Your SlideShare is downloading. ×
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed Europe
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed Europe

1,378
views

Published on

IT security is an increasing concern to companies across all sectors. Unfortunately it can also be an administrative burden with countless applications in place to protect the multiple elements of …

IT security is an increasing concern to companies across all sectors. Unfortunately it can also be an administrative burden with countless applications in place to protect the multiple elements of your network.

With the increasing use of mobile technologies, and sophistication of external dangers such as spyware, how can you ensure your most valuable assets – namely your employees and clients - are protected?

This 60 minute session will outline how you can best protect your network and valuable data whilst greatly reducing the associated administrative burden. It will introduce technology that enables you to monitor, control and secure your entire network from a single user interface.

In fact the session will address ways in which to control:
- Enterprise Reporting
- Web Content filtering
- Spam
- Email Journaling
- Firewall Implementation
- Bandwidth Management
- Policy Management
- Anti-Virus & Spyware
- Zero Hour Threats
- Removable Device Control

Published in: Business, Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,378
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1.  
    • 2. How vulnerable is my computer?
    • 3. Threats to computers!
    • 4. New requirements!
    • 5. Agenda
      • E-mail SPAM
      • Email Journaling
      • Removable Device Control
      • Anti-Virus & Spyware
      • Zero Hour Threats
      • Web Content Filtering
      • Enterprise Reporting
      • Bandwidth Management
      • Remote users
    • 6. E-mail Spam SPAM! How do we stop it, its driving us nuts? How can we reduce the amount of time we waste on dealing with it?
    • 7.  
    • 8.  
    • 9.  
    • 10.  
    • 11.  
    • 12. E-Mail Journaling Compliance. How can we prove that Joe sent that e-mail? Can I be sure that it hasn’t been tampered with too?
    • 13.  
    • 14.  
    • 15. Removable media control I’m worried about some users taking our documents home via these usb things?
    • 16.  
    • 17.  
    • 18. Anti-Virus & Spyware & Zero Hour Threats I’m worried about the way ‘malware’ is going, what can I do about it? What’s this ‘zero-hour attack’ I’ve heard about?
    • 19.  
    • 20.  
    • 21.  
    • 22. Misuse of company resources I think I have a user who is browsing inappropriate web sites, what can I do? Can I stop users wasting time running games? What about users chatting via e-mail all day?
    • 23.  
    • 24.  
    • 25.  
    • 26.  
    • 27.  
    • 28.  
    • 29.  
    • 30.  
    • 31.  
    • 32. Enterprise reporting Can I see what programs are installed on which computers? Can I see which users have a specific program?
    • 33.  
    • 34.  
    • 35.  
    • 36.  
    • 37.  
    • 38.  
    • 39.  
    • 40.  
    • 41. Bandwidth management I have a user complaining that every so often the computer is running slow, can I see why? Sometimes the internet is very slow and my remote users complain?
    • 42.  
    • 43.  
    • 44.  
    • 45.  
    • 46.  
    • 47.  
    • 48. Remote Users How can I ensure that my laptop users are as protected when they are out of the office? Will they still get all the security updates?
    • 49.  
    • 50.  
    • 51.  
    • 52. Lightspeed Total Traffic Control
    • 53. Lightspeed Total Traffic Control
    • 54. Lightspeed Systems Overview Earnie Kramer October 2007
    • 55. Who is Lightspeed Systems?
      • Software company
      • Network specialist
      • Bakersfield California
      • Founded 1981
      • Privately owned
      • 100 staff
      • Highly technical focus
    • 56. Lightspeed Systems History
      • 1981 - McCarthy Associates
        • Multi platform network consulting group
      • 1984 – MacSoft
        • Wang and Banyan connectivity
        • Email migration to MS Exchange
      • 1994 – Lightspeed.Net
        • ISP with 20,000 business customers
      • 1997 – Lightspeed Systems
        • Network monitoring, performance & security
      • 2005 – Lightspeed Europe
        • London based team for UK and Europe
    • 57. Total Traffic Control History Version 6.3 – TTC plus and Lightspeed Guide Version 6 – Device Control and Email Journal Version 5 – Windows Security Agent Version 4 – Web Content Filtering Version 3 – Spam and Email Filtering Version 2 – Network Traffic Management and Reporting Version 1 – Gateway Security and Load Balancing 2007 2006 2005 2004 2003 2002 2001 2000 1999
    • 58. Total Traffic Control Growth
    • 59. Over 25,000 UK users
    • 60. Why is Lightspeed Systems Unique?
      • Single Company
        • We don’t spend R&D money on M&A
      • Single Team
        • Long term stable development team
      • Single Product
        • Not a bunch of separate products in a ‘suite’
      • Single Vision
        • To transform security and let the “good guys” win
    • 61.