SlideShare a Scribd company logo
1
By Joshua Daggs
Sales Engineer
2
Overview
» The problem
» Scenario
» The solution
» Demonstration
» Summary
3
THE PROBLEMTHE PROBLEM
4
The problem
“In the past two years, 70% of businesses have traced the loss of sensitive or
confidential information to USB flash memory sticks”
– Ponemon Institute: July 2011
“The use of pen drives as an easy-to-carry storage device has increased in
the recent past and internal reports have confirmed that over 70 percent
cyber security breaches in the armed forces are due to their unauthorized
use”
– Army Officials report: Thehackernews, 2013
“Utah Department of Health reports Data for about 6,000 recipients was lost
by an employee of an outside contractor while traveling; the employee saved
the personal information to an unencrypted USB memory stick. Breach Costs
Processor $94 Million. The breach included Medicaid recipient's names,
Medicaid identification numbers, age and recent prescription drug use.”
– Michelle L. Price: Associated Press 2013
5
Scenario
» Employee has an iPod with 80GB storage space
» Transfers half a gigabyte of corporate data in less than 10 minutes
» Sensitive company information (such as product plans and designs,
sales and accounting information, product design, human resources
track records) are sold to a third-party, that could be a competitor
» Employee loses his iPod containing security sensitive information
6
A look at conventional control methods
» Banning all device usage in an organization
» Blocking drives on every computer
» Blocking connection ports on every computer
» Physically monitoring all connections 24/7
None of these are feasible solutions in today’s business environment
7
THE SOLUTIONTHE SOLUTION
8
Regain control with GFI EndPointSecurity™
» The key to managing portable devices is in the control over:
□ What devices are in use
□ When they were used and by whom
□ Control what data can be moved between systems and devices
» GFI EndPointSecurity provides comprehensive control on use of iPods,
USB drives and many other popular portable devices
» Actively manage devices by machine, user, access level, file type, time
and content
9
Top features (1/2)
» Volume encryption for removable storage devices
» Granular access control, through the use of read-only and read/write
permissions on a user-by-user and device-by-device basis
» Controls data transfers involving removable devices through real file type
checking and content awareness
» Data leakage risk assessment capabilities
» Automated client-side agent deployment
» Group-based protection control
» Logs device-related user activity
10
Top features (2/2)
» Allows administrators to block devices by class, file extensions,
physical port or device ID from a single location
» Allows administrators to grant temporary device or port access for a
stipulated timeframe
» Centrally monitors the network, detects connected devices and
performs various tasks
» Allows data on removable devices to be encrypted to prevent data
loss or theft
11
Key features in depth (1/2)
Data leakage risk assessment capabilities on new dashboard
»The risk assessment engine assesses the risk level of endpoints and the
network, based on:
□ activity,
□ usage of removable devices,
□ their type and
□ the protective measures in place
»The dashboard provides visually concise information on items requiring
attention
»Risk assessment can be performed on demand or on a schedule, providing
visibility into all the devices ever used on the network
12
Key features in depth (2/2)
Data awareness
» Data aware control of files transiting the endpoints on removable devices
» Content awareness based on the values in regular expressions or
dictionary files
» Out of the box predefined searches, detect well known security sensitive
information such as credit card numbers or ID card numbers
» Supports popular document types such as .doc, .docx, .txt, .pdf, etc
Enhanced file control capabilities
» Real file type checking works with embedded archives
» Define file type checking and content checking based on file size
13
How does it work?
Installed agent
Installed agent
GFI EndPointSecurity monitors
and controls device usage
14
0101010101010101010
0101010101010101010
Complete control of the data on mobile devices
15
Product benefits
» Protect intellectual property and security sensitive information
» Prevents introduction of malware and unauthorized software on the
network through BYOD
» Easy-to-follow user interface
» Supports latest operating systems from Microsoft
Available in the following languages:
16
GFI EndPointSecurity ReportPack add-on
» The GFI EndPointSecurity ReportPack is a full-fledged reporting add-on
» Schedule automatic IT-level and management reports based on data
collected
» Report on
□ devices connected to the network,
□ device usage trends by machine or
by user,
□ files copied to and from devices
(including actual names of files copied)
□ and much more
Device usage report
17
SUMMARYSUMMARY
18
Summary
» The exponential growth in portable storage device technology and
adoption has made it easier for data thieves to get away with sensitive
corporate data
» Administrators must have a way to technologically control the use of
portable storage devices
» GFI EndPointSecurity is the technological solution which:
□ Prevents data theft and protects intellectual property
□ Safeguards network operability by blocking malicious software
□ Supports productivity by blocking games and other non-work related files
□ Supports legal compliance by blocking objectionable material and pirate
software
19
Product testimonials
Prior to the installation of GFI EndPointSecurity, users were downloading and
uploading all sorts of files to and from their PCs and servers. Now, with
surgical precision, I can control and monitor what is happening on the network
- who is doing what, when, how and where. Thanks GFI.
- Tony Malvarez, Aerotecnica S.A.
20
Product kudos
» Thousands of customers worldwide use GFI EndPointSecurity
» Numerous product awards such as:
21
Thank you for taking the time to join us today
Please feel free to contact us with any questions or comments us at
sales@gfi.com
If you would like to see what GFI EndPointSecurity can do for you,
Download a free trial copy by visiting us at
www.gfi.com/endpointsecurity
GFI Software is your complete software solution provider for SMBs

