hak-logo.png
 
 

CyberNsight – Risk intelligence Platform Engine

We offer a mature cyber threat / risk management intelligence service – which includes the components/service elements within a standard framework.

  • Asset Management (What are we protecting, where is it, who owns it)?

  • Threat Management (What Threats are out there and how are they relevant to me)?

  • Risk Management (What threats pose a Risk to your assets, in which countries or locations)?

  • Forensics / Prediction / Data Science (collecting evidence about what happens, where, how through whom and why).

  • Research (using skills to detect, find and analyze attacks and defenses. Learn from attacks and defenses, predict possible trends and new clusters of threats and risks in the future).

  • Actionable Intelligence (using all modern science and information collection procedures possible while remaining easy to understand and digestible).

 

CyberVue – Virtual or hardware appliances including firewall

SOFTWARE

The core software used by Hakdefnet is based on a modified open source version of OPNsense, includes open source mathematic algorithms and data science solutions – which are tested and modified by Hakdefnet. Open source basedsolutions offer a backdoor free, tested and proven software that simply works.

HARDWARE or VIRTUAL

You get your virtual Chief Security Officer as a hardware appliance or completely virtual (installed on your server hardware or in your own virtual environment such as VMware, Citrix or Microsoft).

The Hakdefnet v-CSO Appliances:

  • have the currently most secure, easy and best Firewall cores worldwide

  • are flexible and fast

  • have an IDS (Intrusion Detection System) built in

  • send attack statistics to CyberNsight for analysis and

  • updated defense information and rules

  • use standards like Syslog and Log files for data analysis through Malware-Research-Teams

  • provide automatic updates to core and rules with a subscription

  • provide updates for APIs and create an automatic network defense solution

 
 CyberVUE: small v-CSO Appliance   Technical Data:  Motherboard-CPU: Intel Bay Trail J1800 Dual Core 2.41 GHz, 240 GB SSD, RAM 8GB Connectors: 1 MSA TA, 1 mini PCIe: 1 VGA, 1 HDMI, 1 USB 3.0, 3 USB 2.0, 1 RAJ45 to COM, 1 Line In/ Out, 2 RJ45 LAN, (WiFi optional); 12V4A power adapter, fanless case

CyberVUE: small v-CSO Appliance

Technical Data:
Motherboard-CPU: Intel Bay Trail J1800 Dual Core
2.41 GHz, 240 GB SSD, RAM 8GB
Connectors: 1 MSA TA, 1 mini PCIe: 1 VGA, 1 HDMI,
1 USB 3.0, 3 USB 2.0, 1 RAJ45 to COM, 1 Line In/
Out, 2 RJ45 LAN, (WiFi optional); 12V4A power
adapter, fanless case

 CyberVUE: medium v-CSO Appliance   Technical Data:  Motherboard-CPU: Intel J1900 Quad Core 2.0 GHz, 240 GB SSD, RAM: 8GB Connectors: 1 Mini PCIE, support 3G/WiFi; 1 VGA, 2 USB 2.0, 4 LAN (WiFi optional), 12V4A power adapter, fanless case, clustering possible

CyberVUE: medium v-CSO Appliance

Technical Data:
Motherboard-CPU: Intel J1900 Quad Core 2.0 GHz,
240 GB SSD, RAM: 8GB
Connectors: 1 Mini PCIE, support 3G/WiFi; 1 VGA,
2 USB 2.0, 4 LAN (WiFi optional), 12V4A power
adapter, fanless case, clustering possible

 CYBER ESPIONAGE DETECTION  Today Cyber Crime, Warfare and Espionage are so intertwined that many people do not know where the difference is. Based on our continuous research we find new attacks and tools every day that point to complex espionage campaigns of countries or unknown threat actors. This research helps you detect the undetectable through more comprehensive and proactive approaches to detection.

CYBER ESPIONAGE DETECTION

Today Cyber Crime, Warfare and Espionage are so intertwined that many people do not know where the difference is. Based on our continuous research we find new attacks and tools every day that point to complex espionage campaigns of countries or unknown threat actors. This research helps you detect the undetectable through more comprehensive and proactive approaches to detection.

 MALWARE DISCOVERY AND ANALYSIS  “As the three cybers mix together we see a convergence of threats and attack complexity. New attacks target smaller companies, stay under the radar or antivirus and avoid being detectible to reach their goal. Only informed, proactive and dynamic defenses that use all relevant information in an actionable way will be successful at detecting what is otherwise undetectable. Stay ahead of the game.

MALWARE DISCOVERY AND ANALYSIS

“As the three cybers mix together we see a convergence of threats and attack complexity. New attacks target smaller companies, stay under the radar or antivirus and avoid being detectible to reach their goal. Only informed, proactive and dynamic defenses that use all relevant information in an actionable way will be successful at detecting what is otherwise undetectable. Stay ahead of the game.

 IOT AND CYBER THREAT DETECTION  Internet of Things brings more attack vectors that “cyber” crime, espionage, warfare attacks. Attackers can use IoT to break into your home or company. Protecting new technology and using proactive alerting methods makes sense when dealing with new emerging threats to new and unprotected technology. HVAC, alarms as well as utilities and IoT systems can be attacked using new malware.

IOT AND CYBER THREAT DETECTION

Internet of Things brings more attack vectors that “cyber” crime, espionage, warfare attacks. Attackers can use IoT to break into your home or company. Protecting new technology and using proactive alerting methods makes sense when dealing with new emerging threats to new and unprotected technology. HVAC, alarms as well as utilities and IoT systems can be attacked using new malware.

 THREAT AND RISK PROFILING AND DETECTION  It is not only important to understand what type of attack and tools  are used in an attack but also who is attacking you. Traditional security training teaches older narratives about who hackers are and why they do things. Old ways of teaching security and attacker detection are no longer working. Today’s attackers are more sophisticated and complex so that you know what the typical signs and attack techniques are of today’s attacks.

THREAT AND RISK PROFILING AND DETECTION

It is not only important to understand what type of attack and tools  are used in an attack but also who is attacking you. Traditional security training teaches older narratives about who hackers are and why they do things. Old ways of teaching security and attacker detection are no longer working. Today’s attackers are more sophisticated and complex so that you know what the typical signs and attack techniques are of today’s attacks.