1 Maintained and Sold by NRG Networks Inc. www.nrgnetworksinc.com.

Slides:



Advertisements
Similar presentations
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
For Exchange archiving of internal and external .
Visibility. Then Control. Keep good employees from doing bad things on the Internet.
Monitors and reacts to network and server failures to ensure maximum network uptime.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.
Managed Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory.
1. 2 Presentation outline » Importance of » Using GFI MailArchiver ® to save the day » Testimonials » Reference information.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
1. 2 Presentation outline » IT pain points » GFI WebMonitor™ » Testimonials » Kudos » Conclusion » About us.
For ISA Server Real-time HTTP/FTP monitoring, anti-virus and access control.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
LittleOrange Internet Security an Endpoint Security Appliance.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Presentation outline IT pain points Top features Product snapshot
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
No. 1 anti-spam solution for Exchange/SMTP/Lotus.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
Do you know what your employees are doing when they are supposed to be working?
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
1. 2 Presentation outline » One antivirus engine is not enough » IT pain points » The product » Testimonials » Kudos » Conclusion.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
1. 2 Presentation outline » IT pain points » The product » Testimonials » Kudos » Conclusion.
1. 2 Presentation outline » IT pain points » GFI WebMonitor ® » Testimonials » Kudos » Conclusion » About us.
1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
What’s New in WatchGuard XCS v9.1. Introducing WatchGuard XCS v9.1  Enhancements that improve ease of use Improved web-based installation wizard After.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
1. 2 Presentation outline » IT pain points » The products □ GFI MailEssentials™ □ GFI MailSecurity™ » Testimonials » Kudos » Corporate overview.
1. 2 Presentation outline » IT pain points » The product » Testimonials » Kudos » Conclusion.
1. 2 Presentation outline » IT pain points » The product » Testimonials » Kudos » Conclusion.
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
Vantage Report 3.0 Product Sales Guide
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
One good idea is all it takes... to raise your profile with management.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
BUILD SECURE PRODUCTS AND SERVICES
Managing Windows Security
TMG Client Protection 6NPS – Session 7.
Barracuda Web Filtering Service
Threat Management Gateway
GetWired Internet Manager
(With Hybrid Network Support)
Presentation transcript:

1 Maintained and Sold by NRG Networks Inc.

2 Presentation outline » IT pain points » GFI WebMonitor™ » Testimonials » Kudos » Conclusion » About us

3

4 » User web browsing is a major threat to businesses’ security today » High traffic sites (Facebook/YouTube/Twitter) are a hotbed for distributing malware via shared links » Phishing scams have become increasingly common on social networking sites as scammers have become savvier and bolder in their attacks » Research by IDC shows that up to 40% of employee Internet activity is non work-related » 54 billion months were spent on Facebook in May 2011 – Nielsen » 80% of companies report that employees abuse Internet privileges by downloading pornography or pirated software IT pain points

5

6 GFI WebMonitor Real-time web monitoring, web filtering and web security made easy and affordable! » Different editions available – to offer network administrators a solution for their specific web monitoring needs. □ The WebFilter Edition provides control over what sites users can browse □ The WebSecurity Edition protects networks from viruses, spyware, phishing and other malware □ The UnifiedProtection Edition addresses all web monitoring needs in one package (combines the WebFilter and WebSecurity editions) » GFI WebMonitor is also available as a dedicated plug-in for Microsoft ISA/TMG Server

7 Address IT pain points with GFI WebMonitor (1/2) » Reduce cyberslacking and increase productivity □ Managing your employees’ web browsing habits » Maximize available bandwidth □ Controlling access to bandwidth heavy sites □ Set bandwidth quotas □ Enable proxy caching □ Streaming media and application control » Block sites based on categorization of over 280,000,000 URLs in over 77 categories » Protect yourself against legal liability

8 Address IT pain points with GFI WebMonitor (2/2) » Protect your network using a multiple layers of security □ Block downloads potentially malicious file types □ Scan using multiple antivirus engines (including scanning over HTTPS) □ Block known malicious sites or compromised sites □ Prevent visits to suspicious sites using web reputation □ Protect against socially-engineered phishing attacks » Ensure comprehensive user browsing security at a low cost and with minimal effort

9 WebFilter edition » Control Internet resource usage through web browsing policies based on time and bandwidth quotas » Restrict access to sites according to category, using a web-filtering database which provides URL coverage across multiple languages and over 280,000,000 domains » Proactively block websites identified as current and potential threats through website reputation, based on website characteristics » Allow trusted users to browse any category using soft blocking (warn and allow) » Control bandwidth by limiting access to streaming media content and applications such as iTunes, Winamp, Quicktime, Windows Media Player, etc.

