What is the key value your service provides to enterprises?+
Seculert provides targeted and timely information related to a company's exposure to cyber threats. Our Cyber Threat Management service gathers intelligence from multiple sensors, analyzes malicious content and activity, identifies cybercrime servers and detects corporate-specific attacks in real time. This allows organizations to act swiftly and decisively in the event of a threat, in most cases blocking the malicious elements and averting significant data and monetary losses. Seculert's "in the cloud" service is completely non-intrusive and complements an enterprises' existing security infrastructure. It is designed to provide an additional layer of intelligence-based security on top of on-premise security products. Deployment is virtually instant and extremely cost-effective since there is no need for new hardware, software or any changes to the corporate network.
What are your target markets?+
Seculert's Cyber Threat Management service is designed to help enterprises, government agencies and large organizations protect their vital information assets. Our target market focuses on large enterprises. Within this context, we see substantial interest in our solution from major corporations in the software, pharmaceutical, transportation, healthcare, utilities and financial services sectors.
How do you gather the intelligence information?+
At our Research Lab, a dedicated team of security experts scour the Internet 24x7 to detect new and emerging cyber threats. Seculert uses a combination of patent pending cutting-edge technologies, partnerships and tools for data collection to ensure the most comprehensive coverage of cyber threats. These tools and methods include honeypots, botnet monitoring sensors, malware and spam detection systems, and crawlers. Our experienced research team analyzes the data collected from the wild and distributes this intelligence via our SaaS-based Cyber Threat Management service to our customers.
Do you provide remediation services once you identify malware?+
Remediation services are typically provided by our customer's security consultants and/or service providers, with whom Seculert partners. In order to meet the challenges posed by the growing scope and sophistication of cybercrime, Seculert focuses all of its efforts on providing our enterprise customers with early detection of the broadest possible array of malware threats that may endanger their network. By providing this information in real-time, we both facilitate and increase the effectiveness of the remediation effort.
Does Seculert scan my network systems and traffic to detect the malware?+
No. Seculert provides a cloud-based and non-intrusive service that operates completely outside your corporate network. We provide pinpoint intelligence of corporate exposure to cyber threats through our analysis of data collected from the cybersphere.
Does your service provide customers with information related to the source of data leaks?+
The Seculert Cyber Threat Management service tracks worldwide information in real time, enabling IT managers to pinpoint corporate exposure to cyber threats (e.g., compromised assets, identity theft, compromised partners connecting to the corporate network, leaked file names , etc.). Since malicious code is often designed to steal information, by identifying and quickly handling these threats, companies can significantly reduce the chance of data leakage.
How often do you update your solution to detect new and emerging malware or viruses?+
Based on our extensive security knowledge and patent pending technologies and tools for gathering information, Seculert's Research Lab collects and analyzes huge amounts of data on a continuous basis. Our service provides real-time alerts of corporate cyber threat incidents, as well as up-to-date reports on global cyber threat trends. Seculert Cyber Threat Management complements an enterprise's existing security infrastructure (e.g., firewall, IPS, URL Filtering, anti-virus, etc.), and can be used to enhance perimeter security solutions already in place.
Is it possible to customize security policies?+
Yes. Seculert Cyber Threat Management features an intuitive and easy-to-use management dashboard to facilitate customization. Adjustable threat parameters enable each company's IT manager to define its own threat level policy. In addition, you can customize notifications to be received by email, phone, SMS, etc.
Does your service affect other security tools already running in an enterprise's IT environment?+
Seculert Cyber Threat Management is built to complement and strengthen an enterprise's existing security infrastructure, without the need for new hardware, software or any changes to the corporate network. It does not require network integration; nor does it affect the performance of other security solutions. In fact, the detailed threat data supplied by our service can be used to enhance an enterprise's perimeter security settings.
What is your update policy?+
Seculert offers a Security-as-a-Service (SaaS) solution that does not require the installation of software updates or patches at the customer site. On the Seculert side, low-impact updates are transparently applied to the system – such as performance upgrades and minor software fixes. Seculert schedules major feature updates so as not to impact ongoing operations and in such cases provides advanced notice to customers.
Do I need to install hardware in my network?+
No. Seculert offers a cloud-based service which means that enterprises do not need to purchase or install any hardware in their network. This lowers costs and enables enterprises to get up and running with the service instantly.
How long does it take to establish an account?+
Using the system's comprehensive and easy-to-use management dashboard, service setup is quick and easy, enabling enterprises to get up and running within a matter of minutes.
How does the service notify me? +
The Cyber Threat Management service sends alerts to corporate IT managers when cyber threats attempt to penetrate the corporate network, with detailed information related to corporate exposure to cyber threats. Notifications can be sent via the portal and by email. In addition, our service integrates with SIEM systems that can be used to deliver alerts to IT managers.
Do you work with business partners?+
Yes. We are interested in expanding our business partnerships with VARs specializing in security, consulting firms involved in risk analysis and remediation, managed service providers and cloud infrastructure providers. We believe that Seculert provides a unique and highly effective solution for any firm involved in protecting enterprises from the spread of malware. We welcome you to contact us to discuss partnering opportunities.
How is the service sold?+
We sell the Cyber Threat Management service directly, as well as through channel partners such as value-added resellers and security-related service providers. We believe that our Cyber Threat Management service represents a tremendous opportunity for managed service providers, consulting organizations and VARs to enhance their product and service portfolios.
Does your service cover mobile devices and smart phones? +
Yes. The Seculert Cyber Threat Management is hardware-agnostic and is compatible with any device connected to the Internet running any operating system.
Is your service able provide me with pinpointed intelligence even if my machines are behind a NAT device? +
Yes. Seculert's Cyber Threat Management service is able to provide pinpointed intelligence even if the enterprise asset (machine) is behind a NAT device. Utilizing patent-pending technology, our service provides the exact machine name in cases where the IP address was translated, enabling enterprises to pinpoint infected machines.