CYPRO has all the features you need to protect your business

Monitoring

Our analysts monitor your environment and identify threats. They find attackers and give you the answers you need to kick them out and keep them out. Important aspects are to control corporate traffic across the border, activity at a border, internal workstation, server or device, internal network activity, network connections, session activity of user and workstation, warning of events, exact time in log and backup of data.

close window

Behavior Monitoring

This feature comes from one of the tools used by CYPRO SOC. By analyzing logs and network traffic, we monitor how users behave on the network. For example, we can detect attempts to access malicious websites, phishing attacks, or brutal attacks.

close window

Hot information

This feature comes from one of the tools used by CYPRO SOC. By using the largest platform for hot intelligence, our customers and analysts are always up to date with the latest security knowledge. The intelligence platform is also linked to the intrusion detection systems (IDS), ensuring that they are constantly discovering the latest security threats.

close window

vulnerability Assessment

This feature comes from one of the tools used by CYPRO SOC. We perform authenticated vulnerability searches to identify vulnerabilities across the entire IT infrastructure. These are often done because new vulnerabilities are released daily. To ensure that all the latest vulnerabilities are found, the software uses known vulnerability databases such as MITER or specific product suppliers' own databases.

close window

Remediation Strategy

Cyber ​​Risk Remediation Analysis (RRA) is a method of selecting countermeasures to reduce the cyber asset's susceptibility to cyber attacks over a series of attacks, techniques and procedures (TTPs) associated with Advanced Persistent Threat (APT). Cypro follows the MITER method. Identify the cyber assets that are most critical to the mission's mission (the "Crown Jewels" of a Crown Jewels Analysis). Understand the threats and associated risks of these assets (achieved through a subsequent analysis of cybercrime risk assessment (TSA). Choose remedial measures to prevent and / or combat Internet Risk Remediation Analysis (RRA) used to identify recommended mitigation measures) . Cyber ​​Risk Remediation Analysis (RRA) is the last step in the process framework. It is a method of choosing countermeasures (CMs) to reduce the cyber access susceptibility to cyber attack over a variety of tactics, techniques, and procedures (TTPs) associated with the APT. A CM is defined as an action, entity, procedure or technique that opposes or counteracts a threat, vulnerability or attack by eliminating or preventing it by minimizing the damage it can cause or by detecting and reporting it so that corrective actions can be taken [2]. The choice of CMs is governed by the system's life cycle of the cyber asset being evaluated. Recommended CMs are those considered to be effective in mitigating TTP as a cyber access may be susceptible. CMs cover a wide range, including changes in requirements, system design, testing, implementation configuration and / or operating procedures. https://www.mitre.org/publications/systems-engineering-guide/enterprise-engineering/systems-engineering-for-mission-assurance/cyber-risk-remediation-analysis

close window

Education

A large amount of threats come from inside the company through unconscious employee behavior. This is because security is tricky and people get tricked easily. CYPRO helps raise awareness of security issues. For example, we can help educate employees to discover phishing emails, we can help build security policies and hold lectures to draw attention to the daily security issues.

close window

SIEM and Log management

This feature comes from one of the tools used by CYPRO SOC. An SIEM solution gathers and analyzes billions of events on premises or in the cloud per day. The solution combines threat monitoring, vulnerability and risk management and incidence responses in a single platform. CYPRO integrates and sells SIEM solutions from several suppliers, which gives us the opportunity to provide the best solution for you as a customer.

The platform simplifies the workload of security analysts by gathering all information in a single platform. It analyzes all log sources that are in your network and finds incidents, threats, deviations and dangerous user behavior. The tools can also detect assets on the network that would otherwise go unnoticed. Today's attackers are more organized than ever, to continue we need to organize systems. By implementing an SIEM solution, you take an essential step in meeting the new requirements of the complex security landscape.

close window

Intrusion Detection

This feature comes from one of the tools used by CYPRO SOC. CYPRO Installs network and host inspiration systems (NIDS and HIDS) in the infrastructure to detect real-time attacks. NIDS is connected to the network infrastructure to monitor all network traffic and identify threats. HIDS analyzes logs from the network infrastructure or critical endpoints found in the networks. Together, they can detect security incidents throughout the infrastructure. This provides a holistic view of safety.

close window

Asset Discovery

This feature comes from one of the tools used by CYPRO SOC. Discover cut assets within the corporate infrastructure by regularly making asset scanning of all networks. Asset scanning also helps identify services, open ports and device information to get an overview of networks and devices.

close window

Professional Advisory Service

Through our analysis of your security situation, your level of protection is described and developed. We help you move from basic, advanced to expert level that responds to the type of threat your organization faces. We begin by surveying the current situation by identifying any threats and vulnerabilities that exist on the customer infrastructure, working to guide the client to apply appropriate remediation techniques, and finally ensuring that the remediation is successful. This is a service that guarantees a safer time tomorrow for you as a Cypro client.

close window

Penetration Testing

Identifying the weaknesses in systems and applications is an important part of increasing the security of all companies. CYPRO offers a penetration test provided by well-experienced security experts who know how an attacker can exploit the systems. CYPRO completes the test by verifying that the identified risks are remedied by performing verification attempts. The penetration test service delivers a comprehensive report that contains all the risks that exist on the customer's assets and network units. Conducting regular penetration testing and addressing the current vulnerabilities is the key to a healthy and secure corporate infrastructure.

• Certified safety specialists
• 15 years of advanced testing in various industries such as major banks and telecommunications companies
• Good proven penetration testing methods
• Manual testing with selected tools

close window

Endpoint detection & response

Endpoint Detection and Response (EDR) solutions provide continuous monitoring and response to advanced security threats. In this way, security analysts can detect, investigate and respond to all cyber threats and wider attacks across multiple endpoints.

close window

Why Cypro?

Created to protect against cyber attacks

CYPRO is designed to protect your business and customer data from viruses and hackers. Cost-effective and specially built for SMEs that seem to be compatible and protected.

How does it work?

Security Operations Center (SOC)

Your IT infrastructure automatically sends logs and network traffic

. . . . . .

logs and network traffic are analyzed by CYPRO SOC

CYPRO warns of threats and vulnerabilities in your IT infrastructure, including remediation measures.

. . . . . .

What do you get?

A safe company; a happier team

.

Focus on what is important

Our solutions filter out false positives and quickly get involved in the threats you need to worry about.

.

Identify the root cause

We identify the cause of vulnerabilities and security events so that you can fix the origin. This will prevent future attacks and secure your infrastructure.

.

specific actions for each incident

When we confirm an incident, we recommend specific measures to solve each problem. And we write them in plain English so that everyone can understand.

.

Follow your improvement

Are you safer? Measure our progress, see how much better you become and why.

You get a tailor-made complete solution
that addresses all user and network security issues.

Setup

1. We install a sensor

Sensors are installed on your network to collect data from computers, servers and other Internet-connected devices.

2. configuration

We configure the infrastructure to forward logs and network traffic to the sensor.

3. Adjustment

We establish a baseline for normal activity and adjust the environment to ensure that we get full security coverage.

4. Handing over to SOC

The SOC monitoring starts immediately after the adjustment is complete.

Book a free consultation

Current offer!
Get the first penetration test for half the price when you book a consultation before the end of the year!

We protect your privacy. No contact information will be shared with external parties. Read our security policy.

Partners

We work with all standard tools in the industry

Our latest security news

Subscribe to our newsletter to stay informed about the latest security news, and get unique offers.

Ransomware uses new tricks - exposes companies to greater danger

The hostage program Maze Ransomware shows that it is possible for attackers to hide in the network, without the victim knowing ...
Read More
network interception

Billions of devices vulnerable to Wi-Fi encryption

A new vulnerability that goes by the name of "kr00k" poses a risk to billions of network devices. A form of man-in-the middle attack ...
Read More
phishinh attack

Famous companies exposed to new phishing campaign - Trojan hidden in sent files

A new phishing campaign has hit more companies, including some that have operations in Sweden. Attachments named after ...
Read More

Made with in Karlskrona, Sweden

2020 CYPRO AB. All rights reserved

SwedishEnglish