sts brochure

9
CYBER SECURITY SERVICES. Power of Information.

Upload: william-mcconnell-jr

Post on 18-Aug-2015

15 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: STS Brochure

CYBER SECURITY SERVICES. Power of Information.

Page 2: STS Brochure

Cyber Intelligence

Employing the most advanced threat detection software and top tier personnel, we provide the industry's most powerful cyber intelligence solution.

Network Security Audits

Our internationally accredited ‘white hat’ personnel conduct network security audits to find your weakness to be secured.

Encrypted Communications

Sentinel encrypted communications ensure that your lines of communication and devices are safeguarded from MITM attack.

Secure Cloud Storage

Whether it’s hosting websites, storing vital confidential files and data, Sentinel’s offsite storage solutions maintain the highest certifications for security, redundancy, and reliability.

Disaster Recovery Programs

Sentinel’s engineered disaster relief program techniques ensure that a catastrophic disasters do not interrupt our clients operations

Full Spectrum Managed Service

Cutting Edge Software

Top Tier Personnel

ISO 27001 compliant ( pending )

Team work driven by Integrity and Professionalism

"Knowledge is the foundation to effectiveness, and experience & hard work are the keys to our success!"

SERVICE PLATFORM

“Our founding principle is to work as

a team with our clients and partners

to establish and implement real

world solutions that create tangible

bottom line results.”

Page 3: STS Brochure

Challenge Protecting proprietary information and operational assets from cyber-attacks and catastrophic events that can derail the achievement of organizational objectives.

Solution

Sentinel’s Proprietary Information Protection Platform (PIPP) is an advanced propriety cyber security service platform meticulously engineered to:

Secure proprietary information from loss and tampering

Harden and safeguard threat access points

Identify cyber security threats and neutralize them

As the most powerful information security asset on the market PIPP enables our clients to pursue their objectives without the liability associated with catastrophic events and cyber-attacks that can cripple core operational assets and productivity.

Sentinel P.I.P.P.

Page 4: STS Brochure

Staying true to our core principle to work as a team with our clients and partners to institute real world solutions that generate tangible bottom line value, Sentinel’s ground-breaking tactical and strategic approach to information security combines cutting edge technologies and operation centers with the industry’s most highly qualified personnel, to deliver the most effective security solutions on the market today. The severity and frequency of cyber threats are rapidly increasing, most of which are yet to be identified due to the continuously evolving nature and intent of the various threats. However, Sentinel’s information security platform is able to identify, isolate and neutralize cyber security threats before they have a chance to disrupt vital proprietary information, assets and operations. Within our ISOC our top tier analysts use a combination of breakthrough manual immune system technologies powered by Bayesian probability theory. Acting like an immune system, these technologies allow Sentinel to rapidly establish an understanding of normal processes within individual end user devises and entire computer networks. By rapidly understanding healthy normal system processes Sentinel is able to identify and prioritize previously unknown threats and APTs to be neutralized. Working closely with clients, and depending on client service requests, Sentinel can institute segments of its service platform or provide its full suite of managed security services.

Cyber intelligence

Dynamic threat identification

Manual immunization technology Search for anomalistic behavior,

not signatures Does not require known variables Rapid security deployment (hours to set up)

Threat Neutralization

Manual immune response Cyber Threat Research Analysts

results driven

vested

cont'd education Neutralize known and unknown cyber

security threats

Client Operational Awareness

Sentinel analysts generate weekly incident reports

All incident information is proprietary to our client

Page 5: STS Brochure

Auditing network security risks, measuring risk, and promoting compliance is a streamlined and thorough process with Sentinel. Our team of professional auditors hold some of the industry's most advanced certifications, and are passionate about working with clients to complete audits within a predetermined scope of work agreed to by our clients, and thereafter running an in-depth review of our clients' infrastructure. Independent of whether an audit is an IT audit, IT data security audit, or cyber security audit, two things Sentinel is recognized for are, having our clients closely involved in audits for their own peace of mind, and delivering the most comprehensive and thorough audits available.

network security audits

PROCESS CENTERED ON

o Heightened information security

o Cost effective improvements

o Client compliance objectives

o Non-disruptive implementation

AUDIT CAPABILITY HIGHLIGHTS

● OSCP, CEH, CISA or SSCP Certified ‘White Hat’ team members

● Thorough ‘pen testing’ tactics

● Identify vulnerabilities that may be difficult for automated systems to detect.

