Copyright © Clearswift 20161 Clearswift Corporate Overview 2016.

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

Palo Alto Networks Jay Flanyak Channel Business Manager
Enabling business beyond the corporate network.
1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Top of Content Box Line Subtitle Line Title Line Ruslans Barbasins| Territory Manager – CIS, Central Asia, Caucasus Leading The World Into Connected Security.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureSurf Protect your users when surfing the Internet.
Conference – 7-8 August, 2013 Presented by David Melnick | pg 1 Employee Privacy and Organizational Security: August 8th, 2013 Addressing.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.
About Us Inception in 2001, Bitdefender has continued to raise the bar to set new standards in proactive threat prevention and virus removal. Offices.
Steve Bennett President & Chief Executive Officer NASDAQ OMX International Investor Program December 4, 2013.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Fortinet An Introduction
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
The Changing World of Endpoint Protection
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
2015 Security Conference Dave Gill Intel Security.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Implementing Microsoft Exchange Online with Microsoft Office 365
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Microsoft and Symantec
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
ClearswiftCorporate Overview Copyright © Clearswift About Clearswift HQ in the UK with offices in Australia, Germany, Japan, Spain and USA.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Small Business Solutions Copyright 2014 Trend Micro Inc.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
Reach us at Call: | Visit:
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
AT&T Premises-Based Firewall Enhanced SBS Solution
Real-time protection for web sites and web apps against ATTACKS
Cloud Security Market Share
Introducing ProxyClient
Securing the Threats of Tomorrow, Today.
(With Hybrid Network Support)
Microsoft Data Insights Summit
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

Copyright © Clearswift Clearswift Corporate Overview 2016

Copyright © Clearswift About Clearswift Global cybersecurity coverage with offices in the USA, UK, Australia, Germany & Japan 20 years of secure content, and web security expertise – Developed first Deep Content Inspection Engine 1996 and MIMEsweeper Technology Innovating in Adaptive Data Loss Prevention and Information Governance Turning heads with unique technology – New Entrant on Gartner Magic Quadrant for Enterprise Data Loss Prevention (DLP) –Winner of SC Magazine Europe “Best Security” Award –Winner of Info Security Product Guide’s Best New Product (ARgon for ) & Companies with Tomorrow’s Technology Today (Adaptive Data Loss Prevention) Install Base: 70+ countries | 7M+ active licenses – Trusted by the top cybersecurity teams for our detection rate and more complete protection – Defense/Government/Finance 71%, Other 29%

Copyright © Clearswift Customers 2,500 customers, 6.5 million seats Largest customer: 350,000 seats Process ~1 billion messages / month Deployed on-premise (appliance, software, virtual) and in the cloud 20%+ have more than one product Average sale £7,000 foundation products / £15,000 new products

Copyright © Clearswift Customers by Geo & Vertical

Copyright © Clearswift APT Adaptive DLP WEB Security DLP V1 Security ANTISPAM ANTIVIRUS IPS VPN FIREWALL LOCK & KEY Today’s Cyber Security Landscape High price (1) being paid for high volumes of critical information Spending on threat prevention is increasing to match sophistication and velocity of attacks Organizational impact of attacks can be catastrophic Traditional anti-malware no longer effective against next generation attacks Cloud collaboration and social media increase attack vectors Security solutions must be able to adapt to new ways of working Evolution of Threat Landscape Layer 3-4: CONNECTION Layer 1-2: PHYSICAL HARDWARE THEFT ADVANCED TARGETED ATTACKS Layer 5-7: CONTENT & APPLICATION STATE SPONSORED ATTACKS POLITICAL ACTIVISTS TARGETED DATA THEFT MOBILE INTRUSION MALICIOUS APPS MALICIOUS BOTNETS SPEAR PHISHING SPAM BOTNETS RANSOMWARE ILLEGAL CONTENT HACKERS TROJANS VIRUSES & SPYWARE DISRUPTION INTRUSIONS & WORMS Performance, Damage, Loss Implications (1) Price that hackers receive for high volumes of stolen data. Increasingly complex cyber security landscape

