ClearswiftCorporate Overview 2016. Copyright © Clearswift 20162 About Clearswift HQ in the UK with offices in Australia, Germany, Japan, Spain and USA.

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

Palo Alto Networks Jay Flanyak Channel Business Manager
Enabling business beyond the corporate network.
1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.
The traditional perimeter is rapidly eroding IT needs continuous data protection that work across ‘classic ‘boundaries’ Consumerization of IT Users.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Unified. Simplified. Unified Communications Launch 2007.
Top of Content Box Line Subtitle Line Title Line Ruslans Barbasins| Territory Manager – CIS, Central Asia, Caucasus Leading The World Into Connected Security.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Conference – 7-8 August, 2013 Presented by David Melnick | pg 1 Employee Privacy and Organizational Security: August 8th, 2013 Addressing.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Protecting Customer Websites and Web Applications Web Application Security.
Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.
About Us Inception in 2001, Bitdefender has continued to raise the bar to set new standards in proactive threat prevention and virus removal. Offices.
Steve Bennett President & Chief Executive Officer NASDAQ OMX International Investor Program December 4, 2013.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Fortinet An Introduction
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
The Changing World of Endpoint Protection
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
2015 Security Conference Dave Gill Intel Security.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Unified. Simplified. Unified Communications Launch 2007.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Microsoft and Symantec
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Copyright © Clearswift Clearswift Corporate Overview 2016.
Reach us at Call: | Visit:
Complete Cloud Security Anyone, anywhere, any app, any device.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
AT&T Premises-Based Firewall Enhanced SBS Solution
Real-time protection for web sites and web apps against ATTACKS
Cloud Security Market Share
Introducing ProxyClient
Securing the Threats of Tomorrow, Today.
Microsoft Data Insights Summit
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

ClearswiftCorporate Overview 2016

Copyright © Clearswift About Clearswift HQ in the UK with offices in Australia, Germany, Japan, Spain and USA 160+ Employees 24x7 Global Support Operations Experts in deep content inspection and policy based information management New entrant on Gartner DLP MQ Innovating in Data Loss Prevention and Information Governance

Copyright © Clearswift APT Adaptive DLP WEB Security DLP V1 Security ANTISPAM ANTIVIRUS IPS VPN FIREWALL LOCK & KEY Today’s Cyber Security Landscape High price (1) being paid for high volumes of critical information Spending on threat prevention is increasing to match sophistication and velocity of attacks Organizational impact of attacks can be catastrophic Traditional anti-malware no longer effective against next generation attacks Cloud collaboration and social media increase attack vectors Security solutions must be able to adapt to new ways of working Evolution of Threat Landscape Layer 3-4: CONNECTION Layer 1-2: PHYSICAL HARDWARE THEFT ADVANCED TARGETED ATTACKS Layer 5-7: CONTENT & APPLICATION STATE SPONSORED ATTACKS POLITICAL ACTIVISTS TARGETED DATA THEFT MOBILE INTRUSION MALICIOUS APPS MALICIOUS BOTNETS SPEAR PHISHING SPAM BOTNETS RANSOMWARE ILLEGAL CONTENT HACKERS TROJANS VIRUSES & SPYWARE DISRUPTION INTRUSIONS & WORMS Performance, Damage, Loss Implications (1) Price that hackers receive for high volumes of stolen data. Increasingly complex cyber security landscape

Copyright © Clearswift Region / Country Regulation / Directive Penalties European General Data Protection Regulation 4% WW Revenues or €20 Million Multiple laws all overseen and enforced by Federal Trade Commission Unlimited. FTC apply penalties based on scope of data breach Privacy Act 1988$1.7 Million The Protection of Personal Information Act (“POPIA”) €650,000 Act No. 101/2000 Coll. on the Protection of Personal Data Up to CZK10 million + 8 years imprisonment for severe cases MyNumber (2016)To be confirmed Challenges Cyber-AttacksCorporate Governance Increasing number of high profile cyber security incidents and expanding regulatory and governance requirements add to growth drivers

Copyright © Clearswift Customers 2,500 customers, 6.5 million seats Largest customer: 350,000 seats Process ~1 billion messages / month Deployed on-premise (appliance, software, virtual) and in the cloud 20%+ have more than one product Average sale £7,000 foundation products / £15,000 new products

Copyright © Clearswift Customers by Geo & Vertical

Copyright © Clearswift Product Portfolio Clearswift’s suite of products allow customers to progress along the information security maturity curve from basic hygiene in and web gateways, through to the next generation of Adaptive Data Loss Prevention solutions. SECURE Web Gateway* (introduced in 2006) Enables secure collaboration by automatically removing sensitive, policy-breaking content SECURE Gateway* (introduced in 2005) Multi-layer spam and malware defence mechanism and deep content inspection of s and attachments SECURE File Gateway (introduced in 2012) Adds file content inspection features to client’s existing applications and services Core OfferingsNew Offerings Endpoint DLP Management Server (introduced in 2014) Applies centralized information management policies to include the endpoint Information Governance Server* (introduced in 2013) Sits in the heart of the network and provides a central repository for critical information SECURE Exchange Gateway* (introduced in 2013) Applies DLP policies to internal communications to prevent the sharing of inappropriate data SECURE ICAP Gateway* (introduced in 2013) Designed to co-exist with existing web security provider using industry standard ICAP functionality SDK* (introduced in 2008) A toolkit built from the Deep Content Inspection engine. Capable of inspecting n number of content layers (where n is defined by memory and disk space capacity) ARgon For & OEM* (introduced in 2015) World’s first adaptive DLP solution, removes the exact policy-breaking sensitive data and embedded malicious content Adaptive Redaction Feature* (introduced in 2013) Advanced feature set covering Data Redaction, Document Sanitization, Structural Sanitization New Products and Features Foundation

Copyright © Clearswift Product Portfolio Easy-to-use, consistent Advanced Data Loss Prevention, across all communication channels – SECURE Gateway – across the organisation boundary – SECURE Exchange Gateway – Internal – ARgon for – Adaptive protection for 3 rd party gateway solutions Web – SECURE Web Gateway – SECURE ICAP Gateway – for use with 3 rd party web proxies, for example F5 and Blue Coat Endpoint – Critical Information Protection for Data- At-Rest discovery, Data-In-Use removable media and USB Control Information Governance – Information (sub-file granularity) track and trace – Proactive policy enforcement – Information provenance reporting Internal Perimeter Internet SECURE Web Gateway SECURE ICAP Gateway SECURE Gateway SECURE Exchange Gateway SECURE File Gateway Software Development Kit Remote Client iPhone PMM CIP: Endpoint DLP Information Governance Server ARgon for

Copyright © Clearswift Recent Awards & Accolades New entrant on Gartner DLP Magic Quadrant (Jan 2016) – Only 10 companies featured Product Awards for SECURE Gateway, SECURE Exchange Gateway Innovation Awards for Adaptive Redaction, Adaptive DLP Service Awards for Best Support

Copyright © Clearswift Recognised Thought Leadership New entrant on the 2016 Enterprise DLP Magic Quadrant; (only 10 vendors accepted) Accepted in the 2015 Market Overview report Accepted into the DLP Tech Wave report, planned for publication in 2016 Highlighted in the September 2015 report as a provider of critical information protection software used to enforce the new EU GDPR, as well as other regulation Placed as an Innovator for the landscape report in Received Trend Setter award for continued innovation, compliance and security focus Revisiting their previously published DLP vendor landscape due to inconsistency of the previous report. Clearswift should be placed in the Innovators quadrant Placed as a Champion in August 2014 report Placed in the prominent position for functionality / value Industry AwardsResearch Recognition

Copyright © Clearswift Technology Partners Finalizing for Mobile DLP

12 Copyright © Clearswift 2016 “Clearswift enables secure collaboration by delivering 100% visibility of critical information, 100% of the time”