Security for the
Corporate Security Policy and Documentation
From security and password policies to policies covering data storage and recovery, leak prevention, Internet usage and web browsing, Cybhermetics has the expertise and experience to ensure your policies exceed your requirements. We can also provide detailed documentation such as Microsoft Visio network diagrams and server configurations.
Cyber Security Awareness Training
We have partnered with industry leading companies such as Stickley on Security to provide our customers with comprehensive security awareness training programs. Our solutions provide both initial training and ongoing testing to ensure your team is always aware of potential security threats. Cybhermetics continued employee testing involves a series of controlled exercises that help us identify possible breach vectors through behavioral profiling.
A vulnerability assessment is the process of defining, identifying, classifying, and prioritizing vulnerabilities in computer networks, applications, and system infrastructures. Cybhermetics will regularly conduct these comprehensive assessments. We recognize that all organizations, regardless of size or industry, face a rapidly evolving risk of cyberattacks and will benefit from ongoing vulnerability assessments.
Cybhermetics has partnered with Security Metrics and other compliance firms to assist our customers in obtaining their required certifications. We assist with requisite policy writing, documentation, vulnerability assessments, employee training, etc. to prepare for compliance audits and assessments. Cybhermetics will partner appropriately to help your organization meet the requirements for certifications such as NIST, HIPAA, PCI-DSS, SOX, ISO, FISMA, ITAR, COPPA, HITRUST.
Cyber Liability Insurance
Cyber security insurance is designed to mitigate losses from a variety of cyber incidents such as data breaches, business disruption and infrastructure damage. This includes everything from targeted malware or phishing attacks to the occasional misplaced laptop containing confidential information. While the most important aspect of cyber insurance is maintaining network security requirements, the policy will cover liability claims and ancillary expenses resulting from an attack or breach. Cybhermetics can provide cyber security insurance that covers damages from breaches, cyber extortion, cybercrime, business disruption and data recovery.
Cybhermetics Access Solutions
Next Generation Firewalls are the third generation of firewall technology. They combine traditional firewall features with other network filtering functions to provide a secure browsing experience as well as intrusion prevention systems (IPS) to prevent attacks from outside your network, edge anti-virus, application controls, and more. These firewalls can also be used to provide secure access to your environment. Cybhermetics has extensive knowledge and experience in Fortinet, Cisco, Palo Alto, HP, and Juniper firewall appliances and has standardized the use of firewalls as an SD-WAN core for more than 5 years.
Traditional VPN Solutions
Traditional VPN solutions such as IP Sec VPNs and SSL VPNs have been used for years to provide secure access to private networks. These solutions are proven effective and still have broad applications in modern environments such as providing access to networks that don’t require cloud access or being implemented to create site-to-site tunneling. They can also be utilized in conjunction with software defined perimeters (considered the next generation of VPN) and cloud access solutions to provide access to public and private cloud networks.
Software Defined Perimeter (Next Gen VPN) – Zero Trust Security
Traditionally, perimeter-based network security tools such as legacy VPN provided secure access to an environment but failed to identify the factors that could make the client accessing the network a danger to the network itself. Software Defined Perimeters reduce the attack surface by hiding network resources from unauthorized users with a Zero Trust approach. This means that only trusted users can gain access via assigned permission roles such as user accounts, group membership, geolocation, client type, client av, client patching, and date/time. These attributes can be used to assign access to specific devices or applications in your local network or throughout the cloud using gateways in those environments. Application whitelisting is the gold standard when it comes to blocking ransomware, viruses, and other software-based threats. While constantly evaluating new technologies to ensure our customers attain the highest security levels while maintaining the ease of access desired by their employees, Cybhermetics also partners with industry leaders such as ThreatLocker, AppGate, and Fortinet.
Identity and Access Management Solutions
Identity and access management solutions are used by organizations to administer user identities and control secure access to enterprise resources. These resources may reside locally at a corporate office, at the corporate data center, or in the cloud. Key features of Identity and Access Management Solutions include single sign-on (SSO), multi-factor authentication (MFA), user provisioning and lifecycle management. Some of these solutions may also include cloud-based LDAP authentication mechanisms that can be integrated with or as an alternative to Microsoft’s Active Directory Services. Combining this with security cameras using facial recognition technology can supplement your physical security capabilities and may prevent malicious actors from physically accessing your computer systems.
