Overview VISInsight
  • BOD

    View project situation in the company
    Review, approve necessary documents

  • QA

    View, monitor project information
    Support PM completes the target
    Collect data analysis, build target for the organization

  • Software production department

    Create procedures for opening and closing projects
    Create a report
    Monitoring
    Resource Management

  • IT Support

    Decentralization for the project
    Backup/ recovery’s server folder

  • HR

    Department information management
    Employee information management

  • Sales

    Create customer information
    Bidding information management

Function list

  • Manager Project Bidding

  • Weekly Report

  • Project Opening (submit, review, approve)

  • Resource Reports

  • Redmine members Synchronize

  • OT Registration

  • Estimation Importing

  • Members Management

  • Requirements Importing

  • Departments Management

  • Requirements Synchronization

  • Project Opening Decision

アメリカ国防総省、空軍、国土安全保障省なとて導入済み!

テレワークのデバイス環
境をセキュアに保つ

従来のセキュリティ対策ソフトでは対応できないサイバー攻撃を阻止!
  • クラウドとオンプレミス いすれにも対応
  • 強力なすべての機能を 1つのセンサーに バッケージ化
  • CPU 1 % 20M3 AMで負荷がかからない

高精度
アルゴリズム

膨大なデータをあらゆる角度から深く分析、サイバー攻撃の兆候をリアルタイムに検知・可視化し、標的型攻撃などの高度なサイバー攻撃を阻止します。

Veramine Endpoint Detection日れdRes 0れse (VEDR)

全てのエンドボイントをリアルタイムに監視

企業が保有する数多くのエンドボイントに対し、マルウェアの感染や攻撃を検知し、影響範囲を特定、早期対応を実現します。

Veramine P′Odu( ⅵ MOれ0 ng r00 (VPMT)

Deception
テクノロジー

おとり環境へ標的型サイバー攻撃を誘導し攻撃者を・騙す”ソリューションで攻撃を 阻止します。

Veramine DynamicDeception System (VDDS)

内部のセキュリティ違反
もすぐ検知

あらゆるアクテイヒティをモ二タリングし悪意のあるすべての操作を検知できます。

Veramine引de′ TわヨtPレeれ0 (VITP)

昨今は、ゼロディ攻撃、標的型攻撃といった巧妙な手口を用いたサイバー攻撃が増えており、従来のセキュリティ対策ソフト(EPP)では攻撃を防ぐことが難しくなっています。
Veramineは、会社が保有する全てのPC・ノートパソコン・サーバーの挙動を包括的にモニタリングすることができます。個々のデバイスではなく複数デバイスのデータを関連付けて分析するため、インシデント発生時にも感染経路や感染範囲を素早く特定し、被害を最小限に抑えることができます

Features of Products and Services

Data Collection and Monitoring

Data Quality: Variety. Detailed. Structured. Real Time. Small Traffic. Security-related activities: Process, Registry, System Security, Network, User, SMB, Binaries, AMSI…

Flexible collection policies: admins can select what data to collect. Adaptive filter: sensors smartly don’t send irrelevant high-volume events to servers, that can filter out TB’s of traffic sent and processed by sensors and servers.

External and Insider Threats Prevention with Advanced Monitoring on Data, Devices and Users, such as Key loggers, Video and Screenshot captures, Activities of Browsing-Email-SMB, USB Management Logged Tracking and Access Control Policies (Blocked, Read-Only, or Read-Write), User sessions, User and Entity Behavior Analytics (UEBA)
—–



Detection and Deception

Detect attack tactics and techniques in https://attack.mitre.org/wiki/Technique_Matrix.

More collected data types allow more data analysis algorithms, combining rule-based and machine learning, resulting in better Detection. Examples: SMB data allows detecting Lateral Movement and Insider Threats; Precise Elevation of Privilege (EOP) detection by collecting security tokens; Lsass process open allows detecting credentials and passwords dumping (Mimikatz); Command arguments allow detecting Malicious Powershell intrusions…

Deception is an Active Defense approach, whereas most existing approaches are Passive Defense. Platform of Traps, put along the kill chain, to cheat, detect and prevent intrusions. Capable of making every computer (physical or \/M) a honeypot, in IT Systems. Uniquely offered by Veramine.

Deceptive services, processes, files, mutexes, credentials, network listeners, data shares, registry helper, VMs… Track intruders’ activities, and limit things they can do, with the traps. E.g. WannaCry checks a mutex to decide if a system is already infected, and we can set such a deceptive mutex.



Incident Response and Forensics


Yara Search on Memory and Files. Memory dumps are at fingertips. Collected data is searchable using flexible logical expressions. All executable binaries are col ected for forensics.

Veramine have most Response Actions, from Binaries, Users, Hosts to Processes. E.g. Network Quarantine, Process Suspend/Terminate, User Disable/Disconnect, Host Sleep/Shutdown/Restart, Binary Block, Scan with Virus Total…

Forensics with Velociraptor to collect various built-in or customized artifacts from multiple endpoints in real-time from centralized portal. VQL, similar to SQL, allows collection tasks to be quickly programmed, automated and shared, so that turn-around from IOC to fu I hunt can be a few minutes. E.g. VQL to search and collect fi es in users’ temp directory which have been created within the last week.




Performance, Deployment, Integration and Management

Veramine sensors on average take less than 1% CPU and 20 MB RAM, network traffic is less than 30 MB/day/host, and can be further tuned using col ection policies. Easy deployment to the whole network such as using AD, SCCM or psexec.

Integration with S EM, VDI, LDAP, AD, 2-fact Authen, APIs. Sensor Emergency & Autoupdate. Server: Multisite and audited.



Training and Education

Veramine Founders

– authored a number of books, such as “Practical Reverse Engineering” best rated on Amazon.com

– spoke and trained at most respected venues Black Hat, Recon, CCC, NATO…