Download presentation
Presentation is loading. Please wait.
Published byErica Fowler Modified over 9 years ago
1
InterGuard The only complete internal threat platform Data Loss PreventionWeb FilteringLaptop SecurityEmployee Monitoring Total Visibility and Control
2
Based in Los Angeles, CA Founded in 2002 Patented SaaS technology (Interguard) used by government and law enforcement agencies, financial service companies, banks, hospitals, schools, and more Over 200,000 Total Users Over 10,000 Corporate Customers Who is Awareness Technologies? Total Visibility and Control
4
1.A complete internal threat prevention platform – Data Loss Prevention – Web Filtering 2.Simple SaaS Solution – Fast download to try, easy to buy – No hardware required 3.End-Point Architecture (next gen technology) – Works everywhere (unmatched control) – Sees everything (unmatched visibility) What is InterGuard? – Laptop Recovery – Employee Monitoring Total Visibility and Control 1.Single Point Solutions – Multiple Vendors – Multiple User Interfaces Competition 2.Complex Network Trials/Installs +Hardware Required 3.Works only on network and can only capture specified traffic
5
Viruses Spam Hackers Malware Security 2000 - 2009 Company Network Complete Internal Threat Platform External Threats
6
Viruses Spam Hackers Malware Security 2000 - 2009 Complete Internal Threat Platform Advent of UTM Company Network Anti-Virus Anti-Spam Firewall Anti-Malware
7
Viruses Spam Hackers Malware Security 2010 and Beyond Company Network Employee Errors & Regulatory Failures Confidential Data Employee Productivity Laptop Theft/Loss Complete Internal Threat Platform Company Network Anti-Virus Anti-Spam Firewall Anti-Malware Internal threats are for more damaging
8
Viruses Spam Hackers Malware Employee Errors & Regulatory Failures Confidential Data Employee Productivity Laptop Theft/Loss Company Network Security 2010 and Beyond Complete Internal Threat Platform Company Network Anti-Virus Anti-Spam Firewall Anti-Malware Single Point Solutions InterGuard DLP E MPLOYEE M ONITORING W EB F ILTERING L APTOP R ECOVERY
9
The Power of One Agent to Deploy User Interface Contract Bill Support Team
11
Simplicity Try, Buy, Install and Manage Simple, Complete SaaS Solution
12
Organization Remote Employee On the Road Easily download and install agents on each workstation Simple, Complete SaaS Solution ATI Data Center INTERNET
13
Employee on the Road Reporting INTERNET Organization Remote Employee Simple, Complete SaaS Solution ATI Data Center
14
Coverage Works Everywhere Next Gen Technology – End-Point Architecture Vision Sees Everything
15
OLD WAY Next Gen – Works Everywhere
16
OLD WAY Remote Employee Employee on the Road NO COVERAGE Next Gen – Works Everywhere
17
INTERGUARD WAY Next Gen – Works Everywhere
18
Employee on the Road INTERGUARD WAY Remote Employee ALL WORKSTATIONS ARE COVERED – ON AND OFF NETWORK Next Gen – Works Everywhere
19
Coverage Works Everywhere Next Gen Technology – End-Point Architecture Vision Sees Everything
20
Standard Web Filtering Web Browsing Is Web Browsing the only unproductive use of a computer? Next Gen – Sees Everything
21
Standard Web Filtering Web Browsing Next Gen – Sees Everything Web Browsing is just one piece of the pie
22
Web Browsing Next Generation Web Filtering Business EmailMicrosoft Office Personal Email Media Player IM/Chat File Sharing Games Next Gen – Sees Everything Context is Everything
23
Next Gen – Sees Everything Standard Web Filtering Records: Aim.com Amazon.com Careerbuilder.com Ebay.com Etrade.com Gambling.com Google.com Hotjobs.com Espn.com Facebook.com, etc. List of URLs Does the list of blocked URLs tell the whole story?
24
Next Gen – Sees Everything Standard Web Filtering Records: Aim.com Amazon.com Careerbuilder.com Ebay.com Etrade.com Gambling.com Google.com Hotjobs.com Espn.com Facebook.com, etc. List of URLs InterGuard Records: Aim.com Amazon.com Careerbuilder.com Ebay.com Etrade.com, etc. List of URLS Best ways to sue your employer How to find a better job Discount alcohol How to beat a drug test Best sick day excuses List of Searches Screenshots: ESPN.com HotJobs.com
25
Standard Data Loss Prevention Prevent Prevention is just a small piece of the pie… Next Gen – Sees Everything
26
Standard Data Loss Prevention Prevent Are your policies perfect? Next Gen – Sees Everything If not, how would you know?
27
Standard Data Loss Prevention Prevent Record Do you know where your sensitive data is? Next Gen – Sees Everything
28
Standard Data Loss Prevention Prevention Discover Record If information leaked, could you delete it? Next Gen – Sees Everything
29
Standard Data Loss Prevention Prevention Discover DeleteRecord Can you retrieve the laptop if it is lost? Next Gen – Sees Everything
30
Next Generation Data Protection Locate/Disable Discover Prevent DeleteRecord Next Gen – Sees Everything
31
1.A complete internal threat prevention platform – Data Loss Prevention – Web Filtering 2.Simple SaaS Solution – Fast download to try, easy to install; no hardware 3.End-Point Architecture (next gen technology) – Works everywhere (unmatched control) – Sees everything (unmatched visibility) Unique Technology with No Equal – Laptop Recovery – Employee Monitoring Total Visibility and Control Data Loss Prevention Web Filtering Employee Monitoring Laptop Security Next Steps
32
Screen all email (work and personal) and attachments for sensitive data and block if desired Protect from misuse or misappropriation of trade secrets, Non-Public Personal Information Control or stop use of removable media Block files, based on their content, from being copied to removable media Protect and enforce policies governing each employee’s computer use, including those that never connect to a network (even laptops) Easy, intuitive policy creation Coach and educate employees to adopt protocol and best practices for protecting company data Reports back to secure server over standard HTTPS protocols, instead of network Identify, track, and control who accesses your data, what data they access, and what they can and cannot do with that data Data Loss Prevention Total Visibility and Control
33
Monitors and filters Internet use on and off the network (even on laptops) Blocks or limits applications like P2P, IM Screenshots taken whenever an alert word is typed or read on a webpage All Search Terms captured Works on and off network Web Filtering Total Visibility and Control
34
Works invisibly and undetectably at each desktop, without impacting central network computer resources Records all employee communications - Email (including. webmail) & Instant Messaging Monitors and filters Internet use on and off the network (even on laptops) Blocks or limits applications like P2P, IM Records and analyzes all keystroke activity, regardless of the application used Formats all data into easy-to-read reports, making it easy to find and evaluate critical security lapses Screenshots taken whenever an alert word is typed or read on a webpage Conclusive, actionable data hard-linked to a specific employee’s actions, with full individualized reporting on an employee’s computer activity Employee Monitoring Total Visibility and Control
35
Remotely retrieve important files invisibly, using any internet connection Remotely delete files or an entire hard drive Secure and confirm deletion to the highest Pentagon standard of unrecoverability Geo-locate the stolen laptop, in real-time over any internet connection, often with greater accuracy than GPS Monitor and control everything a thief does – every keystroke they type and file they access will be visable Lock down laptop after disappearance so files can’t be accessed Laptop Security Total Visibility and Control
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.