SlideShare a Scribd company logo
About SAFEND and SUPERCOM
52% OF N.A. ENTERPRISESHAVE LOST CONFIDENTIAL DATA THROUGH REMOVABLE MEDIA
IN THE PAST 2 YEARS (FORRESTER)
OVER 70% OF SECURITY BREACHESORIGINATE FROM WITHIN (VISTA RESEARCH)
16,000 LAPTOPS ARE LOSTPER WEEK BY BUSINESS TRAVELERS
IN THE U.S., EUROPE, AND UNITED ARAB EMIRATES
5% DROP IN SHARE PRICESFOR EVERY INFORMATION BREACH
Facts
Average Incident Cost
per compromised record:
$217
CUSTOMER COSTS
• Brand damage
• Loss of existing
customers
• Recruiting new
customers
• Unbudgeted legal, audit and
accounting fees
• Notification to customers
• Free or discounted service
to customers
• Call center expenses
• Public and investor relations
• Internal investigations
INCREMENTAL COSTS
• Lost employee
productivity
PRODUCTIVITY COSTS
54%
30%
16%
Average Incident Cost:
$6.5 million
Cost of Data Breaches: Recovery Cost
SAFEND IS THE LEADER IN
ENDPOINT DATA
FOR ENTERPRISE PROTECTION AND REGULATORY COMPLIANCE
LEAKAGE PREVENTION
Why DPS?
PROTECTION AGAINST
LOSS AND THEFTFROM LAPTOPS TO USB MEMORY STICKS/CD/DVD
PROTECTION AGAINST
INTENTED AND UNINTENDED
OR WEB UPLOAD TO UNAUTHORIZED RECIPIENTS
PROTECTING
CLASSIFIED DATASTORED ON LAPTOPS
COPYING TO UNAUTHORIZED EXTERNAL STORAGE AND EMAIL
Value Proposition
Data Protection Suite (DPS)
Protector Encryptor
InspectorReporter
Data Protection Suite
Port & Device Control
• Wireless Control
• Removable Storage Control
• Removable Storage
Encryption
• CD/DVD Encryption
• Hardware Keylogger
Protection
Hard Disk Encryption
• Highly Secure
• Completely Transparent
– No Training Required
• Easy to Manage, Deploy
and Use
• Strong Tamper Resistant
Mechanism
Content Based DLP
• Data Classification
• Data Content
• Data Fingerprinting
• Data Leakage
Prevention Through:
• Email, IM and Web
• External Storage
• Printers
Auditor – Endpoint Security Status Audit
Reporter – Security and Compliance Analysis
Discoverer – Sensitive Data Location and Mapping
Protector Encryptor Inspector
• Single Lightweight Agent
• Agent Includes Multi-tiered Anti-tampering Mechanisms
• Simple and Reliable Installation Process
Protector
Encryptor
Inspector Discoverer
Reporter
Auditor
Visibility – Auditor
• Displays all the devices and wireless networks that your endpoints
connect to
Control – Protector
• Port and device control system
• Encrypts removable media and CD/DVD
Protection – Encryptor
• Enforces hard disk encryption of all data stored on laptops and PCs
• Easy recovery of machine and files
Prevention – Inspector
• Prevents sensitive data leakage through e-mail, web, removable storage,
cloud and additional data transfer channels
Inspection – Discoverer
• Locates and maps sensitive data on end-users’ machines
Analysis – Reporter
• Provides graphical security reports and analysis for the protected
environment
Regaining Control of Your Endpoints
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
Products
Visibility - Auditor
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Control - Protector
Auditor displays all the
devices and wireless
networks that your
endpoints connect with
Products
Control - Protector
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Products
Protector provides granular
port and device control and
encrypts removable media
and CD/DVD, allowing for
exceptions and whitelisting
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
Products
Encryptor enforces hard
disk encryption of all data
stored on laptops and PCs,
and easy recovery of
