SlideShare a Scribd company logo
1 of 27
About SAFEND and SUPERCOM
52% OF N.A. ENTERPRISESHAVE LOST CONFIDENTIAL DATA THROUGH REMOVABLE MEDIA
IN THE PAST 2 YEARS (FORRESTER)
OVER 70% OF SECURITY BREACHESORIGINATE FROM WITHIN (VISTA RESEARCH)
16,000 LAPTOPS ARE LOSTPER WEEK BY BUSINESS TRAVELERS
IN THE U.S., EUROPE, AND UNITED ARAB EMIRATES
5% DROP IN SHARE PRICESFOR EVERY INFORMATION BREACH
Facts
Average Incident Cost
per compromised record:
$217
CUSTOMER COSTS
• Brand damage
• Loss of existing
customers
• Recruiting new
customers
• Unbudgeted legal, audit and
accounting fees
• Notification to customers
• Free or discounted service
to customers
• Call center expenses
• Public and investor relations
• Internal investigations
INCREMENTAL COSTS
• Lost employee
productivity
PRODUCTIVITY COSTS
54%
30%
16%
Average Incident Cost:
$6.5 million
Cost of Data Breaches: Recovery Cost
SAFEND IS THE LEADER IN
ENDPOINT DATA
FOR ENTERPRISE PROTECTION AND REGULATORY COMPLIANCE
LEAKAGE PREVENTION
Why DPS?
PROTECTION AGAINST
LOSS AND THEFTFROM LAPTOPS TO USB MEMORY STICKS/CD/DVD
PROTECTION AGAINST
INTENTED AND UNINTENDED
OR WEB UPLOAD TO UNAUTHORIZED RECIPIENTS
PROTECTING
CLASSIFIED DATASTORED ON LAPTOPS
COPYING TO UNAUTHORIZED EXTERNAL STORAGE AND EMAIL
Value Proposition
Data Protection Suite (DPS)
Protector Encryptor
InspectorReporter
Data Protection Suite
Port & Device Control
• Wireless Control
• Removable Storage Control
• Removable Storage
Encryption
• CD/DVD Encryption
• Hardware Keylogger
Protection
Hard Disk Encryption
• Highly Secure
• Completely Transparent
– No Training Required
• Easy to Manage, Deploy
and Use
• Strong Tamper Resistant
Mechanism
Content Based DLP
• Data Classification
• Data Content
• Data Fingerprinting
• Data Leakage
Prevention Through:
• Email, IM and Web
• External Storage
• Printers
Auditor – Endpoint Security Status Audit
Reporter – Security and Compliance Analysis
Discoverer – Sensitive Data Location and Mapping
Protector Encryptor Inspector
• Single Lightweight Agent
• Agent Includes Multi-tiered Anti-tampering Mechanisms
• Simple and Reliable Installation Process
Protector
Encryptor
Inspector Discoverer
Reporter
Auditor
Visibility – Auditor
• Displays all the devices and wireless networks that your endpoints
connect to
Control – Protector
• Port and device control system
• Encrypts removable media and CD/DVD
Protection – Encryptor
• Enforces hard disk encryption of all data stored on laptops and PCs
• Easy recovery of machine and files
Prevention – Inspector
• Prevents sensitive data leakage through e-mail, web, removable storage,
cloud and additional data transfer channels
Inspection – Discoverer
• Locates and maps sensitive data on end-users’ machines
Analysis – Reporter
• Provides graphical security reports and analysis for the protected
environment
Regaining Control of Your Endpoints
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
Products
Visibility - Auditor
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Control - Protector
Auditor displays all the
devices and wireless
networks that your
endpoints connect with
Products
Control - Protector
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Products
Protector provides granular
port and device control and
encrypts removable media
and CD/DVD, allowing for
exceptions and whitelisting
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
Products
Encryptor enforces hard
disk encryption of all data
stored on laptops and PCs,
