SlideShare a Scribd company logo
1 of 32
Herzlich Willkommen. Überblick
G Data businesssolutions
Availablenow
ClientSecurity 10.5 ,[object Object]
G Data AntiVirus Client
G Data AntiSpam Client
NEW: Client-Firewall
100% remote administration
Autopilot orcentralrulesets
Optional offsiteconfigurationfornotebooks
easy, intuitive handling,[object Object]
IT security in  companynetworks
Whatdo companieswant? ,[object Object]
  Spam protection
  Firewall protection,[object Object]
Whatdo companieswant? ,[object Object]
  Spam protection
  Firewall protection
Safe IT infrastructure
  Data privacy
  Legal certainty
Productivity
  …,[object Object]
2/3 of all Internet visitsatworkarebecauseof  private reasons. (Source: Berliner Rechnungshof) 7 of10 pornsurfers do itatwork. (Source: IDC)
The problem: Private usageofcompany PCs
Financial harm ,[object Object]
Decrease in productivityEconomicloss in Germany 2007: 54 Billion Euro! (Source: Berliner Rechnungshof)
Safetyconsequences ,[object Object]
Damagethroughunauthorizedsoftware

More Related Content

What's hot

CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
Bob Guimarin
 
Threats to system power point 1
Threats to system power point 1Threats to system power point 1
Threats to system power point 1
Rebecca Jones
 

What's hot (18)

Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and Stash
 
Where You'll Find Today's Top Malware
Where You'll Find Today's Top MalwareWhere You'll Find Today's Top Malware
Where You'll Find Today's Top Malware
 
The application security controller
The application security controllerThe application security controller
The application security controller
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...
 
Fisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioFisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.io
 
Securing application data | Seclore
Securing application data | SecloreSecuring application data | Seclore
Securing application data | Seclore
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises
 
Trust It Mini Public
Trust It Mini PublicTrust It Mini Public
Trust It Mini Public
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore
 
NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
Threats to system power point 1
Threats to system power point 1Threats to system power point 1
Threats to system power point 1
 
IoT_Implemented
IoT_ImplementedIoT_Implemented
IoT_Implemented
 

Similar to G Data Businessportfolio 10.5 & E P P English

Generic Voice Security Issues
Generic Voice Security IssuesGeneric Voice Security Issues
Generic Voice Security Issues
jasondewar
 
An Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesAn Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security Practices
Jerry Harding
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 
rovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docxrovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docx
acarolyn
 
Secure Your Business 2009
Secure Your Business 2009Secure Your Business 2009
Secure Your Business 2009
RCioffi
 

Similar to G Data Businessportfolio 10.5 & E P P English (20)

OSMC 2019 | Zero Trusted Networks – why Perimeter Security is dead by Jochen ...
OSMC 2019 | Zero Trusted Networks – why Perimeter Security is dead by Jochen ...OSMC 2019 | Zero Trusted Networks – why Perimeter Security is dead by Jochen ...
OSMC 2019 | Zero Trusted Networks – why Perimeter Security is dead by Jochen ...
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Data Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEPData Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEP
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Generic Voice Security Issues
Generic Voice Security IssuesGeneric Voice Security Issues
Generic Voice Security Issues
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
An Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesAn Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security Practices
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Intellinx.z watch
Intellinx.z watchIntellinx.z watch
Intellinx.z watch
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
rovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docxrovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docx
 
Security Made in Germany gateprotect
Security Made in Germany gateprotectSecurity Made in Germany gateprotect
Security Made in Germany gateprotect
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
Secure Your Business 2009
Secure Your Business 2009Secure Your Business 2009
Secure Your Business 2009
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 

G Data Businessportfolio 10.5 & E P P English