eSafe ® SmartSuite™ Overview Noam Lando, Director Product Strategy Nilly Assia, Sr. Product Marketing.

Slides:



Advertisements
Similar presentations
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Advertisements

Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
© 2009 WatchGuard Technologies WatchGuard XCS Extensible Content Security Superior Security with Lowest TCO.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Norman Endpoint Protection Advanced security made easy.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
Srinivas L Technology Specialist – Security | Microsoft
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
SafeNet eSafe SmartSuite Reseller Starter Pack Promotion Q
Barracuda Load Balancer Server Availability and Scalability.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
A l a d d i n. c o m eSafe ® Overview a l a d d i n. c o m 2 © Copyright 2008 Aladdin Knowledge Systems Ltd. All rights reserved. Aladdin, Aladdin.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
Securing Microsoft® Exchange Server 2010
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
Vantage Report 3.0 Product Sales Guide
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
© 2009 Wipro Ltd - Confidential 1 Security Challenges and Opportunities -Indian ISP Scenario.
Network security Product Group 2 McAfee Network Security Platform.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
WHAT OUR CUSTOMERS ARE SAYING “After thorough market research and a review process, Qorus Breeze Proposals stood out from the competitors because of its.
Bill Jensen Bashar Kachachi Session Code: SIA309.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
Implementing Microsoft Exchange Online with Microsoft Office 365
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Web Content Security Unlock the Power of the Web
BUILD SECURE PRODUCTS AND SERVICES
Trend Micro Consumer 2010 Easy. Fast. Smart.
Hybrid Cloud Web Filtering Platform
Web Content Security Unlock the Power of the Web
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Web Filtering Service
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Ralleo Enterprise-Grade Solution for Managing Change and Business Transformation Provides Opportunities to Better Analyze Real-Time Data MICROSOFT AZURE.
Securing the Network Perimeter with ISA 2004
Hosted on Azure, LoginRadius’ Customer Identity
What’s New in Fireware v12.1.1
Check Point Connectra NGX R60
Presentation transcript:

eSafe ® SmartSuite™ Overview Noam Lando, Director Product Strategy Nilly Assia, Sr. Product Marketing

Agenda  SafeNet Overview  What’s new in eSafe SmartSuite  Why eSafe SmartSuite  Web Security Gateway  Mail Security Gateway  eSafe Reporter  eSafe for ISPs  Messaging and Positioning  Marketing Materials  Do you want to be Sure?  Q&A

3 SafeNet Overview  Global success with over 25,000 customers in 100 countries  Employees: 1,600 in over 25 countries  Revenues: ~$500 million  Best-in-class Security Technology: products certified to the highest security standards  Founded: 1983  Ownership: private SafeNet is the largest company exclusively focused on the protection of high-value information assets.

What’s new in eSafe SmartSuite?  DLP - pragmatic data aware monitoring, enabling the detection and control of risks surrounding sensitive data in motion  Enhanced Anti-Malware Protection - dual complementary antivirus and anti-malware engines  Insight and analysis tools - “out-of-the-box” trend analysis and reporting tools delivers insight into business data allowing for improved business decisions

Content Security Market Drivers

Focus on the Mid Market Big Functionality  Complex deployment  Complex operation  Require intense product knowledge Easy to Use  “Entry-level” protection  Limited flexibility/options/scale  Limited attention and support a tough choice for the mid-market Smart Functionality Smart deployment choices Smart security Smart management

Filling the Gap Deliver a solution that is: What you need When you need it Where you need it In a way you can actually extract the value out of it So smart it makes everything simple…

 Annual sales volumes ranging from $10 million to $500 Million  Customer’s average IT budget: 8.3% of revenue*  Geo distribution – customer with multiple sites  Number seats – approx. 500 – 5000 seats Identifying the Mid Market *CIOinsight.com, Feb 11, 2008 “SMB IT Spending Holds Steady”

Web Reporter ISP Mail eSafe SmartSuite Product Family

Web Mail SSL DLP Reporter eSafe – New Features Interfaces

Intelligent, Real-time Web Content Inspection eSafe Web Security Gateway Web

eSafe Web Security Gateway Web Security Real time, deep inspection Protection with zero impact on user experience URL Filter granular user control policies Effectively enforce acceptable web use policy AppliFilter™ Control Internet traffic, over 500 apps, e.g. web 2.0, P2P, IM, etc. Enforce application usage policies & control malicious communications Web SSL scanning of incoming and outgoing SSL encrypted traffic Ensure policy enforcement and protection on SSL encrypted traffic

Web Security Control Control dynamic threats associated with Web 2.0 content  Performs real-time deep content analysis of Web 2.0 content  Proactively identifies all malicious scripts and malware  Strips only the threats, keeps the rest of the web content intact  Zero impact on user experience

Web Browsing Control - URL Filter Effectively enforce acceptable web use policy Controls access to inappropriate, non-productive, and potentially malicious sites Supports granular user control policies 70 different categories More than 100 million categorized sites Up to 150,000 new or revised daily updates

Web Applications Control - AppliFilter™ Enforce web applications use policy Controls Internet traffic and application protocols More than 500 applications in 20 categories Detects application protocols on any port Among controlled categories: –Malicious applications: Spyware, Key-loggers –Instant Messaging –Skype –Peer to Peer –Streaming Multimedia –and more…

Internet usage control – protocol enforcement Enforce Acceptable Internet Use Policies  Prevents Remote Control  Prevents Protocol Tunnelling  Unauthorized use of SSL/443 port  Unauthorized use of HTTP/80 port  Unauthorized protocols

Internet Usage Control – Anonymizers Prevent security circumvention  One of a kind: blocks all known and unknown anonymous proxies  Prevents possible legal liability  Provides protection against circumvention and anonymity techniques

Internet Usage Control – HTTPS Traffic Enforce acceptable usage policy for encrypted HTTPS/SSL traffic  Decrypts / encrypts HTTPS/SSL traffic on the fly  Inspects and enforces content security policies  Validates certificate policies, issuers, revocations, etc.

