InterGuard The only complete internal threat platform Data Loss PreventionWeb FilteringLaptop SecurityEmployee Monitoring Total Visibility and Control.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
RbitPoint Computer Network Monitoring Software Complete Software Solution for Controlling all computers from your desk www. samaysoftware. net.
POSSIBLE THREATS TO DATA
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Quiz Review.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Srinivas L Technology Specialist – Security | Microsoft
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Viruses.
PayDox Corporate Document Management System Rotech AB Interface Ltd Business Software Integration.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Protection from internal threats: Evolution of DLP or Who sets trends.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
IT Security for Users By Matthew Moody.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
Pedigree: Network-wide Protection Against Enterprise Data Leaks Team: Nick Feamster, Assistant Professor, School of CS Anirudh Ramachandran, PhD candidate,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Small Business Security Keith Slagle April 24, 2007.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Introduction TO Network Administration
Computer Security By Duncan Hall.
CAIU Technology Essentials All Staff Day, 2016 Instructor: Stefan Moyer.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Technological Awareness for Teens and Young Adults.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Introduction to Barracuda IM Firewall
Barracuda Web Filtering Service
InterGuard The only complete internal threat platform
Presentation transcript:

InterGuard The only complete internal threat platform Data Loss PreventionWeb FilteringLaptop SecurityEmployee Monitoring Total Visibility and Control

Based in Los Angeles, CA Founded in 2002 Patented SaaS technology (Interguard) used by government and law enforcement agencies, financial service companies, banks, hospitals, schools, and more Over 200,000 Total Users Over 10,000 Corporate Customers Who is Awareness Technologies? Total Visibility and Control

1.A complete internal threat prevention platform – Data Loss Prevention – Web Filtering 2.Simple SaaS Solution – Fast download to try, easy to buy – No hardware required 3.End-Point Architecture (next gen technology) – Works everywhere (unmatched control) – Sees everything (unmatched visibility) What is InterGuard? – Laptop Recovery – Employee Monitoring Total Visibility and Control 1.Single Point Solutions – Multiple Vendors – Multiple User Interfaces Competition 2.Complex Network Trials/Installs +Hardware Required 3.Works only on network and can only capture specified traffic

Viruses Spam Hackers Malware Security Company Network Complete Internal Threat Platform External Threats

Viruses Spam Hackers Malware Security Complete Internal Threat Platform Advent of UTM Company Network Anti-Virus Anti-Spam Firewall Anti-Malware

Viruses Spam Hackers Malware Security 2010 and Beyond Company Network Employee Errors & Regulatory Failures Confidential Data Employee Productivity Laptop Theft/Loss Complete Internal Threat Platform Company Network Anti-Virus Anti-Spam Firewall Anti-Malware Internal threats are for more damaging

Viruses Spam Hackers Malware Employee Errors & Regulatory Failures Confidential Data Employee Productivity Laptop Theft/Loss Company Network Security 2010 and Beyond Complete Internal Threat Platform Company Network Anti-Virus Anti-Spam Firewall Anti-Malware Single Point Solutions InterGuard DLP E MPLOYEE M ONITORING W EB F ILTERING L APTOP R ECOVERY

The Power of One Agent to Deploy User Interface Contract Bill Support Team

Simplicity Try, Buy, Install and Manage Simple, Complete SaaS Solution

Organization Remote Employee On the Road Easily download and install agents on each workstation Simple, Complete SaaS Solution ATI Data Center INTERNET

Employee on the Road Reporting INTERNET Organization Remote Employee Simple, Complete SaaS Solution ATI Data Center

Coverage Works Everywhere Next Gen Technology – End-Point Architecture Vision Sees Everything

OLD WAY Next Gen – Works Everywhere

OLD WAY Remote Employee Employee on the Road NO COVERAGE Next Gen – Works Everywhere

INTERGUARD WAY Next Gen – Works Everywhere

Employee on the Road INTERGUARD WAY Remote Employee ALL WORKSTATIONS ARE COVERED – ON AND OFF NETWORK Next Gen – Works Everywhere

Coverage Works Everywhere Next Gen Technology – End-Point Architecture Vision Sees Everything

