Upload
randy-neish
View
15
Download
0
Embed Size (px)
Citation preview
About SAFEND and SUPERCOM
52% OF N.A. ENTERPRISESHAVE LOST CONFIDENTIAL DATA THROUGH REMOVABLE MEDIAIN THE PAST 2 YEARS (FORRESTER)
OVER 70% OF SECURITY BREACHES ORIGINATE FROM WITHIN (VISTA RESEARCH)
16,000 LAPTOPS ARE LOST PER WEEK BY BUSINESS TRAVELERS IN THE U.S., EUROPE, AND UNITED ARAB EMIRATES
5% DROP IN SHARE PRICESFOR EVERY INFORMATION BREACH
Facts
Average Incident Costper compromised record:
$217
CUSTOMER COSTS• Brand damage• Loss of existing
customers• Recruiting new
customers
• Unbudgeted legal, audit and accounting fees
• Notification to customers• Free or discounted service
to customers• Call center expenses• Public and investor relations• Internal investigations
INCREMENTAL COSTS
• Lost employee productivity
PRODUCTIVITY COSTS
54%
30%
16%
Average Incident Cost: $6.5 million
Cost of Data Breaches: Recovery Cost
SAFEND IS THE LEADER INENDPOINT DATAFOR ENTERPRISE PROTECTION AND REGULATORY COMPLIANCELEAKAGE PREVENTION
Why DPS?
PROTECTION AGAINSTLOSS AND THEFTFROM LAPTOPS TO USB MEMORY STICKS/CD/DVD
PROTECTION AGAINSTINTENTED AND UNINTENDED
OR WEB UPLOAD TO UNAUTHORIZED RECIPIENTS
PROTECTINGCLASSIFIED DATA
STORED ON LAPTOPS
COPYING TO UNAUTHORIZED EXTERNAL STORAGE AND EMAIL
Value Proposition
Data Protection Suite (DPS)Protector Encryptor
InspectorReporter
Data Protection Suite
Port & Device Control • Wireless Control• Removable Storage Control• Removable Storage
Encryption• CD/DVD Encryption• Hardware Keylogger
Protection
Hard Disk Encryption• Highly Secure• Completely Transparent
– No Training Required• Easy to Manage, Deploy
and Use• Strong Tamper Resistant
Mechanism
Content Based DLP• Data Classification
• Data Content• Data Fingerprinting
• Data Leakage Prevention Through:• Email, IM and Web• External Storage • Printers
Auditor – Endpoint Security Status AuditReporter – Security and Compliance Analysis
Discoverer – Sensitive Data Location and Mapping
Protector Encryptor Inspector
• Single Lightweight Agent• Agent Includes Multi-tiered Anti-tampering Mechanisms• Simple and Reliable Installation Process
Protector
Encryptor
Inspector Discoverer
Reporter
Auditor
Visibility – Auditor • Displays all the devices and wireless networks that your endpoints
connect toControl – Protector
• Port and device control system• Encrypts removable media and CD/DVD
Protection – Encryptor• Enforces hard disk encryption of all data stored on laptops and PCs• Easy recovery of machine and files
Prevention – Inspector • Prevents sensitive data leakage through e-mail, web, removable storage,
cloud and additional data transfer channelsInspection – Discoverer
• Locates and maps sensitive data on end-users’ machinesAnalysis – Reporter
• Provides graphical security reports and analysis for the protected environment
Regaining Control of Your Endpoints
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
Products
Visibility - Auditor
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Control - ProtectorAuditor displays all the devices and wireless networks that your endpoints connect with
Products
Control - Protector
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - AuditorProductsProtector provides granular port and device control and encrypts removable media and CD/DVD, allowing for exceptions and whitelisting
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
ProductsEncryptor enforces hard disk encryption of all data stored on laptops and PCs, and easy recovery of machine and files