machine and files
Prevention - Inspector
Protection - Encryptor
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
Products
Inspector prevents sensitive
data leakage via web, e-
mail, removable storage,
cloud and additional data
transfer channels
Inspection - Discoverer
Products
Protection - Encryptor
Prevention - Inspector
Analysis - Reporter
Visibility - Auditor
Control - Protector
Discoverer searches and
maps sensitive data that
resides on end-users’
machines
Analysis - Reporter
Reporter provides
graphical security reports
and enables analysis of
the protected
environment
Products
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Visibility - Auditor
Control - Protector
AUTOMATIC DIRECTORY INTERGRATION
ROLE BASE MANAGEMENTBY ADMINISTRATIVE ACTION AND BY ORGANIZATIONAL UNIT
General Server Features
WITH ACTIVE DIRECTORY ENABLES POLICY ENFORCEMENT STARTING AT THE DOMAIN
LEVEL, THROUGH ORGANIZATIONAL UNITS, DOWN TO A SPECIFIC MACHINE AND USER
General Server Features
SCALABLE ARCHITECTUREA MANAGEMENT SERVER CAN MANAGE MORE THAN 75,000
ENDPOINTS
REAL TIME ALERTSVIA: EMAIL WINDOWS EVENT LOGS/SYSLOG, SNMP SYSTEMS,
AND CUSTOM ALERT DESTINATION
FUNCTIONS ONWINDOWS 7, 8, 8.1, AND 10
OUR SYSTEM SUPPORTSDEPLOYMENT WITH MOST COMMON DISTRUBUTION
TOOLS
OUR SYSTEM OFFERSTAMPERING RESISTANCE, CUSTOMIZABLE ALERTS,
MINIMAL END-USER INTERACTION AND OFFLINE POLICY
ENFORCEMENT AND LOGGING
Client Features
KEY FEATURES:
• PREVENTS DATA LEAKAGE AND PENETRATION VIA ENDPOINTS
• PORT, DEVICE AND STORAGE CONTROL
• REMOVABLE MEDIA ENCRYPTION
• GRANULAR WIFI CONTROL
• BLOCKS HYBRID NETWORK BRIDGING
• U3 AND AUTORUN CONTROL
• BLOCKS HARDWARE KEY LOGGERS
• FILE TYPE CONTROL
• PROVIDES INTEGRATION WITH 3RD PARTY AV SCANNER
Control : Protector
KEY FEATURES:
• TOTAL DATA ENCRYPTION ON LAPTOPS AND DESKTOPS
• TRUE SSO (SINGLE SIGN ON) TECHNOLOGY
• CENTRALLY MANAGED AND ENFORCED
• FULL AUDIT TRAIL OF THE ORGANIZATION ENCRYPTION STATUS
• STABLE AND FAULT TOLERANT ENCRYPTION
• STRONG ENCRYPTION ALGORITHM – AES 256 BITS
• NATIVE WINDOWS LOGIN
• NO PRE CONFIGURATION
• COMPLETELY TRANSPARENT END-USER AUTHENTICATION AND
SEAMLESS PATCH MANAGEMENT, NO HELPDESK OVERHEAD
Control : Encryptor
• CONTENT-AWARE APPLICATION CONTROL
• OUT-OF-THE-BOX, PREDEFINED CLASSIFICATIONS AND
POLICIES
• INTERACTIVE AND CONFIGURABLE MESSAGES FOR USER
EDUCATION
• DATA CONTENT: REGULAR EXPRESSIONS, MATHEMATICAL
AND HEURISTIC VERIFIERS
• DATA FINGERPRINTING
• MAPS SET OF FILES AS SENSITIVE WITHOUT POINTING TO
SPECIFIC TEXT- USING ORIGINATING APPLICATION
KEY FEATURES:
Control : Inspector
• VIEW SECURITY INCIDENTS BY USERS,
ORGANIZATIONAL UNITS, AND TYPE
• TRACK COMPANY-WIDE ENDPOINT
DEPLOYMENT AND ENCRYPTION STATUS
• SCHEDULED REPORTS ARE AUTOMATICALLY
GENERATED AND DELIVERED VIA EMAIL
• FULLY CUSTOMIZABLE REPORTS CAN BE
EXPORTED IN VARIOUS FORMATS
KEY FEATURES:
Control : Reporter
• FIND OUT WHAT DEVICE AND WIFI NETWORKS YOUR
ENDPOINTS CONNECT TO
• IDENTIFY AND MANAGE ENDPOINT VULNERABILITIES
• COMPATIBLE WITH EXISTING NETWORK
MANAGEMENT OR ADMIN TOOLS
• INTUITIVE, CLIENTLESS AND EASY TO USE
KEY FEATURES:
Control : Auditor
• ALLOWS SECURITY ADMINISTRATORS TO LOCATE SENSITIVE
DATA-AT-REST STORED ON ORGANIZATIONAL ENDPOINTS
• HELPS IN IDENTIFYING GAPS IN DATA PROTECTION AND
COMPLIANCE INITIATIVES
• PROVIDES INSIGHT INTO WHAT POLICIES SHOULD BE
IMPLEMENTED USING OTHER COMPONENTS OF THE DATA
PROTECTION SUITE
KEY FEATURES:
Control : Discoverer
THANK YOU
Safend Solution Set

More Related Content

What's hot

Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
pgmaynard
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
GENIANS, INC.
 
Blancco Mobile Device Eraser
Blancco Mobile Device EraserBlancco Mobile Device Eraser
Blancco Mobile Device Eraser
Jemma Elliott
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
Chris Sistrunk
 
Increasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and SecurityIncreasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and Security
CynergisTek, Inc.
 
Introduction to ICS/SCADA security
Introduction to ICS/SCADA securityIntroduction to ICS/SCADA security
Introduction to ICS/SCADA security
Cysinfo Cyber Security Community
 
Critical Infrastructure and Security
Critical Infrastructure and SecurityCritical Infrastructure and Security
Critical Infrastructure and Security
Can Demirel
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
GENIANS, INC.
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
Shah Sheikh
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
MarcoAfzali
 
CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2
David Spinks
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
null The Open Security Community
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
ControlCase
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
Shah Sheikh
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
Joan Figueras Tugas
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
Eran Goldstein
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
OWASP Delhi
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
Shah Sheikh
 
SCADA Security Presentation
SCADA Security PresentationSCADA Security Presentation
SCADA Security Presentation
Filip Maertens
 
PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0
ControlCase
 

What's hot (20)

Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
 
Blancco Mobile Device Eraser
Blancco Mobile Device EraserBlancco Mobile Device Eraser
Blancco Mobile Device Eraser
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
 
Increasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and SecurityIncreasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and Security
 
Introduction to ICS/SCADA security
Introduction to ICS/SCADA securityIntroduction to ICS/SCADA security
Introduction to ICS/SCADA security
 
Critical Infrastructure and Security
Critical Infrastructure and SecurityCritical Infrastructure and Security
Critical Infrastructure and Security
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
SCADA Security Presentation
SCADA Security PresentationSCADA Security Presentation
SCADA Security Presentation
 
PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0
 

Viewers also liked

Proquest y Dspace
Proquest y DspaceProquest y Dspace
Proquest y Dspace
L1arizala
 
Plantilladeproyectociencias 170203014029 (1)
Plantilladeproyectociencias 170203014029 (1)Plantilladeproyectociencias 170203014029 (1)
Plantilladeproyectociencias 170203014029 (1)
DanielaValadez512
 
Merits and demerits of economic systems
Merits and demerits of economic systemsMerits and demerits of economic systems
Merits and demerits of economic systems
Sandrea Butcher
 
національний
національнийнаціональний
національний
Dasha Volkova
 
Eric Jackson_My Literary Analysis of The Lion King
Eric Jackson_My Literary Analysis of The Lion KingEric Jackson_My Literary Analysis of The Lion King
Eric Jackson_My Literary Analysis of The Lion King
Eric Jackson
 
Factors of production
Factors of productionFactors of production
Factors of production
Sandrea Butcher
 
"Mi dossier fotográfico"
"Mi dossier fotográfico""Mi dossier fotográfico"
"Mi dossier fotográfico"
desiree b
 
Division of labour
Division of labourDivision of labour
Division of labour
Sandrea Butcher
 
Flamingo Automotive - Nick Lamping
Flamingo Automotive - Nick LampingFlamingo Automotive - Nick Lamping
Flamingo Automotive - Nick Lamping
Nick Lamping
 
Outputs and recommendations from the Mediterranean Sea-basin Checkpoint Workshop
Outputs and recommendations from the Mediterranean Sea-basin Checkpoint WorkshopOutputs and recommendations from the Mediterranean Sea-basin Checkpoint Workshop
Outputs and recommendations from the Mediterranean Sea-basin Checkpoint Workshop
EMODnet
 
Sahand STR8 EV
Sahand STR8 EVSahand STR8 EV
Sahand STR8 EV
Manoochehr Rabiei
 
Safend Solution Set
Safend Solution SetSafend Solution Set
Safend Solution Set
Randy Neish
 

Viewers also liked (12)

Proquest y Dspace
Proquest y DspaceProquest y Dspace
Proquest y Dspace
 
Plantilladeproyectociencias 170203014029 (1)
Plantilladeproyectociencias 170203014029 (1)Plantilladeproyectociencias 170203014029 (1)
Plantilladeproyectociencias 170203014029 (1)
 
