Professional Documents
Culture Documents
(PROTERGO) Company Profile v01
(PROTERGO) Company Profile v01
[CONFIDENTIAL]
COMPANY PROFILE
2020
PROTERGO
CYBERSECURITY
1. Executive Summary
Losses created from cybercrime provide a gap in the defense of the attacker
compared to the number of attackers. With the increase in losses caused by cyber
crime that has reached an average of more than US $ 15-20 million per
organization in the financial, energy, IT and retail services industries, attackers are
getting smarter to find loopholes. Attacker developed a new method such as
ransomware-as-a-service, which means attackers find it easier to increase the
scale of cyber crime globally.
One of the most successful and significant attacks in recent years has been theft
of Equifax customer data (consumer credit reporting agents). The consequences
of this cyber crime will destroy the integrity of the company because the company
has consumer personal data on the credit market. Among the organizations we
studied, information loss is the biggest component of loss.
• Dedicated Support
o Protergo offers operation support to establish SOC
o Our team has been established in 2018
o Our offers also available 5 days a week (8 hours per day )
• Regulatory Compliance
o Our systems provide you compliance with GDPR, HIPAA, ISO 27001,
PCI DSS, SOC 2
• Cost-Effective Offering
o Protergo C-SOC offering of cyber security solution is an efficient and
cost-effective way of obtaining a robust and scalable IT solution without
heavy investments
Through services managed by us, Protergo can offer organizations with the best
value for Cyber Security solutions.
2. Company Profile
Protergo is a technology company focusing on delivering cyber security world-class
solution and services to various market segments and one of our key focus areas
is the financial service industry. In addition, Protergo is the only Platinum AlienVault
Partner in Indonesia. Protergo can help businesses that have deployed or are
considering deploying C-SOC to bridge the skills and resource gap, in order to
enhance threat detection capabilities and reduce the budgetary and operational
challenges of managing cyber security in-house.
Moreover, our team of over 300 IT resources provides a wide range of solutions
and services for the financial service industry from infrastructure (data center and
DRC facilities), to hardware network.
Certifications
• Certified Ethical Hacker (CEH) by EC-Council
• Certified Security Analyst (CEH) by EC-Council
• CompTIA CSA+
• CompTIA Security+
• CompTIA Linux+
• OSCP (Offensive Security)
• GIAC Exploit Researcher and Advanced Pen. Tester
• Aspara Cloud – Cloud Computing Specialist by Alibaba Cloud
• CCNA – Cisco Certified Network Associate Routing and Switching
• Microtik MTCTCE
• Microtik MTCNA
• Protergo’s capabilities:
- Cyber-security operation center: end-to-end monitoring and
logging of system to alert of potential attacks/ issues
- Penetration testing: attacker’s mindset to check potential
vulnerabilities in the systems
- Cyber security maturity assessment: assessment of the level of
maturity of the organization
3. Protergo’s Solution
The software provided as a service package is provided in such a way you’re your
organization can reduce capital expenditures and convert costs into operational
costs that are paid annually. This initiative will also modernize the entire IT
infrastructure to be able to harmonize in the current era of digitalization.
Costs
• Cost effective solution to cover your organization from cyber-threats
• Setting up your own SOC may cost ~10-50x more than the Protergo
solutions
• Scalable solution that can grow/ be reduced according to your infrastructure
Speed
• Ensure protection since the day-1
• Tools and systems that ensure that the solution is deployed extremely fast
Effectiveness
• World-class solution and tools
• Minimize risk and threat (outside and inside)
BEHAVIORAL VULNERABILITY
MONITORING ASSESSMENT
Log Collection Continuous Vulnerability Monitoring
Netflow Analysis Authenticated / Unauthenticated
Service Availability Monitoring INTRUSION DETECTION Active Scanning
Network, Host & Wireless IDS
File Integrity Monitoring
• Asset discovery
Even a moderately complex network topology can cause operators to be
faced with difficult access procedures, requiring manual steps to discover
Protergo team will work together with you to ensure that based on your
requirements, one or more of the techniques listed above will be used to
provide the most accurate picture possible.
• Vulnerability assessment
As with asset discovery the deployment of vulnerability assessment can be
a logistical hurdle. Our solution provide a flexible approach in tightly
controlled environments as well as provide for centralized management of
the vulnerability assessment scans in environments with complex network
topologies.
Host-based assessment
Using access to the file system of a system, an analysis engine can perform
a more accurate and comprehensive detection of vulnerabilities by
inspecting the installed software and comparing the detected software
packages with a list of known vulnerable software packages.
• Intrusion Detection
This component of the Protergo infrastructure detects the latest threats in
your environment. We provide two different types of Intrusion Detection:
• Behavioral monitoring
Behavioral monitoring is a service that check for end-point activities. The
systems run in our organization are far from predictable—seasonal peaks
such as an end-of- the- quarter sales effort can cause loads and behaviors
never seen before. A good solution for behavioral monitoring will provide
multiple mechanisms for collecting this data. In addition it will provide a low-
overhead mechanism for pervasive deployment in the organization.
Protergo offers different types of behavioral monitoring components:
Netflow analysis
Analyzes the protocols and bandwidth used by each. This is done by
capturing metadata from a TCP/IP stream, saving protocol information as
well as calculating bandwidth usage.
• Security Intelligence
One of the most important aspect of C-SOC is the Security Intelligence
platform. This platform correlates all the data collected. Being able to
associate the data together and respond to user query is necessary for a
user to be able to understand all of the data. The platform automates the
correlation of the data in order to detect malicious behaviour, large-scale
attacks, and breaches. In the Protergo C-SOC solution, the correlation rules
are automatically updated every week through our OTX (Open Threat
Exchange) that contains over >10,000 correlation rules updated weekly to
identify suspicious activities and attacks within your network – new/
different types of attacks.
Desk
• Monitoring at both a network level, and at a host level via Host Intrusion
Detection Services
• Monitoring of remote endpoints in cloud environments such as AWS or
Azure
• Ability to run vulnerability scanning from the portal
• Aggregation of alerting within your environment for systems such as syslog
and net flow.
• Archive of SIEM data for compliance requirements or future forensic
analysis
Access to experts in Security for advice on response to security risks flagged by
the service.