http://www.cyber-51.com offers Network Penetration Testing, Web Application Penetration Testing, Network & Web Application Vulnerability Assessments, Social Engineering, Patch Management, Hardening Services, IT Security Services, IT Security Training, Physical Security and any service related to Cyberspace.
2. Agenda
1. Cyber Security Background
2. Threats and why customers need Cyber Security?
3. How Partners can expand their portfolio?
4. The Services
- Network Penetration Testing
- Web Application Penetration Testing
- Network Vulnerability Assessment
- Web Application Vulnerability Assessment
- Social Engineering
5. The Operational Process
3. Cyber Security Background
• IT has changed the way we live and work
• Businesses and individuals rely on IT infrastructures
• Cyber Crime has equally stepped up in the game
Most businesses deploy the latest modern communication
infrastructures such as clouds, tablets, smartphones, wireless etc.
However whilst up to date on technology – they are typically not
up to speed on Cyber Security.
4. Why Cyber Security?
• Every day, Hackers attack both personal corporate systems
Main Motives are either personal, financial or political:
Theft
customer details, credit card information, confidential
information etc.
Destruction (aka Denial of Service)
competitors, rogue states, hackers in general
5. Why Cyber Security?
• Why would customers would invest in a Security Audit?
A. They realize the threat is real and they want to be protected
before they fall victim to an attack (pro-active customers)
B. They are forced by industry and/or government regulations to
secure their infrastructure accordingly (i.e. PCI Compliance)
C. Customers who have already fallen victim and want to be
prepared for future attacks (re-active customers)
6. Partners – Why Cyber 51?
• Cyber 51 follows a partner strategy
• Partners can resell the full Cyber 51 portfolio to their clients
• Everything can be white labeled
(ie. Cyber 51 is working in the background as partner Ops)
• Partner may also choose to mention a partnership between
Cyber 51 and the partner. This is often beneficial when the
client requires Cyber Security certifications which the partner
may not have
• Mutual NDAs, contractual agreements and processes ensure
protection for all parties and smooth operations.
7. Partners – Why Cyber 51?
Unique Selling Proposition
• Company dedicated to Cyber Security only
• Remote and On-Site capabilities across all continents
• Services in 3 languages (English, German and Spanish)
• Very competitive pricing
• Fully white labeled services
• Highly certified and 10 years+ experienced Consultants
• Free Pre-Sales Support (white labeled) on behalf of Partner
• Free Pre-Sales and Educational Webinars for Partners
• Fix service capabilities (Servers, Networking, Design)
8. Partners
• Most partners are IT services companies
• A Penetration test can often serve as a door opener to
upselling opportunities (ie. fixing the loopholes, configuring
network and server equipment correctly etc.)
• Flexible pricing models to ensure win-win for all parties
• Partners can receive marketing materials and texts to
implement in Newsletters, Websites etc.
9. Services
1. Network Penetration Test
2. Web Application Penetration Test
3. Network Vulnerability Assessment
4. Web Application Vulnerability Assessment
5. Social Engineering
Full Service Portfolio at:
http://www.cyber-51.com/it-security-services
10. Network Penetration Test
Network Penetration Test
Penetration testing or sometimes known as “ethical hacking” is a
security testing service that focuses on locating flaws in your
networks, infrastructure and overall architecture. Tests involve
active exploitation of vulnerabilities.
Steps:
- Written consent of customer is obtained
- Penetration Test is being performed during agreed time frames
- Report is being created
- Debrief with customer and report delivery is scheduled
- Customer can fix the vulnerabilities (upsell opportunity)
11. Web Application Penetration Test
Web Application Penetration Test
More than 70% of all attacks are aimed at the Application layer.
This service examines your web applications from coding and
implementation flaws through to other issues like SQL injection
and cross-site-scripting, involving active exploitation of
vulnerabilities.
Steps:
- Written consent of customer is obtained
- Penetration Test is being performed during agreed time frames
- Report is being created
- Debrief with customer and report delivery is scheduled
- Customer can fix the vulnerabilities (upsell opportunity)
12. Vulnerability Assessments
Network / Web Application Vulnerability Assessment
This service is similar to a Penetration Test, however no active
exploitation is being performed. Customer is made aware of
vulnerabilities but they are not being exploited (hacked) in order
to gain access. Service takes less time and is more on budget for
small clients.
Steps:
- Written consent of customer is obtained
- Vulnerability Test is being performed during agreed time frames
- Report is being created
- Debrief with customer and report delivery is scheduled
- Customer can fix the vulnerabilities (upsell opportunity)
13. Social Engineering
Social Engineering
Social engineering security is a term that describes the non-
technical intrusion into your business environment that relies on
human interaction, often involving tricking people in order to
break normal security policies.
Steps:
- Written consent of customer is obtained
- Social Engineering is being performed during agreed dates
- Report is being created
- Debrief with customer and report delivery is scheduled
- Customer can fix the vulnerabilities (upsell opportunity)
14. White Label Cloud Scanning Portal
Cyber 360 Security Cloud Scanning Portal
• No software or agent required
• Scanning whole infrastructures in minutes
• Comprehensive Reporting
• PC/Laptop, MAC and Mobile Scanning
• PCI Scanning & PAN (Credit Card) Scanning
• Cloud Based Customer Portal
• More info: www.cyber360security.com
15. Benefits
The solution:
Penetration Tests and Network Security
Audits.
Cyber 51 will, with the legal permission
of the network owner, attack customer
systems in the same way as a Hacker.
By doing so, we are able to expose
security holes in the systems.
The benefit:
The customer is made aware of any
Security holes that exist which could
be exploited by a hacker with
malicious intent to gain unauthorized
access to the customer network.
In addition, Cyber 51 will prepare an
action plan and, if the customer
wishes, to implement closure of these
holes.
16. Thank you for your time!
Phone (US): +1 (888) 808 7843
info@cyber51.com
www.cyber51.com