Merits and demerits of economic systems
Merits and demerits of economic systemsMerits and demerits of economic systems
Merits and demerits of economic systems
 
національний
національнийнаціональний
національний
 
Eric Jackson_My Literary Analysis of The Lion King
Eric Jackson_My Literary Analysis of The Lion KingEric Jackson_My Literary Analysis of The Lion King
Eric Jackson_My Literary Analysis of The Lion King
 
Factors of production
Factors of productionFactors of production
Factors of production
 
"Mi dossier fotográfico"
"Mi dossier fotográfico""Mi dossier fotográfico"
"Mi dossier fotográfico"
 
Division of labour
Division of labourDivision of labour
Division of labour
 
Flamingo Automotive - Nick Lamping
Flamingo Automotive - Nick LampingFlamingo Automotive - Nick Lamping
Flamingo Automotive - Nick Lamping
 
Outputs and recommendations from the Mediterranean Sea-basin Checkpoint Workshop
Outputs and recommendations from the Mediterranean Sea-basin Checkpoint WorkshopOutputs and recommendations from the Mediterranean Sea-basin Checkpoint Workshop
Outputs and recommendations from the Mediterranean Sea-basin Checkpoint Workshop
 
Sahand STR8 EV
Sahand STR8 EVSahand STR8 EV
Sahand STR8 EV
 
Safend Solution Set
Safend Solution SetSafend Solution Set
Safend Solution Set
 

Similar to Safend Solution Set

Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
Joseph Mark Heinzen
 
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoFortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Network Performance Channel GmbH
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
Art Morrison
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
Art Morrison
 
Information systems
Information systemsInformation systems
Information systems
Prof. Othman Alsalloum
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
MarketingArrowECS_CZ
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
Jim Kaplan CIA CFE
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
nerdsonsite
 
NAC_p3.pptx
NAC_p3.pptxNAC_p3.pptx
NAC_p3.pptx
Saurabh846965
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
Kevin Lloyd
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
RAJESH S
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
Anton Lishchuk
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
Scalar Decisions
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
Gurjit
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
Vishal Patyal
 
199 baseline security
199 baseline security199 baseline security
199 baseline security
Darrin Jackson
 
Company Profile 2016
Company Profile 2016Company Profile 2016
Company Profile 2016
Jatin Mehta
 
Automated Thermal Imaging for Remote Substation Monitoring
Automated Thermal Imaging for Remote Substation MonitoringAutomated Thermal Imaging for Remote Substation Monitoring
Automated Thermal Imaging for Remote Substation Monitoring
LumaSense Technologies
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability Scan
Shawn Jordan
 
Karunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident HandlingKarunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident Handling
Indonesia Honeynet Chapter
 

Similar to Safend Solution Set (20)

Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoFortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Information systems
Information systemsInformation systems
Information systems
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
NAC_p3.pptx
NAC_p3.pptxNAC_p3.pptx
NAC_p3.pptx
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
199 baseline security
199 baseline security199 baseline security
199 baseline security
 
Company Profile 2016
Company Profile 2016Company Profile 2016
Company Profile 2016
 
Automated Thermal Imaging for Remote Substation Monitoring
Automated Thermal Imaging for Remote Substation MonitoringAutomated Thermal Imaging for Remote Substation Monitoring
Automated Thermal Imaging for Remote Substation Monitoring
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability Scan
 
Karunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident HandlingKarunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident Handling
 

Recently uploaded

zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
YousufSait3
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
ssuserad3af4
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
Rakesh Kumar R
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 

Recently uploaded (20)

zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 

Safend Solution Set

  • 1.
  • 2. About SAFEND and SUPERCOM
  • 3. 52% OF N.A. ENTERPRISESHAVE LOST CONFIDENTIAL DATA THROUGH REMOVABLE MEDIA IN THE PAST 2 YEARS (FORRESTER) OVER 70% OF SECURITY BREACHESORIGINATE FROM WITHIN (VISTA RESEARCH) 16,000 LAPTOPS ARE LOSTPER WEEK BY BUSINESS TRAVELERS IN THE U.S., EUROPE, AND UNITED ARAB EMIRATES 5% DROP IN SHARE PRICESFOR EVERY INFORMATION BREACH Facts
  • 4. Average Incident Cost per compromised record: $217 CUSTOMER COSTS • Brand damage • Loss of existing customers • Recruiting new customers • Unbudgeted legal, audit and accounting fees • Notification to customers • Free or discounted service to customers • Call center expenses • Public and investor relations • Internal investigations INCREMENTAL COSTS • Lost employee productivity PRODUCTIVITY COSTS 54% 30% 16% Average Incident Cost: $6.5 million Cost of Data Breaches: Recovery Cost
  • 5. SAFEND IS THE LEADER IN ENDPOINT DATA FOR ENTERPRISE PROTECTION AND REGULATORY COMPLIANCE LEAKAGE PREVENTION Why DPS?
  • 6. PROTECTION AGAINST LOSS AND THEFTFROM LAPTOPS TO USB MEMORY STICKS/CD/DVD PROTECTION AGAINST INTENTED AND UNINTENDED OR WEB UPLOAD TO UNAUTHORIZED RECIPIENTS PROTECTING CLASSIFIED DATASTORED ON LAPTOPS COPYING TO UNAUTHORIZED EXTERNAL STORAGE AND EMAIL Value Proposition
  • 7. Data Protection Suite (DPS) Protector Encryptor InspectorReporter
  • 8. Data Protection Suite Port & Device Control • Wireless Control • Removable Storage Control • Removable Storage Encryption • CD/DVD Encryption • Hardware Keylogger Protection Hard Disk Encryption • Highly Secure • Completely Transparent – No Training Required • Easy to Manage, Deploy and Use • Strong Tamper Resistant Mechanism Content Based DLP • Data Classification • Data Content • Data Fingerprinting • Data Leakage Prevention Through: • Email, IM and Web • External Storage • Printers Auditor – Endpoint Security Status Audit Reporter – Security and Compliance Analysis Discoverer – Sensitive Data Location and Mapping Protector Encryptor Inspector • Single Lightweight Agent • Agent Includes Multi-tiered Anti-tampering Mechanisms • Simple and Reliable Installation Process
  • 9. Protector Encryptor Inspector Discoverer Reporter Auditor Visibility – Auditor • Displays all the devices and wireless networks that your endpoints connect to Control – Protector • Port and device control system • Encrypts removable media and CD/DVD Protection – Encryptor • Enforces hard disk encryption of all data stored on laptops and PCs • Easy recovery of machine and files Prevention – Inspector • Prevents sensitive data leakage through e-mail, web, removable storage, cloud and additional data transfer channels Inspection – Discoverer • Locates and maps sensitive data on end-users’ machines Analysis – Reporter • Provides graphical security reports and analysis for the protected environment Regaining Control of Your Endpoints
  • 10. Protection - Encryptor Prevention - Inspector Inspection - Discoverer Analysis - Reporter Visibility - Auditor Control - Protector Products
  • 11. Visibility - Auditor Protection - Encryptor Prevention - Inspector Inspection - Discoverer Analysis - Reporter Control - Protector Auditor displays all the devices and wireless networks that your endpoints connect with Products
  • 12. Control - Protector Protection - Encryptor Prevention - Inspector Inspection - Discoverer Analysis - Reporter Visibility - Auditor Products Protector provides granular port and device control and encrypts removable media and CD/DVD, allowing for exceptions and whitelisting
  • 13. Protection - Encryptor Prevention - Inspector Inspection - Discoverer Analysis - Reporter Visibility - Auditor Control - Protector Products Encryptor enforces hard disk encryption of all data stored on laptops and PCs, and easy recovery of machine and files