Copyright © Clearswift Region / Country Regulation / Directive Penalties European General Data Protection Regulation 4% WW Revenues or €20 Million Multiple laws all overseen and enforced by Federal Trade Commission Unlimited. FTC apply penalties based on scope of data breach Privacy Act 1988$1.7 Million The Protection of Personal Information Act (“POPIA”) €650,000 Act No. 101/2000 Coll. on the Protection of Personal Data Up to CZK10 million + 8 years imprisonment for severe cases MyNumber (2016)To be confirmed Challenges Corporate Governance Increasing number of high profile cyber security incidents and expanding regulatory and governance requirements add to growth drivers Cyber-Attacks & Data Leaks

Copyright © Clearswift Product Portfolio Clearswift’s suite of products allow customers to progress along the information security maturity curve from basic hygiene in and web gateways, through to the next generation of Adaptive Data Loss Prevention solutions. SECURE Web Gateway* (introduced in 2006) Enables secure collaboration by automatically removing sensitive, policy-breaking content SECURE Gateway* (introduced in 2005) Multi-layer spam and malware defence mechanism and deep content inspection of s and attachments SECURE File Gateway (introduced in 2012) Adds file content inspection features to client’s existing applications and services Core OfferingsNew Offerings Endpoint DLP Management Server (introduced in 2014) Applies centralized information management policies to include the endpoint Information Governance Server* (introduced in 2013) Sits in the heart of the network and provides a central repository for critical information SECURE Exchange Gateway* (introduced in 2013) Applies DLP policies to internal communications to prevent the sharing of inappropriate data SECURE ICAP Gateway* (introduced in 2013) Designed to co-exist with existing web security provider using industry standard ICAP functionality SDK* (introduced in 2008) A toolkit built from the Deep Content Inspection engine. Capable of inspecting n number of content layers (where n is defined by memory and disk space capacity) ARgon For & OEM* (introduced in 2015) World’s first adaptive DLP solution, removes the exact policy-breaking sensitive data and embedded malicious content Adaptive Redaction Feature* (introduced in 2013) Advanced feature set covering Data Redaction, Document Sanitization, Structural Sanitization New Products and Features Foundation

Copyright © Clearswift Product Portfolio Easy-to-use, consistent Advanced Data Loss Prevention, across all communication channels – SECURE Gateway – across the organisation boundary – SECURE Exchange Gateway – Internal – ARgon for – Adaptive protection for 3 rd party gateway solutions Web – SECURE Web Gateway – SECURE ICAP Gateway – for use with 3 rd party web proxies, for example F5 and Blue Coat Endpoint – Critical Information Protection for Data-At-Rest discovery, Data-In-Use removable media and USB Control Information Governance – Information (sub-file granularity) track and trace – Proactive policy enforcement – Information provenance reporting Internal Perimeter Internet SECURE Web Gateway SECURE ICAP Gateway SECURE Gateway SECURE Exchange Gateway SECURE File Gateway Software Development Kit Remote Client iPhone PMM CIP: Endpoint DLP Information Governance Server ARgon for

Copyright © Clearswift Recent Industry Awards & Accolades New entrant on Gartner DLP Magic Quadrant (Jan 2016) – Only 10 companies featured Product Awards for SECURE Gateway, SECURE Exchange Gateway Innovation Awards for Adaptive Redaction, Adaptive DLP Service Awards for Best Support

Copyright © Clearswift Recognised Thought Leadership New entrant on the 2016 Enterprise DLP Magic Quadrant; (only 10 vendors accepted) Accepted in the 2015 Market Overview report Accepted into the DLP Tech Wave report, planned for publication in 2016 Highlighted in the September 2015 report as a provider of critical information protection software used to enforce the new EU GDPR, as well as other regulations Placed as an Innovator for the landscape report in Received Trend Setter award for continued innovation, compliance and security focus Revisiting their previously published DLP vendor landscape due to inconsistency of the previous report. Clearswift should be placed in the Innovators quadrant Placed as a Champion in August 2014 report Placed in the prominent position for functionality / value Research Recognition

Copyright © Clearswift Technology Partners Finalizing for Mobile DLP

Copyright © Clearswift Get in touch