● Test client staff ability to detect and respond to attacks

● Deploy customized software “on request”

● Designed to augment client ISO 27001 compliancy

Page 6: STS Brochure

All forms of information transfer are susceptible to man in the middle attacks (MITM). Working to keep all proprietary information private, Sentinel offers multiple managed solutions for communications to keep proprietary confidential information private and secure. Effective remote data access / transfers and global communications of proprietary sensitive information can significantly increase the productivity and competitiveness of any organization. Also, as a consequence of the nature of remote communications the cyber surface area susceptible to attack is exponentially greater. From file downloads and email's, to voice calls and text, all forms of information transfers are susceptible to MITM attacks. With an awareness and a thorough understanding of MITM attacks, Sentinel offers numerous managed solutions to neutralize MITM threats. We have the highest standards in encryption, consistently tested by Sentinel's security engineers, and our delivery of advanced encryption communications has enabled us to provide a streamline service to our clients that is user friendly and do not sacrifice to ergonomics and daily usability.

MOBILE DEVICES

● Hardened Android based OS

● Remote ‘Self-destruct’ capability

● Use your own SIM card and phone number

● Wi-Fi 802.11 a/b/g/n/ac dual band 2.4/5.0 GHz

● Bluetooth 4.0LE

● Continuously tested for integrity by Sentinel R&D

SERVICES

o Encrypted Peer-to-Peer calling and video with no Keys stored.

o Communicate privately from anywhere with no roaming charges.

o Unlimited Encrypted Private Messaging

o Email and Texts with optional ‘burn after reading’ settings.

o Projected usage to fine tune perfect plan per user

o 24/7 plan service support from Sentinel

encrypted communications

Page 7: STS Brochure

Sentinel’s secure cloud storage is an advantageous asset which vastly increases information sharing and accessibility, while reducing the capital expenses associated with utilizing fit for purpose data storage repositories and systems. Our cloud merges competitive rates and low latency with the most secure off-site storage on the market, creating an exceptional value proposition. Ultimately the end result is that our clients gain efficiency and competitiveness by having the ability to seamlessly and securely access data and collaborate. the freedom of mobility while keeping vital proprietary information secure and private.

FEATURES

Client exclusive storage racks available Monthly drive space optimization

Rapidly expandable space Network monitoring and support

Encrypted data storage and transfer 24/7 IT staff support

Client exclusive encryption keys 24/7 IT security personnel

High data transfer rate Standalone building capacity

STANDARDS

OPEN – IX (SOC II Audit) SSAE 16 Compliant

FISMA PCI DSS Compliant

HIPPA ISO-27001

secure cloud storage

Page 8: STS Brochure

In a scenario that a catastrophic event causes a widespread outage, your critical infrastructure and information must be recoverable and be available to return impacted assets, or the entire organization, to normal operations as rapidly as possible. At Sentinel we provide much more than simply disaster recovery plans, we provide disaster recovery programs which cross utilizes capabilities available in our service platform (DPR / DR). From our secure cloud services to encrypted communications we ensure our clients that they will maintain the integrity of the information as well as full data restoration and availability promptly in the event of a catastrophic event. With close client involvement, our experienced DR team will develop the disaster recovery program, implement it, test it and train our clients for a DRP scenario. With Sentinel, the DRP is comprehensive and utilizable in a real world scenario that enables our clients to operate knowing that their business is secure. Sentinel's ISOC has been meticulously designed around our service security platform's work flow, with an emphasis on the ability to continue services during, and in the wake of any catastrophic disaster.

Phase I

Objective Setting & Assessment

Phase II

Analysis

Phase III

Design & Develeopment

Phase IV

Implementation

Phase V

Monitoring & Review

Around-the-clock remote remediation and escalation

Offsite backup

Automated recovery

Routine backup

Disaster Recovery Program & Management

disaster recovery program

Define objectives Define DCP / DCP

policy Identify critical

process & workflow Define functionality Project team Risk assessment

Threat & risk analysis

Define recovery point

Business & technology analysis

External dependency impact analysis

Threat & risk analysis

Define recovery point

Business & technology analysis

External dependency impact analysis

Threat & risk analysis

Define recovery point

Business & technology analysis

External dependency impact analysis

Threat & risk analysis

Define recovery point

Business & technology analysis

External dependency impact analysis

Risk Mitigation & Compliance

Page 9: STS Brochure

Sentinel Technology Solutions Corp. www.sentinelcyber.com phone. (832) 917-1976 email. [email protected]