Standard Web Filtering Web Browsing Is Web Browsing the only unproductive use of a computer? Next Gen – Sees Everything

Standard Web Filtering Web Browsing Next Gen – Sees Everything Web Browsing is just one piece of the pie

Web Browsing Next Generation Web Filtering Business Microsoft Office Personal Media Player IM/Chat File Sharing Games Next Gen – Sees Everything Context is Everything

Next Gen – Sees Everything Standard Web Filtering Records: Aim.com Amazon.com Careerbuilder.com Ebay.com Etrade.com Gambling.com Google.com Hotjobs.com Espn.com Facebook.com, etc. List of URLs Does the list of blocked URLs tell the whole story?

Next Gen – Sees Everything Standard Web Filtering Records: Aim.com Amazon.com Careerbuilder.com Ebay.com Etrade.com Gambling.com Google.com Hotjobs.com Espn.com Facebook.com, etc. List of URLs InterGuard Records: Aim.com Amazon.com Careerbuilder.com Ebay.com Etrade.com, etc. List of URLS Best ways to sue your employer How to find a better job Discount alcohol How to beat a drug test Best sick day excuses List of Searches Screenshots: ESPN.com HotJobs.com

Standard Data Loss Prevention Prevent Prevention is just a small piece of the pie… Next Gen – Sees Everything

Standard Data Loss Prevention Prevent Are your policies perfect? Next Gen – Sees Everything If not, how would you know?

Standard Data Loss Prevention Prevent Record Do you know where your sensitive data is? Next Gen – Sees Everything

Standard Data Loss Prevention Prevention Discover Record If information leaked, could you delete it? Next Gen – Sees Everything

Standard Data Loss Prevention Prevention Discover DeleteRecord Can you retrieve the laptop if it is lost? Next Gen – Sees Everything

Next Generation Data Protection Locate/Disable Discover Prevent DeleteRecord Next Gen – Sees Everything

1.A complete internal threat prevention platform – Data Loss Prevention – Web Filtering 2.Simple SaaS Solution – Fast download to try, easy to install; no hardware 3.End-Point Architecture (next gen technology) – Works everywhere (unmatched control) – Sees everything (unmatched visibility) Unique Technology with No Equal – Laptop Recovery – Employee Monitoring Total Visibility and Control Data Loss Prevention Web Filtering Employee Monitoring Laptop Security Next Steps

Screen all (work and personal) and attachments for sensitive data and block if desired Protect from misuse or misappropriation of trade secrets, Non-Public Personal Information Control or stop use of removable media Block files, based on their content, from being copied to removable media Protect and enforce policies governing each employee’s computer use, including those that never connect to a network (even laptops) Easy, intuitive policy creation Coach and educate employees to adopt protocol and best practices for protecting company data Reports back to secure server over standard HTTPS protocols, instead of network Identify, track, and control who accesses your data, what data they access, and what they can and cannot do with that data Data Loss Prevention Total Visibility and Control

Monitors and filters Internet use on and off the network (even on laptops) Blocks or limits applications like P2P, IM Screenshots taken whenever an alert word is typed or read on a webpage All Search Terms captured Works on and off network Web Filtering Total Visibility and Control

Works invisibly and undetectably at each desktop, without impacting central network computer resources Records all employee communications - (including. webmail) & Instant Messaging Monitors and filters Internet use on and off the network (even on laptops) Blocks or limits applications like P2P, IM Records and analyzes all keystroke activity, regardless of the application used Formats all data into easy-to-read reports, making it easy to find and evaluate critical security lapses Screenshots taken whenever an alert word is typed or read on a webpage Conclusive, actionable data hard-linked to a specific employee’s actions, with full individualized reporting on an employee’s computer activity Employee Monitoring Total Visibility and Control

Remotely retrieve important files invisibly, using any internet connection Remotely delete files or an entire hard drive Secure and confirm deletion to the highest Pentagon standard of unrecoverability Geo-locate the stolen laptop, in real-time over any internet connection, often with greater accuracy than GPS Monitor and control everything a thief does – every keystroke they type and file they access will be visable Lock down laptop after disappearance so files can’t be accessed Laptop Security Total Visibility and Control