Outpost networksecurity

294 views
222 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
294
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Outpost networksecurity

  1. 1. Outpost Network SecurityProduct presentation
  2. 2. What is Outpost Network Security?• Combined manageable software firewall and anti-spyware solutiondesigned especially to meet small and medium business’s needs• Protects each and every company PC from both external (Internet) andinternal threats (e.g. hacker attacks, data theft, PC infiltrations, etc)• Allows system administrators to set networking rules for PCs and userapplications to easily secure company IT infrastructureOutpost Network Security – combined power of Firewall and Ant-Spyware protectionto ensure maximum corporate network security
  3. 3. ContentsOutpost Network Security – why would your company need it?Security threatsPossible solutions: Hardware Appliance, Anti-Virus, Outpost Network SecurityWhat is Outpost Network SecurityPackage contentsHow it all works?System requirementsSupportWhy Outpost Network Security?How to purchase?
  4. 4. IT security solutions – that’s what professionals think• The average survival time for an unprotected networked computer dropped from 40 minutesto 20 minutes over the last year - SANS Institute of Bethesda• For every in-house attack reported, there could be as many as 50 that go either unreportedor undetected – The Computer Security Journal• Viruses and worms are the leading information security concerns and continue to generatethe most media and public attention. But CIOs and other IT executives are increasinglyrecognizing the significance of internal threats... – Global Information Security Survey,Ernst&Young LLP• 86% of Computer Crimes originate from inside the company network – Intranet Security• Its bad enough for SOHO / individual users not to use a firewall - absolutely unconscionablefor a business to operate without (a correctly configured) one - www.iway-safety.com• Nearly 90% of US businesses suffered from a computer virus, spyware or other online attackin 2004 or 2005 despite widespread use of security software. The average damage was at$24,000 - FBI
  5. 5. Most cost-dangerous security threatsSpyware and viruses35%Email intrusions3%Denial of serviceattacks12%Web site intrusion7%Loss of confidentialdata43%Source: Ernst&Young LLP
  6. 6. Security solutions available – Hardware ApplianceWeaknesses:Ignores web pages’ content (i.e. Active Content)Regards all outbound traffic as trustworthy,providing no protection against Trojans andSpyware, should they infiltrate endpointsDoesn’t monitor internal network traffic so if ahacker gets inside your company networks, hebecomes almost omnipotentDoesn’t provide endpoint Anti-SpywareprotectionStrengths:Blocks illegal inbound trafficAnalyses traffic on network interface layerProtects company perimeter from known malwareStandalone unit
  7. 7. Security solutions available – Anti-VirusWeaknesses:Anti-virus database MUST contain the virus’ssignature to allow ant-virus recognize itDoesn’t offer any protection against hackerattacks, whether internal or external, exposingyour company to risks of sensitive data lossesand leakageLoads some system resources on employees’PCsStrengths: Monitors emails and web pages for potentialviruses Monitors files for malicious code contamination
  8. 8. Security solutions available – Outpost Network SecurityWeaknesses:Doesn’t include anti-virus yetStrengths: Includes manageable integrated Anti-Spyware protection Blocks illegal inbound and outbound traffic on each PC inyour company network, protecting your company fromboth internal and external threats Analyses traffic on both network interface and applicationlayers, blocking communications for all potentiallydangerous programs, like Trojans, Spyware etc. Allows system administrators to set endpoints to blockpotentially dangerous email attachments and web pages’scripts
  9. 9. Multi-Layer Protection approachOutpost NetworkSecurity – coredefensiveelementHardwareFirewall – tostrengthen youprotection againstexternal attacksAnti-Virus togetherwith OutpostNetwork SecruityAnti-Spywareprotection ensuresno malicious code isrun on any PC inyour companyOutpost Network Security – Core Element of Your Company IT Security
  10. 10. ContentsOutpost Network Security – why would your company need it?Security threatsPossible solutions: Hardware Appliance, Anti-Virus, Outpost Network SecurityWhat is Outpost Network SecurityPackage contentsHow it all works?System requirementsSupportWhy Outpost Network Security?How to purchase?
