2. Hello and welcome to Smart Defend UK Limited. Our business has a dynamic story to tell
about the future of managed security services. In this document you’ll get an overview of
the company, its products and services, and its mission to tackle the intensifying threat from
cybercrime. We look forward to welcoming you as a customer, partner or colleague in the
journey to make everyone’s online life and business safer.
Sincerely,
Naomi Ledsham
Operations Director
welcome
3. Emerging managed security services player
Smart Defend UK is an emerging expert player in the
cybersecurity industry. We have developed market-
leading patented technology to provide a more
robust defence against the escalating threat from
cybercriminal activity. This technology is now gaining
wider recognition for its unique features as it becomes
available internationally.
Supporting law enforcement internationally
We work closely and are constantly forging new
relationships with law enforcement, government
and regulatory agencies as part of a coordinated
international effort to improve individual and business
safety online.
End to end security solutions
As a business, we offer ‘cybersecurity as a service’
through a suite of products that support businesses
large and small, from the website to the server, to
the desktop and to mobile devices. Alongside our
security monitoring operations, we also offer more
standard infrastructure monitoring. Independent of
our own products and services, we consult to various
large organisations, giving them unbiased advice to
ensure they get the most appropriate toolkit for their
particular IT security needs.
UK headquartered, international group
Headquartered in Battle, Sussex in the UK, Smart
Defend UK Limited is part of the Smart Defend Group
which has satellite operations in Slovenia, Germany,
Canada and the United States, all of which play an
active part in our global security monitoring operations
and software development program.
about us
4. Responding to exponential threat
Criminality in the digital space is constantly evolving.
As technology changes now so quickly, its complexity
expands exponentially, confronting users with constant
novelty. This creates vulnerabilities, both human and
technological, that resourceful criminals can attack.
And they do. Vigorously.
Deep cybercrime expertise
Our core capabilities were honed in some of the
toughest emerging market conditions where trust
in online transactions has had less time to become
established. Consumers there have required clearer
validation they were transacting on sites that were
both legitimate and creditworthy. As a consequence,
our software developers and security analysts have
had to develop more versatile skills and robust tools
as part of a professional mission to keep ahead of the
cybercriminal.
Smart Defend now has market-leading products for
more general application because we can detect
and respond to malicious activity in seconds rather
than days. Businesses and their customers are better
protected and law enforcement agencies are given a
major advantage in their fight against cybercrime.
Unique eIDAS-ready patented technology
Smart Defend’s core patented technology is unique
in its field and we expect it to play a central role in
the new regulatory infrastructure envisaged by the
EU’s eIDAS initiative. The EU’s stated goal is to boost
trust and convenience in secure and seamless cross-
border electronic transactions by promoting the use
of electronic identification and trust services (eIDAS
services).
While the first wave of eIDAS relates to public bodies,
the private sector will likely follow because there will
be competitive advantage in demonstrating customer
security as well as corporate governance compliance
pressures. Smart Defend’s products are among the
most advanced eIDAS technologies on the market.
why use us?
5.
6. our products
SME to corporate, website to mobile device
Smart Defend has created a suite of products
with a range of features and price points to serve
organisations of all sizes, from SMEs to major
corporates and public bodies. We are building out an
end-to-end managed security solution for the entire
network infrastructure to cover the website, desktop,
server and mobile device.
Unique URL verification and personal
signature technology
Because of Smart Defend’s patented technology, we
can offer a more comprehensive suite of protection
options than other security companies. In particular,
our unique URL verification and personal signature
technologies cannot be replicated by the major
vendors. We offer keylogging protection, daily
vulnerability scanning, anti-malware, anti-phishing,
firewall protection, host intrusion protection, and PCI
scanning, as well as more generally available defences
such as anti-virus, attack prevention, internet access
restriction and web filtering.
smartdefend SME
smartdefend SME applies our unique patented anti-
phishing technology to assure website customers a
safe browsing experience by embedding our interactive
website SEAL. This can’t be replicated by a malicious
site without alerting our global network security
monitors within seconds.
smartdefend Pro
smartdefend Pro combines all the required tools to
provide a robust and stable solution to the general
protection needs of website owners. This service
incorporates our unique defence technology against
phishing and brand attacks which will alert you if a
cybercriminal is attempting an attack on your website.
We provide you with a daily vulnerability scan which
examines your web pages, applications and web
servers for security vulnerabilities that would give
hackers an opportunity to do damage. There is nothing
to install and our tests will not disturb your site or
visitors.
7.
8. smartdefend Ultimate
To further enhance your reputation and legal
compliance as part of smartdefend Ultimate, we
provide you with a quarterly Payment Card Industry
(PCI) scan certificate. The PCI Data Security Standard
(PCI DSS) is a set of requirements designed to ensure
that all companies processing, storing or transmitting
credit card information maintain a secure environment.
