SlideShare une entreprise Scribd logo
1  sur  27
Overview Presentation On Demand Penetration Testing Application   |  Networks  |  Compliance Reporting www.iViZsecurity.com An IDG Ventures Company
[object Object],[object Object],[object Object],[object Object],Contents Private & Confidential | iViZ
About iViZ ,[object Object],[object Object],[object Object],[object Object],[object Object],Private & Confidential | iViZ
Today’s Security Challenges Private & Confidential | iViZ
Security Challenges Businesses Face Today Business Continuity ,[object Object],Compliance Management Brand Protection ,[object Object],[object Object]
Security Snapshot 7400 New vulnerabilities discovered in 2008 92% Vulnerabilities can be exploited remotely >55% Vulnerabilities affect web applications.  If you add custom applications, this figure will be far higher 74% Vulnerabilities did not have vendor patches by end of 2008 SQL injection exploitations  per day . (#1 vulnerability) Increased from few thousands per day last year Source: Gartner, CERT, Security Trends & Risk Report 2008 75% Attacks are tunneled through web applications (Gartner) 100,000+
Even Secure Organizations Are Not Safe!
Multi-Stage Attacks Are Harder To Detect Attacks Are Getting Complex Attack Entry Critical Server Non-Critical Server
The Solution Private & Confidential | iViZ
Proactive Regular Security Testing  Penetration Testing Ensures You Are Safe Regular proactive  Penetration Testing  is needed to augment defensive security monitoring measures such as firewalls, IDS, IPS etc., especially in light of the rising level of targeted attacks
Current Approach Has Gaps Private & Confidential | iViZ
Private & Confidential | iViZ
Private & Confidential | iViZ On Demand Vulnerability Management Portal Application Penetration Testing Business logic verification Specialized Testing For Web 2.0 Technologies (AJAX, JavaScript, Flash, ActiveX etc.,) Coverage for all 26 classes of WASC vulnerabilities & OWASP Top 10 Network       Penetration Testing Multi-Stage Attack Simulation Coverage for CVE / NVDB / SANS Top 20 vulnerabilities Automated Exploitation  And False Positives Elimination as well as data leakage detection PCI  Compliance Reporting PCI Compliance Checklist PCI-DSS quarterly scanning Auto fill data from test results Expert analysis along with automated scanning ISO, SOX Compliant Reporting iViZ On Demand Security Solution
Customer Applications/Network Internet Internet Private & Confidential | iViZ iViZ Vulnerability Mgmt Portal Customer Log in Schedule Scan iViZ Scanners iViZ Vulnerability Mgmt Portal Report + Vulnerability Dashboard Internet Test over secure connection Customer Customer How does it work? iViZ Scanners iViZ Scanners
Private & Confidential | iViZ Superior Coverage Security Test Coverage
Benefits On Demand Regular Security Testing Coverage Online Vulnerability Management Portal Periodic Security Test Scheduling Comprehensive Detection Of All Possible Attack Paths Unique Multi-Stage Attack  Simulation Technology Cost-Effective High Security ROI Pay-As-You-Go Quarterly Subscriptions Zero Tools / Infrastructure Overheads Hybrid Testing : Automated + Expert Testing
On Demand Portal Screenshots On Demand Scan Scheduling Historical Trend Analysis Vulnerability Analytics
On Demand Metrics Threat Analysis
Threats & Remediation  Report includes threat details & remediation recommendations
About iViZ Private & Confidential | iViZ
Strong research team  discovered new vulnerabilities   in Microsoft, Intel, HP, Lenovo, McAfee and several others Funded by   USD 4 Billion IDG Ventures   (whose portfolio include Netscape and MySpace) About iViZ Private & Confidential | iViZ Information Security company  with  world’s only on-demand penetration testing  solution using unique  patent pending technology Over  1200 successful tests   done for major global brands Global recognitions   by Intel, US Dept. of Homeland Security, London Business School, World Economic Forum
Top 2 in Asia / Top 6 in World Top 100 in Asia Top 8 in World Top 4 Emerging Company Innovative Company Finalist Top 10 Hottest Startups Top 2 in India 2007 2008 2006 2009 2008 2006 Global Recognitions for Technology Private & Confidential | iViZ
Hard Disk Encryption BIOS  Antivirus iViZ Vulnerability Research has discovered security vulnerabilities in the following products F-Prot version 4.6.8, Sophos SAVScan 4.33.0, AVG for Linux version 7.5.51, Avast for Workstations v1.0.8, Bitdefender for GNU/Linux version 7.60825, ClamAV 0.93.3 Microsoft Bitlocker/Vista (SP0), SafeBoot Device Encryption v4, Build 4750 and below Hewlett-Packard 68DTT Ver. F.0D, Intel Corp PE94510M.86A.0050.2007.0710.1559, Lenovo 7CETB5WW v2.05 iViZ Follows Responsible Disclosure Policy: 1) Private vendor disclosure 2) Vendor coordinated public disclosure 3) No public proof of concept One Step ahead of Hackers: iViZ discoveries Private & Confidential | iViZ
IDG Ventures invests $ 2.5 Mil to Enable iViZ Expand Operations iViZ Solutions Aim to Put Hackers Out of Work 10 Hottest Start-ups Keeping a digital vigil Encrypting hard disk is not safe. New vulnerability discovered by iViZ affects Microsoft, Intel, HP and Others New vulnerability discovered by iViZ affects Microsoft, Intel, HP and Others iViZ Research widely cited in over 1000 Media Private & Confidential | iViZ
Due to Non-disclosure Policy, other client names cannot be displayed here Customers Across Broad Industries Private & Confidential | iViZ
Thank You [email_address] Private & Confidential | iViZ www.iViZsecurity.com An IDG Ventures Company
Acronym List & Glossary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Listed in the order of appearance

