Cyber Security

Cyber security
people-image

We Ankor’s cyber security division operates since 2000 and offers a variety of unique, advanced and creative targeted services and solutions for the cyber world that is always situated in danger. All solutions offered are subject to a series of intensive exams by field’s leading professionals and are elected only after proven to be reliable, efficient and optimally suiting market’s needs.

 

Our customers enjoy a personally suited security coverage made for their specific requirements by an accurate characterization and planning process of their business needs and as an answer to their relevant, cyber security and cloud organizational risks in the best, most efficient and creative manner. Our cyber security services create a full and bidirectional integration between the different solutions, and enable to produce the utmost efficiency and highest standard protection.

Our Partners

zscaler logo og
crowdstrike - logo
05 jc oceanblue stacked tm
Cisco_logo
wiz logo F7516DE86C seeklogo.com
Okta - logo
elastic logo H full color
Talon logo
Organization Implementation of SIEM Solutions
ArcSight Solutions

We Ankor specializes in SIEM – Security Information and Event Management systems implementation in organizations for over 15 years.

SIEM systems enable to manage events and information security data, provide information, alerts and real-time analysis (according to rules set in advance), and enable to recognize suspicious abnormal activities, produce periodic reports for regulative and standards requirements, and – follow organizational orientations. Due to the ability to choose scenarios, it is possible to crosscheck data of different systems to produce an overall organizational real-time status report compared to other time periods. Implementing the solution within organizations enables event management up to closure and following of event history, including resuming events automatic replies without any intervention of an additional source.

SIEM systems provided by us are based upon Arcsight and implemented in most of Israeli enterprise organizations. We recruited an excellent unique team of experts (the largest EMEA SIEM team) that leads the market since 2003 with a large variety of installations, comprehensive experience allowing short implementation periods and a high-quality solution, and most importantly – dozens of satisfied customers.

illustration-ArcSight-Solutions
illustration -MSSP-Solutions
SIEM / SOC Managed Solutions
MSSP Solutions

The managed SIEM-SOC service is designated for the search and management of information security events. The managed control center (SIEM/SOC) is occupied 24/7 with a staff of analysts and cyber security experts and enables the monitoring of the organizational surrounding using advanced tools searching and detecting irregular events and cyber-attacks within the organization.

ArcSight
The ArcSight – SIEM systems at our control center are based upon data from IT and information security systems, as well as data of business and operational systems. They perform a general inspection as well as compensational inspection, and provide automatic answers to events with no need for an intervention of any additional source, enable them to locate, identify and manage information data security events and improve the intelligence abilities (RepSM). Using ArcSight organizations may receive real-time alerts and analysis (according to rules set in advance), identify suspicious abnormal activities within the organization, produce periodic reports that also fulfill regulative and standards requirements, and of course – follow organizational orientations.

In addition, we provide security services as a managed service based upon a variety of other systems. For instance, the Okta system enables the management of access inspection and users’ management with the use of cloud services, and is managed for the customer by our MSSP team. Furthermore, the endpoints security system – EDR CrowdStrike implemented on customers’ premises, and is managed, including treatment of security events, by our MSSP center

SIEM / SOC Managed Solutions
MSSP Solutions

The managed SIEM-SOC service is designated for the search and management of information security events. The managed control center (SIEM/SOC) is occupied 24/7 with a staff of analysts and cyber security experts and enables the monitoring of the organizational surrounding using advanced tools searching and detecting irregular events and cyber-attacks within the organization.

ArcSight
The ArcSight – SIEM systems at our control center are based upon data from IT and information security systems, as well as data of business and operational systems. They perform a general inspection as well as compensational inspection, and provide automatic answers to events with no need for an intervention of any additional source, enable them to locate, identify and manage information data security events and improve the intelligence abilities (RepSM). Using ArcSight organizations may receive real-time alerts and analysis (according to rules set in advance), identify suspicious abnormal activities within the organization, produce periodic reports that also fulfill regulative and standards requirements, and of course – follow organizational orientations.