The idea of a website or environment that is immune
to security issues is false. The ability to detect when
incidents occur is fundamental to the establishment
of a good security posture for your website.
The smartdefend Ultimate product continuously
monitors your website, providing immediate alerts
in the event of a security incident such as a malware
infection.
smartdefend GuardedID®
smartdefend GuardedID®
runs alongside antivirus
software to fill an important gap in protecting
the keyboard. Unlike antivirus and anti-malware,
GuardedID®
is the only proactive solution to provide
the critical security functionality necessary for
protecting your data:
real-time keystroke encryption
128-bit out-of-band data channel
enterprise deployment kit
anti-screen scraping
anti-clickjack warning
self-monitoring kernel module
GuardedID®
takes a proactive approach to stopping
malicious keylogging programs by encrypting every
keystroke at the point of typing the keys, and
rerouting those encrypted keystrokes directly to your
browser through its own unique path. GuardedID®
bypasses the typical places keyloggers normally reside,
•
•
•
•
•
•
our products
9. thereby helping to eliminate your vulnerability to
keylogging attacks, which could compromise your
personal information causing you financial losses.
GuardedID®
is designed as a toolbar for your browser,
always present when your browser is launched. With
GuardedID®
, you can now work offline securely as
well as email, browse, shop and bank online with
confidence knowing that each and every keystroke is
protected and not being transmitted to an awaiting
identity thief. With 12,000 keyloggers known to be in
distribution currently, it is only a matter of time before
one affects one of your computers.
smartdefend MobileTrust™
MobileTrust™ is the most advanced security suite
for Apple or Android devices. Mobile devices are
increasingly used to augment the corporate desktop
and are now a prime target for hackers looking to
breach the corporate network.
The MobileTrust™ bundle includes six of the most
powerful security features that are must-haves for
every enterprise mobile user:
password vault – securely stores an unlimited
number of passwords with associated websites
encrypted keyboard and browser – encrypts all
keystrokes between the on-screen keyboard and
the browser
strong password creator – creates strong
passwords based on user-defined preferences and
stores them in the password vault for future use
ProtectID®
soft token – one-time-password
generator for StrikeForce’s award-winning
authentication platform; features a one-touch
user enrolment, supports on-premise and cloud
deployments
OATH-compliant soft token – works with all
OATH compliant authentication systems
encrypted database – store notes and data in
user defined fields in a secure database
•
•
•
•
•
•
10. our services
Automation blended with expert analysis
Protecting your brand, evolving your products and
services, growing your customer base, returning
value to shareholders, and maintaining competitive
advantage hinges on data security. In the past, when
individual hackers used ‘smash-n-grab’ methods to
steal data, protection strategies were straightforward.
But the threat landscape has become more complex.
Hackers are more organised, using multi-vector
attacks to penetrate your environments, conceal their
presence, and steal as much of your data as possible.
In addition to automated analysis and detection, we
apply rigorous human analysis to all security events
generated by our data correlation processing from
within our proprietary network operation centre (NOC)
and security operation centre (SOC).
Fewer false positives
Automated security analysis on its own produces
a high rate of false positives. This is costly for the
customer because it wastes management time tracking
whether an alert reflects a genuine security event.
By outsourcing to Smart Defend, you bring more
human experience and technology to bear to weed out
the false positives and focus resources on following up
genuine threats, minimising management distraction.
Remote operation
Smart Defend’s solutions operate remotely, removing
the need for customers to host complex and costly
technologies on their own premises. Smart Defend
relies on data alone from the customer.
Every day, new malicious threats to your enterprise
emerge. Our system gets regular updates from the
field to make sure vulnerabilities are always identified.
Unparalleled visibility
Our solution aggregates and analyses data from many
sources within the customer environment, providing
unparalleled visibility into all activities, whether
internally or externally driven. We look for all the signs
of a potential breach within an organisation, be it from
a phone, laptop, desktop, server, or router.
11. Many tools today are single purpose, focusing only
on event management or compliance functions. Our
solution combines these capabilities with an integrated
intrusion detection system, log and asset management,
and many other tools like antivirus to gain maximum
flexibility and visibility, all in a single implementation.
Intrusion Detection System (IDS)
Our IDS monitors your environment and sends alerts
when there is any suspicious activity. Because both
internal and external violations can cause issues, we
analyse activity to determine deviations from the norm.
We will help you implement a game plan for fast,
effective response when an alarm is triggered.
Managed Antivirus
Our comprehensive endpoint security solution
combines managed antivirus, content filtering, user
policies, scheduling and other tools to keep all devices
secure. It can block malicious websites, allow selective
access to specific sites, see live status of all systems,
and report and alert on all of these capabilities.
