15.01.2015 Views

Pramid Brochure - Pyramid Cyber Security & Forensic

Pramid Brochure - Pyramid Cyber Security & Forensic

Pramid Brochure - Pyramid Cyber Security & Forensic

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Digital Crime, Fraud Investigation &<br />

<strong>Forensic</strong> Services<br />

About <strong>Pyramid</strong><br />

<strong>Pyramid</strong> <strong>Cyber</strong> <strong>Security</strong> & <strong>Forensic</strong><br />

(P) Limited www.pyramidcyber.com<br />

is an ISO 9001-2008 and ISO 27001-<br />

2005 certified boutique Digital<br />

<strong>Forensic</strong> & specialized Information<br />

<strong>Security</strong> Solutions & Services<br />

Company that helps customers in<br />

Enterprises and Law Enforcement<br />

Agencies to identify, prevent, detect,<br />

resolve and protect from “Digital”<br />

threats, crimes, frauds and acts of<br />

terrorism arising due to vast<br />

proliferation and usage of Digital &<br />

Communication applications, assets<br />

and artifacts in our personal and<br />

professional lives.<br />

Solutions & Services<br />

• Digital <strong>Forensic</strong>s<br />

• e-Discovery<br />

• Incident Response<br />

• SIEM<br />

• Information Rights<br />

Management<br />

<strong>Pyramid</strong> is credited with setting up<br />

some of the most modern and<br />

prestigious Digital <strong>Forensic</strong> Labs for<br />

various Law Enforcement Agencies<br />

(LEA) in India including, CBI, State<br />

Police, Directorate of <strong>Forensic</strong><br />

Science, Intelligence Bureau, Indian<br />

Defense etc. to name a few.<br />

Those who do not want to approach<br />

LEA at the first instance, <strong>Pyramid</strong><br />

provides corporate and private<br />

Digital <strong>Forensic</strong> investigation<br />

services via its first responders and<br />

high technology digital crime &<br />

fraud investigation centre equipped<br />

with most relevant Digital <strong>Forensic</strong>,<br />

crime and fraud investigation tools<br />

to cater to the needs of enterprises,<br />

legal firms and individuals.<br />

For more information on any of our<br />

products or services please write to<br />

us at contact@pyramidcyber.com<br />

Contact us if you find yourself in the following situation!<br />

• You need evidence from a computer system, mobile, storage or any<br />

digital device or system to support your investigations<br />

• You suspect fraud, bribery or corruption in your corporate unit<br />

• You are facing frequent security breaches, attacks and incidences in<br />

your information infrastructure<br />

• You suspect leakage of information or theft of intellectual property<br />

from your department or organization<br />

• You suspect your company’s privacy, security or confidentiality<br />

policies have been violated<br />

• You need a proactive computer usage policies and guidelines in<br />

place in other to prevent computer misuse and to protect your data<br />

from cyber attacks<br />

• You need to protect and prevent misuse of customer and company<br />

sensitive and critical information even if it goes out of your<br />

organization<br />

• You need to put together a Computer <strong>Security</strong> Incident Response<br />

plan & team<br />

• You need to set up Digital <strong>Forensic</strong>s Lab in your organization or<br />

your firm<br />

• You are involved in litigations (domestic, corporate; civil or<br />

criminal) and you need evidence from computer or any digital<br />

device to support your claims<br />

• You need computer forensics expert witness to present unbiased &<br />

scientific opinion and to clarify the complexities of digital evidence<br />

to the courts or a jury<br />

• You need to investigate Software, Music and IP piracy.<br />

• You need awareness & practical training in computer forensics,<br />

mobile forensics, incident response, cyber intelligence analytics and<br />

latest IT Act.


High Technology Crime Investigation Centre<br />

& Digital <strong>Forensic</strong> Laboratory<br />

About <strong>Pyramid</strong><br />

<strong>Pyramid</strong> <strong>Cyber</strong> <strong>Security</strong> & <strong>Forensic</strong> (P)<br />