Intelligent Security and Anti-spam eSafe Mail Security Gateway Mail

Security and Anti-spam Block viruses and spam  Dual anti-spam engine blocks 99% of spam  Proactively blocks malware and zero-hour outbreaks  Strips phishing elements from messages  Self Management SPAM Quarantine, dramatically reduces administration overhead

Data Leakage Prevention (DLP) eSafe DLP is an easy-to-use solution for passive monitoring of business communications, both external and internal, including Web and mail:  Deep content analysis for outgoing traffic  Content-based policies  Prebuilt dictionaries in all west EU languages eSafe assists in identifying who is sending what data where and how, and provides actionable intelligence to reduce the risk of data loss and to manage compliance.

Flexible & Scalable Deployment  Flexible Deployment Options  Inline, Bridge, Router and Proxy deployment modes  Multiple Form Factors  Virtual appliance  VMWare  Purpose-built appliances  Reliability & High Availability  Cluster solutions for high availability and redundancy  Integrations with 3 rd party Load Balancers  Redundant components on eSafe appliances eSafe

Management & Control

 Multi-admin hierarchical access control  Centralized Dashboards  Centralized Configuration  Centralized analysis

Policy Control  Granular User/Group policies for:  DLP - Content Analysis  Application Filters  URL Filters   LDAP /AD / eDirectory integration

Pragmatic DLP  Turn-on, monitor, get alerts, investigate, act!  Web, web 2.0, messaging  Simple, without the typical hassle of DLP

eSafe Reporter Reporter

Web Browsing Reporting Contains 240 predefined reports with drill down capabilities: Dashboard reports Detailed reports Analytical reports Individual user reports Report formats: HTML, PDF, XLS Scheduler for generating and sending reports by

Web Security services platform for ISPs SecureSurfing™ ISP

eSafe Secure Surfing – ISP Value Proposition Industry first and only complete web security value- added services platform for broadband service providers  Generate new data ARPU  Increase customer satisfaction  Reduce spyware related inquires  Differentiate premium offering  Seamless service activation ISP – Value Proposition Differentiate Drive Business Improve Productivity Offer a unique Value added service Offer solution to a well defined customer need Minimize chances of endpoint infection Reduce security Related help desk calls

Scalable, XSP ready service platform High availability, Telco Grade design Customizable / White Labeled Proven, field experience eSafe SecureSurfing Product Offering Real Time deep web content inspection Non blocking secure web surfing Real-time Virtual patching Clean Pipe Complete Multi-user parental control Unique hybrid technology ensures zero bypass Malware outbound activity detection Branded redirection page to allow PC cleanup Periodic end-user reports Portal based end-user interface Reporting Neutralizer Parental Control

eSafe SmartSuite Messaging & Positioning Simple. Intelligent. Security that Thinks

Moving Towards eSafe® SmartSuite™ Deploy Manage Protect / Extract Value Support Sell/Buy  Not just another eSafe version!  A philosophy that changes the way we go to market  A focus on what adds value, simplifies, improves  A new buying (and selling) experience  A focus on our product strengths  An experience that shows the customer the true business value of our solution

Benefits  Choose  Simplified product bundles  Easy access to demos, tools WTA on a stick  Deploy  Just “Plug & Protect”  Simple Install and documentation  Troubleshooting tools  Manage  Notifications/customer updates  New feature updates  Easy access to product information and updates  Retain customers  Enhanced support  Upgrade opportunities  Communications programs  Grow  On-demand training  Lead generation opportunities  Simple sales tools & marketing materials Deploy Manage Protect / Extract Value Support Sell/Buy

Simple. Intelligent. Security that Thinks  Smart - Intelligent protection and management tools  Simple - Easy to deploy, manage and maintain  (In)Sight - Tools that drive visibility and enable business value  Support – Ensure 99.9% availability

eSafe SmartSuite Marketing Materials Simple. Intelligent. Security that Thinks

Look like a Genius communications  Teasers and mailers  New updates and promotions  Microsite

Teasers

Microsite Traffic will be directed from print ad/flyer and banner ads Prize winning contest to win an iPOD Nano cial/esafe/smartsuite- site/philosophy.asp

Security that thinks promotions Print ad/flyer teaser Banner ads Promotional mailers

Sales kit  Overview brochure  Competitive matrix  Solution at a glance  Message Map  QRG

Identify your customer’s soft spots Identify your customer’s soft spots

eSafe WTA - Test Yourself Now! Web Threat Analyzer (WTA) – instantly test your Web Content Security  Identifies threats hidden from Firewalls, IPS/IDS and conventional anti-virus products  Checks effectiveness of your current Web security solution and provides a gap analysis and detailed management report  Virtually simulates the latest malware threats  No impact on your network or user experience

Plug the stick & run…

Show progress and threats…

Present the threat report.

Q&A?

Thank You !