Meet the Technology

3D cyber attack surface analysis solution

CLAW

Features

CLAW – a 3D Cyber Battlefield

Ingest, Visualize, Investigate, Remediate, Collaborate.   A fully-integrated virtual environment that reveals gaps in your cyber strategy and reduces wasted-time by your cyber team. 

Step 1 - Ingest

CLAW ingests data directly from your devices or as batch files imported at regular intervals.  Asset Discovery, protocols, performance, vulnerabilities, risk and firewall configurations are all supported directly by CybernetIQ’s connectors.  Even non-tradional data such as deception technology, insider threat, and database risk, and content tracking can be imported.

Step 2- Visualize

Using a series of lenses, CLAW visualizes layers of data in a 3D Virtual Reality engine that allows your cyber team to quickly and seamlessly move around your cyber battlefield.  The interface is so intuitive and easy to use that your team will see, rather than be told, what they should prioritize.

Step 3 - Investigate
With a single Cyber Battlefield, CLAW reduces false positives by showing your team the most critical threats in a virtual space.  When your cyber team wants to dive deeper, they can initiate penetration testing on any node, right from CLAW.
              
Step 4 - Remediate

CLAW allows your team to immediately adjust fireall rules, ports and protocols, and communication pathways, right from one interace.

Step 5 - Collaborate

CLAW provides an easy way for your team to share knoledge and collaborate on risk.  All updates, changes and conversations are recorded directly on the nodes and within the Cyber Battlefield.

360 Risk Resiliency Report

The most complete risk report on the market.  

Step 1 - On-boarding

Info Gathered:
List of Cyber Tools
Published Policies
Cyber Partners
Network Topology
Mobile Environment
Data Sensitivity
Web/Mobile Applications
Customer Interviews

Step 2 - CLAW Battlefield Creation

Includes:

On-boarding validation
CLAW Integration
3D Battlefield Creation
Policy Review
Cloud environment & Strategy
Cyber Insurance Review
End-of-Life Hardware Check
Software Licensing Review

Step 3 - Risk Review and Assessment

Includes:

Network Plan
Cyber Plan
Hardware/Software Plan
Mobile Plan
Incident Response Plan
Cyber Insurance Plan
Policy Templates
Recommendations
3D Battlefield Analysis 

Step 4 - Draft Review

Includes:

3D Battlefield Review
Assumptions Review
Recommendation Review
New Requirements
Adjustmens

Step 5 - Final Report, Executive Summary

Includes:

Executive Presentation
Project Plan for Recommendations

Step 6 - 90 Day Review

Includes:

30/60/90 Day follow-up

Some of the biggest security gaps I have seen exist between the ‘gaps’; complex weaknesses between domains or partners.  CybernetIQ is attacking that problem with an approach that may disrupt the industry.

Craig Bowman

Vice President, Cybersecurity, Verizon

CLAW has allowed us to maximize the return on investment on our security resourcing expenditures (tools and people) further strengthening our posture and situational awareness.

Zeina Matta

Principal Consultant - Cyber Resilience, Matta Security

We're Here To Help!

Office

7 Bayview Rd.
Ottawa, Canada K1Y 2C5

Hours

M-F: 9am – 5pm
S-S: Closed

Call Us

(877) 236-6996

Share This