Limited www.pyramidcyber.com<br />

is an ISO 9001-2008 and ISO 27001-2005<br />

certified boutique Digital <strong>Forensic</strong> &<br />

specialized Information <strong>Security</strong><br />

Solutions & Services Company that helps<br />

customers in Government, Law<br />

Enforcement & Enterprises to identify,<br />

prevent, detect, resolve and protect from<br />

“Digital” threats, crimes, frauds and acts<br />

of terrorism arising due to vast<br />

proliferation and usage of Digital &<br />

Communication applications, assets and<br />

artifacts in our personal and professional<br />

lives.<br />

Total <strong>Forensic</strong> Solution<br />

First Responder Kits<br />

Hard Disk, CD/DVD<br />

Recovery<br />

Write Blocker Kits<br />

Turnkey Solutions<br />

• Computer <strong>Forensic</strong> Acquisition and<br />

Analysis<br />

• Mobile and PDA <strong>Forensic</strong>s<br />

• <strong>Cyber</strong> Crime First Responder Kits<br />

• Audio & Video Analysis and<br />

<strong>Forensic</strong>s<br />

• Voice Biometric<br />

• Network <strong>Forensic</strong>s<br />

• Password Recovery<br />

• CDR, Social Media & Crime Pattern<br />

Analysis<br />

• Steganography<br />

• Email Tracing, Discovery and<br />

Analysis<br />

• CD/DVD/ Hard Disk recovery<br />

• Internet, Data and Content<br />

Interception, Monitoring and<br />

Analysis<br />

<strong>Forensic</strong> Analysis & Triage<br />

Voice Biometric<br />

Password Recovery<br />

Steganography<br />

<strong>Pyramid</strong> sets up <strong>Cyber</strong> Crime<br />

Investigation Centers and Digital<br />

<strong>Forensic</strong> Laboratories on a turnkey basis<br />

right from Concept, Design, Supply,<br />

Implementation, Commissioning,<br />

Training, Maintenance and<br />

Management.<br />

<strong>Pyramid</strong> is credited with setting up some<br />

of the most modern and prestigious<br />

Digital <strong>Forensic</strong> Labs for various Law<br />

Enforcement Agencies (LEA) in India<br />

including, CBI, State Police, Directorate<br />

of <strong>Forensic</strong> Science, Intelligence Bureau,<br />

Indian Defense etc. to name a few.<br />

Contact Us<br />

Email: contact@pyramidcyber.com<br />

Mobile: +91-9650894671<br />

Fax: +91-11-26322980<br />

Website: www.pyramidcyber.com<br />

Mobile <strong>Forensic</strong> Solutions Email Analysis & e-discovery Network <strong>Forensic</strong>s<br />

Call Data, Social Media Analysis Audio-Video Analysis Internet Interception


Information Theft, Leakage Protection and<br />

Rights Management<br />

About <strong>Pyramid</strong><br />

<strong>Pyramid</strong> <strong>Cyber</strong> <strong>Security</strong> & <strong>Forensic</strong> (P)<br />

Limited www.pyramidcyber.com<br />

is an ISO 9001-2008 and ISO 27001-<br />

2005 certified boutique Digital<br />

<strong>Forensic</strong> & specialized Information<br />

<strong>Security</strong> Solutions & Services<br />

Company that helps customers in<br />

Government, Law Enforcement &<br />

Enterprises to identify, prevent, detect,<br />

resolve and protect from “Digital”<br />

threats, crimes, frauds and acts of<br />

terrorism arising due to vast<br />

proliferation and usage of Digital &<br />

Communication applications, assets<br />

and artifacts in our personal and<br />

professional lives.<br />

Information <strong>Security</strong><br />

Solutions &Services<br />

Using standards based processes,<br />

methodologies and tools <strong>Pyramid</strong>’s<br />

Information <strong>Security</strong> experts help its<br />

customers in protecting the<br />

confidentiality, integrity and<br />

availability of information.<br />

• Identity Management<br />

• Information Assurance<br />

Services<br />

• IS Audit & Remediation<br />

• Vulnerability and<br />

Penetration Testing<br />

• Incident Response & e-<br />

discovery<br />

• Unified Threat Management<br />

• Data Leak Prevention<br />

• Information Rights<br />

Management<br />

• <strong>Security</strong> Information Event<br />

Management<br />

<strong>Pyramid</strong> solutions & services helps<br />

government and enterprises in<br />

prevention, protection and resolution<br />

from threats & attacks, leakage of<br />

sensitive & confidential information<br />

and data.<br />

Contact Us<br />

Email: contact@pyramidcyber.com<br />

Mobile: +91-9650894671<br />

Fax: +91-11-26322980<br />

Website: www.pyramidcyber.com<br />

Information Theft, Leakage, Protection and Regulatory nightmare!<br />

As enterprises become more and more distributed, the need to control usage of<br />

information across the enterprise is increasing. Typical problems faced are<br />

Information misuse: Information shared with employees and business partners is<br />

frequently misused.<br />

Internal information theft: Stolen laptops, mobiles, corporate espionage and employees<br />

joining competition are increasingly costing businesses by way of information loss<br />

