BRAND POINT PROTECTION: ONLINE BRAND PROTECTION
BRAND POINT PROTECTION: ONLINE BRAND PROTECTION
Group-IB
Main activities:
® ONE OF THE LEADING INTERNATIONAL COMPANIES THAT SPECIALIZE ON PREVENTION AND INVESTIGATION OF CYBER CRIMES AND HIGH-TECH FRAUD
3 4 5
® Computer forensics and cyber crime investigation
® Information security audit and security analysis
® Development of innovative information security products
2
® Cyber Intelligence, monitoring and prevention of cyber threats
2
1
® Brand protection and Anti-piracy
CERT-GIBcomputer
security incident
response team
1 2 3 4
® The first 24/7 CERT in Eastern Europe
® Transcontinental support ® Countermeasures against the following types of threats :
® .RU, .РФ, .SU: a competent organization on combating cyber threats
NEW YORK
SINGAPORE
MOSCOW
CERT-GIB is the first round-the-clock computer security incident response teamin Eastern Europe
Monitoring and response groups are present in different parts of the globe :North America Europe Asia
Phishing, spam, DDoS attacks, malware, botnets
An expert organization of the Coordination Center for TLD RU/РФ
3
GROUP-IB’S EXPANSION PHASES
GROUP-IB CREATED
2003 2009 2010 2011 2014
ENTERS THE INTERNATIONAL MARKET BECOMES THE LARGEST
COMPUTER FORENSICS LABORATORY IN EASTERN EUROPE
CERT-GIB CREATED
BECOMES AN ORGANIZATION WITH UNIQUE COMPETENCIES
20+
30+
100+EMPLOYEES 4
5
® Mobile App Monitoring
4 5® Anticounterfeiting
1® Antiphishing ® Antipiracy ® Protection of
business reputation
2 3
BRAND POINT PROTECTION
® An efficient solution for round-the-clock monitoring, notification and response to incidents of online brand abuse
Online threats to brands
6
® A brand is a set of information about a company, product or service; it is a popular, easily recognizable and legally protected symbol of a particular manufacturer or product
® Black PR and unfair competition
41® Phishing and
other fraud® Illegal distribution of
digital content
2® Distribution of
counterfeit and adulterated products
3 5® Dissemination of
confidential information
7
Antiphishing
® Monitoring, detection and notification of incidents of phishing and other cases of online brand abuse.
® Monitoring the Internet by keywords and images for the presence of fraudulent sites
1
® Investigating sites found for fraud
2® Removing fraudulent sites
from direct and public access on the Internet
3
Protection ofbusiness reputation
8
® A package of countermeasures against online spread of false or defamatory information undermining the reputation and image of a company and its employees.
® Information space audit, search for information related to an entity whose reputation is at stake
1® Creation of thematic trends
in search engines by creating tips for search strings with subsequent progress on selected search queries
2® Creation and placement
of thematic materials (press releases, news) on information resources to fill search queries
3
Anti-piracy
9
® A package of countermeasures against illegal distribution of digital content and other intellectual property on the Internet.
® Searching for sources of illegal distribution of digital content using regular expressions
1® Preparing and sending
legal notices to administrators of violating sites
2® Automatic removal
(moderation) of sources of illegal distribution of digital content from largest resources immediately after being detected by the system
3® Continuous analysis of
response to legal notices sent in order to further adjust the strategy of interacting with specific resources
4
Mobile App Monitoring
10
® A solution for identifying and responding to cases of appearance of a software product on mobile app stores, which infringes intellectual property rights and designed to steal personal data.
® Notifying the customer about detected rogue applications, followed up by presentation of a report concerning the developer, number of downloads and a description of the fraud scheme
2® Monitoring online
shops selling applications for IOS, Android, BlackBerry, and Windows Phone
1® Immediate removal of
rogue apps from public sources.
3
Anticounterfeiting
11
® Finding and identifying the sources and distribution channels of counterfeit goods on the Internet in order to stop such illegal activities.
® Gathering information about the people and companies directly involved in the distribution of counterfeit goods on the Internet
® Documentation of violations involving online distribution of counterfeit goods
® Implementation of legal and technical measures aimed at checking the distribution of counterfeit goods and online brand abuse
1 2 3
Benefits
4®Increased trust
in the brand
1®Increased
market value for your company
By managing the security and volume of your company’s intangible assets, such as copyrights, know-how, trademarks, and business reputation
Timely detection of brand abuse and notification to ensure the safety of your brands.
2®Increased sales
revenues
Interruption of cash flows to attackers’ projects. Removal of sources of illegal distribution of counterfeit goods and confidential information
3®Improved
business reputation
Wiping out false and negative reviews undermining your company’s business reputation from search queries
5® Compensation
for damages caused
Prosecuting the criminals abusing your brand
12
13
Our customers
Financial sector Energy, industry, IT
14
www.group-ib.com [email protected]
facebook.com/groupib twitter.com/groupib
youtube.com/groupib linkedin.com/company/group-ib
+1 253 243-31-38