SlideShare a Scribd company logo
1 of 2
Download to read offline
CASE STUDY
4th Generation Intel®Core™i5 and i7 vPro™Processors
Enterprise Security
COMGUARD expands portfolio
Value-add IT distributor COMGUARD continuously seeks to broaden the enterprise security services it
offers to customers. This is essential to remain competitive within its market segment. Together with
Intel, COMGUARD set up a demonstration suite within its Competency Center to highlight to customers
the remote management capabilities of McAfee ePolicy Orchestrator (ePO) Deep Command* with Intel®
Active Management Technology (Intel® AMT)1
. This new facility is helping open up new revenue streams
for COMGUARD with both large enterprises and public sector organizations.
Challenges
• Continuous improvement. COMGUARD wanted to increase the range of enterprise security services
it could offer its customers, boosting revenue
Solutions
• Demonstrable benefits. Together with Intel, COMGUARD set up a demonstration suite at its brand
new Competency Center in Brno to help communicate the endpoint security management features of
McAfee ePO Deep Command
Impact
• Initial interest. COMGUARD is already running several proofs of concepts (PoCs) with large organizations
eager to take advantage of Intel® Remote Wake Technology (Intel® RWT) and Intel® KVM technology2
• Streamlined management. Intel AMT, together with McAfee ePO Deep Command, simplifies security
and IT management, easing the burden on the IT manager, as well as decreasing costs
• Beyond the endpoint. McAfee ePO Deep Command is a key differentiator for COMGUARD, extending
its offering beyond single-endpoint security solutions and opening up new revenue streams
McAfee ePolicy Orchestrator Deep Command* with Intel®Active Management Technology opens up new enterprise
security revenue streams for COMGUARD
“We have to continuously expand
and develop the services we are
able to offer our customers. For us,
McAfee ePO Deep Command* with
Intel® Active Management Tech-
nology is central to that strategy.”
Robert Šefr,
Pre-Sales and Architect Engineer,
COMGUARD
In with the new
COMGUARD is a multinational, value-add IT distrib-
utor specializing in enterprise security and net-
working solutions. In Central and Eastern Europe
(CEE), it operates primarily in the Czech Republic
and Slovakia. COMGUARD offers IT resellers, large
enterprises and public sector organizations best-
of-breed hardware and software, together with
world-class training and consulting services, as
well as IT implementation and management serv-
ices if required.
Two years ago, the European Union awarded
COMGUARD CZK 42.7 million (USD 2.24 million),
which it used in part to fund the construction of
new headquarters in Brno in the Czech Republic.
The four-story building offers improved office
space as well as a specialist Training Center and
Competency Center.
Completed in late 2012, the Competency Center
includes the latest high-end enterprise security
solutions from major vendors, including McAfee.
COMGUARD uses the facility to demonstrate these
IT security technologies to its customers. It does
this by simulating its customers’ client environ-
ments so that they are able to see exactly how
the technology will run and the benefits it can
bring.
To simulate almost any client environment, the
Competency Center contains a range of desktop
and mobile computing devices – including some
running on the latest 4th generation Intel® Core
i5 and i7 vPro™ processors, various operating
systems (OS) and IT management systems, and
applications from a range of manufacturers.
Expanding horizons
Traditionally, COMGUARD specialized in security
solutions focused on network and perimeter se-
curity (e.g. firewalls). However, it wanted to in-
crease revenue by branching out into selling and
managing security solutions across the full client
infrastructure.
This document and the information given are for the convenience of Intel’s customer base and are provided “AS IS” WITH NO WARRANTIES WHATSOEVER, EXPRESS OR IMPLIED,
INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. Receipt or
possession of this document does not grant any license to any of the intellectual property described, displayed, or contained herein. Intel® products are not intended for use in
medical, lifesaving, life-sustaining, critical control, or safety systems, or in nuclear facility applications.
Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit
the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect per-
formance of systems available for purchase.
Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark,
are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should
consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with
other products. For more information go to http://www.intel.com/performance.
