27

Safend Solution Set

Embed Size (px)

Citation preview

Page 1: Safend Solution Set
Page 2: Safend Solution Set

About SAFEND and SUPERCOM

Page 3: Safend Solution Set

52% OF N.A. ENTERPRISESHAVE LOST CONFIDENTIAL DATA THROUGH REMOVABLE MEDIAIN THE PAST 2 YEARS (FORRESTER)

OVER 70% OF SECURITY BREACHES ORIGINATE FROM WITHIN (VISTA RESEARCH)

16,000 LAPTOPS ARE LOST PER WEEK BY BUSINESS TRAVELERS IN THE U.S., EUROPE, AND UNITED ARAB EMIRATES

5% DROP IN SHARE PRICESFOR EVERY INFORMATION BREACH

Facts

Page 4: Safend Solution Set

Average Incident Costper compromised record:

$217

CUSTOMER COSTS• Brand damage• Loss of existing

customers• Recruiting new

customers

• Unbudgeted legal, audit and accounting fees

• Notification to customers• Free or discounted service

to customers• Call center expenses• Public and investor relations• Internal investigations

INCREMENTAL COSTS

• Lost employee productivity

PRODUCTIVITY COSTS

54%

30%

16%

Average Incident Cost: $6.5 million

Cost of Data Breaches: Recovery Cost

Page 5: Safend Solution Set

SAFEND IS THE LEADER INENDPOINT DATAFOR ENTERPRISE PROTECTION AND REGULATORY COMPLIANCELEAKAGE PREVENTION

Why DPS?

Page 6: Safend Solution Set

PROTECTION AGAINSTLOSS AND THEFTFROM LAPTOPS TO USB MEMORY STICKS/CD/DVD

PROTECTION AGAINSTINTENTED AND UNINTENDED

OR WEB UPLOAD TO UNAUTHORIZED RECIPIENTS

PROTECTINGCLASSIFIED DATA

STORED ON LAPTOPS

COPYING TO UNAUTHORIZED EXTERNAL STORAGE AND EMAIL

Value Proposition

Page 7: Safend Solution Set

Data Protection Suite (DPS)Protector Encryptor

InspectorReporter

Page 8: Safend Solution Set

Data Protection Suite

Port & Device Control • Wireless Control• Removable Storage Control• Removable Storage

Encryption• CD/DVD Encryption• Hardware Keylogger

Protection

Hard Disk Encryption• Highly Secure• Completely Transparent

– No Training Required• Easy to Manage, Deploy

and Use• Strong Tamper Resistant

Mechanism

Content Based DLP• Data Classification

• Data Content• Data Fingerprinting

• Data Leakage Prevention Through:• Email, IM and Web• External Storage • Printers

Auditor – Endpoint Security Status AuditReporter – Security and Compliance Analysis

Discoverer – Sensitive Data Location and Mapping

Protector Encryptor Inspector

• Single Lightweight Agent• Agent Includes Multi-tiered Anti-tampering Mechanisms• Simple and Reliable Installation Process

Page 9: Safend Solution Set

Protector

Encryptor

Inspector Discoverer

Reporter

Auditor

Visibility – Auditor • Displays all the devices and wireless networks that your endpoints

connect toControl – Protector

• Port and device control system• Encrypts removable media and CD/DVD

Protection – Encryptor• Enforces hard disk encryption of all data stored on laptops and PCs• Easy recovery of machine and files

Prevention – Inspector • Prevents sensitive data leakage through e-mail, web, removable storage,

cloud and additional data transfer channelsInspection – Discoverer

• Locates and maps sensitive data on end-users’ machinesAnalysis – Reporter

• Provides graphical security reports and analysis for the protected environment

Regaining Control of Your Endpoints

Page 10: Safend Solution Set

Protection - Encryptor

Prevention - Inspector

Inspection - Discoverer

Analysis - Reporter

Visibility - Auditor

Control - Protector

Products

Page 11: Safend Solution Set

Visibility - Auditor

Protection - Encryptor

Prevention - Inspector

Inspection - Discoverer

Analysis - Reporter

Control - ProtectorAuditor displays all the devices and wireless networks that your endpoints connect with

Products

Page 12: Safend Solution Set

Control - Protector

Protection - Encryptor

Prevention - Inspector

Inspection - Discoverer

Analysis - Reporter

Visibility - AuditorProductsProtector provides granular port and device control and encrypts removable media and CD/DVD, allowing for exceptions and whitelisting

Page 13: Safend Solution Set

Protection - Encryptor

Prevention - Inspector

Inspection - Discoverer

Analysis - Reporter

Visibility - Auditor

Control - Protector

ProductsEncryptor enforces hard disk encryption of all data stored on laptops and PCs, and easy recovery of machine and files

Page 14: Safend Solution Set

Prevention - Inspector

Protection - Encryptor

Inspection - Discoverer

Analysis - Reporter

Visibility - Auditor

Control - Protector

ProductsInspector prevents sensitive data leakage via web, e-mail, removable storage, cloud and additional data transfer channels

Page 15: Safend Solution Set

Inspection - Discoverer

Products

Protection - Encryptor

Prevention - Inspector

Analysis - Reporter

Visibility - Auditor

Control - ProtectorDiscoverer searches and maps sensitive data that resides on end-users’ machines