External information theft: Misuse and leaks happen when information leaves the<br />

enterprise boundaries. Customers and vendors contribute to an increasing number of<br />

information thefts for organizations.<br />

Managing collaboration with security: Achieving collaboration whilst maintaining<br />

security of digital information is a tough task.<br />

Monitoring & regulatory compliance: Most regulatory frameworks like Sarbanes Oxley<br />

(404), ISO(27000-1), GLBA etc. mandate the audit and control of information as it flows<br />

within and outside enterprise boundaries. Given that most information is in the form of<br />

documents, this activity is nearly impossible with the present systems.<br />

The Solution<br />

<strong>Pyramid</strong> has partnered with Seclore is an Enterprise Information Rights Management<br />

(IRM) company providing risk mitigation from information leakages whilst enhancing<br />

collaboration and Data <strong>Security</strong>.<br />

Seclore File Secure allows enterprises to achieve the "mutually conflicting" goals of<br />

security and collaboration by breaking down traditional tenets of information security<br />

via distribution control.<br />

• Define Information Usage Policies<br />

o WHO can use the information i.e. people / groups within or outside of the enterprise<br />

o WHAT can each person do with the information i.e. read / edit / print / distribute / copy etc.<br />

o WHEN can each person access the information i.e. within certain dates, within a time span<br />

o WHERE can the information be accessed from i.e. specific computers, within the office.<br />

• Attach Policies To Individual Pieces Of Information<br />

Information can be protected:<br />

o As soon as it is created based on a user driven prompts or predefined settings<br />

o As soon as it is placed in a certain location e.g. folders / file shares<br />

o As soon as it is attached to an email<br />

o As soon as it is uploaded to a document / content management system<br />

o As soon as it is created ( e.g. reports ) within a transactional system<br />

o As soon as it is "discovered" or "tagged" by a content discovery or a DLP system<br />

o Just before information leaves your network ( via email/web )<br />

• Control Usage of the Policy Governed Information<br />

• Audit the Usage of The Information.


<strong>Security</strong> Information Event Management<br />

(SIEM)<br />

About <strong>Pyramid</strong><br />

<strong>Pyramid</strong> <strong>Cyber</strong> <strong>Security</strong> & <strong>Forensic</strong> (P)<br />

Limited www.pyramidcyber.com<br />

is an ISO 9001-2008 and ISO 27001-2005<br />

certified boutique Digital <strong>Forensic</strong> &<br />

specialized Information <strong>Security</strong> Solutions<br />

& Services Company that helps customers<br />

in Government, Law Enforcement &<br />

Enterprises to identify, prevent, detect,<br />

resolve and protect from “Digital” threats,<br />

crimes, frauds and acts of terrorism arising<br />

due to vast proliferation and usage of<br />

Digital & Communication applications,<br />

assets and artifacts in our personal and<br />

professional lives.<br />

Information <strong>Security</strong><br />

Solutions &Services<br />

Using standards based processes,<br />

methodologies and tools <strong>Pyramid</strong>’s<br />

Information <strong>Security</strong> experts help its<br />

customers in protecting the confidentiality,<br />

integrity and availability of information.<br />

• Identity Management<br />

• Information Assurance Services<br />

• IS Audit & Remediation<br />

• Vulnerability and Penetration<br />

Testing<br />

• Incident Response & e-<br />

discovery<br />

• Unified Threat Management<br />

• Data Leak Prevention<br />

• Information Rights<br />

Management<br />

• <strong>Security</strong> Information Event<br />

Management<br />

• Location Based Services<br />

<strong>Pyramid</strong> solutions & services helps<br />

government and enterprises in prevention,<br />

protection and resolution from threats &<br />

attacks, leakage of sensitive & confidential<br />

information and data.<br />

Contact Us<br />

Email: contact@pyramidcyber.com<br />

Mobile: +91-9650894671<br />

Fax: +91-11-26322980<br />

Website: www.pyramidcyber.com<br />

Intelligently identify and mitigate cyber threats and risks!<br />

Enterprises and Government agencies need to proactively safeguard digital assets<br />

comply with corporate and regulatory policy and control the internal and external risks<br />

associated with cyber theft, cyber fraud, cyber warfare and cyber espionage.<br />

SIEM technology provides real-time analysis of security alerts generated by network<br />

hardware and applications. Our SIEM solution comes as software, appliances or<br />

managed services, and is also used to log security data and generate reports for<br />

compliance and forensic purposes.<br />

Our SIEM solution have capabilities of gathering, analyzing and presenting information<br />

from network and security devices; identity and access management applications;<br />

vulnerability management and policy compliance tools; operating system, database and<br />

application logs; and external threat data. The focus is to monitor and help manage user<br />

and service privileges, directory services and other system configuration changes; as well<br />

as providing log auditing and review and incident response.<br />

Simple, fast, cost effective Log Management!<br />

Why care about log management Well, the sheer amount of log data is growing daily.<br />

