Can the most significant changes be implemented based on the Reconnaissance alone?
Yes, the report provided as part of the service contains the necessary information to directly improve security.
How long does it take to receive a report?
The customer receives their report approximately a week after the work is completed.
Is Reconnaissance a complete examination?
No, the goal of Reconnaissance is to provide measurable results in a short period of time based on selective security verification.
What is TAMA?
TAMA is a scalable and powerful operator-grade service solution that provides comprehensive protection against DDoS attacks. It is the only solution of this kind in Poland, tailored to the needs of a telecommunications operator. The service is available in several options, depending on the customer's needs.
How does EXATEL differ from other operators in Poland?
We are a State Treasury Company. We protect critical infrastructure (military, police, government institutions, medical services, etc.), so we know the importance of data quality and protection. We are both an operator and a leader in cyber security. Additionally, in 2021, we opened our own teleport and started to provide satellite services.
What range of cyber security services can EXATEL offer me?
Our company offers a wide range of professional cyber security services. Exatel’s key services include: monitoring and incident handling by Security Operations Center, antimalware protection, data leakage protection (DLP service), penetration testing, security audit and our proprietary DDoS attack protection system – TAMA.
What can my company risk if I do not conduct a proper security audit?
Cybercriminals' methods to hack companies' systems are becoming increasingly more complex. A successful cyber attack can have a serious impact on business continuity. For example, criminals can lock down all company computers, halt production processes, and even steal company customers sensitive data.
Why do I need a security audit?
The value of data the company is obliged to protect is much higher than the cost of a security audit. In addition, companies are required to conduct periodic security audits or penetration tests.
When the penetration tests needs to be performed?
Penetration tests should be performed when:
- relevant data (e.g. personal, medical, payment card data) is processed by a web app,
- a significant part of the company's business is based on web apps made available on the Internet,
- the value of the protected data significantly exceeds the cost of the audit and other security measurements applied,
- there is a suspected breach of application, infrastructure or data security,
- your company wants to minimise the risk of an attack on IT resources,
- your company is obliged (by law, internal procedures, etc.) to periodically conduct security audits or penetration tests).
What is penetration testing?
Penetration tests consist in conducting a controlled attack on the client's IT systems. It allows for practical assessment of the current state of the company's security.
How are penetration tests implemented?
Penetration tests are implemented in three variants:
- blackbox (the tester is not equipped with any knowledge about the system under tests),
- graybox (the tester has limited knowledge about the system under tests),
- whitebox (the tester has access to all information about the system under tests).
What are the consequences of a data leak?
Disclosure of this type of data can expose a company to criminal, civil and reputational liability. A data leak would also mean a number of unplanned expenses for the company related to: identifying victims, informing those affected by the data leak and the need to provide them with certain services, PR activities, legal services, loss of customers (and issues connected with acquiring new ones) and loss of reputation.
What is data leakage?
Data leakage means an unauthorised disclosure of data outside the company through a theft or unintentional action of the company's employees. This data contains information that is protected for business (business secrets) or legal reasons (personal, sensitive, financial and medical data).
What is the EXATEL'S antimalware service?
EXATEL's antimalware solution is a comprehensive protection of customer’s IT resources against known and unknown malware. The service is provided on a central platform located in our Data Center and on the customer's devices. We provide the service on the Elevate XDR platform from Fidelis Cybersecurity.
How does malware impact your computer?
The impact of malware on one's computer can range from displaying unwanted ads (adware) and taking over computer cameras (camjacking) to locking computers for ransom (ransomware). It may happen that infected computer becomes a part of so called botnet and participates in DDoS attacks without the knowledge of its owner. Some malicious codes can steal data and lead to reputational or financial losses for the company.
Where to start in terms of organizational IT security?
The first step taken in order to create/modify a process protecting an organization against cyberthreats should be a security audit. This allows the drawing up of a map of security vulnerabilities and threats, including their assessment and recommendations for remedial actions. Starting the process by merely investing in a security system is a mistake. It entails a risk of inadequate or unnecessary costs and time loss.
Can you use TAMA on a line from an operator other than EXATEL?
Yes - one of the service deployment variants enables protection when using the line of another operator.
I have DDoS protection, so why do I need TAMA?
TAMA is an operator-class solution that is scalable and provides security up to 80 Gb/s. It can be used in combination with a smaller system installed at the customer’s premises - or instead of expensive, foreign operator solutions.
Do I require DLP protection?
Over the past few years, data security and personal data security (in particular) have become a priority. Therefore, GDPR was added to such applicable standards as ISO/IEC 27001, ISO/IEC 27032, PSI-DSS. It should be recognized that a potential leak can even lead to insolvency, regardless of its volume. This is why this threat, no matter the extent to which your organization uses IT solutions, should not be underestimated.
What is malware?
Malware is the general name covering broadly understood malicious software that is harmful to a digital device user. Malware types include viruses, worms, Trojan horses, backdoor, exploits, rootkits, key loggers, ransomware and many more.
Why is a sourced SOC better than in-house?
Using your own Security Operations Centre is much more expensive than utilizing professional sourced services. This is mainly due to the high entry barrier, but also large running costs. If the core activity of (even a large) organization is not cybersecurity, it will be difficult to achieve a service quality guaranteed by EXATEL at a similar price.
Why do I need SOC?
The Security Operations Centre is the only service that combines continuous (24/7) event monitoring with the knowledge and experience of professionals who are able to quickly identify and appropriately respond to incidents.
Are SOC services available only to large organizations?
Certainly not. SOC services include a whole range of products, some of which are intended for small and medium-sized organizations with lesser resources. In the course of initial meetings, our team will help you choose the best solution for your organization.
I want to convince the Management Board to invest in cybersecurity. How can you help me with that?
Cybersecurity is a process and an investment at the same time, the return on which is often hard to show within an organization. The SOC Starter service can be a solution to this issue. The efforts of our specialists give IT managers specific arguments for discussion – we provide a map of threats and a plan for further, potential actions, facts, numbers and examples. They facilitate convincing Board Members to invest in a security system for the organization.
What is ARFA?
ARFA is the continuation of the TAMA project - it is a set of additional modules that can be used to equip the TAMA anti-DDoS solution. Owing to new techniques added in the field of DDoS attack detection and mitigation, ARFA enables preventing, among others, new volumetric attacks.
I have three lines I want to install TAMA on. How do you price such a service configuration?
The service is priced per line.
Is it possible to get statistics on the attacks prevented by TAMA?
Yes. You will have a client portal at your disposal with presented information on alarms and implemented mitigations that are actions aimed at preventing or eliminating attack consequences.
Who can become a DDoS attack target?
The recent years have seen large corporations, as well as local government units, non-government units, associations and small-sized enterprises fall victim to attacks. The ease of conducting such an attack means that no organization is too small to be affected.