DECISION GROUP INC.
Home
2012.12.05          www.edecision4u.com

How to Defend Your Network by Effective Way Case Study from a Hacker-Threaten Company

(From Taipei, Taiwan) Few days ago one of our customers sent a thanks letter to us about the effective alarm and protection of our E-Detective system against unexpected intrusion attack from external threats. As there are many different kinds of intrusion attack by different way, we are highly interested to know how customer uses our solution and how to align our system with company IT governance. So, I pay me visit to Johnny, IT manager of our customer, and had an interview with him.

First, Johnny gave me an introduction about company IT facilities and the IT governance behind it. This company is just like other Taiwan SMB enterprises with 200 employees in different departments for retail chain store management in textile and garment business. In order to maintain a leading role in this fashion industry, you need to keep a seamless value chain from suppliers to end customers. All this value chain highly relies on high efficient operations by IT systems and networks. In the mean time, competition is also everywhere in this industry: from supply side of designer, purchase side of supplier, logistic side, marketing side, to product merchandising and point of sales sides in the store…etc. All these processes must be strongly supported by IT facility and staff to keep company ahead of other competitors in the business.

The information flowing from the upper stream of designer, supplier down to consumers is the most valuable asset of company, and also the target competitors want to know, especially those data of supplier, customer, stock, store revenue…etc. That’s why IT security management is the top priority in this company. Before, lots of efforts by competitors were made to steal data through versatile ways. Because of good IT security system implemented, there were few successful incidents, which were caught later on by police.

Since few months ago digital identity of a senior manager was stolen by an external hacker, which unfortunately he didn’t know, there have been some sensitive information with data of suppliers, customers, daily business transaction and stock moved to outside unknown place. With daily network traffic recorded by Decision Group E-Detective system, Johnny found out there is abnormal data movement to external side, because the data transmission is usually happened at midnight, and data is all of business confidential. Johnny knows this senior manager very well, and he has never tried to access company IT system at midnight before.

Johnny felt there must be an identity stolen issue behind, collected all digital evidence, had senior manager change his digital identity, and called the police. From information collected by E-Detective, police quickly found out the IP addresses of hacker, and the destination, which data moves to. Eventually police caught this hacker, brother of an ex-employee in Johnny’s company now working in the competitor company as merchandise manager.

“This case can be easily found and identified thanks to powerful data analysis capability of E-Detective.” said Johnny, “There are tons of data in our network pipeline among company, suppliers and customers every day. The alarm function of E-Detective pushes us to examine entire security mechanism initially, and later the data reconstruction capability of E-Detective allows us to collect the data leakage facts of account, IP, scope of data, period.”

“It is our responsibility to provide an effective network forensic solution to help our customers prevent from those malice network hacker,” said Casper Chang, CEO of Decision Group, “and we are working on development of enhanced data mining analysis module to provide insight capability on the long term reconstructed data.” At this moment, lots of companies are just like what Johnny has done for protection on their confidential business data. E-Detective now provides data traffic capture, content data reconstruction with more than 200 protocols, and data analysis with network behavior pattern and online alarm.

As the witness from Johnny on data leakage pretection, “I deeply hope that corporate customers can be free from network and IT threats by Decision Group solutions one day.” said Casper Chang.

 

About Decision Group
Decision Group, established in 1986, is one of the leaders in manufacturing of PC-Based Multi-Port RS232/422/425 Serial Cards, Data Acquisition, Measurement Products, Industrial Automation and Control Systems. Decision Group, from the year 2000, started new line of industry involved in designing and development of equipment and software for Internet Surveillance and Forensics Analysis Solutions. 

Decision Group also provides OEM/ODM services of its network forensic solution with deep packet inspection (DPI) technology to other partners worldwide. Decision Group has also developed a comprehensive training course, known as Network Packet Forensics Analysis Training (NPFAT), and has set up training centers worldwide for hands-on training, with certification option as well. 

More Information and Contact by Email: decision@decision.com.tw
URL: www.edecision4u.com (Global), www.internet-recordor.com.tw (Taiwan), www.god-eyes.cn (China), www.decisionjapan.com (Japan) , www.decision-groups.com (Singapore), www.e-detective.de (Germany), www.edecision4u.fr (France), www.edecision4u.es (Spain and Latin America)

More Information and Contact - Ms. Isabelle Huang
URL : http://www.edecision4u.com
Email address : decision@decision.com.tw
Skype: decision-computer
Phone: +886 2 2766 5753
FAX: +886 2 2766 5702