The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.

Slides:



Advertisements
Similar presentations
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Advertisements

Which server is right for you? Get in Contact with us
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
AcuManager rich media core engine AcuManager is the heart of AcuLearn’s Content Delivery Network (CDN) architecture. It works with AcuStudio to speed up.
About DataViz, Inc. In business 25 years 13+ years experience in the mobile industry Specializing in Office compatibility for non-Microsoft platforms.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Unified Logs and Reporting for Hybrid Centralized Management
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
We can help make your terminal server a peak performer COMPANY INTRODUCTION.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
MiVoice Office v MiVoice Office v6.0 is mainly a service enhancement release, rather than a user feature rich enhancement release.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureSurf Protect your users when surfing the Internet.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Managing Client Access
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
IPNexus Briefing Instant Messaging and Collaboration.
Barracuda Load Balancer Server Availability and Scalability.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
ShopKeeper was designed from the ground up to manage your entire fleet maintenance operations … from 1 user to 100, including full security features that.
Securing Microsoft® Exchange Server 2010
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
Chapter 9: Novell NetWare
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Philadelphia Area SharePoint User Group Building Customer/Partner Extranets Designing a Secure Extranet with Sharepoint 2007 Russ Basiura RJB Technical.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Name Company A Day in the Life… A Demonstration of Application Delivery.
1 1 Hosted Network Security EarthLink Complete™ Data.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
Module 5: Configuring Internet Explorer and Supporting Applications.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Module 7: Advanced Application and Web Filtering.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Implementing Microsoft Exchange Online with Microsoft Office 365
Module 1: Overview of Microsoft Office SharePoint Server 2007.
1st Technology Spontaneous and encrypted multimedia connections between users with dynamic IP addresses or ports, and visitors connecting through tunneled.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
User and Device Management
WHAT WE OFFER Go-To-Market Services MICROSOFT AZURE APP BUILDER PROFILE: MxHero MxHero, launched in 2012 in New York, is a cloud-based application that.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
MetaFrame Secure Access Manager Overview Presented by Douglas A. Brown.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
BUILD SECURE PRODUCTS AND SERVICES
Contents Software components All users in one location:
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Barracuda Web Filtering Service
Customized Solutions to your needs
MICROSOFT OUTLOOK and Outlook service Provider
Unit 27: Network Operating Systems
Cloud Security for Endpoints
AbbottLink™ - IP Address Overview
Employee Monitoring Solution
Securing web applications Externally
Introducing MagicInfo 6
Presentation transcript:

The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to the Internet, enabling safe and centrally managed employee Web browsing from within corporate networks. COCKPIT4i allows employees to browse the Internet from a totally separate network environment. Instead of filtering Web data, the product keeps all Web data outside the enterprise network and does not allow any potentially harmful elements to enter it. Users will notice almost no difference in the way they access the Internet. COCKPIT4i thus combines the highest possible level of security and best user browsing experience. COCKPIT4i - Solution Architecture JetroPlatforms.com Enterprise Level Secure Browsing - COCKPIT4i Product Brochure Jetro Platforms LTD. 5 Haofan St., Petach- Tikva 49130, Israel P F “Jetro COCKPIT4i is the only solution that provides the level of security of a separate network environment, from a single desktop environment “ Comsec Consulting

Secure Browsing - COCKPIT4i Seamless Web Access for Enterprise Users  Seamless and transparent browsing experience using Internet Explorer  Same launch methods for both internal and external browsing  Synchronizes personalization between internal and external browsing Smart Links URL Switching  Automatic and seamless switching between internal browsing and remote virtual browsing  Virtual Web browser launches directly from non-Web applications including s, MS- Office documents or any other source on the user’s client desktop Smart Links Firewall  Built-in white-listing and blacklisting  Rule-based access control to websites according to multiple parameters such as user name, client machine, as well as schedule access control Secure File Download  Built-in secure download management  FTP/HTTP ports remain strictly closed throughout the entire download process.  Integrates with file cleaning/launching solutions  Integrates with the organization’s malware defense solutions Secure File Upload  Built-in secure upload management  FTP/HTTP ports remain strictly closed throughout the entire upload process  Integrates with data leakage prevention and content inspection solutions  Rule-based upload management enables restriction of upload by websites, user names and more Secure Send2Me  Simple and intuitive alternative method for downloading content  Point-and-click on a target to send the target via  Content passes through the regular corporate security screening for incoming s Favorites and Cookies Synchronization  Synchronizes between the user’s favorites on the desktop and the user’s favorites in the virtual browser  Synchronizes between the user’s cookies on the desktop and the user’s cookies in the virtual browser Secure Web Browsing Features JetroPlatforms.com Infrastructure Secure Browsing - COCKPIT4i

Complete Anonymity  Virtual browsing is performed under randomly generated user names and user groups  Translation of real user names is kept only inside the network  Only administrators can access the translation tables  Prevents exposure of employees’ identities to the target web sites  Complete anonymity without losing the ability to integrate with proxy servers Robust Foundation  Highly scalable architecture that supports multi-server farms of virtual browsers  Full redundancy and hot failover for all system components  Supports complex network deployments including multiple sites, zone preferences, and more  Central administration and reporting  Tight Active Directory integration  Automatic centralized distribution of software upgrades COCKPIT4i – Secure browsing policy limit Jetro COCKPIT4i - Secure Browsing Secure Web Browsing Features Why do we win? Unique and managed solution using a unified browser Eliminates the need for two desktops/browsers per user Advanced redirection capabilities combine the highest security level with the best user experience No open ports from external to internal network Complete managed solution: Users, policies, URLs Jetro COCKPIT4i - Secure Browsing JetroPlatforms.com Secure Browsing - COCKPIT4i

Application Delivery Platform Our Customers Finance / Banking Insurance Government Services Utilities Manufacturing Transportation Other Industries Jetro COCKPIT4i - Secure Browsing JetroPlatforms.com Secure Browsing - COCKPIT4i