1. 2 Presentation outline » IT pain points » The product » Testimonials » Kudos » Conclusion.

Slides:



Advertisements
Similar presentations
Award-winning vulnerability management software
Advertisements

For Exchange archiving of internal and external .
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Syslog for SIEM using iSecurity Real-Time Monitoring of IBM i Security Events.
Monitors and reacts to network and server failures to ensure maximum network uptime.
Power BI Sites and Mobile BI. What You Will Learn Sharing and Collaboration Introducing Power BI Exploring Power BI Features and Services Partner Opportunities.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.
1. 2 Presentation outline » Importance of » Using GFI MailArchiver ® to save the day » Testimonials » Reference information.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
1. 2 Presentation outline » IT pain points » GFI WebMonitor™ » Testimonials » Kudos » Conclusion » About us.
Network Security Scanner Network vulnerability scanning, patch management and auditing.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Bar|Scan ® Asset Inventory System The leader in asset and inventory management.
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Presentation outline IT pain points Top features Product snapshot
1. 2 Presentation outline » IT pain points » The product » Testimonials » Kudos » Conclusion.
1. 2 Presentation outline » IT pain points » The product » How does GFI LanGuard ® work? » Top features » What’s new in GFI LanGuard 2012? » Product benefits.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
No. 1 anti-spam solution for Exchange/SMTP/Lotus.
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
Security Guidelines and Management
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
Do you know what your employees are doing when they are supposed to be working?
1. 2 Presentation outline » One antivirus engine is not enough » IT pain points » The product » Testimonials » Kudos » Conclusion.
Product Demo. Terminal Services Log By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in Technology.
Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee  Internationally renowned iSeries solutions provider  Founded in 1983  100% focused on.
1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
1. 2 Presentation outline » IT pain points » The products □ GFI MailEssentials™ □ GFI MailSecurity™ » Testimonials » Kudos » Corporate overview.
HIPAA COMPLIANCE WITH DELL
1. 2 Presentation outline » IT pain points » The product » Testimonials » Kudos » Conclusion.
1. 2 Presentation outline » IT pain points » The product » Testimonials » Kudos » Conclusion.
APC InfraStruxure TM Central Smart Plug-In for HP Operations Manager Manage Power, Cooling, Security, Environment, Rack Access and Physical Layer Infrastructure.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
© British Telecommunications plc BT Managed Services Innovate
ARGENT SOFTWARE Product Presentation ARGENT. ARGENT SOFTWARE Argent – Company Overview Argent Software is one of the world's leading systems management.
Managing and Monitoring Windows 7 Performance Lesson 8.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Auditing Information Systems (AIS)
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
1. 2 Presentation outline » Current scenario » The solution » Testimonials » Conclusion.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
Product Presentation. SysKit By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, Europe founded in Technology.
Jorke Odolphi Product Technology Specialist WebCentral Using Microsoft Operations Manager To Monitor And Maintain Your Farm.
One good idea is all it takes... to raise your profile with management.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
Windows Small Business Server 2003 R2 Powering Small Businesses.
Quantify Insight – 24/7 monitoring for compliance Product presentation By Q uantify.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
Maintaining and Updating Windows Server 2008 Lesson 8.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
The Ultimate SharePoint Admin Tool
Hybrid Management and Security
Get to know SQL Manager SQL Server administration done right 
Infrastructure, Data Center & Managed Services
© 2011 ZOHO Corp. All Rights Reserved
Cloud Security for Endpoints
A 5-minute overview of ADAudit Plus
Microsoft Virtual Academy
SysKit Security Manager
Presentation transcript:

1

2 Presentation outline » IT pain points » The product » Testimonials » Kudos » Conclusion

3

4 IT pain points (1/2) » Protecting business entails prompt detection of security incidents » This requires log data analysis – a very tedious process if performed manually » Almost 50% of organizations have experienced a security breach –CSI Computer Crime and Security Survey 2010 » More than 83% of the UK companies experienced a security breach in 2009, with each security incident costing up to £690,000 –Information Security Breaches Survey 2010

5 IT pain points (2/2) » Meeting regulatory compliance requirements is almost impossible without an automated log management solution » Automating IT management processes is a must in order to reduce costs and maintain business continuity » Businesses can also suffer from system downtimes and other IT incidents; it is critical that these are detected and solved quickly to minimize business loss » Forensic investigation of IT incidents can be very costly unless event log data is centralized in a database and proper analysis tools are available » IT systems usually generate large volumes of log data which cannot be reviewed in an efficient manner without a log management tool

6

7 Log data analysis and IT management » Award-winning log data management and analysis solution » Supports a wide range of log types » Real-time, check-based monitoring engine enables active monitoring » Monitors an extended range of hardware products » Powerful built-in intelligence » Large number of predefined and easy-to-customize reports » Unique combination of active monitoring with log data analysis not only detects IT problems, but also gives insights on their cause

