, Telco)
3/2015 Last investment round is $1m
8/2015 Launch 1st GA version
2016 Plan for additional investment round

CyberObserver Ltd Office: 972.4.6895203


Confidential Business
10 Shakham st. Fax : 972.4.6891584
Caesarea Industrial Park Mail : info@cyber-observer.com
Caesarea, Israel 3088900

S-ar putea să vă placă și