SESSION SESSION FOCUS FOCUS
INTEGRATION DELAY
POST ATTACK WORK FLOW
STEP 1
Notification Detailed statistics and attack vector information to trigger an investigation.
STEP 2
Reports Listing of suspect files that have been corrupted. Including number of files, location, owner, etc.
STEP 3
STEP 4
Diagnosis
Recovery
Report on event logs to determine user account and executable used for data corruption.
Delete corrupt files or replace with last good version to avoid business interruption.
BLOCKSCAP - CYBER RESILIENCY TECHNOLOGY SOLUTION BLOCKSCAP BELIEVES
SERVICES • BLOCKSCAP FIREWALL • BLOCKSCAP ACCESS CONTROLS • BLOCKSCAP VPN • BLOCKSCAP SERVICE API • BLOCKSCAP HASH FILTER • BLOCKSCAP AUTHORIZED FILESYSTEMS
DETECT • INTRUSION SOURCE • WEB API GATEWAYS • SPAMMING • CRYPTOJACKING HASH • FILESYSTEM HANDLING
PREVENT • INTRUSION PREVENTION • SECURE WEB API GATEWAYS • SPAMMING • BOTNETS • DOS & DDOS • CRYPTOJACKING • MITM • SPEAR PHISING • DRIVE BY ATTACK
PROTECT DATA
CONTINUITY
RE-INSTATE DATA
An ounce of prevention is worth a pound of cure The mistakes of the world are warning message for you Presumption is the opposite of Prevention
BLOCKSCAP SOLUTION MODEL DIAGRAM
GUI ENVIRONMENT
FIREWALL
BLOCKSCAP CORE GENERATE SEED
REQUEST
HC NET CORE MANAGE ACCOUNT
POLICY VALIDATE USER INTERFACE
MAPPING SERVER WEB SERVER
SEED REQUEST & VALIDATE
LOGICAL ENVIRONMENT
REGULATORY SERVER
STORE INFO
BLOCKSENSE ENGINE CONTROL VAULT
APPLICATION SERVER
DATABASE SERVER
REQUEST VALIDATE & FORWARD RESPONSE
VALIDATE API REQUEST
PERSIST & FETCH DATA BIND APP SERVICES WITH AURORA API
MANAGE API
AI CORE
SOLUTION ARCHITECTURE
BLOCKSCAP WORKFLOW FOR CYBER SECURITY IMPLEMENT POLICIES Definition of policies and method bindings are core process. It segregates the services & policies for detection and prevention.
RESTRICT INTRUSION Blockscap abstraction layer validates the policies and request origin before establishing the process communication with the business layer.
IMPLEMENT POLICIES
RESTRICT INTRUSION
RE-INSTATE DATA Blockscap ensures higher availability of data by re-instating the primary database to the current state by analyzing the last persisted transaction hash with the recent transaction hash present in the blockchain database
RE-INSTATE
DETECT THREAT ANALYTICS
DETECT ANNOMALIES Blockscap scans critical data sources archived in the policy vault. This includes unstructured files & services, hashes, request origin and databases to create an observation. .
ANALYTICS More than 40 statistics generated from each observation. Statistics include analysis of file entropy, similarity, corruption, mass deletion/creations, and much more.
BLOCKSCAP BENEFITS
BLOCKSCAP IMPLEMENTATION PROCESS
Setup Blockchain Node
Integrate Blocksense Engine Define Policies & Controls Configure connection with Primary DB
Append Node Service RPC
SESSION Q&A