  11. 11. Outpost Network Security Package• Agnitum Command Center• Outpost Network Security Client• Agnitum Update Service• Agnitum Publisher Service
  12. 12. Outpost Network Security Client• Combined anti-spyware and firewall protection• Safeguards company PCs from both external (Internet) and internal threats and• Forcing firewall and anti-spyware settings to client PCs• Remote deployment
  13. 13. Agnitum Update Service•Centralized update deployment•Controlling Network Security Clients on the company PCs•Minimal system requirements
  14. 14. Screenshots
  15. 15. Agnitum Publisher Service•Centralized rules and configurations deployment•Minimal system requirements
  16. 16. Screenshots
  17. 17. Agnitum Command Center•Controlling Network Security Clients on the company PCs•Defining user groups•Setting up endpoint rules•Update Service and Publisher Service management•Unprecedentedly easy-to-use
  18. 18. Screenshot
  19. 19. ContentsOutpost Network Security – why would your company need it?Security threatsPossible solutions: Hardware Firewall, Anti-Virus, Outpost Network SecurityWhat is Outpost Network SecurityPackage contentsHow it all works?System requirementsSupportWhy Outpost Network SecurityHow to purchase?
  20. 20. System requirementsTo allow remote deployment• Windows 2000 or 2003 Domain ControllerAdministrator PC• Windows XP, 2000 Pro or 2003 Server operating systemClient PCs• 233 MHz Intel Pentium or compatible CPU• 32 MB RAM• Windows 98, Me, 2000, XP or 2003 Server operating system• 30 MB of hard disk spaceAgnitum Command Center doesn’t need to beinstalled on company server!
  21. 21. ContentsOutpost Network Security – why would your company need it?Security threatsPossible solutions: Hardware Firewall, Anti-Virus, Outpost Network SecurityWhat is Outpost Network SecurityPackage contentsHow it all works?System requirementsSupportWhy Outpost Network Security?How to purchase?
  22. 22. Support service for Outpost Network Security
  23. 23. ContentsOutpost Network Security – why would your company need it?Security threatsPossible solutions: Hardware Firewall, Anti-Virus, Outpost Network SecurityWhat is Outpost Network SecurityPackage contentsHow it all works?System requirementsSupportWhy Outpost Network Security?How to purchase?
  24. 24. Why Outpost Network Security?Award-winning technologyThe core of Outpost Network Security is award-winning Outpost Personal Firewall technology.Recent awards:
  25. 25. Why Outpost Network Security?• Advanced applicationcontrol (physical pathverification, systemregistry path verification)• Agnitum Update Serviceand Agnitum PublisherService can run underunprivileged useraccount• Advanced Ethernetprotection (anti-sniffing,anti-spoofing, ARPattack protection etc.)Advanced securityfeaturesLow system resourcesconsumption andhardware requirementsAgnitum Command Centeris capable of working with150 clients at the sameinstant, which means thesystem will successfullywith work thousands ofPCs• Outpost NetworkSecurity client flawlesslyruns on ANY PC suitablefor at least MS Windows98 OS• Agnitum CommandCenter successfully runson ANY PC meetingWindows 2000 hardwarerequirements• Agnitum CommandCenter doesn’t have tobe installed on companyserverScalabilityOutpost Network Security is suitable for any network,supports VPN and ensures your company is 105%protected against all known attacks and spyware, whetheryou have tens or thousands of PCs to secure
  26. 26. ContentsOutpost Network Security – why would your company need it?Security threatsPossible solutions: Hardware Firewall, Anti-Virus, Outpost Network SecurityWhat is Outpost Network SecurityPackage contentsHow it all works?System requirementsSupportWhy Outpost Network Security?How to purchase?
  27. 27. How to download and purchase Outpost Network Security?• Download Outpost Network Security 15 day trial here: http://agnitum.com/download/ons.html• Purchase online here: http://agnitum.com/purchase/shop/ons/businesslicense.html• Purchase through the network of our Solutions Providers or Distributors. To locateyour nearest partner, please follow this link:http://agnitum.com/purchase/buyoffline.html• For additional information please see Outpost Network Security page on ourwebsite: http://agnitum.com/products/ons/index.html or contact us via email:ons@agnitum.com or phone: +7-812-336-5246
  28. 28. Thank you for your attention!Yours sincerely,Agnitum Ltd. Team

×