More Related Content

What's hot

Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
Aakashjit Bhattacharya
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Digital forensic
Digital forensicDigital forensic
Digital forensic
Chandan Sah
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
Ulf Mattsson
 
IT Security Essentials
IT Security EssentialsIT Security Essentials
IT Security Essentials
Skoda Minotti
 
Digital forensics intro 20151123
Digital forensics intro 20151123Digital forensics intro 20151123
Digital forensics intro 20151123
Kevin Schlottmann
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
Peter Henley
 
TrustCom-16 - Paper ID 227
TrustCom-16 - Paper ID 227TrustCom-16 - Paper ID 227
TrustCom-16 - Paper ID 227
Denys A. Flores, PhD
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
Precisely
 
WPCCS 16 Presentation
WPCCS 16 PresentationWPCCS 16 Presentation
WPCCS 16 Presentation
Denys A. Flores, PhD
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
Filip Maertens
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
Jeff Lemmermann
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
Kabul Education University
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
Bitglass
 
Anti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsAnti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsUltraUploader
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
Anyck Turgeon, CFE/GRCP/CEFI/CCIP/C|CISO/CBA
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 

What's hot (20)

Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
 
IT Security Essentials
IT Security EssentialsIT Security Essentials
IT Security Essentials
 
Forensics
ForensicsForensics
Forensics
 
Digital forensics intro 20151123
Digital forensics intro 20151123Digital forensics intro 20151123
Digital forensics intro 20151123
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
TrustCom-16 - Paper ID 227
TrustCom-16 - Paper ID 227TrustCom-16 - Paper ID 227
TrustCom-16 - Paper ID 227
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
WPCCS 16 Presentation
WPCCS 16 PresentationWPCCS 16 Presentation
WPCCS 16 Presentation
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
Anti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsAnti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documents
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 

Viewers also liked

Going Mobile in the Retail Environment
Going Mobile in the Retail EnvironmentGoing Mobile in the Retail Environment
Going Mobile in the Retail Environment
Infogain
 
The Benefits of FileMaker Pro
The Benefits of FileMaker ProThe Benefits of FileMaker Pro
The Benefits of FileMaker Pro
Productive Computing, Inc.
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Unidev
 
Netbiscuits Company Overview May 2014
Netbiscuits Company Overview May 2014Netbiscuits Company Overview May 2014
Netbiscuits Company Overview May 2014
Netbiscuits
 