and easy recovery of
machine and files
Prevention - Inspector
Protection - Encryptor
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
Products
Inspector prevents sensitive
data leakage via web, e-
mail, removable storage,
cloud and additional data
transfer channels
Inspection - Discoverer
Products
Protection - Encryptor
Prevention - Inspector
Analysis - Reporter
Visibility - Auditor
Control - Protector
Discoverer searches and
maps sensitive data that
resides on end-users’
machines
Analysis - Reporter
Reporter provides
graphical security reports
and enables analysis of
the protected
environment
Products
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Visibility - Auditor
Control - Protector
AUTOMATIC DIRECTORY INTERGRATION
ROLE BASE MANAGEMENTBY ADMINISTRATIVE ACTION AND BY ORGANIZATIONAL UNIT
General Server Features
WITH ACTIVE DIRECTORY ENABLES POLICY ENFORCEMENT STARTING AT THE DOMAIN
LEVEL, THROUGH ORGANIZATIONAL UNITS, DOWN TO A SPECIFIC MACHINE AND USER
General Server Features
SCALABLE ARCHITECTUREA MANAGEMENT SERVER CAN MANAGE MORE THAN 75,000
ENDPOINTS
REAL TIME ALERTSVIA: EMAIL WINDOWS EVENT LOGS/SYSLOG, SNMP SYSTEMS,
AND CUSTOM ALERT DESTINATION
FUNCTIONS ONWINDOWS 7, 8, 8.1, AND 10
OUR SYSTEM SUPPORTSDEPLOYMENT WITH MOST COMMON DISTRUBUTION
TOOLS
OUR SYSTEM OFFERSTAMPERING RESISTANCE, CUSTOMIZABLE ALERTS,
MINIMAL END-USER INTERACTION AND OFFLINE POLICY
ENFORCEMENT AND LOGGING
Client Features
KEY FEATURES:
• PREVENTS DATA LEAKAGE AND PENETRATION VIA ENDPOINTS
• PORT, DEVICE AND STORAGE CONTROL
• REMOVABLE MEDIA ENCRYPTION
• GRANULAR WIFI CONTROL
• BLOCKS HYBRID NETWORK BRIDGING
• U3 AND AUTORUN CONTROL
• BLOCKS HARDWARE KEY LOGGERS
• FILE TYPE CONTROL
• PROVIDES INTEGRATION WITH 3RD PARTY AV SCANNER
Control : Protector
KEY FEATURES:
• TOTAL DATA ENCRYPTION ON LAPTOPS AND DESKTOPS
• TRUE SSO (SINGLE SIGN ON) TECHNOLOGY
• CENTRALLY MANAGED AND ENFORCED
• FULL AUDIT TRAIL OF THE ORGANIZATION ENCRYPTION STATUS
• STABLE AND FAULT TOLERANT ENCRYPTION
• STRONG ENCRYPTION ALGORITHM – AES 256 BITS
• NATIVE WINDOWS LOGIN
• NO PRE CONFIGURATION
• COMPLETELY TRANSPARENT END-USER AUTHENTICATION AND
SEAMLESS PATCH MANAGEMENT, NO HELPDESK OVERHEAD
Control : Encryptor
• CONTENT-AWARE APPLICATION CONTROL
• OUT-OF-THE-BOX, PREDEFINED CLASSIFICATIONS AND
POLICIES
• INTERACTIVE AND CONFIGURABLE MESSAGES FOR USER
EDUCATION
• DATA CONTENT: REGULAR EXPRESSIONS, MATHEMATICAL
AND HEURISTIC VERIFIERS
• DATA FINGERPRINTING
• MAPS SET OF FILES AS SENSITIVE WITHOUT POINTING TO
SPECIFIC TEXT- USING ORIGINATING APPLICATION
KEY FEATURES:
Control : Inspector
• VIEW SECURITY INCIDENTS BY USERS,
ORGANIZATIONAL UNITS, AND TYPE
• TRACK COMPANY-WIDE ENDPOINT
DEPLOYMENT AND ENCRYPTION STATUS
• SCHEDULED REPORTS ARE AUTOMATICALLY
GENERATED AND DELIVERED VIA EMAIL
• FULLY CUSTOMIZABLE REPORTS CAN BE
EXPORTED IN VARIOUS FORMATS
KEY FEATURES:
Control : Reporter
• FIND OUT WHAT DEVICE AND WIFI NETWORKS YOUR
ENDPOINTS CONNECT TO
• IDENTIFY AND MANAGE ENDPOINT VULNERABILITIES
• COMPATIBLE WITH EXISTING NETWORK
MANAGEMENT OR ADMIN TOOLS
• INTUITIVE, CLIENTLESS AND EASY TO USE
KEY FEATURES:
Control : Auditor
• ALLOWS SECURITY ADMINISTRATORS TO LOCATE SENSITIVE
DATA-AT-REST STORED ON ORGANIZATIONAL ENDPOINTS
• HELPS IN IDENTIFYING GAPS IN DATA PROTECTION AND
COMPLIANCE INITIATIVES
• PROVIDES INSIGHT INTO WHAT POLICIES SHOULD BE
IMPLEMENTED USING OTHER COMPONENTS OF THE DATA
PROTECTION SUITE
KEY FEATURES:
Control : Discoverer
THANK YOU
Safend Solution Set