Every desktop, every firewall, every application, database, server, VPN, every IT asset<br />

generates a log, and the number of assets is growing rapidly. And, with more users<br />

accessing those assets, log data just explodes. So, Logger is a foundation component of<br />

our SIEM platform.<br />

Organizations want to bring more and more logs into the log management<br />

infrastructure. To address the growing use cases and management challenges for<br />

enterprise log data, the logger is capable of capturing and analyzing all enterprise log<br />

data while providing a compressed, cost effective and self managing log repository.<br />

Correlation helps Find Needles in the Haystack!<br />

Our SIEM Solution provides the correlation infrastructure to help identify the meaning<br />

of any given event by placing it within context of who, what, where, when and why that<br />

event occurred and its impact on business risk. The user model that natively understands<br />

identities, roles and groups, and all the accounts that individuals within the organization<br />

use. The user model also allows administrators to correlate common identifiers like email<br />

addresses, login ids and user accounts, and to report on all actions a user has taken<br />

across systems, applications, accounts and IP addresses.


SOLUTIONS & SERVICES<br />

• DIGITAL CRIME & FRAUD INVESTIGATION<br />

• DIGITAL FORENSICS<br />

O COMPUTER FORENSICS<br />

O MOBILE FORENSICS<br />

O NETWORK FORENSICS<br />

O EMAIL INVESTIGATION<br />

O CRYPTO ANALYSIS<br />

O STEGANO ANALYSIS<br />

O LINK ANALYSIS & DATAMINING<br />

O SOCIAL MEDIA ANALYSIS<br />

O VOICE BIOMETRIC<br />

• E-DISCOVERY<br />

O EDRM<br />

O LITIGATION MANAGEMENT<br />

• INCIDENT RESPONSE<br />

O IR PLAN<br />

O CIRT<br />

• SIEM<br />

O LOG MANAGEMENT<br />

O CORRELATION<br />

• INFORMATION RIGHTS MANAGEMENT<br />

O REMOTELY CONTROL<br />

O FEARLESSLY SHARE<br />

INFORMATION<br />

DIGITAL FORENSICS & INFORMATION SECURITY SOLUTIONS<br />

P R O T E C T Y O U R C O N F I D E N T I A L , S E N S I T I V E I N F O R M A T I O N F R O M T H E F T , L E A K A G E A N D<br />

D E T E C T A N D I N V E S T I G A T E D I G I T A L T H R E A T S , C R I M E S & F R A U D S U S I N G D I G I T A L F O R E N S I C S<br />

Government and Enterprises are spending millions of<br />

dollars each year to ensure that their information<br />

infrastructure, networks and data are properly protected<br />

against intrusion, security breaches, thefts and<br />

information leakage. Operating systems are hardened,<br />

firewalls are installed, intrusion detection, data leak<br />

prevention systems are put in place, security policies<br />

and procedures are established, security awareness<br />

programs are rolled out and systems are constantly<br />

monitored. As business grows ever more dependent on<br />

IT, Internet and Telecommunications, the need to keep<br />

the enterprise data and networks safe grows even<br />

more.<br />

Digital Crimes and Frauds are growing exponentially<br />

due to high proliferation of Digital Artifacts and<br />

communication technologies in our personal and<br />

professional lives. Digital <strong>Forensic</strong>s is a highly<br />

specialized field which is a blend of art of innovative<br />

investigation techniques and science of maintenance<br />

of chain of custody by deploying scientific tools,<br />

standardized processes by skilled investigators.<br />

Digital <strong>Forensic</strong>s, e-discovery and Incident response<br />

helps gather evidence, unearth hidden and deleted<br />

data, perform root cause analysis while security<br />

technologies such as DLP, IRM and SIEM helps<br />

prevent such incidences.<br />

Digital Crime, Threats, Frauds<br />

and <strong>Forensic</strong> Solutions<br />

ABOUT PYRAMID<br />

<strong>Pyramid</strong> <strong>Cyber</strong> <strong>Security</strong> & <strong>Forensic</strong> (P) Limited<br />

is an ISO 9001-2008 and ISO 27001-2005 certified<br />

boutique Digital <strong>Forensic</strong> & specialized Information<br />

<strong>Security</strong> Solutions & Services Company that helps<br />

customers in Enterprises and Law Enforcement<br />

Agencies to identify, prevent, detect, resolve and protect<br />

from “Digital” threats, crimes, frauds and acts of<br />

terrorism arising due to vast proliferation and usage of<br />

Digital & Communication applications, assets and<br />

artifacts in our personal and professional lives.<br />

Solution & Services portfolio covers Digital <strong>Forensic</strong>s, e-<br />

