- Web Browser Protection (Limit Social Media and Internet Access by User and Time)
- Threat Prevention
- Application Level Firewall
- Device Control (USB, Removable Device, etc)
- Zero Day Tuning of HASH and Security Policy Enforcement Rules
- AMSI access to the Windows OS lower event traffic for better malware detection
- Fileless attack memory protection and tuning for new vectors of “Living off the Land” attacks
- Network Intrusion protection based on Reputation data in real time
- Machine Learning protections to identify compromised content like MS Office created files, pictures and pdf formatted documents
- Protection Based on your Behavior
- Adaptive Threat Protection (Ransomware Behavior Protection)
- Dynamic Application Containment (Zero Day Protection)
- Threat Intelligence Based Update on Protection Profiles
- Staff are trained in ATT&CK and D3FEND operating methods
- Support for Mac, Linux, and Windows including Server
- Patches/Update/DATs for protections done for you
- 24x7 Support via Phone/Email/Chat
Main Content
NAGA CYBER DEFENSE
TRUSTED SECURITY FOR ALL OF INDONESIA
YAKIN ANDA AMAN?
Mungkin Anda berpikir bahwa Anda aman saat berselancar di Internet, tetapi apakah Anda yakin bahwa setiap data yang Anda miliki (dokumen, file, foto) benar-benar aman dari penjahat dunia maya?
ANDA DALAM BAHAYA!
Anda tidak menyadari bahwa perangkat Anda yang tidak terlindungi yang sedang terhubung ke Internet tersebut sangat rentan terhadap serangan dunia maya. Ada banyak cara yang bisa digunakan untuk mencuri data berharga Anda. Salah satunya yang baru-baru ini sedang populer adalah RANSOMWARE!
Yang lebih buruk adalah RATS yang dapat melihat data berharga, uang Anda bahkan ANDA sendiri melalui ponsel Anda. Pemerasan adalah langkah terakhir yang akan mereka lakukan, namun menjual Anda di DARK WEB juga sangat mungkin dilakukan oleh aktor dunia maya!
KAMI ADALAH SECURITY AS A SERVICE
KEAMANAN UNTUK SEMUA ORANG
KAMI MELINDUNGI ANDA 24 JAM, BAHKAN SAAT ANDA TERTIDUR.
SECURITY AS A SERVICE
MENGAPA AS A SERVICE?
Model pembiayaan sederhana, semakin banyak yang kami lindungi, semakin sedikit harga yang harus dibayar untuk perlindungan. Membuat Kami mampu menemukan dan melakukan yang terbaik dari yang terbaik untuk melindungi Anda secara real-time.
APA YANG MEMBUAT KAMI BERBEDA?
Indonesia First; Dimiliki dan dioperasikan di Indonesia. Seluruh perlindungan kami dihosting di Indonesia. Cloud kami dirancang untuk bekerja di kepulauan dengan sumber daya yang terbatas untuk menyediakan layanan yang lebih cepat untuk Anda.
APA YANG MEMBUAT KAMI LEBIH BAIK?
PENGALAMAN…
Pendiri NCD mulai mengamankan dunia maya pada Tahun 1987. Kami menggunakan pengalamannya dan keterampilan kami untuk membangun cara yang lebih baik berdasarkan Best Practice yang telah terbukti dan teruji untuk membuat Anda tetap aman.
KOMITMEN
KEPADA PELANGGAN
Kami memiliki beberapa kebijakan. Yang paling penting: Kami tidak berbicara mengenai pelanggan kami kepada siapapun!! Anda adalah satu-satunya, yang berhak untuk MENGETAHUI INFORMASI TENTANG ANDA!
Kami tidak memberikan informasi mengenai pelanggan kami dan kami meminta kepada pelanggan untuk menjaga lingkaran kepercayaan dengan tidak membicarakan kami juga. Kami terus berusaha untuk menjaga agar celah yang berbahaya bagi Anda KECIL. Kami meminta Anda untuk membantu kami melindungi Anda dengan melakukan hal yang sama.
KAMI ADALAH SOLUSI
Professional Endpoint Solution
Business Enterprise Protection for Workstations & Laptops
Advanced protection for your Endpoint including Windows, Linux, and Apple.
Data Loss Prevention for PDPL
Sensitive and confidential data will be stored securely in your business.
- Includes “Professional Endpoint” Protection
- Data Loss Protection (DLP) Endpoint: For PII Protection and PDP LAW 27 of 2022 Compliance
- Provides comprehensive protection for all possible channel leaks, including removable storage devices, cloud, email, instant messaging, web, printing, clipboard, screenshots, file sharing applications and more.