8 Product snapshot (1/4) GFI EventsManager Management Console

9 Product snapshot (2/4) GFI EventsManager Dashboard

10 Product snapshot (3/4) GFI EventsManager Active Monitoring checks

11 Product snapshot (4/4) GFI EventsManager Quick Launch Console

12 Product benefits (1/2) » Cut costs on IT staff and increase network uptime and productivity by automating the IT management process from incident detection to incident remediation » Boost security by detecting security incidents and monitoring security relevant activities, policies, mechanisms and applications » Listen to your network – assess risk and get insight on how to mitigate it by knowing what is going on in your network. Proactively detect potential points of failure before issues occur » Increase productivity and ensure compliance with company’s policies by monitoring user activity and the usage of the entire IT environment (services, applications, endpoints, servers and network)

13 Product benefits (2/2) » Cover the log management requirements of regulations and standards (PCI DSS, HIPAA, SOX and more) by collecting, normalizing, analyzing and consolidating log data » Provide reliable data sources and powerful analysis for forensic investigations, in case of litigations or internal/external audits » Process and integrate results from GFI LanGuard ® and GFI EndPointSecurity™ to get a more compelling picture on the security status of your network and consolidate your compliance reports » Excellent pricing!

14 Top features (1/2) » Fast and cost-effective IT monitoring and management » Log data collecting, normalization, analysis and consolidation with wide support for various log types » Safe storage of log data featuring three consolidation levels » Check-based active monitoring engine » Proactive monitoring based on log data » Unique combination of active monitoring and log data analysis

15 Top features (2/2) » Works in highly distributed environments » Excellent log data scanning performance and multiple alerting options » Excellent scalability with support for centralization of log data » Built-in processing rules provide for effective log data classification » Supports all Windows operating systems and their variants starting from Windows XP □ Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008 (R2), Windows 7, Windows 8, Windows Server 2012

16 What’s new in GFI EventsManager 2013? (1/4) Check-based active monitoring engine powered by GFI NetworkServerMonitor » Enables real-time monitoring of the entire IT environment » Not only detects the problem but gives insight into the cause as well – all from the same console. Enhanced console security system » Helps comply with best practices recommendations that imply access to data on a “need to know” basis » Each GFI EventsManager user can be assigned a subset of computers to manage and the console will only allow usage of the data coming from those configured computers for that user.

17 What’s new in GFI EventsManager 2013? (2/4) New parsing schemas » Enables collection and analysis of XML logs, DHCP logs and log data coming from certain POS devices More flexible storage » The database engine supports multiple EventsManager instances writing to the same database which now can be remote; Hashing of log data to prevent tampering with the physical files holding the logs Export log data to an SQL Server database

18 What’s new in GFI EventsManager 2013? (3/4) New licensing model » The “Active Monitoring” license offers check-based, active monitoring of servers, workstations and network devices and adds value by offering log data management and analysis for workstations (Windows logs and text logs) » The “Complete” license offers check-base, active monitoring of servers, workstations and network devices together with complete log data management and analysis functionality (for servers, workstations and network devices)

19 What’s new in GFI EventsManager 2013? (4/4)

20

21 Product testimonials “We have been using GFI EventsManager for six months now and from a compliance perspective – particularly with regard to PCI DSS – we are currently getting closer to compliancy with the help of GFI’s team. From a technology perspective, we are satisfied with the product.” – Mark-Oliver Horst, Chief Technical Officer, Quipu Gmbh, Frankfurt, Germany Click here for more testimonials!

22 Product kudos » Thousands of customers worldwide use GFI EventsManager » Validated for the HP Converged Infrastructure » Numerous product awards, a few listed below:

23 GFI product complements Best incorporated with GFI’s on-premise network security suite of products: » GFI LanGuard for security scanning, vulnerability management and patch management » GFI EndPointSecurity for network-wide control of portable storage media and consumer electronic devices

24 Conclusion (1/2) » Fast and cost-effective monitoring and management of the entire network » Invaluable regulatory compliance companion through built-in dedicated reports, alerts and views » Increase network uptime and identify network health and security problems through real-time alerting » Monitor security-critical activities, policies, mechanisms and applications » Assess security risks and know how to mitigate it » Centralize, normalize, consolidate, review and analyze Windows, Syslog, W3C, plain text, SQL Server and Oracle audit logs and SNMP traps generated by firewalls, servers, routers, sensors, switches, phone systems, PCs and more

25 Conclusion (2/2) » Built-in intelligence to automatically detect, alert and report on the most important events generated by systems and devices in the network » Excellent performance and scalability » Flexible, drill-down views and dashboards with powerful filtering capabilities for quick review and analysis of the most important events » Large number of predefined and easy-to-customize reports » Extended and fully customizable reporting capabilities » Works with third-party tools to scan specific logs like SharePoint » Excellent pricing

26 » Offices located around the globe: USA (North Carolina, California and Florida), UK (London and Dundee), Australia, Austria, Romania, and Malta » Hundreds of thousands of installations worldwide » Trusted by thousands of companies around the world » GFI products are sold by a global network of thousands of partners All product and company names herein may be trademarks of their respective owners. Corporate overview

27 More info and downloads » Click here to learn more about the product Click here to learn more about the product » Check out our competitive pricing Check out our competitive pricing » Download your FREE trial of GFI EventsManager Download your FREE trial of GFI EventsManager » » Visit: