WHITEPAPER Recall Cyber Intelligence 1 Whitepaper Recall Cyber Intelligence Table of Contents iSolv Technologies Solves Employee Insider Threats 3 Case Study 4 The Threat 4 The Challenges 5 iSolv’s Solution: Recall Cyber Intelligence 5 The Benefits of Recall Cyber Intelligence 6 Potential Use Cases 6 iSolv Technologies (Pty) Ltd 8 CONFIDENTIAL © iSolv Technologies (Pty) Ltd, 2013. All rights reserved. 2 Whitepaper Recall Cyber Intelligence ISOLV TECHNOLOGIES: CYBER INTELLIGENCE iSolv Technologies Solves Employee Insider Threats The cyber security landscape has changed. Hacking, web-flooding and technology-focused attacks are now being directed from both inside and outside organisations, creating a playground for criminals and employees alike. Attack vectors have become increasingly complex, thereby rendering systems easy targets. Organisations and businesses are therefore driven to proactively fend off ever-present cyber-attacks, and are investing heavily in strategies to overcome insider and outsider cyber threats. These threats include cybercriminals hacking critical infrastructure, as well as disgruntled employees releasing sensitive information, taking intellectual property to competitors, engaging in online fraud, or colluding with crime syndicates by copying sensitive company information, or accessing network restricted areas and restricted files on files shares. High profile organisations are becoming increasingly visible targets for cyber-attacks. The US Government had information leaked to various press offices by Edward Snowden on what he called “illegal government behaviour”. Additionally, the Google offices in China and companies like Juniper Networks, Adobe and Yahoo were all part of targeted cyber-attacks from China. CONFIDENTIAL © iSolv Technologies (Pty) Ltd, 2013. All rights reserved. 3 Whitepaper Recall Cyber Intelligence In response to the increasing threat of insider cyber-attacks, iSolv has developed the Recall Cyber Intelligence solution. It offers unprecedented evidence collection and covert monitoring capabilities, designed to enable businesses and organisations to act against insider cyber-attackers. Case Study The Threat The CFO of a major insurance company admitted that internal fraud and external network attacks had played a major role in the losses incurred by the company. After having a more detailed understanding of the environment, he and his team discovered the following: Employees were being recruited by crime syndicates Customer data was being stolen and/or sold Syndicates were linked to identity theft using stolen customer data Call centre agents were most susceptible to working with the syndicates Information was being leaked from multiple points Corporate IP/trade secrets were being stolen Non-compliance issues were being raised as a result of customers’ confidential details being divulged CONFIDENTIAL © iSolv Technologies (Pty) Ltd, 2013. All rights reserved. 4 Whitepaper Recall Cyber Intelligence The Challenges In his efforts to investigate, the CFO found that it was very difficult to gain forensic data from the suspected employees’ computers without them knowing that they were being monitored. He noted that: Sophisticated methods were being used by employees to leak information via removable media such as USBs, hard drives etc. File names were being altered to suit the employee, making them nearly impossible to track Insufficient evidence could be found to link employees to the actions This meant that the risks could not be captured, analysed or acted on, as there was insufficient forensic support data coming from their existing systems. Despite their best efforts, they remained completely exposed to on-going insider threats. iSolv’s Solution: Recall Cyber Intelligence iSolv Technologies proposed its Recall Cyber Intelligence solution to the company, which allowed for the following: Real-time collection of critical forensic evidence for data leakage at the point of the crime Undercover deployment of monitoring agents and non-intrusive monitoring of user activity Security alerts generated from attempted breaches CONFIDENTIAL © iSolv Technologies (Pty) Ltd, 2013. All rights reserved. 5 Whitepaper Recall Cyber Intelligence Monitoring of USB activity, screen shots, key logs, user printer activity and, if required, voice and camera feeds to match the user to the activity Key application monitoring for file and name changes Monitoring of user internet activity, including viewable browser history The Benefits of Recall Cyber Intelligence Recall Cyber Intelligence puts an organisation in control by giving it capabilities that allow it to track exactly what trends are transpiring, and where computer-related crimes are taking place. The capabilities gained by using Recall Cyber Intelligence include: Real-time, silent evidence-collection directly from the point of the crime Monitor and create activity based profiles on suspected employees Identification of data movement from servers and file shares Identification of employees involved in internal crimes Compliance was met due to the security measures put in place from monitoring user activity Potential Use Cases The Recall Cyber Intelligence solution is ideally suited to customers wanting to gain intelligence on their internal environment. Customers that would most benefit from this solution include: Government Departments CONFIDENTIAL © iSolv Technologies (Pty) Ltd, 2013. All rights reserved. 6 Whitepaper Recall Cyber Intelligence Military and Defence Financial Institutes Insurance Agencies Medical Industry Attorneys at Law Mining Sector Chemical/Petroleum Sector CONFIDENTIAL © iSolv Technologies (Pty) Ltd, 2013. All rights reserved. 7 Whitepaper Recall Cyber Intelligence iSolv Technologies (Pty) Ltd T: +27 11 880 6103 P.O. Box 802 1st Floor, Block A, Rosebank Office Park F: +27 11 880 5443 Saxonwold 181 Jan Smuts Avenue E: sales@isolvtech.com 2132 Johannesburg www.isolvtech.com Republic of South Republic of South Africa Africa Trademark Information Recall Cyber Intelligence is a registered trademark of iSolv Technologies (Pty) Ltd. All other registered names and trademarks are the property of their respective owners Copyright Information 2013, iSolv Technologies (Pty) Ltd. All rights reserved. This document must not be copied or changed, in part or its entirety, without express written consent from iSolv Technologies (Pty) Ltd. CONFIDENTIAL © iSolv Technologies (Pty) Ltd, 2013. All rights reserved. 8