CYBERCAT

CyberCAT helps organisations to gain insight into vulnerabilities in their network, information systems, and applications. This includes attacks by specialised hackers, so-called “scriptkiddies” that use automated attacks, or malware outbreaks. CyberCAT is active in various focus areas in order to improve your cyber-resilience level.

ADVANTAGES

INSIGHTS INTO VULNERABILITIES AND ATTACKS

Insights into vulnerabilities and attacks within your network, systems, and applications.

INSIGHTS INTO NETWORK TRAFFIC

Insights into (malicious) network traffic.

INSIGHTS INTO SYSTEMS

Insights into the systems implemented in the network (for asset management).

EASY IMPLEMENTATION

Simple implementation of CyberCAT

TRANSPARENCY

CyberCAT is implemented in the network in a transparent manner, and only monitors without adjusting traffic*

INSIGHTS INTO VULNERABILITIES AND RISKS

Insights into vulnerabilities and risks via a safe online dashboard.

BLOCKING ATTACKS

Option to block attacks in consultation.

FIXED CONTACT MOMENTS

Fixed contact moments to discuss cyber-related topics with our experts.

SUBSCRIPTIONS

 

CyberCAT is active in different focus areas so we can tackle the basic measures that are needed for an increased basic level of the cyber-vulnerability. These focus areas are offered via three service levels.

* Prices excluding connection costs (€ 149) and excluding VAT.

* The prices displayed are based on a maximum of 100 devices in the network. A price indication can be requested if there are more devices present.

 EXPLANATION FOCUS AREAS

 

CyberCAT is active in various focus areas in order to improve your cyber-resilience level. These focus areas are offered via three service levels.

1. DETECTING (MANAGED MONITORING)
  • CyberCAT analyses all incoming and outgoing traffic between the internal network and the internet to gain insight into malicious traffic and possible attacks.

  • When CyberCAT detects malicious traffic, it will be reported to our security experts.

  • Potential vulnerabilities will be further inspected by a security expert to determine how serious they are, and we will verify whether the vulnerabilities that have been discovered are in any way related to each other.

2. ATTACKING (MANAGED VULNERABILITY MANAGEMENT)
  • CyberCAT simulates an attack by a malicious person on the infrastructure that is accessible via the Internet. In doing that, CyberCAT looks for possible entrances (such as configuration flaws or outdated software) to gain access to the internal network.

  • Within this network, CyberCAT will try to find vulnerabilities in the configuration, as well as design errors in equipment, which can be exploited to gain access to systems, applications, or data.

  • Potential vulnerabilities will be further inspected by a security expert to determine how serious they are, and we will verify whether the vulnerabilities that have been discovered are in any way related to each other.

3. DEFENDING (MANAGED PROTECTION)
  • When CyberCAT detects an attack, it can block the identified attack before it reaches the system or user.

  • By combining CyberCAT with end-point protection, we can verify whether detected attacks will affect the systems. Furthermore, end-point protection helps to protect against ransomware and other forms of malware.

4. CYBERCAT HUNTER
  • Our CyberCAT services unburden and remove any worries that organisations have when it comes to information security. However, technology does not solve all cyber risks. That is why our information security experts analyse the data and technical vulnerabilities that are detected by the CyberCAT system and translate these into risks for the organisation. Apart from that, our information security experts offer recommendations to solve or mitigate cyber security risks.

  • All identified vulnerabilities are made transparent via an online dashboard. This dashboard provides insight into the (open) vulnerabilities per system and into the ongoing inspections. Furthermore, the online dashboard can be used to export data, for example, when using a “Vulnerability Management Tracking” system.

WHY CYBERCAT?

All organisations are connected to the internet nowadays, and a huge amount of information is stored and exchanged digitally. To guarantee that this is done safely, now and in the future, excellent information security is essential.

 Insufficient or lacking information security can have far-reaching consequences for organisations. Apart from financial consequences, cybercrime can also cause the loss of customer information, decreasing customer confidence, and sometimes even a temporary discontinuation of the organisation. Aside from the possible threat of cybercrime, the stricter supervisory measures such as the General Data Protection Regulation (AVG) are also an important reason to ensure that your information security is up to date.

The National Cyber Security Centre (NCSC), amongst others, indicates that the basic measures at many companies are not in order, while these basic measures are crucial to block the majority of the possible attacks or to limit the damage caused by attacks. Fortunately, companies are becoming more and more aware of this risk, and subjects such as information security and cybercrime are high on the agenda. However, this raises the question: where do we start and how do we handle it?

CyberCAT doesn’t believe in expensive consultants, paranoid behaviour, never-ending security transformations, and safety measures that make systems and networks impossible to work with. Focus on the basic measures of information security to detect or block the majority of the attacks and prepare for a possible failure. This creates a healthy balance between protection and the usefulness of these measures, as well as affordable information security.

CyberCAT B.V.
Albert Einsteinweg 2

8501 XE Joure
Nederland

Tel: 085 303 58 62
E-mail: [email protected]

VAT reg.no.: 8596.48.849.L.01
IBAN: NL RABO 0337 0601 50

Terms and Conditions