[prev] [thread] [next] [lurker] [Date index for 2006/05/10]
<html> <head> <meta http-equiv="Content-Language" content="en-us"> <meta http-equiv="Content-Type" content="text/html; charset=windows-1252"> </head> <body> <font SIZE="2" face="Arial"></font> <p><font face="Arial" size="2">Skybox Security Solutions</font></p> <p><b><font face="Arial" size="2">Simulated DDoS Network Attacks and Network Intrusions</font></b></p> <p><font face="Arial" size="2"><b><span class="red_bold_headline">Customer Challenge</span>: </b><br> Large corporations often hire consultants to conduct quarterly penetration (DDoS) <br> testing on specific segments of their corporate network. This testing can cost over<br> hundreds of thousands of dollars, and also exposes the network to many potential <br> disruptions. These disruptions are the result of the intense DDoS attacks testers<br> can impose on live networks in order to isolate vulnerabilities and weaknesses.<br> Since the network is constantly changing, and DDoS attacks are rarely dispersed<br> from a centralized location, the penetration test results often become nullified and<br> end up being limited to a small portion of the total network.</font></p> <p><font face="Arial" size="2"><b>The Skybox Solution:<br> </b></font><font face="Arial"><span class="red_bold_headline"><font size="2">Skybox Security</font></span><font size="2"> performs accurate and non-intrusive DDoS attacks across a larger<br> portion of the corporate network. The tests are modeled and analyzed through an<br> automated process via our large botnet network rather than manually performed on a<br> live network. As a result, the tests are repeated rigorously on a scheduled basis <br> without any fear of network disruption. Through DDoS attack and access simulation, <br> vulnerability exposures as well as security control weaknesses are revealed instantly.</font></font><font size="2" face="Arial"><br> DDoS attack simulation discovers all possible attack scenarios and reveals the step<br> by step process that an attacker or worm may follow. It illustrates specific vulnerabilities<br> to be exploited and network access traversed for each exploitable path. Access simulation<br> calculates network access privileges determined by firewall and routing configuration.<br> Our botnet helps characterize the interconnectivity between any two given points, reporting<br> not just whether access is possible, but also the detailed path to reach a final destination.<br> Based on these combined results, security personnel are able to determine what additional<br> DDoS attacks are necessary and where to deploy our organizations penetration testers.</font></p> <p><b><font face="Arial" size="2">Awards:</font></b><font face="Arial" size="2"><br> Info Security - Info Security Hot Companies 2006</font><br> <font face="Arial" size="2">The Wall Street Journal - One of the most innovative companies in 2005</font><br> <font face="Arial" size="2">Information Security Magazine - Product of the year </font><br> <font face="Arial" size="2">Network Magazine - Most Visionary Security Product </font><br> <font face="Arial" size="2">Network Magazine - Best of the Best in all categories </font><br> <font face="Arial" size="2">Secure Enterprise Magazine - Editor's Choice </font> <br> <font face="Arial" size="2">Gartner - " Cool Vendor " in the security & privacy space </font><br> <font face="Arial" size="2">SC Magazine Awards 2006 Winner - The Best Security Solution for Financial Services</font><br> <font face="Arial" size="2">IM2005 Award finalist - Information Security and Product of the Year</font><br> </p> <ul> </ul> <b><font face="Arial" size="2">Company Profile:</font></b><span class="blue_bold_headlineCopy"><br> <font size="2" face="Arial">Eran Reshef</font></span><font size="2" face="Arial"> <br> <span class="blue_bold_headlineCopy">Founder, Chairman & CEO of Blue Security</span> ( <a href="http://www.bluesecurity.com">www.bluesecurity.com </a>) <br> <br> A serial entrepreneur, Eran is currently the founder, chairman & CEO of Blue Security,<br> the do-not-disturb registry pioneer. Prior to Blue, Eran co-founded Skybox Security and<br> served as its Chairman. Prior to Skybox Eran founded and managed Sanctum (acquired<br> by WatchFire), the leader in web application security. Eran holds a variety of security-<br> related patents that are based on his inventions. </font> <p class="copy"><font face="Arial" size="2"> <span class="blue_bold_headlineCopy">Rina Shainski</span> <br> <span class="blue_bold_headlineCopy">General Partner at Carmel Ventures</span> ( <a href="http://www.carmelventures.com">www.carmelventures.com </a>) <br> <br> Following a successful career leading business development and R&D operations in <br> high-growth software companies, Rina has been investing in software companies ever since.<br> Before joining Carmel she served as the VP Business Development at Clal Industries and <br> Investments where she was responsible for software investments. From 1989 to 1996, Rina<br> held several managerial positions in Tecnomatix including VP Business Development and <br> R&D Director. Rina serves on the boards of Followap Communications, Skybox Security,<br> mFormation and Silicon Design Systems. Rina holds a B.Sc. degree in Physics from Tel <br> Aviv University and a Master of Science degree in Computer Science from Weizmann Institute. </font></p> <p class="copy"><font face="Arial" size="2"><b>Contact Information:</b><br>2077 Gateway Place, Suite 550 <br> San Jose, California 95110 USA <br> Phone: 866-6SKYBOX<br> Phone: 408 441 8060<br> Fax: 408 441 8068</font></p> <p class="copy"><font face="Arial" size="2">Regional Offices (Israel) <br> 60 Medinat Hayehudim St. <br> P.O.Box 4109 <br> Herzliya Pituach 46140 Israel<br> Phone: +972-9-9545922<br> Fax: +972-9-9545933</font></p> </body> </html>
Generated at 02:00 on 13 May 2006 by mariachi 0.52