Real Estate Investment Guide - Waveland, Mississippi
Real Estate Investment Guide - Waveland, MississippiReal Estate Investment Guide - Waveland, Mississippi
Real Estate Investment Guide - Waveland, MississippiMarco Santarelli
 
Ecommerce In Sri Lanka: Building An Experience That Customers Will Love
Ecommerce In Sri Lanka: Building An Experience That Customers Will LoveEcommerce In Sri Lanka: Building An Experience That Customers Will Love
Ecommerce In Sri Lanka: Building An Experience That Customers Will Love
Adnan Issadeen
 
Avidian Technologies' Prophet CRM
Avidian Technologies' Prophet CRMAvidian Technologies' Prophet CRM
Avidian Technologies' Prophet CRM
Avidian Technologies
 
What Builds Fans SA Marketing Week 2010
What Builds Fans SA Marketing Week 2010What Builds Fans SA Marketing Week 2010
What Builds Fans SA Marketing Week 2010
Apparent
 
Play Framework (anatomy of a play application) @ Codacy
Play Framework (anatomy of a play application) @ CodacyPlay Framework (anatomy of a play application) @ Codacy
Play Framework (anatomy of a play application) @ Codacy
Rodrigo Fernandes
 
Presenting John Loder
Presenting John LoderPresenting John Loder
Presenting John Loder
Intelligent Environments (Aus)
 
Teva presentatie nl def
Teva presentatie nl   defTeva presentatie nl   def
Teva presentatie nl defSTYLELABS
 
InvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner ProgramInvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner ProgramInvisibleCRM
 
Web 2.0 and the world of global collaboration v2010
Web 2.0 and the world of global collaboration v2010Web 2.0 and the world of global collaboration v2010
Web 2.0 and the world of global collaboration v2010
GroveSite
 
Nsauditor Web Proxy Scanner
Nsauditor Web Proxy  ScannerNsauditor Web Proxy  Scanner
Nsauditor Web Proxy Scanner
Nsasoft
 

Viewers also liked (15)

Going Mobile in the Retail Environment
Going Mobile in the Retail EnvironmentGoing Mobile in the Retail Environment
Going Mobile in the Retail Environment
 
The Benefits of FileMaker Pro
The Benefits of FileMaker ProThe Benefits of FileMaker Pro
The Benefits of FileMaker Pro
 
Impel elemech-company
Impel elemech-companyImpel elemech-company
Impel elemech-company
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Netbiscuits Company Overview May 2014
Netbiscuits Company Overview May 2014Netbiscuits Company Overview May 2014
Netbiscuits Company Overview May 2014
 
Real Estate Investment Guide - Waveland, Mississippi
Real Estate Investment Guide - Waveland, MississippiReal Estate Investment Guide - Waveland, Mississippi
Real Estate Investment Guide - Waveland, Mississippi
 
Ecommerce In Sri Lanka: Building An Experience That Customers Will Love
Ecommerce In Sri Lanka: Building An Experience That Customers Will LoveEcommerce In Sri Lanka: Building An Experience That Customers Will Love
Ecommerce In Sri Lanka: Building An Experience That Customers Will Love
 
Avidian Technologies' Prophet CRM
Avidian Technologies' Prophet CRMAvidian Technologies' Prophet CRM
Avidian Technologies' Prophet CRM
 
What Builds Fans SA Marketing Week 2010
What Builds Fans SA Marketing Week 2010What Builds Fans SA Marketing Week 2010
What Builds Fans SA Marketing Week 2010
 
Play Framework (anatomy of a play application) @ Codacy
Play Framework (anatomy of a play application) @ CodacyPlay Framework (anatomy of a play application) @ Codacy
Play Framework (anatomy of a play application) @ Codacy
 
Presenting John Loder
Presenting John LoderPresenting John Loder
Presenting John Loder
 
Teva presentatie nl def
Teva presentatie nl   defTeva presentatie nl   def
Teva presentatie nl def
 
InvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner ProgramInvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner Program
 
Web 2.0 and the world of global collaboration v2010
Web 2.0 and the world of global collaboration v2010Web 2.0 and the world of global collaboration v2010
Web 2.0 and the world of global collaboration v2010
 
Nsauditor Web Proxy Scanner
Nsauditor Web Proxy  ScannerNsauditor Web Proxy  Scanner
Nsauditor Web Proxy Scanner
 

Similar to Spotlight on GFI EndPoint Security 2013

Latest presentation
Latest presentationLatest presentation
Latest presentation
Adetunji Adeoje
 
Executive Summary_2016
Executive Summary_2016Executive Summary_2016
Executive Summary_2016Annie Cute
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDMGreg Cranley
 
Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?
Baltimax
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
Sergei Yavchenko
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
CableLabs
 
Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization
Gross, Mendelsohn & Associates
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
ijtsrd
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...
Lumension
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
Ijripublishers Ijri
 
Securing IoT medical devices
Securing IoT medical devicesSecuring IoT medical devices
Securing IoT medical devices
Benjamin Biwer
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
Absolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-ComplianceAbsolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-Compliance
Sébastien Roques
 
Comparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction ToolsComparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction Tools
ijtsrd
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODCaston Thomas
 

Similar to Spotlight on GFI EndPoint Security 2013 (20)

Latest presentation
Latest presentationLatest presentation
Latest presentation
 
Executive Summary_2016
Executive Summary_2016Executive Summary_2016
Executive Summary_2016
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
 
Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
Mis
MisMis
Mis
 
Securing IoT medical devices
Securing IoT medical devicesSecuring IoT medical devices
Securing IoT medical devices
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Absolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-ComplianceAbsolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-Compliance
 
Absolute grc-
Absolute grc-Absolute grc-
Absolute grc-
 
Comparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction ToolsComparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction Tools
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYOD
 

More from GFI Software

Network Environments
Network EnvironmentsNetwork Environments
Network Environments
GFI Software
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
GFI Software
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
GFI Software
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
GFI Software
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
GFI Software
 
Data Backups
Data BackupsData Backups
Data Backups
GFI Software
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class Series
GFI Software
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
GFI Software
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
GFI Software
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
GFI Software
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™
GFI Software
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log Management
GFI Software
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManager
GFI Software
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security Solutions
GFI Software
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web Security
GFI Software
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your Network
GFI Software
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR Spam
GFI Software
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
GFI Software
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
GFI Software
 

More from GFI Software (20)

Network Environments
Network EnvironmentsNetwork Environments
Network Environments
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
 
Data Backups
Data BackupsData Backups
Data Backups
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class Series
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log Management
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManager
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security Solutions
 
Maxmp greylisting
Maxmp greylistingMaxmp greylisting
Maxmp greylisting
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web Security
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your Network
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR Spam
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Spotlight on GFI EndPoint Security 2013

