○ Infrastructure agnostic: not tied to any specific gateway or device, maximising channel opportunities
○ Cost effective: the one-stop solution dramatically reduces set up costs and eliminates burdensome configuration
○ Using Content Disarms & Recontruction (CDR) & Keystrike Encryption
ORISECURE is a must have - the flood of threat intelligence and defensive information can no longer be analysed manually.
ORISECURE provides multiple facets of an end-to-end - cyber risk and security management solution
Common language for cyber risk and security professionals –
both operationally and strategically
○ Monitor threats and maturity of defences
○ Measure adherence to compliance standards both internal and external on a day to day basis
○ Manage and fully optimize cybersecurity posture
ORISECURE is an industrialized tool to monitor open source activities and Deep / Dark Web, with particular emphasis on virtual HUMINT operations.
○ COVERT - Prevent attacks before they occur
Our proprietary technology makes us invisible to cyber criminals. We developed hidden service locators that pinpoint and track illegal Dark Web hideouts.
○ CONTINUOUS - Detect and control organizational data leaks
By continuously tracking & discovering communication nodes across evolving darknets, we trace malicious activity back to their original sources.
○ COMPREHENSIVE - Observe the attackers' planning process
We monitor criminal activity from start to finish. From target selection, reconnaissance and planning, to the actual sale of information or goods.
○ AUTOMATIC - Generate customized & actionable intelligence
Fully Automated Intelligent monitoring algorithms provide deeper reach, more comprehensive analysis, and prioritized real-time alerts.
Comprehensive Cyber Curriculum
○ Pre-Packaged, field-proven courses. Entry level up to elite professional certification tracks
○ Authentic malware and techniques based on the most recent cyber war fare campaigns (APTs, zero-day)
○ Team (SOC, CERT) and individual-level training
○ Easily extendable and customizable scenarios
Cyber Training and Test Lab
○ Easy-to-operate private-cloud virtualization technology
○ Typical IT components: Domain servers, mail servers, file & FTP servers, DB servers, web & application servers, user workstations
○ Typical security components: Anti-virus/EPS, IDS/IPS, firewall, SIEM, forensics and incident response tools
○ Typical management components: network health monitoring and system administration tools
○ Network traffic generated to create a realistic multi-user, multi-node organization
○ Customized Network topology and components
Dark Web / OSINT surveillance
Entreprise Mobility Management
Cyber Warfare/Resilience Training
Cloud Service powered by IBM
Support Service available 24x7
Interoperable & Reliable
Cost effective & Efficient
Scalable and Flexible
"We are very happy that Origone scooped 1st place at the European/American Pitch Awards Competition during MatchFest, they should be very proud of this achievement at the prestigious CES 2017 in Las Vegas."”
“Great Cyber Resilience platform capable of identifying illegal activities on the internet at a very fast pace.”
“EIT Digital Accelerator member Origone has won first place at the European/American Pitch Awards competition during the Consumer Electronics Show (CES) 2017.”