mitigate cyber risk before, during and after incidents · mitigate cyber risk before, during and...

3
MITIGATE CYBER RISK BEFORE, DURING AND AFTER INCIDENTS TRANSFORM YOUR DISASTER RECOVERY SITE INTO A VIRTUAL CYBER RANGE Prove Your Preparedness. Defend Yourself. Increase Your Confidence. Identify what’s real, important, and dangerous Benefits to End-Users, Consulting Firms, and Systems Integrators CyberVR™ delivers simulation and sandboxing capabilities that end-users with different cyber risk management experience use to accelerate their development and improve their security posture. For consulting firms and systems integrators, CyberVR TM is a unique tool offering built-in content and authoring capabilities. With CyberVR™, organizations can accelerate the pace at which their clients improve risk posture and verify their ability to reduce times to detection, containment and recovery—all while reducing operational costs and improving compliance. VM2020 brings cutting-edge technology and cyber resilience content to enterprise risk management to let you realistically simulate the impact, remediation, and recovery from cyber threats – all using existing business continuity infrastructure and processes. With CyberVR™, you can manipulate near-exact copies of a virtualized datacenter to identify your cybersecurity strengths and weaknesses. CyberVR™ helps you quickly recover operations should controls fail while maintaining critical evidence required for forensics and insurance. • Hunt for threats without impacting production • Exploit vulnerabilities to describe cyber risks in a business context • Assess risks of remediation steps and patches on business processes • Conduct cyber war-games using near-exact copies of production systems • Accelerate triage and threat containment • Exercise full-scale recovery without additional IT resources • Practice forensic techniques that satisfy insurance companies • Improve the alignment of your business continuity and cyber resilience teams SOLUTION BRIEF CyberVR VM2020 Solutions | [email protected] | +1 954-282-5135 Business Applications D u r i n g B e f o r e A f t e r Threat Hunting Exploitation Patching War Games Recovery Containment Triage Lessons Learned Forensics Vulnerability Remediation Testing

Upload: others

Post on 06-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MITIGATE CYBER RISK BEFORE, DURING AND AFTER INCIDENTS · MITIGATE CYBER RISK BEFORE, DURING AND AFTER INCIDENTS ... VM2020 brings cutting-edge technology and cyber resilience content

MITIGATE CYBER RISK BEFORE, DURING AND AFTER INCIDENTSTRANSFORM YOUR DISASTER RECOVERY SITE INTO A VIRTUAL CYBER RANGE

Prove Your Preparedness. Defend Yourself. Increase Your Confidence.

Identify what’s real, important, and dangerous

Benefits to End-Users, Consulting Firms, and Systems Integrators

CyberVR™ delivers simulation and sandboxing capabilities that end-users with different cyber risk management experience use to accelerate their development and improve their security posture.

For consulting firms and systems integrators, CyberVRTM is a unique tool offering built-in content and authoring capabilities. With CyberVR™, organizations can accelerate the pace at which their clients improve risk posture and verify their ability to reduce times to detection, containment and recovery—all while reducing operational costs and improving compliance.

VM2020 brings cutting-edge technology and cyber resilience content to enterprise risk management to let you realistically simulate the impact, remediation, and recovery from cyber threats – all using existing business continuity infrastructure and processes. With CyberVR™, you can manipulate near-exact copies of a virtualized datacenter to identify your cybersecurity strengths and weaknesses. CyberVR™ helps you quickly recover operations should controls fail while maintaining critical evidence required for forensics and insurance.

• Hunt for threats without impacting production

• Exploit vulnerabilities to describe cyber risks in a business context

• Assess risks of remediation steps and patches on business processes

• Conduct cyber war-games using near-exact copies of production systems

• Accelerate triage and threat containment

• Exercise full-scale recovery without additional IT resources

• Practice forensic techniques that satisfy insurance companies

• Improve the alignment of your business continuity and cyber resilience teams

S O L U T I O N B R I E F

CyberVR™

VM2020 Solutions | [email protected] | +1 954-282-5135

BusinessApplicationsD

uring

Before

After

Threat Hunting

Exploitation

Patching

War Games

Recovery

Containment

Triage

Lessons Learned

Forensics

Vulnerability Remediation

Testing

Page 2: MITIGATE CYBER RISK BEFORE, DURING AND AFTER INCIDENTS · MITIGATE CYBER RISK BEFORE, DURING AND AFTER INCIDENTS ... VM2020 brings cutting-edge technology and cyber resilience content

Before Cyber Incidents Occur: Prepare for Effective Defense

Feature Description

Threat Hunting and Vulnerability Assessments

Automatically deploy fully functional yet isolated copies of production systems. Safely launch built-in and third-party full-scale threat hunting tasks and obtain reports. Built-in capabilities include OpenVAS and Microsoft Baseline Security Analyzer.