  • 14. Prevention - Inspector Protection - Encryptor Inspection - Discoverer Analysis - Reporter Visibility - Auditor Control - Protector Products Inspector prevents sensitive data leakage via web, e- mail, removable storage, cloud and additional data transfer channels
  • 15. Inspection - Discoverer Products Protection - Encryptor Prevention - Inspector Analysis - Reporter Visibility - Auditor Control - Protector Discoverer searches and maps sensitive data that resides on end-users’ machines
  • 16. Analysis - Reporter Reporter provides graphical security reports and enables analysis of the protected environment Products Protection - Encryptor Prevention - Inspector Inspection - Discoverer Visibility - Auditor Control - Protector
  • 17. AUTOMATIC DIRECTORY INTERGRATION ROLE BASE MANAGEMENTBY ADMINISTRATIVE ACTION AND BY ORGANIZATIONAL UNIT General Server Features WITH ACTIVE DIRECTORY ENABLES POLICY ENFORCEMENT STARTING AT THE DOMAIN LEVEL, THROUGH ORGANIZATIONAL UNITS, DOWN TO A SPECIFIC MACHINE AND USER
  • 18. General Server Features SCALABLE ARCHITECTUREA MANAGEMENT SERVER CAN MANAGE MORE THAN 75,000 ENDPOINTS REAL TIME ALERTSVIA: EMAIL WINDOWS EVENT LOGS/SYSLOG, SNMP SYSTEMS, AND CUSTOM ALERT DESTINATION
  • 19. FUNCTIONS ONWINDOWS 7, 8, 8.1, AND 10 OUR SYSTEM SUPPORTSDEPLOYMENT WITH MOST COMMON DISTRUBUTION TOOLS OUR SYSTEM OFFERSTAMPERING RESISTANCE, CUSTOMIZABLE ALERTS, MINIMAL END-USER INTERACTION AND OFFLINE POLICY ENFORCEMENT AND LOGGING Client Features
  • 20. KEY FEATURES: • PREVENTS DATA LEAKAGE AND PENETRATION VIA ENDPOINTS • PORT, DEVICE AND STORAGE CONTROL • REMOVABLE MEDIA ENCRYPTION • GRANULAR WIFI CONTROL • BLOCKS HYBRID NETWORK BRIDGING • U3 AND AUTORUN CONTROL • BLOCKS HARDWARE KEY LOGGERS • FILE TYPE CONTROL • PROVIDES INTEGRATION WITH 3RD PARTY AV SCANNER Control : Protector
  • 21. KEY FEATURES: • TOTAL DATA ENCRYPTION ON LAPTOPS AND DESKTOPS • TRUE SSO (SINGLE SIGN ON) TECHNOLOGY • CENTRALLY MANAGED AND ENFORCED • FULL AUDIT TRAIL OF THE ORGANIZATION ENCRYPTION STATUS • STABLE AND FAULT TOLERANT ENCRYPTION • STRONG ENCRYPTION ALGORITHM – AES 256 BITS • NATIVE WINDOWS LOGIN • NO PRE CONFIGURATION • COMPLETELY TRANSPARENT END-USER AUTHENTICATION AND SEAMLESS PATCH MANAGEMENT, NO HELPDESK OVERHEAD Control : Encryptor
  • 22. • CONTENT-AWARE APPLICATION CONTROL • OUT-OF-THE-BOX, PREDEFINED CLASSIFICATIONS AND POLICIES • INTERACTIVE AND CONFIGURABLE MESSAGES FOR USER EDUCATION • DATA CONTENT: REGULAR EXPRESSIONS, MATHEMATICAL AND HEURISTIC VERIFIERS • DATA FINGERPRINTING • MAPS SET OF FILES AS SENSITIVE WITHOUT POINTING TO SPECIFIC TEXT- USING ORIGINATING APPLICATION KEY FEATURES: Control : Inspector
  • 23. • VIEW SECURITY INCIDENTS BY USERS, ORGANIZATIONAL UNITS, AND TYPE • TRACK COMPANY-WIDE ENDPOINT DEPLOYMENT AND ENCRYPTION STATUS • SCHEDULED REPORTS ARE AUTOMATICALLY GENERATED AND DELIVERED VIA EMAIL • FULLY CUSTOMIZABLE REPORTS CAN BE EXPORTED IN VARIOUS FORMATS KEY FEATURES: Control : Reporter
  • 24. • FIND OUT WHAT DEVICE AND WIFI NETWORKS YOUR ENDPOINTS CONNECT TO • IDENTIFY AND MANAGE ENDPOINT VULNERABILITIES • COMPATIBLE WITH EXISTING NETWORK MANAGEMENT OR ADMIN TOOLS • INTUITIVE, CLIENTLESS AND EASY TO USE KEY FEATURES: Control : Auditor
  • 25. • ALLOWS SECURITY ADMINISTRATORS TO LOCATE SENSITIVE DATA-AT-REST STORED ON ORGANIZATIONAL ENDPOINTS • HELPS IN IDENTIFYING GAPS IN DATA PROTECTION AND COMPLIANCE INITIATIVES • PROVIDES INSIGHT INTO WHAT POLICIES SHOULD BE IMPLEMENTED USING OTHER COMPONENTS OF THE DATA PROTECTION SUITE KEY FEATURES: Control : Discoverer

Editor's Notes

  1. 19% of consumers affected by a data breach terminate their relationship with the offending company; 40% consider a termination
  2. Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  3. Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  4. Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  5. Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  6. Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  7. Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  8. Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector