top of page

CYBER SECURITY SOLUTIONS

Computer Programming
ARE YOU PROTECTED?

As reported by FIN24 there are 13 842 attempted cyberattacks in South Africa per day.

That translates to 577 attacks per hour or 9.6 per second!

CAN YOU AFFORD TO
HAVE A SECURITY BREACH

According to an IBM study:

SA companies loose an average of R36 Mil every time they get hacked. The cost is rising year on year with previous years being 2017 - R32Mil & 2016 - R26.6Mil

If you’re unable to detect and mitigate an attack, you could face significant losses, in the form of:

  • Direct theft (money, data or intellectual property)

  • Lost business and productivity

  • Poor customer experience and customer churn

  • Reputation damage from bad publicity

  • Potential lawsuits or service level agreement penalties

  • Business continuity is affected

  • High cost of resourced needed to address the attack

ZERO DAY VULNERABILITIES

Security specialists are constantly on the watch for so-called "zero day" vulnerabilities--flaws in their code that hackers find and exploit before the first day companies become aware of them. But the term "zero-day" doesn't capture just how early hackers' head-starts often are:

 

Day zero, it seems, often lasts between 150-300 days depending on the industry.

Screenshot 2019-10-15 at 10.40.20.png
COMMON THREATS COMPANIES ENCOUNTER
Icons 2.png
RANSOMWARE

Ransomware is a type of malicious software, or malware, designed to deny access to a computer system, or data, until a ransom is paid.

Icons 2.png
SOCIAL ENGINEERING

Social engineering is the art of tricking / persuading individuals to divulge privileged information to attackers

Icons 2.png
CRYPTOJACKING

Cryptojacking is an emerging form of malware that hides on your device and steals its computing resources in order to mine for online currencies like bitcoin

Icons 2.png
MALWARE

Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms & Trojan horses.

Icons 2.png
EMAIL PHISHING

Email phishing is a serious threat and responsible for a large percentage of security breaches

Icons 2.png
DATA THEFT

Data theft can hurt businesses and consumers in a variety of ways. They are a costly expense that can damage lives and reputations.

WHAT WE OFFER
DETECT ATTACKS AND BLOCK THEM IN REAL TIME
FORENSICS ON A CLICK
TAILOR MADE SOLUTIONS FOR YOUR BUSINESS
DEVELOPED FOR SOUTH AFRICAN THREATS, AS WELL AS INTERNATIONAL THREATS
ACTIVE TRAPS AND HONEY POTS TO STUDY AND PREVENT
ATTACKS
REAL TIME CORRELATION WITH THREAT 
INTELLIGENCE DATA
INTEGRATES WITH 60+ ANTIVIRUS PLATFORMS AND THREAT BOOKS - EAST & WEST
LOW HARDWARE COSTS. RENTAL OPTIONS AVAILABLE
How it works3.png
HEADLINE FEATURES
  • Optimised architecture for real time processing; If the hardware and connection allows, we can perform 5,000 proxy events per second against 1,000,000 threat indicators in REAL TIME.

  • Integrated support for Virus Total (around 60 western antivirus engines) and Threat Book (Asian service with around 30 eastern antivirus engines).

 

  • Our platform creates digital clones as active traps (we make digital clones of your device/service, and learn in real time who tries to attack it, and HOW they attack it; protecting you against even unknown threats).

  • Our platform offers java script engine to implement ANY correlation script logic for real time or historical correlation.

 

  • All data has anonymization/pseudonymization integrated.

  • We offer real time auto remediation; we integrate automatic action scripts that will be executed at your firewall or domain controller to remediate detected threat.

 

  • Allows you track visually any of your systems/ employees.

  • Learn about your specific network architecture and possible vulnerabilities.

  • Drill down to minute detail on any event. Because breach detection records have detailed information on network intrusions, you’ll be able to analyse the events leading up to a security breach and be in a position to manage its impact. You can also use this information to understand how the breach took place in order to implement additional security measures.

 

  • All data logs are collected and in stored in raw format to comply with GDPR regulations.

  • Speed, Speed, Speed. Our software architecture provides for incredible detection and response times. These precious milli seconds are worth their weight in gold when attacks are implemented.

  • Rules and multiple alerts can be set for differing threats.  

 

  • Our platform performs automatic noise events elimination (to eliminate from consideration events that were previously identified as non-threats).

REAL TIME ATTACKS AND THREAT INTELLIGENCE
Threat map.png

We place digital clones of your devices around the world, at your external IP, and inside your network, in order to protect you in real time against new attackers and learn how do they attack you. In 2018 we had ~13000 attacks per day per system (9 attacks every minute) with ~ 2.4% uploaded tools not detected by ANY antivirus (0/60)

FORENSICS ON A CLICK

Drill down to process hierarchy analyses. In addition to standard text logs & process trees; 

SOTERIA SOLUTIONS offers a visual reconstruction (“forensics on a click”)  Its a unique feature our platform offers which no other SIEM offers. It does it visually, like in a 3D movie, with all additional information including object host, execution privileges level, and many others.

bottom of page