Network Access Control (NAC)
Also known as network admission control, is the process of restricting unauthorized users and devices from gaining access to a corporate or private network. NAC ensures that only authenticated users and authorized devices compliant with security protocols can connect to the network. As endpoints proliferate across an organization—typically driven by bring-your-own-device (BYOD) policies and an expansion in the use of Internet-of-Things (IoT) devices—having more control is critical. Even the largest IT organizations do not have the resources to manually configure all the devices in use. The automated features of a NAC solution are a substantial benefit, reducing the time and associated costs with authenticating and authorizing users and determining device compliance. Further, cyber criminals are well aware of increases in endpoint usage and continue to design and launch sophisticated campaigns to exploit any vulnerabilities in affiliated networks. With more endpoints, the attack surface increases, which means more opportunities for fraudsters to gain access. NAC solutions can be configured to detect any unusual or suspicious network activity and respond with immediate countermeasures, such as isolating the device from the network to prevent the attack from spreading.
Next Generation Firewall Solutions
Monitoring of your organization’s computer network is central to network security. It is the first line of defense in notifying organizations that something is suspect in their environment. This could be anything from virus definitions being out of date to cyber security and ransomware attacks. Quality monitoring systems also store historical data so administrators can examine security and traffic trends to determine when additional hardware is needed. However, it is of little benefit to your organization if no one notices the issues or alert notifications. Cybhermetics can customize an alert management protocol to ensure no issues go unnoticed.
Network Device Logging
Network devices have an extraordinary amount of traffic flowing through them and limited space to log that data. In many cases, if that data is needed to troubleshoot a network outage or to trace a cyber security attack the data is gone long before the administrators have time to locate it. Using a logging service or server is necessary to ensure you have that information available on demand. Vendor specific logging, such as a FortiAnaylzer for Fortinet devices, can provide far more detailed information about events that occurred.
SIEM (Security Information and Event Management)
Security information and event management is a subsection within the field of computer security, where software products and services combine these elements. SIEM’s provide real-time analysis of security alerts generated by applications and network hardware. Cybhermetics works with a variety of SIEM solutions and providers and can outline the most appropriate options for your environment.
Cyber Security AI
The use of artificial intelligence in cyber security has marked a fundamental shift in organizations’ ability to protect critical data systems and digital infrastructures. For strained security teams, it offers the possibility to keep pace with a rapidly evolving threat landscape. While rule and signature-based solutions offer some protection against pre-identified threats, the reality is that attacks consistently evade these tools. Powered by unsupervised machine learning, Autonomous Cyber AI proactively responds to these threats before they become a crisis. Autonomous Cyber AI is a self-learning technology — it learns ‘on the job’, from the data and activity that it observes in an organizations’ computer environment. This means making billions of probability-based calculations in a fraction of a second rather than waiting for an administrator to respond to an attack. Cybhermetics has partnered with Darktrace and ESentire among others to provide industry leading AI technologies.
SOC (Security Operation Center)
A SOC is a team of people that leverage process and technology to monitor an organization’s security posture. The purpose of a SOC is to attempt to detect, analyze, prevent, and respond to cyber security incidents. SOC’s use information from monitoring systems, syslog databases, SIEM’s, etc. to perform these tasks. Essentially, the SOC is the correlation point for every event logged within an organization that is being monitored. The Cybhermetics team will assist in identifying the response level for each possible event, determine how to respond, and manage the resolution.
Monitoring and Alert Management
Cybhermetics Endpoint Security
Antivirus and EDR/MDR/XDR
Legacy antivirus software has been around for quite some time. This type of software uses definition-based scanning to detect viruses, malware, spyware, etc. and hopefully remove it or at a minimum stop if from performing its programmed function. EDR (Endpoint Detection and Response), MDR (Managed Detection and Response) and XDR (eXtended Detection and Response) platforms use tools to gather data from endpoint devices and then analyze the data to reveal potential cyber threats. The software is installed on end-user devices and is continually monitored while storing the data in a centralized database. If a threat is detected a preventative list of actions can be taken automatically ensuring minimal damage to the infected computer and the associated network. Cybhermetics is aligned with anti-virus industry leaders such as Sentinel One and Fortinet to ensure our customers are protected from the latest threats.