More Related Content

What's hot

Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overviewpgmaynard
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesGENIANS, INC.
 
Blancco Mobile Device Eraser
Blancco Mobile Device EraserBlancco Mobile Device Eraser
Blancco Mobile Device EraserJemma Elliott
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSChris Sistrunk
 
Increasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and SecurityIncreasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and SecurityCynergisTek, Inc.
 
Critical Infrastructure and Security
Critical Infrastructure and SecurityCritical Infrastructure and Security
Critical Infrastructure and SecurityCan Demirel
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet GENIANS, INC.
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsShah Sheikh
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkMarcoAfzali
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar Nnull The Open Security Community
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated ComplianceControlCase
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolShah Sheikh
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Joan Figueras Tugas
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...Eran Goldstein
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghOWASP Delhi
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0Shah Sheikh
 
SCADA Security Presentation
SCADA Security PresentationSCADA Security Presentation
SCADA Security PresentationFilip Maertens
 
PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0ControlCase
 

What's hot (20)

Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
 
Blancco Mobile Device Eraser
Blancco Mobile Device EraserBlancco Mobile Device Eraser
Blancco Mobile Device Eraser
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
 
Increasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and SecurityIncreasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and Security
 
Introduction to ICS/SCADA security
Introduction to ICS/SCADA securityIntroduction to ICS/SCADA security
Introduction to ICS/SCADA security
 
Critical Infrastructure and Security
Critical Infrastructure and SecurityCritical Infrastructure and Security
Critical Infrastructure and Security
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
SCADA Security Presentation
SCADA Security PresentationSCADA Security Presentation
SCADA Security Presentation
 
PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0
 

Viewers also liked

Proquest y Dspace
Proquest y DspaceProquest y Dspace
Proquest y DspaceL1arizala
 
Plantilladeproyectociencias 170203014029 (1)
Plantilladeproyectociencias 170203014029 (1)Plantilladeproyectociencias 170203014029 (1)
Plantilladeproyectociencias 170203014029 (1)DanielaValadez512
 
Merits and demerits of economic systems
Merits and demerits of economic systemsMerits and demerits of economic systems
Merits and demerits of economic systemsSandrea Butcher
 
національний
національнийнаціональний
національнийDasha Volkova
 
Eric Jackson_My Literary Analysis of The Lion King
Eric Jackson_My Literary Analysis of The Lion KingEric Jackson_My Literary Analysis of The Lion King
Eric Jackson_My Literary Analysis of The Lion KingEric Jackson
 
"Mi dossier fotográfico"
"Mi dossier fotográfico""Mi dossier fotográfico"
"Mi dossier fotográfico"desiree b
 
Flamingo Automotive - Nick Lamping
Flamingo Automotive - Nick LampingFlamingo Automotive - Nick Lamping
Flamingo Automotive - Nick LampingNick Lamping
 
Outputs and recommendations from the Mediterranean Sea-basin Checkpoint Workshop
Outputs and recommendations from the Mediterranean Sea-basin Checkpoint WorkshopOutputs and recommendations from the Mediterranean Sea-basin Checkpoint Workshop
Outputs and recommendations from the Mediterranean Sea-basin Checkpoint WorkshopEMODnet
 
Safend Solution Set
Safend Solution SetSafend Solution Set
Safend Solution SetRandy Neish
 

Viewers also liked (12)

Proquest y Dspace
Proquest y DspaceProquest y Dspace
Proquest y Dspace
 
Plantilladeproyectociencias 170203014029 (1)
Plantilladeproyectociencias 170203014029 (1)Plantilladeproyectociencias 170203014029 (1)
Plantilladeproyectociencias 170203014029 (1)
 