In addition, we provide security services as a managed service based upon a variety of other systems. For instance, the Okta system enables the management of access inspection and users’ management with the use of cloud services, and is managed for the customer by our MSSP team. Furthermore, the endpoints security system – EDR CrowdStrike implemented on customers’ premises, and is managed, including treatment of security events, by our MSSP center

illustration -MSSP-Solutions
DDoS Protection
Distributed Denial of Service Attacks

DDoS attacks are well known within organizations. The simple fact is that almost any type of smart device connected to the internet may become a potential DDoS victim: IoT devices, smartphones, personal computers, and servers. DDoS attack damage potential creating an overload on resources, may shut down an organization if not correctly prepared.

We Ankor cooperates with the global Akamai company to provide advanced organizational cloud-based solutions, including advanced and effective multi-layer protection. The systems’ comprehensive protection abilities make the We Ankor and Akamai’s solution a powerful tool offering the necessary desired protection to keep internet-depended performances and their availability

illustration - DDoS-Protection
illustration- WAF-protection
WAF Protection
Web Application Firewall

As long as the world grows more and more dependent on internet apps, the validity of such apps becomes a larger threat to organizations’ productivity and security. WAF – Web Application Firewall is therefore an essential and necessary tool to protect from fast and dynamic threats that characterize the cyber world.

We Ankor’s WAF services provide effective protection from malicious attacks aiming to extract sensitive information from the database (SQL injection), malicious files, cross-sites scripts and other attacks which allow hackers easy access to organizational data and enable attackers to perform damaging manipulations.

WAF system based on Akamai’s cloud efficiently protects from such threats, provides a firewall for applications and helps keep high performances. The system, together with DDoS prevention capabilities provides a full protection, availability and completeness of the organization’s websites and online apps.

WAF Protection
Web Application Firewall

As long as the world grows more and more dependent on internet apps, the validity of such apps becomes a larger threat to organizations’ productivity and security. WAF – Web Application Firewall is therefore an essential and necessary tool to protect from fast and dynamic threats that characterize the cyber world.

We Ankor’s WAF services provide effective protection from malicious attacks aiming to extract sensitive information from the database (SQL injection), malicious files, cross-sites scripts and other attacks which allow hackers easy access to organizational data and enable attackers to perform damaging manipulations.

WAF system based on Akamai’s cloud efficiently protects from such threats, provides a firewall for applications and helps keep high performances. The system, together with DDoS prevention capabilities provides a full protection, availability and completeness of the organization’s websites and online apps.

illustration- WAF-protection
Access Control & Identity Management
Identifications Management and Users Verification

The digital age require organizations to engage with dozens of apps – some on-premise and some are cloud-based – without ensuring users’ identification or whether the user is permitted access and authorized to use the service. In addition, employees are required to keep inserting passwords and engage in complicated verification processes on every login or application launching, turning work continuity difficult.

Since data, personal details and passwords theft phenomena regularly escalates, information security (before providing organizational data access) is the key to organizational basic protection. We Ankor provides identification management, user verification and access inspection services for clouds. The offered solution is based upon of the technology from Okta– a worldwide leading company in the identification management and user verification. Okta provides a cloud based unified platform, to manage organizations’ identifications for all users, any device and every organizational app.

The system operates with optimal efficiency to manage identifications and access inspection using secure identification (including SSO abilities and Multi Factor Authentication) and provides full atomization for creating and/or removing users from the organizational resources, along with immediate response-ability if an account is damaged

illustration
illustration - Big-Data
Big Data
Big Data Does Not Have to Become a Big Deal

Modern times create an enormous amount of information that is collected by companies (both on-premise and on-cloud)resulting  with great and different challenges. Starting with hoarding, management, storage and real-time analysis of an immense amount of data, through to the formulation of business insights that will provide them with competitive advantages in the market, and up to information security and access inspection and protection of its reliability and completeness.

We Ankor customers enjoy all of the advantages of our deep acquaintance with the field, thus enabling a real business advantage for organizations – starting with an accurate analysis of the organization’s needs, through to choosing the suiting technology, and up to fast and quality implementation.

We Ankor has strategic partners of field’s leading companies: Elastic, a company offering world’s most advanced infrastructure for intrinsic and extrinsic data search in Big Data configuration and representation of operational database to the Big Data worlds.

The use of Big Data Analytics based on Elastic’s search improves the abilities to identify abnormal user engagement, improves reporting abilities (reports), visualization abilities of security events and enables to receive the full picture in real-time.

We also partner with DATASTAX that develops Apache Cassandra based database management systems that enable fast calculation and search while maintaining full availability and utmost growth and flexibility abilities

Big Data
Big Data Does Not Have to Become a Big Deal

Modern times create an enormous amount of information that is collected by companies (both on-premise and on-cloud)resulting  with great and different challenges. Starting with hoarding, management, storage and real-time analysis of an immense amount of data, through to the formulation of business insights that will provide them with competitive advantages in the market, and up to information security and access inspection and protection of its reliability and completeness.

We Ankor customers enjoy all of the advantages of our deep acquaintance with the field, thus enabling a real business advantage for organizations – starting with an accurate analysis of the organization’s needs, through to choosing the suiting technology, and up to fast and quality implementation.

We Ankor has strategic partners of field’s leading companies: Elastic, a company offering world’s most advanced infrastructure for intrinsic and extrinsic data search in Big Data configuration and representation of operational database to the Big Data worlds.

The use of Big Data Analytics based on Elastic’s search improves the abilities to identify abnormal user engagement, improves reporting abilities (reports), visualization abilities of security events and enables to receive the full picture in real-time.

We also partner with DATASTAX that develops Apache Cassandra based database management systems that enable fast calculation and search while maintaining full availability and utmost growth and flexibility abilities

illustration - Big-Data
EDR
Endpoint Detection and Response

Even the most protected layer suffers breaches and cyber threats, which is why technology’s cutting-edge solutions are crucial for strengthening vulnerable spots within the organization. EDR is an overall name for a variety of tools focusing on identifying, investigating and treatment of suspicious activities and information data security challenges at the workstations, servers, guest computers and endpoints at the organizational network.

We Ankor offers its customers an advanced security EDR and EPP solutions. Our services offer the next generation of endpoints and servers security and enable an automatically and fast locating of cyber threats events, prevent attacks and investigate events comprehensively.

We provide smart platforms and technologies such as Crowdstrike, ENDGAME, Cynet ECAT that enable full replacement of existing Antivirus systems, and prevention of standard and advanced attacks (including Zero Day Attacks), as well as an efficient thorough inquiry of each event

illustration - EDR
Talon

Talon Cyber Security is modernizing security programs and improving user experiences for hybrid work by delivering the first secure access browser, that delivers native features like authentication, data loss prevention, Zero Trust controls, and more. 

Our customers leverage Talon to gain visibility into and secure SaaS applications, web activity, and managed and unmanaged devices. Built on Chromium, Talon-Work ensures employee privacy and delivers native high-quality user experiences needed to securely power the future of work.

Talon

Talon Cyber Security is modernizing security programs and improving user experiences for hybrid work by delivering the first secure access browser, that delivers native features like authentication, data loss prevention, Zero Trust controls, and more. 

Our customers leverage Talon to gain visibility into and secure SaaS applications, web activity, and managed and unmanaged devices. Built on Chromium, Talon-Work ensures employee privacy and delivers native high-quality user experiences needed to securely power the future of work.

MDR
Managed Detection & Response

Managed & Response Detection, or in short – MDR – includes a few crucial organizational tools. Starting with identifying and preventing malicious network activities, through to their investigation and execution of forensic identification to determine the main cause, up to delivering the response to ease the situation. Such solutions assist organizations to maintain away from threats that are not malicious software, such as hacking and system penetration, misuse of photos and information, suspicious movements, data screening and more.

We Ankor offers advanced MDR services based on the technology of leading cyber security firms, companies such as Armis and RSA. The systems map and analyze  all organizational network components, detect unusual events within servers, workstations and IoT components, and act to prevent them. The systems map all of network’s components, creates inventory, and enable to perform a full and efficient inquiry while using ML (Machine Learning) and to fast locate and identify abnormal activity (Anomaly) within the network and company’s system, and minimize or even prevent the effect on the organization.

The company also offers Deception solutions. Our partnership with TrapX enables us to provide an advanced security solution based upon preliminary alert abilities and prior attack detection, while using traps and misleading the attacker

illustration - MDR
talking_image

For professional consulting and further information

contact us for for additional information

Let's Talk