More than 90% of cyber-attacks originate from an email. This makes email security paramount to all organizations. Email security consists of SPAM filtering, virus and trojan filtering, outbound data loss prevention, email encryption, email archiving, etc. Providing clean email to their users is a top priority amongst network administrators. Cybhermetics can ensure your organization’s email is a productive tool instead of a danger to your environment.
Video Surveillance Systems
Zero Trust networking is a security model that forces all devices and applications to self-identify before they are trusted. This is applicable to people as well. Video surveillance systems that can perform advanced functions such as facial recognition to ensure threats like disgruntled ex-employees and sex offenders are not allowed on-premises, that can detect elevated body temperatures and/or facial masks during pandemics, and that have built-in AI to alert of abnormalities are an increasing necessity to businesses. In addition, ensuring video feeds are constantly monitored eliminates the likelihood such events are missed. Cybhermetics can design, deploy, and manage all of your video surveillance components. Video surveillance systems must keep pace with the security challenges today’s businesses face. Analog CCTV and aging video equipment fail to deliver reliable, proactive security protection against sophisticated threats. Beyond cybersecurity challenges, disjointed video surveillance cameras and recording systems increase operational complexity, require manual management, draw more power, and provide only limited risk and reliability reductions. Cybhermetics offers secure video surveillance systems that create safe workspaces to protect employees, safeguard property, and prevent losses from theft and vandalism. Built with the highest security standards that incorporate innovative AI technologies, Cybhermetics enables organizations to unify video surveillance and physical security management in one integrated platform. Unlike many one-size-fits-all products, Cybhermetics provides fully customized solutions. Your team can easily configure the video surveillance system and build a secure, productive environment specific to your business. Cybhermetics comprehensive video surveillance solutions give you the premium features you need in video surveillance cameras, network video recorders, video management software, and mobility support.
Your domain is an essential part of your brand. Protect your employees and Customers by preventing cybercriminals from using your domain in their spear phishing and typosquatting attacks. How We Crush Spear Phishing and Typosquatting • Screen Scrape Protection (detects if your website is copied to a domain to attack your Customers) • Iframe Attack Protection (prevents your website from being pulled to another domain via an iframe) • Monitor all lookalike domains to prevent spear phishing attacks on staff and Customers • Monitor typo-domains to prevent typosquatting attacks on your Customers • Detects any domain using your domain as a subdomain (example: yourdomain.superscam.com) • Monitors all similar domains that contain “yourdomain” to prevent spear phishing attacks using the unlimited extensions available (example: usffcu.mobi) • Monitors DNS including MX records of all lookalike, typo and similar domains to detect if a harmless domain turns malicious • Take down services for all lookalike, typo and similar domains that are found to be malicious • DA Prevent Option: Purchase lookalike and typo domains and forward them to primary domain so they cannot be used to attack your organization Spear Phishing Prevention People who receive an email with a domain that looks almost identical to your domain are far more likely to believe the email is legitimate and trust the link or attachment. According to the 2019 Verizon Data Breach Investigation Report, 92% of all malware infections begin with a phishing email. Locking down all the domains similar to yours is the best way to prevent them from ever being used for nefarious reasons. Typosquatting is a Top Source of Credential Theft and Malware Infection For as long as companies have been registering domain names, cybercriminals and competitors have been using this tactic to commit a wide range of scams. The two most common scams are tricking a user into downloading malware and to stealing a user’s credential when they believe they’re logging into your site. Impersonation attacks can look like any company associated with yours. Some are larger than others, making them even a better threat. The Domain Assure Ecosystem links your company with other companies to create the largest protection network possible. Protect your company from phishing emails impersonating partners, vendors, clients, and big brands. Partners employees regularly work with are a higher threat as a trusted relationship. In 2021 86% of companies were compromised by an impersonation attack.