portfolio omerta information security - engels
TRANSCRIPT
OMERTA INFORMATION SECURITY WWW.OMERTA.NL2
In a world unimaginable without internet, where computers rule our everyday life a brand-new industry has emerged nearly unnoticedly: cyber crime. Enterprises, organizations and institutions are so vulnerable when being online that the estimated loss for the Netherlands only varies between two and ten billion Euros per year.
According to our knowledge, these estimations are probably not
even high enough – since frequently private information and
listed companies are involved it is not more than the tip of the
iceberg we know about. Omerta’s security experts, hackers and
programmers will protect and watch over your digital data. They
will make sure you can rely on your IT infrastructure,
communicate safely and have your financial and other sensitive
(customer) information secured behind bomb-proof walls.
About Us
Security, freedom and privacy are hard-earned features – and as
such you won’t let them just slip away. Everybody working for,
with and at Omerta truly believes in this. Omerta is continuously
innovating and developing. In a field of increasingly faster
superseding innovations with increasingly serious social and
socio-economic consequences we are concerned not to give up
our leading position in the creation and establishment of digital
security. We check crucial IT networks and vital systems for being
“ironclad”, identify leaks (and their source), secure systems
against hacker intrusion and watch them 24 hours a day.
Moreover, we help enterprises and respectively responsible
authorities gaining access to forensic research data in order to
actually identify active cyber criminals, prosecute and sentence
them. Being so close to the law and constant innovation, we, too,
improve every day to provide our clients with even better services
– certificates as per ISO 9001, series 27000, CISSP and CISA are of
course part of our vita.
Some of Omerta Information Security products are NL ( DV,
departmental trusted ) EU Restricted and NATO Restricted.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL3
CONTENTSPORTFOLIOOmerta mobileAppleOmerta CryptoguardOmerta FirestormOmerta “Meds” mail Encrypted Defender System
Omerta semi conductor (diode)Cyber AuditIntelligenceWebsecureCybersecurity as a serviceEncrypt your cloudYour own malware analyzerSocial Engineering Workshops and Training
456789
10111213141516
OMERTA INFORMATION SECURITY WWW.OMERTA.NL4
OMERTA MOBILEANDROID/BLACKBERRYThe Omerta Mobile solution has been crafted with privacy
in mind. The Omerta Mobile solution will allow you to
perform secure phone calls and text messages via the
mobile. The Omerta Mobile solution is installed via a
secure microSD. The Omerta Mobile solution works on
Android and Blackberry phones.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL5
OMERTA MOBILEAPPLEThe Omerta PIM solution has been crafted for Apple
products. The Apple products will be able to perform
secure communication via the OMERTA PIM solution. The
OMERTA PIM solution can be downloaded but it is also
possible to apply a hardware OMERTA PIM solution which
will grant an extra security layer
OMERTA INFORMATION SECURITY WWW.OMERTA.NL6
OMERTA CRYPTOGUARDVPNThe OMERTA cryptoguard solution has been crafted for
people that want to use secure communication channels.
The Cryptoguard solution will create a unique tunnel which
will allow the communication to pass through it. The
communication which is passed via the tunnel is
unreadable for third-parties.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL7
OMERTA FIRESTORMVPN/NEXT GENERATION FIREALLThe OMERTA FIRESTORM solution is a next generation
solution. The Firestorm solution acts like a Firewall which
is capable of taking care of unlimited amount of users and
connections. The solution is used to secure the
communication channels of companies and government
environments.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL8
OMERTA “MEDS“MAIL ENCRYPTED DEFENDER SYSTEMThe mail encrypted defender system (MEDS) will perform
encryption on all the e-mails which are send from within
the organization. The MEDS solution uses S/MIME,
OpenPGP, PDFMail and OmertaWebmail to perform secure
e-mail communication. This solution is often implemented
at companies which use and generate a lot of personal and
classified information.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL9
OMERTA SEMI-CONDUCTORDIODEThe SEMI-CONDUCTOR solution has been crafted to stop
(cyber) attacks from the outside. The Diode will create a one
way communication channel between the selected networks/
computers. This will disallow attackers to perform attacks on
the designated target as the target will only RECEIVE or SEND
information. The DIODE is often implemented at Industrial
environments as it is capable of handling temperatures of
-20 and +55 degrees.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL10
CYBER AUDITINVESTIGATIONThe OMERTA cyber audit solution will provide an insight in
operation network/security levels within a company. Omerta
information security will use cyber security methodologies
and techniques to check the designated environment for
vulnerabilities, single points of failure and failed policies.
The scans and checks can be performed online and offline.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL11
INTELLIGENCEBIG DATA COLLECTION The Omerta Information Security “Intelligence” service will
provide the client the latest information about the possible
threats which might hit the client environment. It is
important for companies to keep track of the events which
are taken against or for a company. The Intelligence service
will allow companies to keep track of almost each post on
the internet which discusses the specified client requests
and keywords.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL12
WEBSECURESCHEDULED SCANNINGThe Websecure service will provide a hourly/daily/weekly/
monthly scan on the designated website or server. The
service will provide insight on security and patch status of
the target. Masking, DDos prevention, malware scans,
stress testing and numerous other tests which will
prevent cyber-attacks or malfunctioning of your web
environment.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL13
CYBERSECURITYAS A SERVICEThe cybersecurity as a service solution is a solution which
has been crafted for companies that want to outsource
their cyber security challenges. We from Omerta
Information Security will monitor the network and the
security status of the designated environment and we will
also perform actions to keep the environments secure.
This solution runs 24/7. A privileged SOC ( security
operations center ) is setup and fully operational at your
convenience.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL14
ENCRYPT YOUR CLOUDTHINK AGAINThe cloud is awesome and it allows the users to gain
access to their files wherever they are. There is only one
problem, the files which are often uploaded to the cloud
are not secured (encrypted) and it is often unclear in
which country YOUR DATA is stored. Countries like the
United States are known for their privacy violation attacks
– to ensure our clients that they are secure against
governments and criminal organizations we have crafted
the “Encrypt your cloud” service.
The service will secure and encrypt all the files which
are uploaded to cloud environment. This will
disallow third-parties to read and access the content
which you have shared to the cloud.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL15
MALWARE ANALYZERGET YOUR OWNThe Omerta Malware Analyzer will allow the client to scan
weird or malicious files for more information. The
information which is crafted by the malware analyzer will
allow the technical staff in the company to stop/block/
identify future attacks.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL16
SOCIAL ENGINEERINGWORKSHOPS and TRAININGSocial Engineering is a skill used by hackers to gain
information such as credentials, personnel and systems,
about a company. As a company you can protect your
employes by learning them what dangers there are in
social engineering.
During the Social Engineering workshop the participants
are confronted with several videos and examples of
Social Engineering.
LEARNING GOALS
- Awareness of a social engineering attack
- Setup of a social engineering attack
- What to do if you are not sure if it is a Social Engineering attack
Duration The workshop takes around 3 hours. When additional
learning goals are requested, extra time will be
added.