Merits and demerits of economic systems
Merits and demerits of economic systemsMerits and demerits of economic systems
Merits and demerits of economic systems
 
національний
національнийнаціональний
національний
 
Eric Jackson_My Literary Analysis of The Lion King
Eric Jackson_My Literary Analysis of The Lion KingEric Jackson_My Literary Analysis of The Lion King
Eric Jackson_My Literary Analysis of The Lion King
 
Factors of production
Factors of productionFactors of production
Factors of production
 
"Mi dossier fotográfico"
"Mi dossier fotográfico""Mi dossier fotográfico"
"Mi dossier fotográfico"
 
Division of labour
Division of labourDivision of labour
Division of labour
 
Flamingo Automotive - Nick Lamping
Flamingo Automotive - Nick LampingFlamingo Automotive - Nick Lamping
Flamingo Automotive - Nick Lamping
 
Outputs and recommendations from the Mediterranean Sea-basin Checkpoint Workshop
Outputs and recommendations from the Mediterranean Sea-basin Checkpoint WorkshopOutputs and recommendations from the Mediterranean Sea-basin Checkpoint Workshop
Outputs and recommendations from the Mediterranean Sea-basin Checkpoint Workshop
 
Sahand STR8 EV
Sahand STR8 EVSahand STR8 EV
Sahand STR8 EV
 
Safend Solution Set
Safend Solution SetSafend Solution Set
Safend Solution Set
 

Similar to Safend Solution Set

Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoFortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoNetwork Performance Channel GmbH
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentationArt Morrison
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentationArt Morrison
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technologynerdsonsite
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyKevin Lloyd
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptRAJESH S
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in misVishal Patyal
 
Company Profile 2016
Company Profile 2016Company Profile 2016
Company Profile 2016Jatin Mehta
 
Automated Thermal Imaging for Remote Substation Monitoring
Automated Thermal Imaging for Remote Substation MonitoringAutomated Thermal Imaging for Remote Substation Monitoring
Automated Thermal Imaging for Remote Substation MonitoringLumaSense Technologies
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability ScanShawn Jordan
 
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPROIDEA
 

Similar to Safend Solution Set (20)

Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoFortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Information systems
Information systemsInformation systems
Information systems
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
NAC_p3.pptx
NAC_p3.pptxNAC_p3.pptx
NAC_p3.pptx
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
199 baseline security
199 baseline security199 baseline security
199 baseline security
 
Company Profile 2016
Company Profile 2016Company Profile 2016
Company Profile 2016
 
Automated Thermal Imaging for Remote Substation Monitoring
Automated Thermal Imaging for Remote Substation MonitoringAutomated Thermal Imaging for Remote Substation Monitoring
Automated Thermal Imaging for Remote Substation Monitoring
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability Scan
 
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
 

Recently uploaded

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 

Recently uploaded (20)

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 

Safend Solution Set

  • 1.
  • 2. About SAFEND and SUPERCOM
  • 3. 52% OF N.A. ENTERPRISESHAVE LOST CONFIDENTIAL DATA THROUGH REMOVABLE MEDIA IN THE PAST 2 YEARS (FORRESTER) OVER 70% OF SECURITY BREACHESORIGINATE FROM WITHIN (VISTA RESEARCH) 16,000 LAPTOPS ARE LOSTPER WEEK BY BUSINESS TRAVELERS IN THE U.S., EUROPE, AND UNITED ARAB EMIRATES 5% DROP IN SHARE PRICESFOR EVERY INFORMATION BREACH Facts
  • 4. Average Incident Cost per compromised record: $217 CUSTOMER COSTS • Brand damage • Loss of existing customers • Recruiting new customers • Unbudgeted legal, audit and accounting fees • Notification to customers • Free or discounted service to customers • Call center expenses • Public and investor relations • Internal investigations INCREMENTAL COSTS • Lost employee productivity PRODUCTIVITY COSTS 54% 30% 16% Average Incident Cost: $6.5 million Cost of Data Breaches: Recovery Cost
  • 5. SAFEND IS THE LEADER IN ENDPOINT DATA FOR ENTERPRISE PROTECTION AND REGULATORY COMPLIANCE LEAKAGE PREVENTION Why DPS?
  • 6. PROTECTION AGAINST LOSS AND THEFTFROM LAPTOPS TO USB MEMORY STICKS/CD/DVD PROTECTION AGAINST INTENTED AND UNINTENDED OR WEB UPLOAD TO UNAUTHORIZED RECIPIENTS PROTECTING CLASSIFIED DATASTORED ON LAPTOPS COPYING TO UNAUTHORIZED EXTERNAL STORAGE AND EMAIL Value Proposition
  • 7. Data Protection Suite (DPS) Protector Encryptor InspectorReporter
  • 8. Data Protection Suite Port & Device Control • Wireless Control • Removable Storage Control • Removable Storage Encryption • CD/DVD Encryption • Hardware Keylogger Protection Hard Disk Encryption • Highly Secure • Completely Transparent – No Training Required • Easy to Manage, Deploy and Use • Strong Tamper Resistant Mechanism Content Based DLP • Data Classification • Data Content • Data Fingerprinting • Data Leakage Prevention Through: • Email, IM and Web • External Storage • Printers Auditor – Endpoint Security Status Audit Reporter – Security and Compliance Analysis Discoverer – Sensitive Data Location and Mapping Protector Encryptor Inspector • Single Lightweight Agent • Agent Includes Multi-tiered Anti-tampering Mechanisms • Simple and Reliable Installation Process
  • 9. Protector Encryptor Inspector Discoverer Reporter Auditor Visibility – Auditor • Displays all the devices and wireless networks that your endpoints connect to Control – Protector • Port and device control system • Encrypts removable media and CD/DVD Protection – Encryptor • Enforces hard disk encryption of all data stored on laptops and PCs • Easy recovery of machine and files Prevention – Inspector • Prevents sensitive data leakage through e-mail, web, removable storage, cloud and additional data transfer channels Inspection – Discoverer • Locates and maps sensitive data on end-users’ machines Analysis – Reporter • Provides graphical security reports and analysis for the protected environment Regaining Control of Your Endpoints
  • 10. Protection - Encryptor Prevention - Inspector Inspection - Discoverer Analysis - Reporter Visibility - Auditor Control - Protector Products
  • 11. Visibility - Auditor Protection - Encryptor Prevention - Inspector Inspection - Discoverer Analysis - Reporter Control - Protector Auditor displays all the devices and wireless networks that your endpoints connect with Products
  • 12. Control - Protector Protection - Encryptor Prevention - Inspector Inspection - Discoverer Analysis - Reporter Visibility - Auditor Products Protector provides granular port and device control and encrypts removable media and CD/DVD, allowing for exceptions and whitelisting
  • 13. Protection - Encryptor Prevention - Inspector Inspection - Discoverer Analysis - Reporter Visibility - Auditor Control - Protector Products Encryptor enforces hard disk encryption of all data stored on laptops and PCs, and easy recovery of machine and files
  • 14. Prevention - Inspector Protection - Encryptor Inspection - Discoverer Analysis - Reporter Visibility - Auditor Control - Protector Products Inspector prevents sensitive data leakage via web, e- mail, removable storage, cloud and additional data transfer channels
  • 15. Inspection - Discoverer Products Protection - Encryptor Prevention - Inspector Analysis - Reporter Visibility - Auditor Control - Protector Discoverer searches and maps sensitive data that resides on end-users’ machines
  • 16. Analysis - Reporter Reporter provides graphical security reports and enables analysis of the protected environment Products Protection - Encryptor Prevention - Inspector Inspection - Discoverer Visibility - Auditor Control - Protector
  • 17. AUTOMATIC DIRECTORY INTERGRATION ROLE BASE MANAGEMENTBY ADMINISTRATIVE ACTION AND BY ORGANIZATIONAL UNIT General Server Features WITH ACTIVE DIRECTORY ENABLES POLICY ENFORCEMENT STARTING AT THE DOMAIN LEVEL, THROUGH ORGANIZATIONAL UNITS, DOWN TO A SPECIFIC MACHINE AND USER
  • 18. General Server Features SCALABLE ARCHITECTUREA MANAGEMENT SERVER CAN MANAGE MORE THAN 75,000 ENDPOINTS REAL TIME ALERTSVIA: EMAIL WINDOWS EVENT LOGS/SYSLOG, SNMP SYSTEMS, AND CUSTOM ALERT DESTINATION
  • 19. FUNCTIONS ONWINDOWS 7, 8, 8.1, AND 10 OUR SYSTEM SUPPORTSDEPLOYMENT WITH MOST COMMON DISTRUBUTION TOOLS OUR SYSTEM OFFERSTAMPERING RESISTANCE, CUSTOMIZABLE ALERTS, MINIMAL END-USER INTERACTION AND OFFLINE POLICY ENFORCEMENT AND LOGGING Client Features
  • 20. KEY FEATURES: • PREVENTS DATA LEAKAGE AND PENETRATION VIA ENDPOINTS • PORT, DEVICE AND STORAGE CONTROL • REMOVABLE MEDIA ENCRYPTION • GRANULAR WIFI CONTROL • BLOCKS HYBRID NETWORK BRIDGING • U3 AND AUTORUN CONTROL • BLOCKS HARDWARE KEY LOGGERS • FILE TYPE CONTROL • PROVIDES INTEGRATION WITH 3RD PARTY AV SCANNER Control : Protector
  • 21. KEY FEATURES: • TOTAL DATA ENCRYPTION ON LAPTOPS AND DESKTOPS • TRUE SSO (SINGLE SIGN ON) TECHNOLOGY • CENTRALLY MANAGED AND ENFORCED • FULL AUDIT TRAIL OF THE ORGANIZATION ENCRYPTION STATUS • STABLE AND FAULT TOLERANT ENCRYPTION • STRONG ENCRYPTION ALGORITHM – AES 256 BITS • NATIVE WINDOWS LOGIN • NO PRE CONFIGURATION • COMPLETELY TRANSPARENT END-USER AUTHENTICATION AND SEAMLESS PATCH MANAGEMENT, NO HELPDESK OVERHEAD Control : Encryptor
  • 22. • CONTENT-AWARE APPLICATION CONTROL • OUT-OF-THE-BOX, PREDEFINED CLASSIFICATIONS AND POLICIES • INTERACTIVE AND CONFIGURABLE MESSAGES FOR USER EDUCATION • DATA CONTENT: REGULAR EXPRESSIONS, MATHEMATICAL AND HEURISTIC VERIFIERS • DATA FINGERPRINTING • MAPS SET OF FILES AS SENSITIVE WITHOUT POINTING TO SPECIFIC TEXT- USING ORIGINATING APPLICATION KEY FEATURES: Control : Inspector
  • 23. • VIEW SECURITY INCIDENTS BY USERS, ORGANIZATIONAL UNITS, AND TYPE • TRACK COMPANY-WIDE ENDPOINT DEPLOYMENT AND ENCRYPTION STATUS • SCHEDULED REPORTS ARE AUTOMATICALLY GENERATED AND DELIVERED VIA EMAIL • FULLY CUSTOMIZABLE REPORTS CAN BE EXPORTED IN VARIOUS FORMATS KEY FEATURES: Control : Reporter
  • 24. • FIND OUT WHAT DEVICE AND WIFI NETWORKS YOUR ENDPOINTS CONNECT TO • IDENTIFY AND MANAGE ENDPOINT VULNERABILITIES • COMPATIBLE WITH EXISTING NETWORK MANAGEMENT OR ADMIN TOOLS • INTUITIVE, CLIENTLESS AND EASY TO USE KEY FEATURES: Control : Auditor
  • 25. • ALLOWS SECURITY ADMINISTRATORS TO LOCATE SENSITIVE DATA-AT-REST STORED ON ORGANIZATIONAL ENDPOINTS • HELPS IN IDENTIFYING GAPS IN DATA PROTECTION AND COMPLIANCE INITIATIVES • PROVIDES INSIGHT INTO WHAT POLICIES SHOULD BE IMPLEMENTED USING OTHER COMPONENTS OF THE DATA PROTECTION SUITE KEY FEATURES: Control : Discoverer

Editor's Notes

  1. 19% of consumers affected by a data breach terminate their relationship with the offending company; 40% consider a termination
  2. Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  3. Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  4. Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  5. Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  6. Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  7. Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  8. Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector