Security Assessment
Automatic Detection of Vulnerabilities in Systems, Devices and Applications
Portfolio

Baseline Configuration Review
Sangfor IAG manages and controls network applications more comprehensively, accurately, and conveniently with the largest application signature database in Asia, which can identify more than 6,000+ applications in its database including 700+ cloud applications, 1,000+ mobile applications, 300+ web applications, and is updated every 2 weeks. In addition, it precisely controls applications according to their specific functions, such as distinguishing upload, download.

Baseline Configuration Review
Sangfor IAG manages and controls network applications more comprehensively, accurately, and conveniently with the largest application signature database in Asia, which can identify more than 6,000+ applications in its database including 700+ cloud applications, 1,000+ mobile applications, 300+ web applications, and is updated every 2 weeks. In addition, it precisely controls applications according to their specific functions, such as distinguishing upload, download.

Baseline Configuration Review
Sangfor IAG manages and controls network applications more comprehensively, accurately, and conveniently with the largest application signature database in Asia, which can identify more than 6,000+ applications in its database including 700+ cloud applications, 1,000+ mobile applications, 300+ web applications, and is updated every 2 weeks. In addition, it precisely controls applications according to their specific functions, such as distinguishing upload, download.

Baseline Configuration Review
Sangfor IAG manages and controls network applications more comprehensively, accurately, and conveniently with the largest application signature database in Asia, which can identify more than 6,000+ applications in its database including 700+ cloud applications, 1,000+ mobile applications, 300+ web applications, and is updated every 2 weeks. In addition, it precisely controls applications according to their specific functions, such as distinguishing upload, download.
Scope of Incident Response Service



External Attack Surface Assessment
External Attack Surface Assessment



Indicator of Compromise (IOC) Determination
Indicator of Compromise (IOC) Determination



Malware In-depth
Malware In-depth



Malware Family and Type Identification
Malware Family and Type Identification



Malware Eradication
Malware Eradication



Initial Attack Vector Identification
Initial Attack Vector Identification



Remediation
Remediation



Kill Chain / Chain of Infection Determination
Kill Chain / Chain of Infection Determination
Incident Response Service Deliverable

External Firewall Ruleset and Configuration Review Report

Automatic Security Incident Report

External Attack Surface Assessment Report

Threat Analysis and Remediation Report

Security Strengthening and Reinforcement Proposal

Yearly Security Incident Report
TIARA Case Study
Customer Profile
In 2018 a mid-sized financial services company, serving the investment needs of large enterprises, SOEs, banks and insurance companies, discovered that two of its virtual servers were infected with two different types of ransomware. Sangfor deployed their Endpoint Secure and Cyber Command solutions.
Existing Security
- Protection Perimeter Gateways
- Endpoint Protection

Pitfalls of the Traditional Approach

Limited Detection
Traditional FW and AV are limited to known attacks

Narrow Space
FW blind to internal activities & AV limited to managed endpoints

Lack of Security Operations
Protection available without response capabilities

Wide Open
FW is designed to open doors to apps & partners.
- Incidents of Ransomware Detected
The customer’s IT department reported two incidents of ransomware, and unsure if they had more hidden threat lurking in the system, they called in TIARA.
- Incidents of Ransomware Detected
The customer’s IT department reported two incidents of ransomware, and unsure if they had more hidden threat lurking in the system, they called in TIARA.
- Incidents of Ransomware Detected
The customer’s IT department reported two incidents of ransomware, and unsure if they had more hidden threat lurking in the system, they called in TIARA.
Blog
See More