Page 16: Safend Solution Set

Analysis - Reporter

Reporter provides graphical security reports and enables analysis of the protected environment

Products

Protection - Encryptor

Prevention - Inspector

Inspection - Discoverer

Visibility - Auditor

Control - Protector

Page 17: Safend Solution Set

AUTOMATIC DIRECTORY INTERGRATION

ROLE BASE MANAGEMENTBY ADMINISTRATIVE ACTION AND BY ORGANIZATIONAL UNIT

General Server Features

WITH ACTIVE DIRECTORY ENABLES POLICY ENFORCEMENT STARTING AT THE DOMAINLEVEL, THROUGH ORGANIZATIONAL UNITS, DOWN TO A SPECIFIC MACHINE AND USER

Page 18: Safend Solution Set

General Server Features

SCALABLE ARCHITECTUREA MANAGEMENT SERVER CAN MANAGE MORE THAN 75,000 ENDPOINTS

REAL TIME ALERTSVIA: EMAIL WINDOWS EVENT LOGS/SYSLOG, SNMP SYSTEMS,AND CUSTOM ALERT DESTINATION

Page 19: Safend Solution Set

FUNCTIONS ON WINDOWS 7, 8, 8.1, AND 10

OUR SYSTEM SUPPORTS DEPLOYMENT WITH MOST COMMON DISTRUBUTION TOOLS

OUR SYSTEM OFFERSTAMPERING RESISTANCE, CUSTOMIZABLE ALERTS, MINIMAL END-USER INTERACTION AND OFFLINE POLICY ENFORCEMENT AND LOGGING

Client Features

Page 20: Safend Solution Set

KEY FEATURES:• PREVENTS DATA LEAKAGE AND PENETRATION VIA ENDPOINTS• PORT, DEVICE AND STORAGE CONTROL• REMOVABLE MEDIA ENCRYPTION• GRANULAR WIFI CONTROL• BLOCKS HYBRID NETWORK BRIDGING• U3 AND AUTORUN CONTROL• BLOCKS HARDWARE KEY LOGGERS• FILE TYPE CONTROL• PROVIDES INTEGRATION WITH 3RD PARTY AV SCANNER

Control : Protector

Page 21: Safend Solution Set

KEY FEATURES:• TOTAL DATA ENCRYPTION ON LAPTOPS AND DESKTOPS• TRUE SSO (SINGLE SIGN ON) TECHNOLOGY• CENTRALLY MANAGED AND ENFORCED • FULL AUDIT TRAIL OF THE ORGANIZATION ENCRYPTION STATUS• STABLE AND FAULT TOLERANT ENCRYPTION• STRONG ENCRYPTION ALGORITHM – AES 256 BITS• NATIVE WINDOWS LOGIN• NO PRE CONFIGURATION• COMPLETELY TRANSPARENT END-USER AUTHENTICATION AND

SEAMLESS PATCH MANAGEMENT, NO HELPDESK OVERHEAD

Control : Encryptor

Page 22: Safend Solution Set

• CONTENT-AWARE APPLICATION CONTROL• OUT-OF-THE-BOX, PREDEFINED CLASSIFICATIONS AND

POLICIES• INTERACTIVE AND CONFIGURABLE MESSAGES FOR USER

EDUCATION• DATA CONTENT: REGULAR EXPRESSIONS, MATHEMATICAL

AND HEURISTIC VERIFIERS• DATA FINGERPRINTING• MAPS SET OF FILES AS SENSITIVE WITHOUT POINTING TO

SPECIFIC TEXT- USING ORIGINATING APPLICATION

KEY FEATURES:

Control : Inspector

Page 23: Safend Solution Set

• VIEW SECURITY INCIDENTS BY USERS, ORGANIZATIONAL UNITS, AND TYPE

• TRACK COMPANY-WIDE ENDPOINT DEPLOYMENT AND ENCRYPTION STATUS

• SCHEDULED REPORTS ARE AUTOMATICALLY GENERATED AND DELIVERED VIA EMAIL

• FULLY CUSTOMIZABLE REPORTS CAN BE EXPORTED IN VARIOUS FORMATS

KEY FEATURES:

Control : Reporter

Page 24: Safend Solution Set

• FIND OUT WHAT DEVICE AND WIFI NETWORKS YOUR ENDPOINTS CONNECT TO

• IDENTIFY AND MANAGE ENDPOINT VULNERABILITIES • COMPATIBLE WITH EXISTING NETWORK

MANAGEMENT OR ADMIN TOOLS• INTUITIVE, CLIENTLESS AND EASY TO USE

KEY FEATURES:

Control : Auditor

Page 25: Safend Solution Set

• ALLOWS SECURITY ADMINISTRATORS TO LOCATE SENSITIVE DATA-AT-REST STORED ON ORGANIZATIONAL ENDPOINTS

• HELPS IN IDENTIFYING GAPS IN DATA PROTECTION AND COMPLIANCE INITIATIVES

• PROVIDES INSIGHT INTO WHAT POLICIES SHOULD BE IMPLEMENTED USING OTHER COMPONENTS OF THE DATA PROTECTION SUITE

KEY FEATURES:

Control : Discoverer

Page 26: Safend Solution Set

THANK YOU

Page 27: Safend Solution Set