Magix Value Proposition Ar


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Magix Value Proposition Ar

  1. 1.
  2. 2. Magix Security Overview<br /><ul><li>Strong Investors (Conexus)
  3. 3. Magix Security
  4. 4. Focussed “Insider Threat” Specialisation
  5. 5. Branches JHB & CT
  6. 6. Proven & Experienced Management Team
  7. 7. 15 Staff
  8. 8. Level-3 BBBEE Status
  9. 9. 8 Year Track Record of Success
  10. 10. Extensive Industry Expertise
  11. 11. Broad & Evolving Service Offerings
  12. 12. Commitment to Long-term Employee Development  
  13. 13. Leading Software Products
  14. 14. Local Skills & Services to Extract Benefits
  15. 15. High-profile Customers
  16. 16. Profitable & Sustainable</li></li></ul><li>Magix Customers<br />
  17. 17. We can help you find the Rotten Apple<br />Magix Information Security<br />Specialises on the Insider Threat<br />
  18. 18. SA loses R150bn to insider fraud <br /><ul><li>Blue IQ: CEO linked to R450 000 in fraudulent payments, claims password stolen. September 2009..
  19. 19. Vodacom: R8 million insider fraud, stolen passwords, diverted funds. August 2009.
  20. 20. Mpumalanga Education Department: R5.5 million stolen via insider password fraud. October 2009.
  21. 21. R769 million stolen: KwaZulu-Natal probes insider fraud. April 2010.
  22. 22. Teasers: insider diverted R162 000 to personal account. June 2010.
  23. 23. Social Security Agency: insiders steal passwords and divert funds to personal accounts. March 2010.
  24. 24. Department of Environmental Affairs: stolen funds diverted by insiders to private account. March 2010.
  25. 25. Omnia Holdings: R23 million stolen by insider. May 2009.
  26. 26. SA Institute of Electrical Engineers: R703 452 stolen by insider. March 2010.
  27. 27. State pension fund: insider syndicate steals R1 million via modified banking details. July 2010.
  28. 28. Mpumalanga Agriculture Department: R1.9 million stolen by insiders. July 2010. </li></ul>17 September 2010<br />
  29. 29. User Monitoring<br />Magix Value<br />Infrastructure Monitoring<br />Data Monitoring<br />
  30. 30. User Monitoring<br />Magix Value<br />
  31. 31. User Monitoring<br />Identity theft <br />Compromises honest users & exposes organisations to acts of fraud & sabotage<br />Authorised users <br />May commit fraudulent acts & steal data whilst performing normal duties<br />Lack of Visibility of User Activities <br />Opens opportunities for the misuse of privileged access, bypassing of controls & general disregard for policies<br />Known Risks<br />
  32. 32. Magix User Monitoring Solutions<br />User Behaviour Control Mechanisms<br />Record all user interaction <br />with applications<br />& operating systems<br />Targeted Monitoring <br />Ensure proper management of user accounts & effective monitoring of user’s actions when using these accounts<br />Magix Solutions<br />
  33. 33. Magix User Monitoring Solutions<br />Magix Solutions<br />Intellinx is a non-invasive, real-time application monitoring solution that enables the enterprise to record, review and react to all application based activity<br />ObserveIT audits and records all user activities performed on your server platform. Every window session on your network – whether via remote access or console access, is recorded and indexed according to usage metadata.<br />Helps IT executives secure access to IT resources, meet the control and auditing requirements of regulatory compliance mandates, and generate the real-time reports<br />
  34. 34. Magix Value<br />Data Monitoring<br />
  35. 35. Data Monitoring<br />Lack of control over confidential / sensitive data<br />Compromises the organisation’s ability to comply with regulation & protect data<br />Data Leaked or Lost<br /><ul><li>As a result of theft or espionage
  36. 36. Due to poorly understood data practices
  37. 37. From a lack of effective policy
  38. 38. As a result of user error</li></ul>Known Risks<br />
  39. 39. Magix Data Monitoring Solutions<br />Implementation of controls<br />Create policies and controls for data at rest, in use, & in motion<br />Targeted Monitoring<br />Confirms policy compliance & escalate violations<br />Magix Solutions<br />
  40. 40. Magix Data Monitoring Solutions<br />Magix Solutions<br />Endpoint data leakage prevention solutions that protect against corporate data loss via physical, wireless, and removable media ports<br />Provides the ability to manage access entitlements, audit access to every file event, identify and involve data owners and find and classify sensitive and business critical data. <br />Enables businesses to easily deploy and manage enterprise application environments to PCs<br />
  41. 41. Magix Data Monitoring Solutions<br />Magix Solutions<br />FortiDB, the most comprehensive solution to secure databases and applications such as ERP, CRM, SCM and custom applications.<br />FortiMail, proven, powerful messaging security for the most demanding messaging systems.<br />FortiWeb, Integrated web application and XML firewalls protect web-based applications and internet-facing data from attack and data loss help you prevent identity theft, financial fraud and corporate espionage.<br />Helps organizations automate, accelerate and secure the delivery of digital assets throughout internal and distributed IT environments.<br />Secures data with always-on hardware encryption to meet compliance and data protection requirements<br />
  42. 42. Magix Value<br />Infrastructure Monitoring<br />
  43. 43. Infrastructure Monitoring<br />Infrastructure Vulnerabilities<br /><ul><li>Expose organisation to malicious attacks & data theft
  44. 44. Inevitably result in productivity losses
  45. 45. Attackers constantly search for new, unprotected or incorrectly configured systems</li></ul>Known Risks<br />
  46. 46. Magix Infrastructure Solutions<br />Implementation of software <br />& hardware policies<br />Introduce controls for software and hardware configurations<br />Management of devices<br />Ensures ongoing compliance with corporate standards & policies<br />Targeted Monitoring<br />Ensures vulnerabilities and attacks are identified &<br />mitigated<br />Magix Solutions<br />
  47. 47. Magix Infrastructure Solutions<br />Magix Solutions<br />Qualys offers a full range of on demand solutions to help security managers effectively strengthen the security of their networks, conduct automated security audits and ensure compliance with internal policies and external regulations.<br />Provides a suite of solutions that unify real-time vulnerability, event and compliance monitoring into a single, role-based, interface for administrators, auditors and risk managers to evaluate, communicate and report needed information for effective decision making and systems management<br />
  48. 48. Business Value<br /><ul><li>Accelerated Compliance & Risk Mitigation Strategy
  49. 49. Reliable & Regular View of IT Risks
  50. 50. Detailed Audit Trails of User & System Activity for Forensic Purposes
  51. 51. Alerting Mechanisms to Enable Intervention to Mitigate Damage
  52. 52. Engender Trust between your Organisation & its Stakeholders</li></li></ul><li>