Security software for today’s enterprise marketplace

Slides:



Advertisements
Similar presentations
w w w. b y t w a r e. c o m NATIVE VIRUS DETECTION FOR THE iSERIES powered by McAfee Executive Presentation.
Advertisements

Into the Breach: Preventing Data Theft Strong Bear LLC Palisade, Colorado June 2010.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
For further information computersecurity.wlu.ca
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Data Encryption Overview South Seas Corporation Jared Owensby.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Server 2008 Terminal Services and Remote Desktop Services Basic application access is possible without Citrix, and Server 2008 R2 adds on some key features.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Norman Endpoint Protection Advanced security made easy.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Continuous Backup for Business CrashPlan PRO offers a paradigm of backup that includes a single solution for on-site and off-site backups that is more.
Small Business Security Keith Slagle April 24, 2007.
CHECO Jared Owensby – Technical Paul Herbka – Pricing & Purchasing South Seas Corporation.
Topic 5: Basic Security.
Computers Sue Kayton April Keep the computer physically clean Don’t install programs you don’t need Watch out for viruses! Turn off the computer.
Introduction TO Network Administration
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Computer Security Keeping you and your computer safe in the digital world.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Section II Terms Emily Stepp.
Chapter 6 Application Hardening
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Fuel Cap Reinvented Fueloyal Presents Smart Fuelcap
TECHNOLOGY GUIDE THREE
Backdoor Attacks.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Computer Virus and Antivirus
Forefront Security ISA
Business Risks of Insecure Networks
OLMEK Building a confidential and secure communication between a Bank and its customers March 2006.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security of a Local Area Network
SECURITY INFORMATION AND EVENT MANAGEMENT
Matt G change over point ?
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
IT 200 STUDY Education for Service-- it200study.com.
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Information Security Session October 24, 2005
Outline Overview Development Tools
CHECO Jared Owensby – Technical Paul Herbka – Pricing & Purchasing
Secure once, run anywhere Simplify your security with Sophos
Introduction to Systems Security
Implementing Client Security on Windows 2000 and Windows XP Level 150
DATS International Portfolio.
G061 - Network Security.
INTERNET SECURITY.
Presentation transcript:

Security software for today’s enterprise marketplace Strong Bear Development January 2018

About Strong Bear A technology development company with over 18 years of experience. Developer of Device Detection System (DDS), a security software product that monitors and reports all drive activity IN REAL TIME on all devices that are connected to an organization’s network. Strong Bear is seeking an asset sale of its Device Detection System technology.

Device Detection Systems (DDS) DDS is a client-server security software application that: Protects proprietary company data from theft, loss and intrusion through a removable media device. DDS is scalable and easily integrated into the existing PC environment. DDS will not interfere with anti-virus, firewall, or spyware protection software. DDS runs on OS platforms Windows XP and above. DDS has been tested on all Windows Server software.

DDS Client and Server The server software monitors media devices attached or removed at client workstations. DDS is transparently downloaded to all client workstations. Its operation is invisible to the user.

DDS Alerts When an unregistered device is detected by the client monitoring software an alarm is generated by the server. DDS logs the intrusion of this unauthorized device and reports it IN REAL TIME to the IT department.

DDS PC Tracker DDS can track lost or stolen computers and notify the IT department when that computer connects to the internet.

DDS Threat Prevention Monitors all media devices attached to a computer such as hard drives, flash drives, cell phones, digital cameras, etc. Tracks file activity on media devices. Creates history file of all client activity. History file may be used to comply with Sarbanes-Oxley Act (SOX.) Can be saved in customizable formats. Tracks lost or stolen client computers and laptops.

DDS Market Readiness DDS is market-ready. Product manual written. DDS code has been internally tested. DDS has an estimated 12-month head start. DDS is patented (US 8,478,860 B2).

Endpoint Protection Magic Quadrant Gartner Group defines all PC security as “Endpoint Protection”. DDS will help niche players advance one quadrant.

DDS is Different Symantec Endpoint Protection offers a complete package of anti-virus and spyware protection. Symantec also closes off USB ports and drives. No part of this package is similar to DDS since DDS does not close off ports or drives, but instead monitors them and reports any access as it occurs IN REAL TIME. Sophos Safeguard provides data encryption for PCs. DDS DOES NOT ENCRYPT DATA but will operate seamlessly with Safeguard to monitor all media devices attached to the PC.

DDS is Different McAfee Device Control protects company data by defining security policies which dictate what data can be transferred to removable media and what cannot. DDS tracks the media devices and pinpoints users who have accessed this data. Panda Security for Business offers a complete anti-virus protection. DDS in addition tracks the media devices attached to a workstation for even better layered security.

DDS is Different Microsoft Forefront is identity management software. This product only allows properly identified users access to a computer system. DDS gives additional security tracking by logging all removable devices attached to the client computer even if the user is pre-authorized. Eset’s Smart Security provides extensive anti-virus protection. DDS augments that protection by monitoring removable media devices and alerting the network admin when an unauthorized device is used, which could potentially infect the network.

DDS is Different CA HIPS provides intrusion detection and prevention in a software suite. DDS augments this by continuous tracking of removable media. eEye’s Blink anti-virus is breaking new ground with their new methods of virus detection. DDS provides intrusion detection to this service by alerting network authorities of unauthorized media devices used by authorized clients.

Management Team Suzan Bernhard – CEO Co-Owner, Strong Bear LLC, Teacher, Business English, Roosevelt University BA, MA in Sociology, Roosevelt University, Chicago, IL Rodney Roberts – CTO IT Manager, Endovascular Technologies, Menlo Park, CA Civil Engineer, Polydyne Engineering, AK; Alaska Engineers & Surveyors, AK; M&R Surveying, AK Ron Gardner – Chief Engineer Teacher, Computer Programming, IntelliTec Colleges Software Engineer, Ametek/Dixon, Grand Junction CO; Ada Business Computers. Ada OK; Jarman Technologies L.L.C, Paul’s Valley OK

Asset Offering Strong Bear intends to sell its patented and patent-pending technology as part of a strategy to monetize its IP portfolio and find the right vehicle for its solution to be represented in the market.

Contact Robert Ferri Principal Nagle-Ferri 555 Florida Street Suite 220 San Francisco, CA 94110 bob.ferri@nagle-ferri.com (415) 575-1589