Contenu connexe

Tendances

Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
Tokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and StatusTokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and StatusFIDO Alliance
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersFIDO Alliance
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy Nur Shiqim Chok
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Alliance
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)HITCON GIRLS
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
 
FIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO Alliance
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in GovernmentFIDO Alliance
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
Authentication and ID Proofing in Education
Authentication and ID Proofing in EducationAuthentication and ID Proofing in Education
Authentication and ID Proofing in EducationFIDO Alliance
 
FIDO Certified Program: Status & Futures
FIDO Certified Program: Status & FuturesFIDO Certified Program: Status & Futures
FIDO Certified Program: Status & FuturesFIDO Alliance
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Alliance
 
FIDO Privacy Principles and Approach
FIDO Privacy Principles and ApproachFIDO Privacy Principles and Approach
FIDO Privacy Principles and ApproachFIDO Alliance
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlock Armour
 
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native AppsUAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native AppsFIDO Alliance
 
Csslp Launch Presentation
Csslp Launch PresentationCsslp Launch Presentation
Csslp Launch Presentationgueste35899
 
Becoming Unphishable
Becoming UnphishableBecoming Unphishable
Becoming UnphishableFIDO Alliance
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 

Tendances (20)

Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Tokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and StatusTokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and Status
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and Consumers
 
CSSLP Course
CSSLP CourseCSSLP Course
CSSLP Course
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
FIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - Presentation
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in Government
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Authentication and ID Proofing in Education
Authentication and ID Proofing in EducationAuthentication and ID Proofing in Education
Authentication and ID Proofing in Education
 
FIDO Certified Program: Status & Futures
FIDO Certified Program: Status & FuturesFIDO Certified Program: Status & Futures
FIDO Certified Program: Status & Futures
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
 
FIDO Privacy Principles and Approach
FIDO Privacy Principles and ApproachFIDO Privacy Principles and Approach
FIDO Privacy Principles and Approach
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud Security
 
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native AppsUAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
 
Csslp Launch Presentation
Csslp Launch PresentationCsslp Launch Presentation
Csslp Launch Presentation
 
Becoming Unphishable
Becoming UnphishableBecoming Unphishable
Becoming Unphishable
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 