ExploitationSafely exploit vulnerabilities to help describe cyber risks to executives in a precise business context. Validate tools and controls while developing skills, confidence and situational awareness of employees and contractors. The Metasploit mass exploitation framework can be automatically deployed by CyberVRTM.

Remediation and Patch Testing

Take advantage of the infinite maintenance windowTM and application instrumentation provided by CyberVRTM to reduce the time it takes to safely remediate vulnerabilities and prevent unintended consequences. Built-in functionality includes a mass credential re-issue exercise and built-in integration with Windows Server Update Services.

War Games and Tabletops

Enhance tabletop exercises with realistic simulations that build muscle memory and help reduce unnecessary improvisation during a real attack. Test the effectiveness of internal processes and third-party contractors.

During Cyber Incidents: Be Ready to React and Recover Quickly

Feature Description

TriageAutomatically deploy multiple points in time of your datacenter environment to identify root causes and assess damage. Augment tools and instrumentation in the triage environment to enhance diagnostic capabilities even when production systems are down.

Containment Select containment options, test actions for full-scale effectiveness, and avoid unintended consequences.

Recovery Fast recovery of the full environment to the desired point in time without destroying evidence required for forensics.

After Cyber Incidents: Analyze, Learn and Improve Your Defense

Feature Description

Forensics Automatically deploy desired full-scale point-in-time copies of environments with specialized tools and processes to determine the event sequence and failed controls that allowed the threat to materialize.

Lessons Learned Analyze and document findings of all previous activities to determine corrective actions and test their effectiveness with the help of CyberVRTM.

VM2020 Solutions | [email protected] | +1 954-282-5135

CyberVRTM in ActionBusiness applications and services are at the core of CyberVR™.

Find out when and why business services stop operating as a consequence of prevention, detection, exploitation, remediation, or recoverability tasks. CyberVRTM detects application status during simulations by using built-in or third-party instrumentation.

Page 3: MITIGATE CYBER RISK BEFORE, DURING AND AFTER INCIDENTS · MITIGATE CYBER RISK BEFORE, DURING AND AFTER INCIDENTS ... VM2020 brings cutting-edge technology and cyber resilience content

PROD VMs

FULLY ISOLATED NETWORK

Network

Primary Site Disaster Recovery Site

PROD Network

Full copy of PROD VMs with self contained

network and full backupsPoint-in-time

restorations of full drill environment

Teams for drills: Incident response, pen testers, security teams

Integrated instrumenation, exploits, scans, and application validations

Multi-RPO Replicas

VM2020 Solutions | [email protected] | +1 954-282-5135

Contact us for a demo and to help you select the CyberVRTM plan that works best for you.

CyberVR™

Key components of the CyberVR TM Simulation Platform

Component Description

Primary Site Site/Datacenter/Cluster where the production VMs run

Disaster Recovery Site Secondary/Target site where the production VMs are backed-up/replicated to

Multi-RPO ReplicasRemote backups or snapshots, that are fully independent from each other, and can be quickly restored to full VMs without impacting the integrity of the underlying data or the physical capacity of the storage

Full PROD VMRestored copies of the production VMs with embedded yet isolated networking to provide the networks needed by the VMs to communicate with each other. Local snapshots of th VMs are conducted during simulations making possible fast point-in-time restorations used during multi-path drill execution.

New Machine Group A point in time restoration of any group of VMs that was instantiated for a CyberVRTM simulation

InstrumentationPre-packaged content that can be deployed to any simulation, including but not limited to: OpenVAS, Metasploit, MBSA, amongst others. Additionally, CyberVRTM automatically performs any user-defined application health check during the lifecycle of any simulation.

ParticipantsMulti-disciplinary teams can safely connect to the isolated networks using the CyberVRTM screens or through the vCenter client. CyberVRTM takes advantage of native vSphere functionality to ensure flexible and safe access when needed.