Security Log Management
Compliance and litigation environments increasingly
call for log collection and monitoring, which are
also important parts of maintaining visibility into
your systems. Correlating logs from all of your
preventative systems is essential to quickly identifying
and remediating security incidents. Our Security Log
Management system will forensically sign and validate
all logs for authenticity and accuracy in long-term
storage and investigations.
Managed IT Services
Managing security overlaps with general IT monitoring,
so in addition to our security-driven solutions we also
offer general IT managed services. Our SmartCare
Managed IT Services give you the benefits of a
managed service provider relationship for all your
software and hardware needs and remove the expense
of doing it all in-house, providing proactive monitoring
and complete umbrella backups.
12. consultancy
Dealing with complexity
Large enterprises, particularly those which have
grown through acquisition or with rapidly changing
marketplace dynamics, can be extraordinarily complex,
particularly when it comes to their technological
infrastructure. Managing that infrastructure for
security in the face of the escalating threat from
cybercrime is a tough task for in-house IT managers.
Risk management
Risk management is central to modern IT, protecting
customer, staff and shareholder interests, defending
the fundamental integrity of the firm, its brand and
operational efficiency. Mapping IT activity to meet
specific regulatory requirements, or more general
corporate governance standards, delivers a challenge
all the way from the engine room to the boardroom.
Acknowledging the gravity of these challenges, Smart
Defend provides our in-house expertise of the security
threat and our extensive knowledge of commercial
responses to help firms identify the best policies and
technologies for their unique circumstances.
Unbiased advice
As consultants, we provide unbiased advice
independent of our own sales solutions. We assess
your existing infrastructure and plans for the future.
We examine the current threat landscape and your
likely vulnerabilities. Then we build a strategic security
plan for you, mapping the appropriate market-based
technologies to meet your specific needs.
We introduce you to the specific vendors who best
suit your security needs and manage those multiple
relationships for you, ensuring a coherent solution
removing for you a layer of management complexity.
So whether it is meeting the latest regulatory
requirement, being ready to anticipate the next shift
in regulation, providing a helicopter perspective on
corporate governance best practice, or understanding
which technologies will scale to your future needs, we
can help. Our consultants will give you peace of mind
that you have the most appropriate set of policies,
technologies and investment plans in place for all
eventualities and in the most cost-effective solution.
13. compliance
Compliance Management Security System
Regulatory breaches can be costly to the firm in bad
press, fines, brand damage and lost customers. The
regulatory framework can only get more demanding
for IT departments. The issue is an agenda item for
all boards as they grapple with the tighter demands
on corporate governance from legislation such as
Sarbanes-Oxley.
Companies are often unaware that there is a simplified
and hands-off approach to compliance that is more
efficient and effective. Instead of piecing together
several different software applications and vendors,
Smart Defend offers a one-step solution to compliance
that will ensure critical manual updates are never
missed again. We call it our Compliance Management
Security System.
With their easy-to-read dashboard and reporting
centre, Smart Defend’s automated systems mean
you don’t need to worry about your next audit; our
continual compliance will anticipate what you will need
and make sure you’re prepared.
PCI DSS
At the front of commercial online transactional
compliance is the Payment Card Industry Data Security
Standard (PCI DSS). For some firms this can be a
significant headache. Our auditor-tested PCI DSS
software removes the element of human error, making
compliance not only possible but easy to maintain.
Data protection
Recent hacking controversies have made personal data
protection one of the hottest topics in the press. Public
concern over personal records increases, particularly
with regard to healthcare. So, meeting and even
exceeding legislative requirements should be central to
a security risk-management approach.
Forensics
Employee malfeasance is a growing risk, particularly in
finance. Global enterprises may be required to produce
data by law enforcement or litigators, no matter where
the data was created. Our system will forensically sign
all logs to validate their authenticity and accuracy.
14. collaboration
Working for a safer cyber future
The engine of technological innovation will continue
to drive forward, and at an accelerating pace. It
will create commercial opportunities for firms and
individuals who embrace it and solve many economic
and social problems that once seemed intractable. The
Internet of Things, 3D printing, and wearable devices
promise previously unimaginable benefits.
But they also augur a substantial increase in the
complexity of the technological environment through
the enlarged network of connections these devices
will create between their users and the wider social
landscape. Like any new landscape, unprecedented
dangers will emerge that will require adaptive
behaviours by individuals and organisations.
Cybersecurity as a culture
Cybersecurity is a discipline at an individual level and
a culture at a corporate level — a shared endeavour
between various stakeholders. Smart Defend is an
ambitious company committed to playing a central role
in advancing this culture.
We will work with our customers, partners, regulators,
law enforcement agencies and governments to create
a safer social and economic landscape, one in which
private data, commercial transactions and national
security are robust in the face of malicious cyber
activities.
Join us as we help build a safer cyber future.