En vedette

Top 10 Bald truth of Life
Top 10 Bald truth of Life Top 10 Bald truth of Life
Top 10 Bald truth of Life Sadman Samad Sad
 
Calendar 2015 - Ritika Gupta
Calendar 2015 - Ritika GuptaCalendar 2015 - Ritika Gupta
Calendar 2015 - Ritika Guptaritika
 
Bus 475 guide 1 55) When your purchases are swiped over the bar-code reader...
Bus 475 guide 1   55) When your purchases are swiped over the bar-code reader...Bus 475 guide 1   55) When your purchases are swiped over the bar-code reader...
Bus 475 guide 1 55) When your purchases are swiped over the bar-code reader...jackkumaran
 
Las tecnologias y su incorporacion en el sector educativo venezuelano
Las tecnologias y su incorporacion en el sector educativo  venezuelanoLas tecnologias y su incorporacion en el sector educativo  venezuelano
Las tecnologias y su incorporacion en el sector educativo venezuelanoDanny RC
 
Through the Tunnel
Through the TunnelThrough the Tunnel
Through the Tunnelkelsealynn
 
The Australian Way Sept 2013 Then we paint Berlin Rachael Watts
The Australian Way Sept 2013 Then we paint Berlin Rachael WattsThe Australian Way Sept 2013 Then we paint Berlin Rachael Watts
The Australian Way Sept 2013 Then we paint Berlin Rachael WattsRachael Vance
 
Historia del computador 3
Historia del computador 3Historia del computador 3
Historia del computador 3yohanfelipe
 
Mama cistoesteatonecrosis
Mama cistoesteatonecrosisMama cistoesteatonecrosis
Mama cistoesteatonecrosisxixel britos
 
Електронні інформаційні ресурси наукової бібліотеки СНУ ім. В.Даля
Електронні інформаційні ресурси наукової бібліотеки СНУ ім. В.ДаляЕлектронні інформаційні ресурси наукової бібліотеки СНУ ім. В.Даля
Електронні інформаційні ресурси наукової бібліотеки СНУ ім. В.ДаляSavua
 

En vedette (13)

Top 10 Bald truth of Life
Top 10 Bald truth of Life Top 10 Bald truth of Life
Top 10 Bald truth of Life
 
Calendar 2015 - Ritika Gupta
Calendar 2015 - Ritika GuptaCalendar 2015 - Ritika Gupta
Calendar 2015 - Ritika Gupta
 
Bus 475 guide 1 55) When your purchases are swiped over the bar-code reader...
Bus 475 guide 1   55) When your purchases are swiped over the bar-code reader...Bus 475 guide 1   55) When your purchases are swiped over the bar-code reader...
Bus 475 guide 1 55) When your purchases are swiped over the bar-code reader...
 
Las tecnologias y su incorporacion en el sector educativo venezuelano
Las tecnologias y su incorporacion en el sector educativo  venezuelanoLas tecnologias y su incorporacion en el sector educativo  venezuelano
Las tecnologias y su incorporacion en el sector educativo venezuelano
 
Through the Tunnel
Through the TunnelThrough the Tunnel
Through the Tunnel
 
The Australian Way Sept 2013 Then we paint Berlin Rachael Watts
The Australian Way Sept 2013 Then we paint Berlin Rachael WattsThe Australian Way Sept 2013 Then we paint Berlin Rachael Watts
The Australian Way Sept 2013 Then we paint Berlin Rachael Watts
 
EDITH C[1] (1)
EDITH C[1] (1)EDITH C[1] (1)
EDITH C[1] (1)
 
Historia del computador 3
Historia del computador 3Historia del computador 3
Historia del computador 3
 
Company Profile Presentation 2014
Company Profile Presentation 2014Company Profile Presentation 2014
Company Profile Presentation 2014
 
Akij group
Akij groupAkij group
Akij group
 
Mama cistoesteatonecrosis
Mama cistoesteatonecrosisMama cistoesteatonecrosis
Mama cistoesteatonecrosis
 
