Project Description

ClearSky provides cyber solutions focused on three main pillars: IR services, Threat intelligence services, and Cyber defense turnkey projects

Company Profile

Over the years, ClearSky team has encountered numerous types of cyber attacks, from individual hackers to state sponsored attacks. We are helping top tier organizations to combat cyberattacks. Over the last few year we have led several governmental cyber defense projects around the world; designing, building and operating governmental Security Operations Centers (SOC), CERTs, and research teams. As such, we detect, investigate and mitigate countless attacks and incidents, including large-scale Denial of Service attacks, advanced malware attacks (e.g. ransomware and spyware), as well as high level attacks against national Internet infrastructure. Our team of experts created a special methodology combining agility, adaptivity and a unique Knowledge Center to prevent millions of cyberattacks every single day. Over the past years, ClearSky has developed a compressive TI methodology using several tools that enable us to collect data and analyze it in order to protect critical assets. Our monitoring system detect phishing infrastructure, APT new infrastructure, leaks and new cyber-attack methods.

How will the product/service, assist orgenizations dealing with current cyber threats?

ClearSky’s IR work include the following steps: • Understand the scope of the attack, infected systems, and critical systems for the organization. • Set emergency team to work with the organization’s IT team. • Establish a secure communication channel with the team and the organization’s management. • Disconnect all infected machines from the internal network and disconnect the network from external sources. • Use Clearsky’s advanced Threat Intelligence and monitoring tools to identify the ransomware type and possible modus operandi needed to recover from it. • Analyze, re-configure and harden the firewall. • Start 24X7 monitoring of the systems to prevent new infections. • Deploy DNS level protection. • Pay ransom for critical infected machines that did not have a proper backup. • Deploy endpoint monitoring and advanced threat protection tool. • Scan the network for critical vulnerabilities. • Help the internal IT team to establish back critical systems. • Start the recovery phase. • Create "first aid" security controls to prevent next attack. • Create new security architecture. Create summary report of the attack including our insights and recommendations ClearSky's cyber threat Intelligence services provides information that will help mitigate and negate cyber attacks, just like having your own highly trained security expert unit for cyber. Our Threat Intelligence services include the following: • 24/7 Threat Intelligence alerts. • APT hunting – mapping and monitoring relevant APT groups. • Recurring reports on recent incidents, vulnerabilities and threats. • Direct IOC feed that interfaces with the client’s security monitoring systems.

Technical description of the product/service

ClearSky’s IR work include the following steps: • Understand the scope of the attack, infected systems, and critical systems for the organization. • Set emergency team to work with the organization’s IT team. • Establish a secure communication channel with the team and the organization’s management. • Disconnect all infected machines from the internal network and disconnect the network from external sources. • Use Clearsky’s advanced Threat Intelligence and monitoring tools to identify the ransomware type and possible modus operandi needed to recover from it. • Analyze, re-configure and harden the firewall. • Start 24X7 monitoring of the systems to prevent new infections. • Deploy DNS level protection. • Pay ransom for critical infected machines that did not have a proper backup. • Deploy endpoint monitoring and advanced threat protection tool. • Scan the network for critical vulnerabilities. • Help the internal IT team to establish back critical systems. • Start the recovery phase. • Create "first aid" security controls to prevent next attack. • Create new security architecture. Create summary report of the attack including our insights and recommendations
For more information, contact us

Can’t find your challenge here?
Add your own challenge and find relevant Israeli Cyber companies.

What is your challenge?