1. Taking CYBER Solutions to Next Level
When Results Matter
Cyber Analytics and Forensics End-to-End Cyber Centers
Tackling Cyber challenges via advanced analytics capabilities as a stepping
stone towards tacking the "Attribution Challenge"
Identity Resolution: IAI provides analytical capabilities, for correlating cyberspace
activities, and the virtual identities that perform them to a singular physical entity.
Geo-location Resolution: IAI provides analytical capabilities, to resolve the geo-location
challenge, based on a variety of data sources and analysis tools. IAI provides, in near real-time, a
pinpoint physical geo-location of a virtual entity, to a high degree of probability.
TAME™ GuardTAME™ Guard
Advanced statistical anomaly detection engines for early detection of:
Advanced Persistent Threats (APTs)
Zero-day Malware
Incorporating proprietary IAI’s sensors, data processing and data
analytics capabilities
IAI has designed a modular, open-platform architecture and framework, incorporating
intelligence, cyber security & early warning into a single framework. This allows building a
comprehensive cyber situational awareness picture, and intervening and acting in
cyberspace.
Cyber early warning center
Cyber intelligence center
Cyber security operations center
Incorporating all relevant activity & contextual data sources:
IT security, wireless networks, SCADA networks, social networks,
cloud based services networks, cellular networks, OSINT and customer sources
Flexible, ontology based, data modeling and processing
Multi engine analytics
Create a single, holistic, point of view at the organizational, sectorial and national level
Customized work ow for Intelligence, early warning, Cyber ops, and forensics
ISRAEL AEROSPACE INDUSTRIES
Ben Gurion International Airport
70100 Israel
Tel: (972)3-935-3111
Email: corpmkg@iai.co.il
Website: www.iai.co.il
The contents of this brochure are presented as general
information only and are not meant too, nor do they
constitute any representation of warranty by IAI Ltd. The
contents are not meant to serve or be used in substitution
for the information contained in any approved
specification, manual or the like issued by IAI Ltd. The
contents shall not in any way add to, amend, delete or
change any term of any contract in whichchange any term of any contract in which IAI Ltd. is a party.
CYBERFROM SENSORSTO CENTERS
2. When Results Matter
Capability buildup, Training, Testing,
Simulation & Forensics
Accessibility Solutions
Productizing Hacking, Delivering Intelligence and Insight
Cyber & Cellular Off the Air Interception
Conceptus – Social Network Intelligence & In uence
Passive intelligence collection, digital HUMINT, soft power projection
Penetrating closed groups and areas of interest
Automation of large scale collection and in uence operations
Nimbus – Cloud Based Interception
Lawful Interception solution for monitoring encrypted cloud based services
(web-mail, le sharing, social networks, instant messaging and more)(web-mail, le sharing, social networks, instant messaging and more)
Applied either in a strategic and/or tactical interception mode
SCADA Monitoring
Monitoring ICS/SCADA controllers
Detecting abnormals behaviour
Centralized management and reporting
Combining the Cellular & Cyber media to identify, geo-locate
and intercept targets
Orbis: Stand-off Cellular Interception and Monitoring
Modular system for off-the-air cellular interception, monitoring and geo-location
Integrated Direction Finding (DF) capabilities within the system, providing accurate
geo-location
Designed for various types of deployments, tactical, portable, vehicular & airborne
CyFi – an tactical probe for monitoring secure WiFi hotspots
Gaining access to secure hotspots: WEP, WPA, WPA2
Active mode: Actively routing (and intervening in) target’s traffic
Fully integrated with Nimbus and Orbis
National, sectorial and organizational capability buildup via
training, testing and simulation of complex cyber scenarios
TAME™ Range
Cyber "War Game" trainer with:
Real Cyber attack trainings on con gurable isolated organization IT & ICT networks
Field tested Cyber defense methodology, certi cation levels and threat response
performance assessment
Multi-team role playing scenarios (e.g., SOC, CERT, IT, CISO)
Built-in features of Red-team Blue-team Cyber war game & security tools Test-bed
Cyber Research & Forensics Lab
Cyber research lab for Computer Emergency Response Team (CERT) functions
Full range of analysis, diagnostic, recovery and forensics tools
Novel automated environment & investigation tools for malware assessment
Simulation of real life complex scenarios through operations research and impact analysis
3. Taking CYBER Solutions to Next Level
When Results Matter
Cyber Analytics and Forensics End-to-End Cyber Centers
Tackling Cyber challenges via advanced analytics capabilities as a stepping
stone towards tacking the "Attribution Challenge"
Identity Resolution: IAI provides analytical capabilities, for correlating cyberspace
activities, and the virtual identities that perform them to a singular physical entity.
Geo-location Resolution: IAI provides analytical capabilities, to resolve the geo-location
challenge, based on a variety of data sources and analysis tools. IAI provides, in near real-time, a
pinpoint physical geo-location of a virtual entity, to a high degree of probability.
TAME™ GuardTAME™ Guard
Advanced statistical anomaly detection engines for early detection of:
Advanced Persistent Threats (APTs)
Zero-day Malware
Incorporating proprietary IAI’s sensors, data processing and data
analytics capabilities
IAI has designed a modular, open-platform architecture and framework, incorporating
intelligence, cyber security & early warning into a single framework. This allows building a
comprehensive cyber situational awareness picture, and intervening and acting in
cyberspace.
Cyber early warning center
Cyber intelligence center
Cyber security operations center
Incorporating all relevant activity & contextual data sources:
IT security, wireless networks, SCADA networks, social networks,
cloud based services networks, cellular networks, OSINT and customer sources
Flexible, ontology based, data modeling and processing
Multi engine analytics
Create a single, holistic, point of view at the organizational, sectorial and national level
Customized work ow for Intelligence, early warning, Cyber ops, and forensics
ISRAEL AEROSPACE INDUSTRIES
Ben Gurion International Airport
70100 Israel
Tel: (972)3-935-3111
Email: corpmkg@iai.co.il
Website: www.iai.co.il
The contents of this brochure are presented as general
information only and are not meant too, nor do they
constitute any representation of warranty by IAI Ltd. The
contents are not meant to serve or be used in substitution
for the information contained in any approved
specification, manual or the like issued by IAI Ltd. The
contents shall not in any way add to, amend, delete or
change any term of any contract in whichchange any term of any contract in which IAI Ltd. is a party.
CYBERFROM SENSORSTO CENTERS
4. Taking CYBER Solutions to Next Level
When Results Matter
Cyber Analytics and Forensics End-to-End Cyber Centers
Tackling Cyber challenges via advanced analytics capabilities as a stepping
stone towards tacking the "Attribution Challenge"
Identity Resolution: IAI provides analytical capabilities, for correlating cyberspace
activities, and the virtual identities that perform them to a singular physical entity.
Geo-location Resolution: IAI provides analytical capabilities, to resolve the geo-location
challenge, based on a variety of data sources and analysis tools. IAI provides, in near real-time, a
pinpoint physical geo-location of a virtual entity, to a high degree of probability.
TAME™ GuardTAME™ Guard
Advanced statistical anomaly detection engines for early detection of:
Advanced Persistent Threats (APTs)
Zero-day Malware
Incorporating proprietary IAI’s sensors, data processing and data
analytics capabilities
IAI has designed a modular, open-platform architecture and framework, incorporating
intelligence, cyber security & early warning into a single framework. This allows building a
comprehensive cyber situational awareness picture, and intervening and acting in
cyberspace.
Cyber early warning center
Cyber intelligence center
Cyber security operations center
Incorporating all relevant activity & contextual data sources:
IT security, wireless networks, SCADA networks, social networks,
cloud based services networks, cellular networks, OSINT and customer sources
Flexible, ontology based, data modeling and processing
Multi engine analytics
Create a single, holistic, point of view at the organizational, sectorial and national level
Customized work ow for Intelligence, early warning, Cyber ops, and forensics
ISRAEL AEROSPACE INDUSTRIES
Ben Gurion International Airport
70100 Israel
Tel: (972)3-935-3111
Email: corpmkg@iai.co.il
Website: www.iai.co.il
The contents of this brochure are presented as general
information only and are not meant too, nor do they
constitute any representation of warranty by IAI Ltd. The
contents are not meant to serve or be used in substitution
for the information contained in any approved
specification, manual or the like issued by IAI Ltd. The
contents shall not in any way add to, amend, delete or
change any term of any contract in whichchange any term of any contract in which IAI Ltd. is a party.
CYBERFROM SENSORSTO CENTERS