Електронні інформаційні ресурси наукової бібліотеки СНУ ім. В.Даля
Електронні інформаційні ресурси наукової бібліотеки СНУ ім. В.ДаляЕлектронні інформаційні ресурси наукової бібліотеки СНУ ім. В.Даля
Електронні інформаційні ресурси наукової бібліотеки СНУ ім. В.Даля
 
Caso Clinico Vir
Caso Clinico VirCaso Clinico Vir
Caso Clinico Vir
 

Similaire à iViZ Security : On Demand Penetration Testing

Insecurity in security products 2013
Insecurity in security products 2013Insecurity in security products 2013
Insecurity in security products 2013DaveEdwards12
 
Why current security solutions fail
Why current security solutions failWhy current security solutions fail
Why current security solutions failDaveEdwards12
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...Kaspersky
 
Info sec for startups
Info sec for startupsInfo sec for startups
Info sec for startupsKesava Reddy
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesTechBiz Forense Digital
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesTechBiz Forense Digital
 
Verisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence ServicesVerisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence ServicesTechBiz Forense Digital
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck by Synopsys
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Using 80 20 rule in application security management
Using 80 20 rule in application security managementUsing 80 20 rule in application security management
Using 80 20 rule in application security managementDaveEdwards12
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company PresentationChaitanyaS
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challengewebhostingguy
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challengewebhostingguy
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 

Similaire à iViZ Security : On Demand Penetration Testing (20)

iViZ Profile
iViZ ProfileiViZ Profile
iViZ Profile
 
Insecurity in security products 2013
Insecurity in security products 2013Insecurity in security products 2013
Insecurity in security products 2013
 
Why current security solutions fail
Why current security solutions failWhy current security solutions fail
Why current security solutions fail
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
 
Info sec for startups
Info sec for startupsInfo sec for startups
Info sec for startups
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
 
Verisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence ServicesVerisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence Services
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open Source
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Using 80 20 rule in application security management
Using 80 20 rule in application security managementUsing 80 20 rule in application security management
Using 80 20 rule in application security management
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challenge
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challenge
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Discover an IT Infrastructure Services & Management
Discover an IT Infrastructure Services & ManagementDiscover an IT Infrastructure Services & Management
Discover an IT Infrastructure Services & Management
 

Dernier

Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 

Dernier (20)

Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 

iViZ Security : On Demand Penetration Testing

  • 1. Overview Presentation On Demand Penetration Testing Application | Networks | Compliance Reporting www.iViZsecurity.com An IDG Ventures Company
  • 2.
  • 3.
  • 4. Today’s Security Challenges Private & Confidential | iViZ
  • 5.
  • 6. Security Snapshot 7400 New vulnerabilities discovered in 2008 92% Vulnerabilities can be exploited remotely >55% Vulnerabilities affect web applications. If you add custom applications, this figure will be far higher 74% Vulnerabilities did not have vendor patches by end of 2008 SQL injection exploitations per day . (#1 vulnerability) Increased from few thousands per day last year Source: Gartner, CERT, Security Trends & Risk Report 2008 75% Attacks are tunneled through web applications (Gartner) 100,000+
  • 8. Multi-Stage Attacks Are Harder To Detect Attacks Are Getting Complex Attack Entry Critical Server Non-Critical Server
  • 9. The Solution Private & Confidential | iViZ
  • 10. Proactive Regular Security Testing Penetration Testing Ensures You Are Safe Regular proactive Penetration Testing is needed to augment defensive security monitoring measures such as firewalls, IDS, IPS etc., especially in light of the rising level of targeted attacks
  • 11. Current Approach Has Gaps Private & Confidential | iViZ
  • 13. Private & Confidential | iViZ On Demand Vulnerability Management Portal Application Penetration Testing Business logic verification Specialized Testing For Web 2.0 Technologies (AJAX, JavaScript, Flash, ActiveX etc.,) Coverage for all 26 classes of WASC vulnerabilities & OWASP Top 10 Network Penetration Testing Multi-Stage Attack Simulation Coverage for CVE / NVDB / SANS Top 20 vulnerabilities Automated Exploitation And False Positives Elimination as well as data leakage detection PCI Compliance Reporting PCI Compliance Checklist PCI-DSS quarterly scanning Auto fill data from test results Expert analysis along with automated scanning ISO, SOX Compliant Reporting iViZ On Demand Security Solution
  • 14. Customer Applications/Network Internet Internet Private & Confidential | iViZ iViZ Vulnerability Mgmt Portal Customer Log in Schedule Scan iViZ Scanners iViZ Vulnerability Mgmt Portal Report + Vulnerability Dashboard Internet Test over secure connection Customer Customer How does it work? iViZ Scanners iViZ Scanners
  • 15. Private & Confidential | iViZ Superior Coverage Security Test Coverage
  • 16. Benefits On Demand Regular Security Testing Coverage Online Vulnerability Management Portal Periodic Security Test Scheduling Comprehensive Detection Of All Possible Attack Paths Unique Multi-Stage Attack Simulation Technology Cost-Effective High Security ROI Pay-As-You-Go Quarterly Subscriptions Zero Tools / Infrastructure Overheads Hybrid Testing : Automated + Expert Testing
  • 17. On Demand Portal Screenshots On Demand Scan Scheduling Historical Trend Analysis Vulnerability Analytics
  • 18. On Demand Metrics Threat Analysis
  • 19. Threats & Remediation Report includes threat details & remediation recommendations
  • 20. About iViZ Private & Confidential | iViZ
  • 21. Strong research team discovered new vulnerabilities in Microsoft, Intel, HP, Lenovo, McAfee and several others Funded by USD 4 Billion IDG Ventures (whose portfolio include Netscape and MySpace) About iViZ Private & Confidential | iViZ Information Security company with world’s only on-demand penetration testing solution using unique patent pending technology Over 1200 successful tests done for major global brands Global recognitions by Intel, US Dept. of Homeland Security, London Business School, World Economic Forum
  • 22. Top 2 in Asia / Top 6 in World Top 100 in Asia Top 8 in World Top 4 Emerging Company Innovative Company Finalist Top 10 Hottest Startups Top 2 in India 2007 2008 2006 2009 2008 2006 Global Recognitions for Technology Private & Confidential | iViZ
  • 23. Hard Disk Encryption BIOS Antivirus iViZ Vulnerability Research has discovered security vulnerabilities in the following products F-Prot version 4.6.8, Sophos SAVScan 4.33.0, AVG for Linux version 7.5.51, Avast for Workstations v1.0.8, Bitdefender for GNU/Linux version 7.60825, ClamAV 0.93.3 Microsoft Bitlocker/Vista (SP0), SafeBoot Device Encryption v4, Build 4750 and below Hewlett-Packard 68DTT Ver. F.0D, Intel Corp PE94510M.86A.0050.2007.0710.1559, Lenovo 7CETB5WW v2.05 iViZ Follows Responsible Disclosure Policy: 1) Private vendor disclosure 2) Vendor coordinated public disclosure 3) No public proof of concept One Step ahead of Hackers: iViZ discoveries Private & Confidential | iViZ
  • 24. IDG Ventures invests $ 2.5 Mil to Enable iViZ Expand Operations iViZ Solutions Aim to Put Hackers Out of Work 10 Hottest Start-ups Keeping a digital vigil Encrypting hard disk is not safe. New vulnerability discovered by iViZ affects Microsoft, Intel, HP and Others New vulnerability discovered by iViZ affects Microsoft, Intel, HP and Others iViZ Research widely cited in over 1000 Media Private & Confidential | iViZ
  • 25. Due to Non-disclosure Policy, other client names cannot be displayed here Customers Across Broad Industries Private & Confidential | iViZ
  • 26. Thank You [email_address] Private & Confidential | iViZ www.iViZsecurity.com An IDG Ventures Company
  • 27.