Download presentation
Presentation is loading. Please wait.
Published byNorman Carson Modified over 9 years ago
1
About Safend ► Venture capital backed by: ► Experienced management team ► Top talent researchers and security experts ► Customers in the forefront of security awareness ► Selected as Red Herring Top 100 Company Innovative Endpoint Security
2
Current Situation: Current Situation: Devices can connect to each PC – no visibility, no control Info-sec Team Endpoints Bluetooth USB FireWire IrDA WiFi GPRS Serial
3
Understanding the Threat ► ► 39% of USB drive owners use it to transfer files between home & work ► ► “ Data theft accounted for over $50B in losses [in 2004] in America alone. ” - The Economist (6/18/2005) ► ► “ Poor information security has exposed personal information of over 50 million Americans so far in 2005 ” -The Economist (6/18/2005) ► ► “ 50% of security incidents originate from within an organization. ” – 2005 FBI / CSI Computer Crime and Security Survey ► ► “ 70% of security breaches that involve losses over $100,000 are perpetrated from inside the enterprise. ” -- Vista Research ► ► “ HIPAA mandates removable media controls. We must prevent copying of corporate data to plug-and-play storage devices of all types. ” Large Safend Health Care Customer
4
With Safend Visibility and granular control
5
Visibility: Safend Auditor ► Audit device connections through communication ports ► Provide both current and historical data ► Clientless, immediate use ► Audit results clearly show pain-points and risk levels ► Easy to use ► Available free at www.safend.com www.safend.com Security audit for all enterprise endpoints
6
Security shield for all enterprise endpoints Control : Safend Protector ► Enforce granular policies throughout the organizations ► Unique protocol analysis based security ► Tamper-resistant ► Centrally managed, integrated with Active Directory ► Easy to use ► Lowest TCO
7
Endorsements ► ► “Safend's USB Protector … is capable of addressing the different communication protocols at the endpoints, providing a policy-based solution that is flexible enough to mitigate risks while allowing legitimate use” IDC, January 2005 ► ► “We are always very happy when something WORKS AS ADVERTISED! Very clean product…very impressed with the Auditor too.” CIO of hospital chain in Memphis ► ► “[Safend’s] granularity of control is exactly what we were looking for in a solution.” Director of Desktop Security, Pharmaceutical Company ► ► 5 stars from ZDNet Germany for the USB Auditor
9
Questions ► What elements have to be considered to implement the solution? ► What can be the main benefit for a company that uses this product? ► Is there a product that competes with this one?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.