Taking Cyber Defence technology a step forward

Taking Cyber Defence technology a step forward

This post is also available in: heעברית (Hebrew)

16861154_mSkillful hackers’ cyber attacks are getting more and more common in today’s technological world. Just a few days ago, such an attack brought down the official website of the U.S. Army, and last December chinese hackers managed to break federal defence systems and information archives, the U.S. goverment claims, and reach important financial information on approximately 4 million employees of U.S. official authorities in the past and present.

In light of the Israeli-Palestinian conflict and Israel’s international status, it seems that Israeli companies see themselves as under attack, or at least under a potential one. This feeling isn’t completely divorced from reality, as each year there is an OpIsrael, where hackers from all over the world attack Israeli bodies and affiliates. The israeli S.Shastovich company saw itself as under such potential attack and so took the appropriate protection measures. But it seems that it isn’t always enough.

Cyber malware continues to evolve and upgrade constantly, thus leaving the bodies under attack to face a new danger each time. In a sort of a counter-attack, security defence comapnies are also improving their defence abilitiy softwares.

Shastovich acquired from IBM the Trusteer Apex defence system which was designed to secure the sensitive communication in the company’s 200 computers using SAP applications. In the israeli company’s surprise, in spite all of the defence measures it took, the system revealed a significant number of malwares assimilated into the company’s information systems were discovered, revealing valueable and sensitive information to the cyber attacker.

The software gives multi-layered protection by breaking the chain of attack, which makes for more effective protection from theft of usernames and passwords that give access to the organization network, breaking processes that take advantage of software breaches, locating and treating malwares on end stations, efficient and unique blocking of JAVA code and preventing external communication of malware trying to communicate with the attacking body and steal information.

Trusteer Apex was developed by the Israeli Trusteer company and is a local protection of work stations with the support of IBM-Trusteer experts. It can uniquely defend against Zero-Day Threats, which are very hard to defend from as they aren’t known in advance. It seems, then, that the company could now defend the sensitive information flowing through its’ system and operate more calmly.