11
©2016 April 2016 Copyright: Sarah Holmlund Presents:

S.A.R.A Overview (1)

Embed Size (px)

Citation preview

Page 1: S.A.R.A Overview (1)

©2016 April 2016

Copyright: Sarah Holmlund

Presents:

Page 2: S.A.R.A Overview (1)

©2016 April 2016

S.A.R.A. Supercomputed Advanced Response Apparatus™

Cyber-Intelligence Accelerated

Comprehensive Overview

Page 3: S.A.R.A Overview (1)

©2016 April 2016

Information Technology

Before

Computers have been a part of our

culture and businesses for a number of

years. In the amount time computers

have been in our lives, we have seen

many amazing changes and

advancements in what we can

accomplish with these amazing

machines. Computers have gotten

smaller, thinner, smarter, faster, and

more powerful. Great companies like

IBM, HP, DELL, Apple, and Microsoft all have had the opportunity to shape and create the

computational world that we currently live in.

After the computer was created, we needed to make sure they could speak to each

other, from one machine to another. This was the beginning of the internet. After computers

could be networked, people of all levels of computational interest began to find interesting

information gathered accidently across these

networks. The need for network and computer

security was born.

Legions of programmers, computer

engineers and computer scientists began

developing potential solutions. Working

tirelessly, development teams tried and failed

hundreds of times to create smarter

technology and the protocols to control them. Two major players in the security space to

Page 4: S.A.R.A Overview (1)

©2016 April 2016

emerge from the insatiable need for security and products were Symantec Corporation and

Cisco. These giants developed the foundation to control the cybercrime epidemic we are

experiencing today - they were able to predict these issues decades ago.

Data manipulation and computer crimes have been happening the same way for the last

four decades. Fundamentally, security is flawed. Programs and computers are created by

humans who only think and operate in accordance with their emotions, experiences,

memories, and developed traits over a period of time. In short, we evolve, grow, change,

transform into something more amazing every day. Computers only evolve based on need at

the time. We rely on computers for many different reasons, yet we fail to remember their

limitations under budget and pressure.

We also must consider the development

team and development process. Programmers

develop software in the same way they

process information. Based on this fact,

computers have holes in their software and

hardware architecture. Once upon a time,

there were only a few people that

manipulated the data and or the machines. Today, hundreds of thousands of kids, teens, and

adults are involved in hacking. Some people know about it, and some do not.

Now, understanding computers are flawed and security is an associated risk of

computation, what do we do? Currently, we deploy highly complicated and specialized

hardware to detect threats with the best of software solutions.

What is the common denominator?

Page 5: S.A.R.A Overview (1)

©2016 April 2016

Humans! As long as humans build computers and software it will be flawed. Hardware,

firmware, and software will need to be updated and scores of people will be needed to

manage the issues as they arise. Our current information technology systems are complex,

often requiring many ‘experts’ to assemble, configure, administrate, and fix our technology.

Solutions designed to combat cyber-threats are often based around Software as a Service

(SaaS). Security Information Event Managers (SIEM) are complex and take many people to

correlate security events. So how is fundamentally flawed software supposed to combat

threats of today?

A: INNOVATION

Blackbourne Worldwide has seen the rise in cybercrime over the last 13 years, with

business owners saying the same thing: “we have IT, they do security as well,” or “we have

always done it this way.” Simply because you can, does not mean you should. Blackbourne

Worldwide understands there needs to be a shift in how we see computers and how we

interact with them.

Page 6: S.A.R.A Overview (1)

©2016 April 2016

Let’s discuss typical IT problems:

Workstations are expensive

Security is flawed

Software and hardware is flawed

SaaS don’t catch everything

Your IT department is not trained to combat cybercrime

Industry certificates are not enough

Now that you are looking at the global perspective of your Information Technology

Department, let’s determine how to solve these issues.

Page 7: S.A.R.A Overview (1)

©2016 April 2016

S.A.R.A. Blackbourne Worldwide has created the only solution that is proven time and time

again to properly combat cyberattacks and protect your company from cybercrime. Our

processes and methodologies are in a league of their own. We have the ability to detect

threats and mitigate using the most intelligent system on the planet: S.A.R.A™, or the

Supercomputed Advanced Response Apparatus™, is the core of Blackbourne Worldwide.

S.A.R.A™ was designed to become the only permanent solution in cybersecurity.

S.A.R.A™ has the ability to track every asset on your system and pull comprehensive

information about each device she is connected to, then provide a detailed report of how the

device interacts with your network and the actions users have taken on your system. When

Page 8: S.A.R.A Overview (1)

©2016 April 2016

S.A.R.A™ is installed in your environment, she has the ability to

administrate and scan each workstation, server, and networking

device on your network by using the best in virtualization

technology and proprietary software.

S.A.R.A™ includes $658 million in security and information

technology architecture built into her. S.A.R.A™’s most unique

and powerful ability is to correlate and aggregate cyber-events

happening across your network, regardless of the organizations

size in milliseconds. This ability delivers cyber-intelligence about

your security posture at an almost predictive rate. Her analytics

programming and Artificial Intelligence integration allows for the

information to be scrubbed, detailed, sorted, and fed securely to

our Security Operation Center to provide advanced human

intervention.

S.A.R.A™’s unique and dynamic hardware and software

allow for her to fully administrate your Information Technology

infrastructure, with expert human support. She also provides

VOIP services as an option as well. Truly, S.A.R.A™ is a unique

solution capable of handling your entire IT department and

security. She is supported internally by Blackbourne Worldwide

with some of the brightest minds in the industry, and

programmed by some of the leading developers in the world.

Key Features:

1.5 Hour

response with

mitigation report

Forensic detailing

of major events

Dedicated team

serving your

company

Behavior Threat

Monitoring

Cyber Forensics

Insider Threat

Monitoring

Affordable

Fully compatible

with your existing

network

Page 9: S.A.R.A Overview (1)

©2016 April 2016

S.A.R.A™’s neural network is constantly expanding. Currently, she is part of the Open

Threat Exchange™ started by AlienVault™. She connects and gathers intelligence from over

800,000 endpoints in over 200 countries. This neural network delivers actionable intelligence

to S.A.R.A™’s primary cortex, allowing the best security analysts in the industry to process data

and analytics to perform various functionality changes behind the scenes to perfect your

network.

S.A.R.A™’s cerebrum is extremely complex with

thousands of processing cores, tons of ram, and capable of

1 petabyte of onboard storage. Her parallel processing and

advanced streamlined computation set-up means she

wastes no time – with an average calculation that normally

took seconds, now takes nanoseconds to accomplish. This

makes S.A.R.A™ the smartest, fastest, and most affordable of cybersecurity solutions in the

world. She tracks, logs, and mitigates up to 3.5 trillion cyber-attacks on average per client

every year. How many events would you say your IT department observed? How many are

responded to and mitigated?

S.A.R.A™’s hologram brain activity 3/2016

Page 10: S.A.R.A Overview (1)

©2016 April 2016

Looking to the future

Our technology is the most sophisticated and advanced on the market today. S.A.R.A™’s

abilities eclipse what other SaaS companies are capable of. Our aim is to correct the

cybercrime epidemic and allow for all companies to have the ability obtain a near-perfect

security posture. In the upcoming years, it will be imperative to have the best cybersecurity

system installed - S.A.R.A™ watches over hundreds networks, is she protecting yours?

Who is watching your network?

Page 11: S.A.R.A Overview (1)

©2016 April 2016

S.A.R.A. Supercomputed Advanced Response Apparatus™

Cyber-Intelligence Accelerated

400 Renaissance Center

Detroit, MI 48243

313-651-7048

www.blackbourneco.com