Growing in number, more diversified and more precisely targeted, computer attacks have become commonplace and are becoming more and more sophisticated, to the point that they can now be considered as genuine strategic offensives. Advanced Persistent Threats, or APTs, are characteristic of this new generation of threats, methodically combining several intrusion tools and vectors in order to strike slowly, but surely.

In the face of this permanent challenge, cyber-security is no longer seen as a fortress that can just be put in place once and for all in order to protect against threats launched one after the other or indiscriminately by remote hackers. Today, proactiveness and resilience are called for. If a system finds itself unable to anticipate threats, it must be able to confine and neutralize them. The combination of several layers of protection makes it possible to both reduce the risk of flaws and lessen the impact in the event of intrusion.

Reconnaissance

+ Detect the precursory signs of a threat to your company or organization and identify your own areas of vulnerability, in particular through intentional or unintentional web-based data leaks by your staff members, before such information can fall into the wrong hands.

Weaponization

+ Pick up on search and discussion topics relating to one or several professional applications used in your company at the weaponization phase of the process.

Initial instruction

+ Filtering and decontamination of removable media to ensure the harmlessness of data imported into your system.

All potentially harmful or unauthorized content is quarantined.

+ High-level partitioning of data environments (e.g. messaging applications vs. professional applications) and zones of differing sensitivity levels (e.g. internet vs. company network)

Malware introduced via an infected attachment for example, will see its scope of action restricted to the active application environment, with no possibility  of spreading to the wider professional environment or the other machines of the network.

+ Role-based access control (RBAC) limiting user rights to those that are necessary and sufficient for the specific tasks that they have to perform (principle of least privilege)

Even if they manage to gain access to a machine on your network via a back door, hackers will be unable to grant themselves rights of a higher level than those already granted to the victim of the attack (no privilege upgrades) and will not be able to go beyond the confines of the machine in question.

Discover

MediaCentric®

Software platform for advanced processing of multilingual multimedia open sources

more information