Prevention - Inspector
Protection - Encryptor
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
ProductsInspector prevents sensitive data leakage via web, e-mail, removable storage, cloud and additional data transfer channels
Inspection - Discoverer
Products
Protection - Encryptor
Prevention - Inspector
Analysis - Reporter
Visibility - Auditor
Control - ProtectorDiscoverer searches and maps sensitive data that resides on end-users’ machines
Analysis - Reporter
Reporter provides graphical security reports and enables analysis of the protected environment
Products
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Visibility - Auditor
Control - Protector
AUTOMATIC DIRECTORY INTERGRATION
ROLE BASE MANAGEMENTBY ADMINISTRATIVE ACTION AND BY ORGANIZATIONAL UNIT
General Server Features
WITH ACTIVE DIRECTORY ENABLES POLICY ENFORCEMENT STARTING AT THE DOMAINLEVEL, THROUGH ORGANIZATIONAL UNITS, DOWN TO A SPECIFIC MACHINE AND USER
General Server Features
SCALABLE ARCHITECTUREA MANAGEMENT SERVER CAN MANAGE MORE THAN 75,000 ENDPOINTS
REAL TIME ALERTSVIA: EMAIL WINDOWS EVENT LOGS/SYSLOG, SNMP SYSTEMS,AND CUSTOM ALERT DESTINATION
FUNCTIONS ON WINDOWS 7, 8, 8.1, AND 10
OUR SYSTEM SUPPORTS DEPLOYMENT WITH MOST COMMON DISTRUBUTION TOOLS
OUR SYSTEM OFFERSTAMPERING RESISTANCE, CUSTOMIZABLE ALERTS, MINIMAL END-USER INTERACTION AND OFFLINE POLICY ENFORCEMENT AND LOGGING
Client Features
KEY FEATURES:• PREVENTS DATA LEAKAGE AND PENETRATION VIA ENDPOINTS• PORT, DEVICE AND STORAGE CONTROL• REMOVABLE MEDIA ENCRYPTION• GRANULAR WIFI CONTROL• BLOCKS HYBRID NETWORK BRIDGING• U3 AND AUTORUN CONTROL• BLOCKS HARDWARE KEY LOGGERS• FILE TYPE CONTROL• PROVIDES INTEGRATION WITH 3RD PARTY AV SCANNER
Control : Protector
KEY FEATURES:• TOTAL DATA ENCRYPTION ON LAPTOPS AND DESKTOPS• TRUE SSO (SINGLE SIGN ON) TECHNOLOGY• CENTRALLY MANAGED AND ENFORCED • FULL AUDIT TRAIL OF THE ORGANIZATION ENCRYPTION STATUS• STABLE AND FAULT TOLERANT ENCRYPTION• STRONG ENCRYPTION ALGORITHM – AES 256 BITS• NATIVE WINDOWS LOGIN• NO PRE CONFIGURATION• COMPLETELY TRANSPARENT END-USER AUTHENTICATION AND
SEAMLESS PATCH MANAGEMENT, NO HELPDESK OVERHEAD
Control : Encryptor
• CONTENT-AWARE APPLICATION CONTROL• OUT-OF-THE-BOX, PREDEFINED CLASSIFICATIONS AND
POLICIES• INTERACTIVE AND CONFIGURABLE MESSAGES FOR USER
EDUCATION• DATA CONTENT: REGULAR EXPRESSIONS, MATHEMATICAL
AND HEURISTIC VERIFIERS• DATA FINGERPRINTING• MAPS SET OF FILES AS SENSITIVE WITHOUT POINTING TO
SPECIFIC TEXT- USING ORIGINATING APPLICATION
KEY FEATURES:
Control : Inspector
• VIEW SECURITY INCIDENTS BY USERS, ORGANIZATIONAL UNITS, AND TYPE
• TRACK COMPANY-WIDE ENDPOINT DEPLOYMENT AND ENCRYPTION STATUS
• SCHEDULED REPORTS ARE AUTOMATICALLY GENERATED AND DELIVERED VIA EMAIL
• FULLY CUSTOMIZABLE REPORTS CAN BE EXPORTED IN VARIOUS FORMATS
KEY FEATURES:
Control : Reporter
• FIND OUT WHAT DEVICE AND WIFI NETWORKS YOUR ENDPOINTS CONNECT TO
• IDENTIFY AND MANAGE ENDPOINT VULNERABILITIES • COMPATIBLE WITH EXISTING NETWORK
MANAGEMENT OR ADMIN TOOLS• INTUITIVE, CLIENTLESS AND EASY TO USE
KEY FEATURES:
Control : Auditor
• ALLOWS SECURITY ADMINISTRATORS TO LOCATE SENSITIVE DATA-AT-REST STORED ON ORGANIZATIONAL ENDPOINTS
• HELPS IN IDENTIFYING GAPS IN DATA PROTECTION AND COMPLIANCE INITIATIVES
• PROVIDES INSIGHT INTO WHAT POLICIES SHOULD BE IMPLEMENTED USING OTHER COMPONENTS OF THE DATA PROTECTION SUITE
KEY FEATURES:
Control : Discoverer
THANK YOU