- You can define your data protection based on your business needs and functions.
- Create custom Discovery Scans of your Endpoints to find Business Classifed / PII / PDP data in the places you don't want it.
- Create custom Protection Rules to block movement of data to only that have a "NEED to KNOW".
- The data you want to keep safe where you want it.
- Application Control (Whitelisting) helps to protect content and provide change management controls to prove secure data for compliance.
- Hard Disk Encyrption for Data At Rest protection
- DLPe Provides Data in Use protection
- File and Removable Media provides Data in Motion Protection
- Microsoft Sharepoint Protection Included
- Custom Reporting and Dashboards
- Helpdesk support for DLP controls
- Evidence Collection Secure on Your Site for Legal Compliance
- We PROTECT YOUR DATA. We DO NOT GET TO SEE YOUR DATA.
- Support in Data Loss Prevention policy tuning.
- Consultation for creation of Data Lost Prevention Policy and Procedures is EXTRA via Naga Cybersecurity
- Training for PDP execution and daily operations provided by Naga Cyber Academy
Mobile Threat Defense^ (MTD)
Protection for Android or IOS (Apple) Mobile Devices (HP & Tablet)
- Protection without disturbing or violating your privacy.
- Notifications of when hackers are trying to break in to your device from WIFI or Bluetooth networks with
- Behavior level protection from local software so that internet is not needed to get protection.
- Zero Day Malware Detection from a SOC manned 24x7 to help you keep intruders out of your private life.
- Provide Network Security with a VPN to protect you on PUBLIC Hotspots.
- Protects you from Phishing attacks on Social Media or from those who target you directly.
- Protects you when you are ON or OFF the Internet and when you think your device is sleeping.
- eMail/Signal Chat/Phone support as you needed, when you needed it the most.
Continuous Monitoring PENTEST+
Constant Monitoring facilitates Risk Validation and Hardened Configuration Compliance. By doing your Pentest 24x7x365
- All Protection Plus “Professional Endpoint”.
- Policy Auditor who performs configuration assessments against the latest compliance standards, including CIS, CJIS, PCI DSS 3.2, SOX, GLBA, HIPAA, FISMA, EU GDPR, ISO 27001, NIST 800-171, and COBiT frameworks for Windows and Linux
- Allows you to verify daily if the system does not have the latest CVE patch and/or if a third party application or patch violates your security standards.
- Provides a means to historically prove compliance based on Continuous Monitoring status.
- Application Control (Whitelist) is again used to prove that configuration and control files are like .ini files and ini are not modified by third parties or attacks.
- Encrypt Hard Drives, Files & Removable Media to help protect system data at rest and in motion to prevent Fileless and Living off the Land attacks from modifing control files.
Cyber Resilience for Endpoint
Professional Endpoint, Data Loss Prevention and Continous Monitoring in one package.
- All of the Protections we offer in one managed solution
- Quickest path to meeting Cyber Resilience Compliance requirements as required by Perpres Nomor 82 of 2022 and the follow on Ministries Regulations for required Endpoint protections.
- Provides the protections required by PDP Law 27 of 2022
- Gives you a foundation to build Security Operations Center (SOC) Identify, Detect, Protect, Respond and Recover security controls on.
- We provide you with remote Tier 1 to Tier 4 SOC response services working with your team handling touch labour and other on-site Tier 2 to 4 services .
- We can direct information to your SIEM or use our own to support you.
- Add our OSINT Threat Intelligence services based Security Scorecard and other OSINT tools to help control your Attack Surface.
- Add Server Protectons to give you a complete protection profile by allowing us to protect your on-premise and cloud data center resources.
- Add Network Protections like NIPS, Web Gateways, Reverse Proxies and Next Generation Firewalls.
- Replace your VPN with our Customized MESH NETWORK solutions to secure your Enterprise as a Single Indentity reducing risk and cost of operations overnight.
Protect Your Servers and Cloud Resources
PDPL requires more than DLP on the desktop for protection or compliance!
Bare Metal Protections
Best suited for most Bare Metal Standalone Servers requiring protections from within a strong trusted network. Please look at the Internet Server Protection Solution for systems that are exposed to the Internet.
- Managed Endpoint Security for your servers (Windows or Linux).
- We recommend the usage of full system hardening to CIS standards per your Applications and base OS.
- ON top of this you should have a Endpoint Security tool suite that has active support in near real-time.
- Adaptive Threat Protection with Malware cleaning (Anti-Virus) based on Zero Day Intelligence data.
- Real-time Application aware Firewall provides localized Network Intrustion Protections on the Server.
- Optional capability to place the server within a Meshed Intranet to remove ATTACK Surface points of entry while still allowing for SECURE REMOTE Management.
- Ask us about creation of a SIEM for your operations team or having us Collect and Manage your Resources from our SOC for you.
- PLPL controls require full audit of all PII data within your environment not just what is on the desktops.
Virtual Server Protections
Best suited for most Virtual Servers requiring protections from within a strong trusted network. Protections for both the Hosting and Client Servers within your Virtual Environment. Please look at the Cloud Server Protection Solution for systems that are exposed to the Internet.
- Protections are based on the Hypervisor used. (VMware, OpenStack, Citrix Xen, Hyper-V, AWS and Azure)
- Again we Recommend that the systems be fully hardened to CIS standards per your Applications and base OS. Windows or Linux OS supported
- Hypervisor style determines if we are using Agent Based or Agentless Security Tool.
- Our Protections are for the same controls as Bare Metal just installed and managed differently.
- Please let us know what you use for Virtual Environments. Be they based on Dockers, Cubes and Full Virtual Machines are all supported
- Network Visibility viathe Micro-Segmentation based firewall.
- Optional capability to place the server within a Meshed Intranet to remove ATTACK Surface points of entry while still allowing for SECURE REMOTE Management
Cloud Security
We provide protections for your Cloud Supply Chain. We can secure your cloud resources be it Software as a Service like Microsoft 365 to Servicenow or Slack. We can provide you with the solution your business needs.
- Cloud Workload Security for Cloud and Cloud Hybrid (Google, Redhat, Oracle, VMware, OpenStack, Citrix Xen, Hyper-V, AWS and Azure)
- Cloud Access Security Broker (CASB) for Shadow IT, Microsoft 365, MS Drive, Google Drive, Dropbox, Slack, Salesforce, ServiceNow, Workday.
- Data Lost Prevention (DLP/PDP) solutions for your Cloud Resources such as Microsoft Sharepoint, Cloud eMail and other archive locations.
- Secure Mesh Networking to control and secure cloud applications and servers for Remote Worker and Direct Office access.
- Secure Web Browser to allow Developments to have access to the web with out compromising your DEV\SEC\OPS environment.
- Access Controls built on CASB, Web Gateway, Reverse Proxy and Mesh Networking to help you move to Zero Trust Architecture faster across your digital footprint.
Database Security Suite
The Keys to the Castle, the Golden Nugget are terms used to refer to your data. It is the item of interest, the target of theft. Is yours protected as well as it should be?
- Datacenter Security Suite for Databases comes with a Databases Activity Monitoring (DAM). DAM provides real-time monitoring of database activity allowing you to monitor transactions and interactions of the data base for Security Policy violations.
- The Database Security has a memory based intrusion prevention and virtual patching for databases allowing you to delay patches until a code review is complete on how patches will impact your applications.
- Vulnerability Manager for Databases which can scan databases and notify on: patch levels, detected vulnerabilities, insecure code, weak passwords, rootkits and other malware that a third party as added to your Database.
- Log Collection to an external system that is isolated and secure from the production enviroment is normally a missing security control. This solution covers this control plus allows for Database Restoration based on the history collected in a timely manner.
- Solutions can by placed On-Premise with you or securely at our Data Center via a Private Mesh Network allowing us to management your environment via a total OPEX solution.
Continuous Monitoring PENTEST+ for Servers
Ease of Risk and Compliance Validation of hardened Configurations for servers.
- Policy Auditor who performs configuration assessments against the latest compliance standards, including CIS, CJIS, PCI DSS 3.2, SOX, GLBA, HIPAA, FISMA, EU GDPR, ISO 27001, NIST 800-171, and COBiT frameworks for Windows and Linux
- Allows you to verify daily if the system does not have the latest CVE patch and/or if a third party application or patch violates your security standards.
- Verify what software microcode is installed. Review current libraries, bundles, jar files and scripts to ensure that "Zero Day" code issues are remediated in a timely manner before the hacker can use the exposure against you.
- Manage Licenses by verifying where software is installed on a daily basis. Know when an employee has loaded something "NEW" from the Internet.
- VERIFY COMPLIANCE to Company Standards of Configuration based on department, user job roles, and needs. Do assume that everyone is following Acceptable Usage Policies, KNOW if they are!