Outpost Office Firewall Product presentation. What is Outpost Office Firewall? Software firewall solution designed especially to meet small and medium.

Slides:



Advertisements
Similar presentations
Securing Your Computer 1,2,3 The Basics Just the facts……..  In 2003, Symantec documented 2,636 new computer vulnerabilities, an average of seven per.
Advertisements

Outpost Network Security Product presentation. What is Outpost Network Security? Combined manageable software firewall and anti-spyware solution designed.
Protect and control your PC’s.  Clean Slate restores your computer to its original configuration discarding unwanted user changes.  Settings are restored.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Internet, Intranet and Extranets
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Cyber X-Force-SMS alert system for threats.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
LittleOrange Internet Security an Endpoint Security Appliance.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Norman Endpoint Protection Advanced security made easy.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
1 Computer Security: Protect your PC and Protect Yourself.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Data Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
IT security By Tilly Gerlack.
Honeypot and Intrusion Detection System
CYBER CRIME.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
1 Protecting Consumers from Themselves Presented by the State Information Security Office & the California Office of Privacy Protection September 13, 2007.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Small Business Security Keith Slagle April 24, 2007.
Lesson 11: Configuring and Maintaining Network Security
Network Security & Accounting
NetTech Solutions Protecting the Computer Lesson 10.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Introduction TO Network Administration
Computer Security By Duncan Hall.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Safe’n’Sec IT security solutions for enterprises of any size.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
One-of-its-Kind, SmartCOP.Easy3S is a revolutionary virus removal technology launched by one of India’s rapidly growing companies, Cyber Astro Ltd. With.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Armenia Twinning 2011 Component F – Information Society, 2 – 6 May DEVELOPMENT OF INFORMATION SOCIETY STATISTICS IN LITHUANIA SURVEY ON.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Chapter 7. Identifying Assets and Activities to Be Protected
Top 5 Open Source Firewall Software for Linux User
Securing the Network Perimeter with ISA 2004
Cyber Security By: Pratik Gandhi.
Firewalls.
Call AVG Antivirus Support | Fix Your PC
Check Point Connectra NGX R60
Web Servers / Deployment
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

Outpost Office Firewall Product presentation

What is Outpost Office Firewall? Software firewall solution designed especially to meet small and medium businesss needs Protects each and every company PC from both external (Internet) and Internal threats (e.g. hacker attacks, data theft, PC infiltrations, etc) Allows system administrators to set networking rules for PCs and user applications to easily secure company IT infrastructure

Contents Outpost Office Firewall – why would your company need it? Security threats Possible solutions: Hardware Firewall, Anti-Virus, Outpost Office Firewall What is Outpost Office Firewall Package contents How it all works? System requirements Support How to purchase?

IT security solutions – thats what professionals think The average survival time for an unprotected networked computer dropped from 40 minutes to 20 minutes over the last year - SANS Institute of Bethesda For every in-house attack reported, there could be as many as 50 that go either unreported or undetected – The Computer Security Journal Viruses and worms are the leading information security concerns and continue to generate the most media and public attention. But CIOs and other IT executives are increasingly recognizing the significance of internal threats... – Global Information Security Survey, Ernst&Young LLP 86% of Computer Crimes originate from inside the company network – Intranet Security It's bad enough for SOHO / individual users not to use a firewall - absolutely unconscionable for a business to operate without (a correctly configured) one -

Most cost-dangerous security threats Source: Ernst&Young LLP

Security solutions available – Hardware Firewall Weaknesses: Ignores web pages content (i.e. Active Content) Regards all outbound traffic as trustworthy, thus leaving your company defenseless against Trojans and Spyware, should they infiltrate your employees PCs (e.g. through Active Content flaws) Doesnt monitor internal network traffic, so if a hacker gets inside your company networks, he becomes almost omnipotent Strengths: Blocks illegal inbound traffic Analyses traffic on network interface layer Standalone unit

Security solutions available – Anti-Virus Weaknesses: Anti-virus database MUST contain the viruss signature to allow ant-virus recognize it Doesnt offer any protection against hacker attacks, whether internal or external, exposing your company to risks of sensitive data losses and leakage Loads some system resources on employees PCs Strengths: Monitors s and web pages for potential viruses Monitors files for malicious code contamination

Security solutions available – Outpost Office Firewall Weaknesses: Doesnt include anti-virus yet Strengths: Blocks illegal inbound and outbound traffic on each PC in your company network, protecting your company from both internal and external threats Analyses traffic on both network interface and application layers, blocking communications for all potentially dangerous programs, like Trojans, Spyware etc. Allows system administrators to set client firewalls to block potentially dangerous attachments and web pages scripts

Multi-Layer Protection approach Outpost Office Firewall – core defensive element Hardware Firewall – to strengthen you protection against external attacks Anti-Virus ensures no malicious code is run on any PC in your company Outpost Office Firewall – Core Element of Your Company IT Security

Contents Outpost Office Firewall – why would your company need it? Security threats Possible solutions: Hardware Firewall, Anti-Virus, Outpost Office Firewall What is Outpost Office Firewall Package contents How it all works? System requirements Support How to purchase?

Outpost Office Firewall Package Agnitum Command Center Outpost Office Firewall Client Agnitum Update Service Agnitum Publisher Service

Outpost Office Firewall Client Protecting company PCs from both external (Internet) and internal threats Forcing firewall settings to client PCs Remote deployment

Agnitum Update Service Centralized update deployment Controlling software on the company PCs Minimal system requirements

Screenshots

Agnitum Publisher Service Centralized rules and configurations deployment Minimal system requirements

Screenshots

Agnitum Command Center Controlling network software on the company PCs Setting up rules for the PCs and for separate applications as well Update Service and Publisher Service management

Screenshot

Contents Outpost Office Firewall – why would your company need it? Security threats Possible solutions: Hardware Firewall, Anti-Virus, Outpost Office Firewall What is Outpost Office Firewall Package contents How it all works? System requirements Support How to purchase?

System requirements To allow remote deployment Windows 2000 or 2003 Domain Controller Administrator PC Windows XP, 2000 Pro or 2003 Server operating system Client PCs 233 MHz Intel Pentium or compatible CPU 32 MB RAM Windows 98, Me, 2000, XP or 2003 Server operating system 30 MB of hard disk space Agnitum Command Center doesnt need to be installed on company server!

Contents Outpost Office Firewall – why would your company need it? Security threats Possible solutions: Hardware Firewall, Anti-Virus, Outpost Office Firewall What is Outpost Office Firewall Package contents How it all works? System requirements Support How to purchase?

Support service for Outpost Office Firewall

Contents Outpost Office Firewall – why would your company need it? Security threats Possible solutions: Hardware Firewall, Anti-Virus, Outpost Office Firewall What is Outpost Office Firewall Package contents How it all works? System requirements Support How to purchase?

How to download and purchase Outpost Office Firewall? Download Outpost Office Firewall 15 day trial here: Purchase online here: Purchase through the network of our Solutions Providers or Distributors. To locate your nearest partner, please follow this link: For additional information please see Outpost Office Firewall page on our website: or contact us via or phone: http://agnitum.com/products/oof/index.html

Thank you for your attention! Yours sincerely, Agnitum Ltd, Team