  • 2. 2 Overview » The problem » Scenario » The solution » Demonstration » Summary
  • 4. 4 The problem “In the past two years, 70% of businesses have traced the loss of sensitive or confidential information to USB flash memory sticks” – Ponemon Institute: July 2011 “The use of pen drives as an easy-to-carry storage device has increased in the recent past and internal reports have confirmed that over 70 percent cyber security breaches in the armed forces are due to their unauthorized use” – Army Officials report: Thehackernews, 2013 “Utah Department of Health reports Data for about 6,000 recipients was lost by an employee of an outside contractor while traveling; the employee saved the personal information to an unencrypted USB memory stick. Breach Costs Processor $94 Million. The breach included Medicaid recipient's names, Medicaid identification numbers, age and recent prescription drug use.” – Michelle L. Price: Associated Press 2013
  • 5. 5 Scenario » Employee has an iPod with 80GB storage space » Transfers half a gigabyte of corporate data in less than 10 minutes » Sensitive company information (such as product plans and designs, sales and accounting information, product design, human resources track records) are sold to a third-party, that could be a competitor » Employee loses his iPod containing security sensitive information
  • 6. 6 A look at conventional control methods » Banning all device usage in an organization » Blocking drives on every computer » Blocking connection ports on every computer » Physically monitoring all connections 24/7 None of these are feasible solutions in today’s business environment
  • 8. 8 Regain control with GFI EndPointSecurity™ » The key to managing portable devices is in the control over: □ What devices are in use □ When they were used and by whom □ Control what data can be moved between systems and devices » GFI EndPointSecurity provides comprehensive control on use of iPods, USB drives and many other popular portable devices » Actively manage devices by machine, user, access level, file type, time and content
  • 9. 9 Top features (1/2) » Volume encryption for removable storage devices » Granular access control, through the use of read-only and read/write permissions on a user-by-user and device-by-device basis » Controls data transfers involving removable devices through real file type checking and content awareness » Data leakage risk assessment capabilities » Automated client-side agent deployment » Group-based protection control » Logs device-related user activity
  • 10. 10 Top features (2/2) » Allows administrators to block devices by class, file extensions, physical port or device ID from a single location » Allows administrators to grant temporary device or port access for a stipulated timeframe » Centrally monitors the network, detects connected devices and performs various tasks » Allows data on removable devices to be encrypted to prevent data loss or theft
  • 11. 11 Key features in depth (1/2) Data leakage risk assessment capabilities on new dashboard »The risk assessment engine assesses the risk level of endpoints and the network, based on: □ activity, □ usage of removable devices, □ their type and □ the protective measures in place »The dashboard provides visually concise information on items requiring attention »Risk assessment can be performed on demand or on a schedule, providing visibility into all the devices ever used on the network
  • 12. 12 Key features in depth (2/2) Data awareness » Data aware control of files transiting the endpoints on removable devices » Content awareness based on the values in regular expressions or dictionary files » Out of the box predefined searches, detect well known security sensitive information such as credit card numbers or ID card numbers » Supports popular document types such as .doc, .docx, .txt, .pdf, etc Enhanced file control capabilities » Real file type checking works with embedded archives » Define file type checking and content checking based on file size
  • 13. 13 How does it work? Installed agent Installed agent GFI EndPointSecurity monitors and controls device usage
  • 15. 15 Product benefits » Protect intellectual property and security sensitive information » Prevents introduction of malware and unauthorized software on the network through BYOD » Easy-to-follow user interface » Supports latest operating systems from Microsoft Available in the following languages:
  • 16. 16 GFI EndPointSecurity ReportPack add-on » The GFI EndPointSecurity ReportPack is a full-fledged reporting add-on » Schedule automatic IT-level and management reports based on data collected » Report on □ devices connected to the network, □ device usage trends by machine or by user, □ files copied to and from devices (including actual names of files copied) □ and much more Device usage report
  • 18. 18 Summary » The exponential growth in portable storage device technology and adoption has made it easier for data thieves to get away with sensitive corporate data » Administrators must have a way to technologically control the use of portable storage devices » GFI EndPointSecurity is the technological solution which: □ Prevents data theft and protects intellectual property □ Safeguards network operability by blocking malicious software □ Supports productivity by blocking games and other non-work related files □ Supports legal compliance by blocking objectionable material and pirate software
  • 19. 19 Product testimonials Prior to the installation of GFI EndPointSecurity, users were downloading and uploading all sorts of files to and from their PCs and servers. Now, with surgical precision, I can control and monitor what is happening on the network - who is doing what, when, how and where. Thanks GFI. - Tony Malvarez, Aerotecnica S.A.
  • 20. 20 Product kudos » Thousands of customers worldwide use GFI EndPointSecurity » Numerous product awards such as:
  • 21. 21 Thank you for taking the time to join us today Please feel free to contact us with any questions or comments us at sales@gfi.com If you would like to see what GFI EndPointSecurity can do for you, Download a free trial copy by visiting us at www.gfi.com/endpointsecurity GFI Software is your complete software solution provider for SMBs