You are on page 1of 2

AUJAS

Brief
The objective of the Video is to highlight the challenges with Software Security Vulnerability
Management today, and How our solution helps solve it. Someone seeing the 1-2 min video should
get convinced to see a demo/Talk to us.

The theme/storyline should be light and engaging to senior IT/Security folks in large enterprises (US
Audience)

Script

1. There is a flood of security vulnerability information out there (show CVE codes like CVE-
2017-5575, CVE-2016-1000217, CVE-2008-5807, CVE-2000-0531 and text like Threats,
Exploits, Vulnerabilities, Security patches).
Lines start coming from top and bottom following these comes lines from sides forming a
grid. This grid is then taken into perspective on which buildings pop-up (organizations). CVE
codes are displayed in speech bubbles and the text is followed by lines connected to
organizations.

2. There are lots of IT assets internally with different versions of software (show servers,
desktops, data centre, laptops, smart phones, IOT devices and text Microsoft, Oracle,
Java, Adobe, Unix).
A cube enters the screen which then breakdowns to small rectangles which morph into
devices (Devices have the company logos mentioned above).

3. It is a tough job to match the two sides, and be able to fix the problem quickly (show chaos
and confusion within the organization, and lots of running around)
A hierarchy of devices is shown in which one devices de-links. An office environment is shown
in which heads starts popping up with a question mark on their heads that turns into
exclamation mark (people running around the cubicles).

4. It takes a lot of time to decide which vulnerabilities to patch. Also the time to fix the
problem keeps getting delayed. (show people trying to place cards with CVE value in front of
each asset)
A person sitting in front of a computer placing a CVE Value Card.

5. Tracking using spreadsheets and co-ordinating with others team members via email/phone
is painful (show an organization distributed across the globe. US, Europe, Asia)
Lines enter the screen to form a globe with latitudes and longitudes and buildings popup in
different regions. These elements scatter to make a spreadsheet with a bar graph in it.
6. As a result the company is vulnerable to cyber attacks (show data breach news items will
provide)
Data breach news items are attached at the top of each bar in the graph. A bar starts falling
which ultimately leads to the fall of other bars (Each bar is formed from the organization
building from the globe)

7. This is a cyclic problem. By the time you fix 1 set of problems, the new set of vulnerabilities
is ready, and it starts all over again. (show a hamster inside a wheel)
The Bars that haven fallen are again structured to show the fixation of a problem and a new
graph from some other spreadsheet starts falling. Hamster inside a wheel appears
simultaneously supporting the text.

8. Aujas SAVP - Security Analytics and Visualization Platform- to the rescue. It is an advanced
security analytics platform to manage Vulnerability Management using advanced Machine
Learning, NLP, and Clustering Algorithms.
Text with the Aujas Logo is shown and the elements for NLP & Clustering Algorithms float in
background.

9. FOCUS on risks pertaining to your IT assets only 300 Intelligence BOTS sweep the internet
for vulnerabilities, threats and exploits for 1.5Million products. It discovers the composition
of your IT assets, and helps prioritize by mapping the two sides. Even before CVE. (show all
the external things from scene 1 get sucked into a funnel, similarly show all the internal
things from scene 2 get sucked into another funnel. Match the 2 to show a horizontal hour
glass. Show a check-list as the end outcome)
All the transitions mentioned above will be implemented.

10. AUTOMATE vulnerability management It aggregates all kinds of data; structured,


unstructured and hybrid, and the BPMN 2.0 compliant workflows help route to the right
people across the global organization to fix. Analytics helps de-bottleneck remediation
process. No more spreadsheets and emails. (show the confusion from scene 3 getting
organized/streamlined)
Fixing the problem shown in scene-03

11. SAVE time and resources Sit back, relax and watch the system automate day to day tasks.
Advanced machine learning algorithms makes it better every passing day, and it is always ON
so that there are no surprises between scans. (Show a CISO and a small team sit-back and
look at a dashboard screen)
A Chief Information Security Officer looking at the dashboard with his team behind.

12. To see a DEMO/ Know more visit www.aujas.com, www.savpbyaujas.com


Call To Action button is displayed with the contact information.

You might also like