Discovery, Incident Response, SIEM, IRM.<br />

DIGITAL FORENSICS, FRAUD<br />

INVESTIGATION AND INFORMATION<br />

PROTECTION SOLUTIONS & SERVICES<br />

PEOPLE SKILLS AND KNOWLEDGE<br />

CAPITAL<br />

<strong>Pyramid</strong> operates in a talent and skill intensive industry<br />

and leverages its people power to differentiate itself from<br />

competition. Current skills repository is in areas such as<br />

Computer and Mobile <strong>Forensic</strong>s, Information <strong>Security</strong>,<br />

Software, Networking, and Information Law.<br />

<strong>Pyramid</strong>’s management team and senior executives<br />

bring decades of experience and a history of success.<br />

This team constantly guides passionate and talented<br />

young employees to create innovative solutions and<br />

deliver quality services that aim to help and delight our<br />

customers in line with our vision.<br />

DIGITAL FORENSIC LABS<br />

<strong>Pyramid</strong> specializes in setting<br />

up comprehensive Digital<br />

Crime Investigation Centers<br />

and <strong>Forensic</strong> Laboratories for<br />

customers in Law<br />

Enforcement, Banking,<br />

Telecom and Enterprise<br />

segment on a turnkey basis<br />

that involves design, supply,<br />

implementation,<br />

commissioning, training &<br />

facilities management.<br />

DIGITAL CRIME & FRAUD<br />

INVESTIGATION<br />

SERVICES<br />

<strong>Pyramid</strong>’s Digital <strong>Forensic</strong><br />

investigators acquire and<br />

reconstruct hidden and deleted<br />

information from a Digital<br />

Artifact such as a hard drive,<br />

computer systems, smart<br />

phone, PDA; Tablet etc. to<br />

gather evidence and establish<br />

credible audit trails of<br />

electronic wrongdoing.<br />

<strong>Pyramid</strong> is credited with setting up some of the most<br />

modern and prestigious Digital <strong>Forensic</strong> Labs for various<br />

LEA in India including, Central Bureau of Investigation,<br />

Police <strong>Cyber</strong> Crime Cells, Directorate of <strong>Forensic</strong><br />

Science, Intelligence Bureau, Indian Defense etc. to<br />

name a few.<br />

Those who do not want to approach LEA at the first<br />

instance, <strong>Pyramid</strong> provides corporate and private Digital<br />

<strong>Forensic</strong> investigation services via its first responders<br />

and digital crime & fraud investigation centre equipped<br />

with most relevant Digital <strong>Forensic</strong>, crime and fraud<br />

investigation tools to cater to needs of fraud, risk, legal<br />

and IS teams.<br />

P Y R AMI D CY B E R SE C U R I TY &<br />

FO R E NSI C ( P ) LI MITED<br />

F B - 0 5 , N S I C S O F T W A R E T E C H N O L O G Y P A R K ,<br />

O K H L A I N D U S T R I A L E S T A T E<br />

N E W D E L H I - 1 1 0 0 2 0 , I N D I A<br />

W E B S I T E : W W W . P Y R A M I D C Y B E R . C O M<br />

E M A I L : C O N T A C T @ P Y R A M I D C Y B E R . C O M<br />

P H O N E : + 9 1 - 9 6 5 0 8 9 4 6 7 1 , F A X : + 9 1 - 1 1 - 2 6 3 2 2 9 8 0<br />

GLOBAL TECHNOLOGY PARTNERS<br />

<strong>Pyramid</strong> has nurtured long term partnerships with best of<br />

breed technologies coming from world’s leading Digital<br />

<strong>Forensic</strong> and Information <strong>Security</strong> technology companies<br />

that offer cutting edge solutions to organizations such a<br />

CIA, FBI, NASA, Department of Justice, Scotland Yard in<br />

the Law Enforcement to leading corporations,<br />

INFORMATION SECURITY<br />

<strong>Pyramid</strong> provides e-<br />

discovery, Incident response,<br />

SIEM, IRM solutions &<br />

services that helps<br />

government and enterprises<br />

in prevention and protection<br />

from threats & attacks,<br />

leakage of sensitive &<br />

confidential information and<br />

data.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!