10 WebSecurity edition » Create multiple user/group/IP-based download control policies to control what type of files your users can download » Scan downloaded files with multiple antivirus engines □ Norman and BitDefender included by default □ Kaspersky available as an optional third antivirus engine » Increase real-time security by checking websites against various auto-updatable engines that detect and protect you from known malicious websites » Monitor and block IM clients (MSN Live Messenger, Yahoo Messenger, Gchat/Gtalk and thin client portals, e.g., iloveim.com)

11 Comprehensive Web Security – Unified Protection Combines the functionality of each edition and includes other features which are common to all editions, such as: » The ability to monitor or block a connection in real time » The ability to drill down into browsing activity by users, categories, domains and sites through interactive reports » User and site bandwidth monitoring features to track download and upload traffic » The ability to monitor and block applications’ hidden downloads » URL/user/IP-based whitelist and blacklist

12 Monitors connections and provides statistics Product snapshot

13 Product snapshot Web filtering policies based on site categories

14 Why use GFI WebMonitor? » Protect the network from dangerous downloads in real time by □ managing what type of files users can download □ blocking known bad websites and limiting access to suspicious websites □ benefitting from multiple antivirus engines □ blocking socially engineered phishing websites and preventing data leakage » Increase productivity and reduce cyberslacking through granular monitoring and management of employee web browsing habits » Formulate and enforce an effective Internet Usage Policy » Maximize available bandwidth by controlling what type of sites can be visited, setting time and bandwidth thresholds, policies to block streaming media and through proxy caching » Help protect against legal liability

15 What’s new in GFI WebMonitor 2011 R3? (1/2) Website reputation-based filtering (WebFilter edition) » GFI WebMonitor uses the reputation score of a web site or IP address to predict the security risk involved in visiting that site Policies to block streaming media (WebFilter edition) » You can save bandwidth by enforcing policies to block streaming media audio and video across all categories of websites Soft blocking – Warn and allow (WebFilter edition) » Although blocking of certain categories of websites is recommended for most users, you might want to allow certain trusted users to override this – the concept of self-policing

16 What’s new in GFI WebMonitor 2011 R3? (2/2) Access to an activity log (WebFilter edition) » You can now see an exact trail of what a user has done – an “Activity Log”; this also includes the time and date when a specific website was visited Blacklisting of malicious websites (WebSecurity edition) » GFI WebMonitor now includes the option to automatically blacklist websites which have been confirmed to be distributing malware, phishing content or otherwise serving content with malicious intent Support for additional IM clients (WebSecurity edition) » This release adds support for blocking a number of thin IM clients such as Yahoo! Messenger, Gmail chat and instant messaging portals such as meebo.com, iloveim.com and more

17

18 Testimonials “Trussbilt decided to purchase GFI products because they are designed with the SMB in mind and the features offered an excellent fit for the company. With GFI software installed, the company was able to ensure that received was free of spam and viruses while giving IT administrators full control over the use of the Internet within the organization; thereby cutting down on unnecessary, non work-related Internet browsing and greatly reducing the risk that inappropriate content could be viewed on company machines. The growing threat from infected websites and malicious downloads was also a concern, especially for an organization working in the security business.” – Mark Harvey, Trussbilt “GFI gave us the feature set that we were looking for at the greatest value by far. It is a cost-effective solution and it has saved us operational time.” – Mr. Laskowski, Aegisoft Click here for more testimonials!

19 Product kudos » Leading companies worldwide use GFI WebMonitor » Validated for the HP Converged Infrastructure » Numerous product awards, a few listed below:

20 Independent product reviews Business Solutions Award Best Channel Product 2009 – Five Best Channel Product awards have been given to GFI’s products. GFI rated exceptionally well in the Network Security category and very high in terms of ease of upgrade and VARs’ ability to service the product. The winning products are: GFI MailArchiver™, GFI MailEssentials™, GFI EndPointSecurity™, GFI WebMonitor™ and GFI MAX™, the latest offering from GFI specifically for VARs, MSPs and IT support companies. – Business Solutions Magazine SCM – Four-star Review GFI WebMonitor for ISA Server receives four stars in a review in SC Magazine. The product is a comprehensive monitoring tool and is extremely useful to add features that are missing from Microsoft ISA Server. – SC Magazine, 2009

21 GFI product complements Best incorporated with: » GFI MailDefense Suite™ for Exchange/SMTP/Lotus Domino for security, anti-spam, anti- phishing and management: Protects you from viruses, exploits, trojans and other threats using multiple antivirus engines » GFI VIPRE ® Antivirus Business for reliable, fast and efficient workstation malware protection » GFI LanGuard™ for a complete network security overview with minimal administrative effort, while also providing remedial action through its patch management features

22 Conclusion GFI WebMonitor helps boost productivity and secures browsing to protect your network from viruses, spyware, phishing and other malware attacks and meet regulatory requirements. GFI WebMonitor provides the solution with three editions: » The WebFilter Edition includes time and bandwidth-based browsing control, as well as website categorization, web reputation filtering, URL filtering and policies to block streaming media » The WebSecurity Edition includes download control, virus scanning with multiple antivirus engines, blocking known bad websites, anti-phishing and IM client control » The UnifiedProtection Edition combines both WebFilter and WebSecurity editions

23 » Offices located around the globe: USA (North Carolina, California and Florida), UK (London, Edinburgh and Dundee), Australia, Austria, Romania, Philippines and Malta » Hundreds of thousands of installations worldwide » Trusted by thousands of companies around the world » GFI products are sold by a global network of thousands of partners All product and company names herein may be trademarks of their respective owners. Corporate overview

24 In association with: NRG Networks 3250 Eldridge Rd. Newton Grove, NC USA Tel: Url: