The document discusses SAFEND and SUPERCOM's Data Protection Suite (DPS) which includes several products (Protector, Encryptor, Inspector, Discoverer, Reporter, Auditor) to help enterprises protect confidential data and regain control of endpoints. Each product has key features such as encryption, data leakage prevention, reporting, and auditing to provide visibility, protection, prevention, inspection, and control of endpoints and sensitive data. The overall suite addresses issues like data breaches from removable media, insider threats, and lost/stolen laptops.
3. 52% OF N.A. ENTERPRISESHAVE LOST CONFIDENTIAL DATA THROUGH REMOVABLE MEDIA
IN THE PAST 2 YEARS (FORRESTER)
OVER 70% OF SECURITY BREACHESORIGINATE FROM WITHIN (VISTA RESEARCH)
16,000 LAPTOPS ARE LOSTPER WEEK BY BUSINESS TRAVELERS
IN THE U.S., EUROPE, AND UNITED ARAB EMIRATES
5% DROP IN SHARE PRICESFOR EVERY INFORMATION BREACH
Facts
4. Average Incident Cost
per compromised record:
$217
CUSTOMER COSTS
• Brand damage
• Loss of existing
customers
• Recruiting new
customers
• Unbudgeted legal, audit and
accounting fees
• Notification to customers
• Free or discounted service
to customers
• Call center expenses
• Public and investor relations
• Internal investigations
INCREMENTAL COSTS
• Lost employee
productivity
PRODUCTIVITY COSTS
54%
30%
16%
Average Incident Cost:
$6.5 million
Cost of Data Breaches: Recovery Cost
5. SAFEND IS THE LEADER IN
ENDPOINT DATA
FOR ENTERPRISE PROTECTION AND REGULATORY COMPLIANCE
LEAKAGE PREVENTION
Why DPS?
6. PROTECTION AGAINST
LOSS AND THEFTFROM LAPTOPS TO USB MEMORY STICKS/CD/DVD
PROTECTION AGAINST
INTENTED AND UNINTENDED
OR WEB UPLOAD TO UNAUTHORIZED RECIPIENTS
PROTECTING
CLASSIFIED DATASTORED ON LAPTOPS
COPYING TO UNAUTHORIZED EXTERNAL STORAGE AND EMAIL
Value Proposition
8. Data Protection Suite
Port & Device Control
• Wireless Control
• Removable Storage Control
• Removable Storage
Encryption
• CD/DVD Encryption
• Hardware Keylogger
Protection
Hard Disk Encryption
• Highly Secure
• Completely Transparent
– No Training Required
• Easy to Manage, Deploy
and Use
• Strong Tamper Resistant
Mechanism
Content Based DLP
• Data Classification
• Data Content
• Data Fingerprinting
• Data Leakage
Prevention Through:
• Email, IM and Web
• External Storage
• Printers
Auditor – Endpoint Security Status Audit
Reporter – Security and Compliance Analysis
Discoverer – Sensitive Data Location and Mapping
Protector Encryptor Inspector
• Single Lightweight Agent
• Agent Includes Multi-tiered Anti-tampering Mechanisms
• Simple and Reliable Installation Process
9. Protector
Encryptor
Inspector Discoverer
Reporter
Auditor
Visibility – Auditor
• Displays all the devices and wireless networks that your endpoints
connect to
Control – Protector
• Port and device control system
• Encrypts removable media and CD/DVD
Protection – Encryptor
• Enforces hard disk encryption of all data stored on laptops and PCs
• Easy recovery of machine and files
Prevention – Inspector
• Prevents sensitive data leakage through e-mail, web, removable storage,
cloud and additional data transfer channels
Inspection – Discoverer
• Locates and maps sensitive data on end-users’ machines
Analysis – Reporter
• Provides graphical security reports and analysis for the protected
environment
Regaining Control of Your Endpoints
11. Visibility - Auditor
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Control - Protector
Auditor displays all the
devices and wireless
networks that your
endpoints connect with
Products
12. Control - Protector
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Products
Protector provides granular
port and device control and
encrypts removable media
and CD/DVD, allowing for
exceptions and whitelisting
13. Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
Products
Encryptor enforces hard
disk encryption of all data
stored on laptops and PCs,
and easy recovery of
machine and files
14. Prevention - Inspector
Protection - Encryptor
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
Products
Inspector prevents sensitive
data leakage via web, e-
mail, removable storage,
cloud and additional data
transfer channels
15. Inspection - Discoverer
Products
Protection - Encryptor
Prevention - Inspector
Analysis - Reporter
Visibility - Auditor
Control - Protector
Discoverer searches and
maps sensitive data that
resides on end-users’
machines
16. Analysis - Reporter
Reporter provides
graphical security reports
and enables analysis of
the protected
environment
Products
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Visibility - Auditor
Control - Protector
17. AUTOMATIC DIRECTORY INTERGRATION
ROLE BASE MANAGEMENTBY ADMINISTRATIVE ACTION AND BY ORGANIZATIONAL UNIT
General Server Features
WITH ACTIVE DIRECTORY ENABLES POLICY ENFORCEMENT STARTING AT THE DOMAIN
LEVEL, THROUGH ORGANIZATIONAL UNITS, DOWN TO A SPECIFIC MACHINE AND USER
18. General Server Features
SCALABLE ARCHITECTUREA MANAGEMENT SERVER CAN MANAGE MORE THAN 75,000
ENDPOINTS
REAL TIME ALERTSVIA: EMAIL WINDOWS EVENT LOGS/SYSLOG, SNMP SYSTEMS,
AND CUSTOM ALERT DESTINATION
19. FUNCTIONS ONWINDOWS 7, 8, 8.1, AND 10
OUR SYSTEM SUPPORTSDEPLOYMENT WITH MOST COMMON DISTRUBUTION
TOOLS
OUR SYSTEM OFFERSTAMPERING RESISTANCE, CUSTOMIZABLE ALERTS,
MINIMAL END-USER INTERACTION AND OFFLINE POLICY
ENFORCEMENT AND LOGGING
Client Features
20. KEY FEATURES:
• PREVENTS DATA LEAKAGE AND PENETRATION VIA ENDPOINTS
• PORT, DEVICE AND STORAGE CONTROL
• REMOVABLE MEDIA ENCRYPTION
• GRANULAR WIFI CONTROL
• BLOCKS HYBRID NETWORK BRIDGING
• U3 AND AUTORUN CONTROL
• BLOCKS HARDWARE KEY LOGGERS
• FILE TYPE CONTROL
• PROVIDES INTEGRATION WITH 3RD PARTY AV SCANNER
Control : Protector
21. KEY FEATURES:
• TOTAL DATA ENCRYPTION ON LAPTOPS AND DESKTOPS
• TRUE SSO (SINGLE SIGN ON) TECHNOLOGY
• CENTRALLY MANAGED AND ENFORCED
• FULL AUDIT TRAIL OF THE ORGANIZATION ENCRYPTION STATUS
• STABLE AND FAULT TOLERANT ENCRYPTION
• STRONG ENCRYPTION ALGORITHM – AES 256 BITS
• NATIVE WINDOWS LOGIN
• NO PRE CONFIGURATION
• COMPLETELY TRANSPARENT END-USER AUTHENTICATION AND
SEAMLESS PATCH MANAGEMENT, NO HELPDESK OVERHEAD
Control : Encryptor
22. • CONTENT-AWARE APPLICATION CONTROL
• OUT-OF-THE-BOX, PREDEFINED CLASSIFICATIONS AND
POLICIES
• INTERACTIVE AND CONFIGURABLE MESSAGES FOR USER
EDUCATION
• DATA CONTENT: REGULAR EXPRESSIONS, MATHEMATICAL
AND HEURISTIC VERIFIERS
• DATA FINGERPRINTING
• MAPS SET OF FILES AS SENSITIVE WITHOUT POINTING TO
SPECIFIC TEXT- USING ORIGINATING APPLICATION
KEY FEATURES:
Control : Inspector
23. • VIEW SECURITY INCIDENTS BY USERS,
ORGANIZATIONAL UNITS, AND TYPE
• TRACK COMPANY-WIDE ENDPOINT
DEPLOYMENT AND ENCRYPTION STATUS
• SCHEDULED REPORTS ARE AUTOMATICALLY
GENERATED AND DELIVERED VIA EMAIL
• FULLY CUSTOMIZABLE REPORTS CAN BE
EXPORTED IN VARIOUS FORMATS
KEY FEATURES:
Control : Reporter
24. • FIND OUT WHAT DEVICE AND WIFI NETWORKS YOUR
ENDPOINTS CONNECT TO
• IDENTIFY AND MANAGE ENDPOINT VULNERABILITIES
• COMPATIBLE WITH EXISTING NETWORK
MANAGEMENT OR ADMIN TOOLS
• INTUITIVE, CLIENTLESS AND EASY TO USE
KEY FEATURES:
Control : Auditor
25. • ALLOWS SECURITY ADMINISTRATORS TO LOCATE SENSITIVE
DATA-AT-REST STORED ON ORGANIZATIONAL ENDPOINTS
• HELPS IN IDENTIFYING GAPS IN DATA PROTECTION AND
COMPLIANCE INITIATIVES
• PROVIDES INSIGHT INTO WHAT POLICIES SHOULD BE
IMPLEMENTED USING OTHER COMPONENTS OF THE DATA
PROTECTION SUITE
KEY FEATURES:
Control : Discoverer
19% of consumers affected by a data breach terminate their relationship with the offending company; 40% consider a termination
Additionally add: Common Breach occurrences…
Loss/Theft of Laptop - Encryptor
Loss/Theft of USB memory stick/CD/DVD- Protector
Intentional copy to unauthorized external storage - Protector/Inspector
Email to unintended recipients - Inspector
Web upload or intentional mail to unauthorized recipients - Inspector
Classified data stored on Laptops - Discoverer
Copy to any network based application or share - Inspector
Additionally add: Common Breach occurrences…
Loss/Theft of Laptop - Encryptor
Loss/Theft of USB memory stick/CD/DVD- Protector
Intentional copy to unauthorized external storage - Protector/Inspector
Email to unintended recipients - Inspector
Web upload or intentional mail to unauthorized recipients - Inspector
Classified data stored on Laptops - Discoverer
Copy to any network based application or share - Inspector
Additionally add: Common Breach occurrences…
Loss/Theft of Laptop - Encryptor
Loss/Theft of USB memory stick/CD/DVD- Protector
Intentional copy to unauthorized external storage - Protector/Inspector
Email to unintended recipients - Inspector
Web upload or intentional mail to unauthorized recipients - Inspector
Classified data stored on Laptops - Discoverer
Copy to any network based application or share - Inspector
Additionally add: Common Breach occurrences…
Loss/Theft of Laptop - Encryptor
Loss/Theft of USB memory stick/CD/DVD- Protector
Intentional copy to unauthorized external storage - Protector/Inspector
Email to unintended recipients - Inspector
Web upload or intentional mail to unauthorized recipients - Inspector
Classified data stored on Laptops - Discoverer
Copy to any network based application or share - Inspector
Additionally add: Common Breach occurrences…
Loss/Theft of Laptop - Encryptor
Loss/Theft of USB memory stick/CD/DVD- Protector
Intentional copy to unauthorized external storage - Protector/Inspector
Email to unintended recipients - Inspector
Web upload or intentional mail to unauthorized recipients - Inspector
Classified data stored on Laptops - Discoverer
Copy to any network based application or share - Inspector
Additionally add: Common Breach occurrences…
Loss/Theft of Laptop - Encryptor
Loss/Theft of USB memory stick/CD/DVD- Protector
Intentional copy to unauthorized external storage - Protector/Inspector
Email to unintended recipients - Inspector
Web upload or intentional mail to unauthorized recipients - Inspector
Classified data stored on Laptops - Discoverer
Copy to any network based application or share - Inspector
Additionally add: Common Breach occurrences…
Loss/Theft of Laptop - Encryptor
Loss/Theft of USB memory stick/CD/DVD- Protector
Intentional copy to unauthorized external storage - Protector/Inspector
Email to unintended recipients - Inspector
Web upload or intentional mail to unauthorized recipients - Inspector
Classified data stored on Laptops - Discoverer
Copy to any network based application or share - Inspector