1
Intel®Active Management Technology Security features enabled by Intel® Active Management Technology require an enabled chipset, network hardware and software, and a
corporate network connection. Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power,
sleeping, hibernating, or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks,
and modifications or implementation of new business processes. For more information, visit http://www.intel.com/technology/manage/iamt.
2
Intel®KVM Remote Control (Keyboard, Video, Mouse) is only available with Intel® Core™ i5 vPro™ and Core™ i7 vPro™ processors with Intel® Active Management technology
activated and configured and with integrated graphics active. Discrete graphics are not supported.
Copyright
©2013, Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Core, Intel vPro, Core vPro inside, Intel KVM Technology, Intel Active Management Technology
and Intel Remote Wake Technology are trademarks of Intel Corporation in the U.S. and other countries.
*Other names and brands may be claimed as the property of others. 1113/JNW/RLC/XX/PDF 329900-001EN
Robert Šefr, pre-sales and architect engineer at
COMGUARD, explains: “In order to remain competitive
in our market segment, we have to continuously
expand and develop the services we are able to
offer customers. For us, McAfee ePO Deep Command
with Intel AMT is central to that strategy.”
McAfee ePO Deep Command provides IT adminis-
trators with secure remote access to PCs regard-
less of the PC’s power or encrypted state. This
enables them to remotely remediate compromised
systems, enable energy-saving initiatives, wake
systems and apply proactive security.
Customer demonstrations
COMGUARD turned to Intel to help it set up a
McAfee ePO Deep Command demonstration suite
at its Competency Center. Its primary use is to
demonstrate to customers the remote security
management benefits of McAfee ePO Deep Com-
mand, and show how it can work hand in hand
with existing security software solutions such
as McAfee Endpoint Encryption*.
“We were very impressed with the speed at which
we were able to get McAfee ePO Deep Command
up and running and familiarize ourselves with it,"
says Šefr. "It was a matter of days rather than
weeks, which meant that we were able to get
potential customers through the door as soon as
the Competency Center opened for business.
“Presently," Šefr continued, "we are running sev-
eral PoCs for large enterprise customers. We have
found the Intel Remote Wake Technology and KVM
Remote Control features to be of particular ben-
efit to large organizations spread over several
offices and geographies.
“For example," Šefr said, "one of our customers’
goals is to run anti-virus scheduled scans over night
which is easier said than done when multiple lo-
cations are involved. Using Intel Remote Wake
Technology, the customer is able to power on and
wake up a PC out of office hours, enabling it to
update anti-virus signatures, perform software
updates and scan whole drives without impacting
end-user productivity.
“Using Intel KVM technology, IT administrators
are able to take control of users’ computers, even
mobile and home workers," Šefr said, "from the
management console, enabling them to see what’s
on the monitor even if the OS crashes. This greatly
simplifies the task of client management, easing
the burden on the IT manager and reducing asso-
ciated maintenance costs. They are able to resolve
more problems remotely, which means less in-
convenience to the business.”
Bottom-line benefits
It’s not just customers who stand to benefit from
McAfee ePO Deep Command. It will be a key differ-
entiator for COMGUARD itself. McAfee ePO Deep
Command with Intel AMT extends COMGUARD’s
offering to customers beyond single endpoint
security solutions to those which cover the full
client infrastructure.
Spotlight on COMGUARD
COMGUARD is a leading value-added distributor
of security and networking products. In Central
and Eastern Europe, it operates primarily in
the Czech Republic and Slovakia. COMGUARD’s
Competency Center, located at its headquar-
ters in Brno, is the first facility in the Czech
Republic dedicated to demonstrating the latest
enterprise security solutions to combat gro-
wing and rapidly changing security threats.
Knowledge gained from PoCs means that COM-
GUARD can now consult with customers on how
to approach large requests for proposals (RFPs)
focused on endpoint management as well as se-
curity. All this helps to broaden COMGUARD’s
customer base.
Find the solution that’s right for your organization.
Contact your Intel representative, visit Intel’s
Business Success Stories for IT Managers
(www.intel.co.uk/Itcasestudies) or explore the
Intel.co.uk IT Center (www.intel.co.uk/itcenter).
McAfee ePO Deep Command is a key differentiator
for COMGUARD

More Related Content

What's hot

Engineer Sensors For Digital Transformation Webinar PPT
Engineer Sensors For Digital Transformation Webinar PPTEngineer Sensors For Digital Transformation Webinar PPT
Engineer Sensors For Digital Transformation Webinar PPTSadatulla Zishan
 
Slowear Heading Clouds
Slowear Heading CloudsSlowear Heading Clouds
Slowear Heading Cloudsxband
 
FDT 3.0 and OPC UA : Key to Interoperability
FDT 3.0 and OPC UA : Key to InteroperabilityFDT 3.0 and OPC UA : Key to Interoperability
FDT 3.0 and OPC UA : Key to InteroperabilitySadatulla Zishan
 
Andersson Elffers Felix integrates physical and digital access with SafeNet e...
Andersson Elffers Felix integrates physical and digital access with SafeNet e...Andersson Elffers Felix integrates physical and digital access with SafeNet e...
Andersson Elffers Felix integrates physical and digital access with SafeNet e...SafeNet
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsIT@Intel
 
An Overview of OPC UA Security
An Overview of OPC UA SecurityAn Overview of OPC UA Security
An Overview of OPC UA SecuritySadatulla Zishan
 
Air defense spectrum_analysis_module_spec_sheet
Air defense spectrum_analysis_module_spec_sheetAir defense spectrum_analysis_module_spec_sheet
Air defense spectrum_analysis_module_spec_sheetAdvantec Distribution
 
“Smarter Manufacturing with Intel’s Deep Learning-Based Machine Vision,” a Pr...
“Smarter Manufacturing with Intel’s Deep Learning-Based Machine Vision,” a Pr...“Smarter Manufacturing with Intel’s Deep Learning-Based Machine Vision,” a Pr...
“Smarter Manufacturing with Intel’s Deep Learning-Based Machine Vision,” a Pr...Edge AI and Vision Alliance
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAdvantec Distribution
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterGeneXus
 
EMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarEMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarErin Banks
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Javaterrencebarr
 
Unlock Hidden Potential through Big Data and Analytics
Unlock Hidden Potential through Big Data and AnalyticsUnlock Hidden Potential through Big Data and Analytics
Unlock Hidden Potential through Big Data and AnalyticsIT@Intel
 
Eurotech M2M Building Blocks and Multi-Service Gateway Approach
Eurotech M2M Building Blocks and Multi-Service Gateway ApproachEurotech M2M Building Blocks and Multi-Service Gateway Approach
Eurotech M2M Building Blocks and Multi-Service Gateway ApproachEurotech
 
Knorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudyKnorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudySafeNet
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency PlatformSymantec
 
Intel Mobile Launch Information
Intel Mobile Launch InformationIntel Mobile Launch Information
Intel Mobile Launch InformationAnna Yovka
 
Legacy hardware integration
Legacy hardware integrationLegacy hardware integration
Legacy hardware integrationi-comply
 

What's hot (20)

Engineer Sensors For Digital Transformation Webinar PPT
Engineer Sensors For Digital Transformation Webinar PPTEngineer Sensors For Digital Transformation Webinar PPT
Engineer Sensors For Digital Transformation Webinar PPT
 
Slowear Heading Clouds
Slowear Heading CloudsSlowear Heading Clouds
Slowear Heading Clouds
 
FDT 3.0 and OPC UA : Key to Interoperability
FDT 3.0 and OPC UA : Key to InteroperabilityFDT 3.0 and OPC UA : Key to Interoperability
FDT 3.0 and OPC UA : Key to Interoperability
 
Andersson Elffers Felix integrates physical and digital access with SafeNet e...
Andersson Elffers Felix integrates physical and digital access with SafeNet e...Andersson Elffers Felix integrates physical and digital access with SafeNet e...
Andersson Elffers Felix integrates physical and digital access with SafeNet e...
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform Benefits
 
An Overview of OPC UA Security
An Overview of OPC UA SecurityAn Overview of OPC UA Security
An Overview of OPC UA Security
 
Air defense spectrum_analysis_module_spec_sheet
Air defense spectrum_analysis_module_spec_sheetAir defense spectrum_analysis_module_spec_sheet
Air defense spectrum_analysis_module_spec_sheet
 
“Smarter Manufacturing with Intel’s Deep Learning-Based Machine Vision,” a Pr...
“Smarter Manufacturing with Intel’s Deep Learning-Based Machine Vision,” a Pr...“Smarter Manufacturing with Intel’s Deep Learning-Based Machine Vision,” a Pr...
“Smarter Manufacturing with Intel’s Deep Learning-Based Machine Vision,” a Pr...
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
Network Monitoring
Network MonitoringNetwork Monitoring
Network Monitoring
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao Datacenter
 
EMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarEMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey Webinar
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
 
Unlock Hidden Potential through Big Data and Analytics
Unlock Hidden Potential through Big Data and AnalyticsUnlock Hidden Potential through Big Data and Analytics
Unlock Hidden Potential through Big Data and Analytics
 
Eurotech M2M Building Blocks and Multi-Service Gateway Approach
Eurotech M2M Building Blocks and Multi-Service Gateway ApproachEurotech M2M Building Blocks and Multi-Service Gateway Approach
Eurotech M2M Building Blocks and Multi-Service Gateway Approach
 
Knorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudyKnorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case Study
 
Personal identity information protection
Personal identity information protectionPersonal identity information protection
Personal identity information protection
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency Platform
 
Intel Mobile Launch Information
Intel Mobile Launch InformationIntel Mobile Launch Information
Intel Mobile Launch Information
 
Legacy hardware integration
Legacy hardware integrationLegacy hardware integration
Legacy hardware integration
 

Similar to Comguard expanding-portfolio

Fujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administrationFujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administrationxband
 
IT@Intel: Introducing IT on the Go
IT@Intel:   Introducing IT on the GoIT@Intel:   Introducing IT on the Go
IT@Intel: Introducing IT on the GoIT@Intel
 
Introduction to container networking in K8s - SDN/NFV London meetup
Introduction to container networking in K8s - SDN/NFV  London meetupIntroduction to container networking in K8s - SDN/NFV  London meetup
Introduction to container networking in K8s - SDN/NFV London meetupHaidee McMahon
 
Bringing manufacturing in house with secure IIoT communications | Siemens & P...
Bringing manufacturing in house with secure IIoT communications | Siemens & P...Bringing manufacturing in house with secure IIoT communications | Siemens & P...
Bringing manufacturing in house with secure IIoT communications | Siemens & P...Polestar IIoT
 
Intel software guard extension
Intel software guard extensionIntel software guard extension
Intel software guard extensionDESMOND YUEN
 
Win 7 & Intel V Pro Tech
Win 7 & Intel V Pro TechWin 7 & Intel V Pro Tech
Win 7 & Intel V Pro Techtechnext1
 
Thyssen Krupp Presta AG Driving Productivity
Thyssen Krupp Presta AG Driving ProductivityThyssen Krupp Presta AG Driving Productivity
Thyssen Krupp Presta AG Driving Productivityxband
 
Preparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsPreparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsIntel IoT
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...Kuralamudhan Ramakrishnan
 
Validy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryValidy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryGilles Sgro
 
IT@Intel: Introducing IT on the Go
IT@Intel: Introducing IT on the GoIT@Intel: Introducing IT on the Go
IT@Intel: Introducing IT on the GoIntel IT Center
 
ChipGlobe - Dieter Rudolf - Secure IoT communication - for Infineon IoT Secur...
ChipGlobe - Dieter Rudolf - Secure IoT communication - for Infineon IoT Secur...ChipGlobe - Dieter Rudolf - Secure IoT communication - for Infineon IoT Secur...
ChipGlobe - Dieter Rudolf - Secure IoT communication - for Infineon IoT Secur...Dieter Rudolf
 

Similar to Comguard expanding-portfolio (20)

Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
 
Fujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administrationFujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administration
 
IT@Intel: Introducing IT on the Go
IT@Intel:   Introducing IT on the GoIT@Intel:   Introducing IT on the Go
IT@Intel: Introducing IT on the Go
 
Value Journal - March 2021
Value Journal - March 2021Value Journal - March 2021
Value Journal - March 2021
 
Introduction to container networking in K8s - SDN/NFV London meetup
Introduction to container networking in K8s - SDN/NFV  London meetupIntroduction to container networking in K8s - SDN/NFV  London meetup
Introduction to container networking in K8s - SDN/NFV London meetup
 
Bringing manufacturing in house with secure IIoT communications | Siemens & P...
Bringing manufacturing in house with secure IIoT communications | Siemens & P...Bringing manufacturing in house with secure IIoT communications | Siemens & P...
Bringing manufacturing in house with secure IIoT communications | Siemens & P...
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Intel software guard extension
Intel software guard extensionIntel software guard extension
Intel software guard extension
 
Win 7 & Intel V Pro Tech
Win 7 & Intel V Pro TechWin 7 & Intel V Pro Tech
Win 7 & Intel V Pro Tech
 
Intel_IoT_gateway.pdf
Intel_IoT_gateway.pdfIntel_IoT_gateway.pdf
Intel_IoT_gateway.pdf
 
vPro-BMW
vPro-BMWvPro-BMW
vPro-BMW
 
Thyssen Krupp Presta AG Driving Productivity
Thyssen Krupp Presta AG Driving ProductivityThyssen Krupp Presta AG Driving Productivity
Thyssen Krupp Presta AG Driving Productivity
 
Preparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsPreparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of Things
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
 
Validy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryValidy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summary
 
IT@Intel: Introducing IT on the Go
IT@Intel: Introducing IT on the GoIT@Intel: Introducing IT on the Go
IT@Intel: Introducing IT on the Go
 
Voip automation framework
Voip automation frameworkVoip automation framework
Voip automation framework
 
Resume_Pratik
Resume_PratikResume_Pratik
Resume_Pratik
 
ChipGlobe - Dieter Rudolf - Secure IoT communication - for Infineon IoT Secur...
ChipGlobe - Dieter Rudolf - Secure IoT communication - for Infineon IoT Secur...ChipGlobe - Dieter Rudolf - Secure IoT communication - for Infineon IoT Secur...
ChipGlobe - Dieter Rudolf - Secure IoT communication - for Infineon IoT Secur...
 

More from xband

Talos threat-intelligence
Talos threat-intelligenceTalos threat-intelligence
Talos threat-intelligencexband
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breachesxband
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Securityxband
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Servicesxband
 
Security Operations and Response
Security Operations and ResponseSecurity Operations and Response
Security Operations and Responsexband
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protectionxband
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
API Connect Presentation
API Connect PresentationAPI Connect Presentation
API Connect Presentationxband
 
Verizon Data Breach Investigation Report
Verizon Data Breach Investigation ReportVerizon Data Breach Investigation Report
Verizon Data Breach Investigation Reportxband
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netxband
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Hipaa Omnibus Final-Rule-eResource
Hipaa Omnibus Final-Rule-eResourceHipaa Omnibus Final-Rule-eResource
Hipaa Omnibus Final-Rule-eResourcexband
 
The Total Economic Impact™ Of Cisco Data Virtualization
The Total Economic Impact™ Of Cisco Data VirtualizationThe Total Economic Impact™ Of Cisco Data Virtualization
The Total Economic Impact™ Of Cisco Data Virtualizationxband
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutionsxband
 
Big Data, Little Data, and Everything in Between
Big Data, Little Data, and Everything in BetweenBig Data, Little Data, and Everything in Between
Big Data, Little Data, and Everything in Betweenxband
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysisxband
 
Charles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limitsCharles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limitsxband
 
Iter supercomputing beyond_horizon
Iter supercomputing beyond_horizonIter supercomputing beyond_horizon
Iter supercomputing beyond_horizonxband
 

More from xband (20)

Talos threat-intelligence
Talos threat-intelligenceTalos threat-intelligence
Talos threat-intelligence
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
Security Operations and Response
Security Operations and ResponseSecurity Operations and Response
Security Operations and Response
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
API Connect Presentation
API Connect PresentationAPI Connect Presentation
API Connect Presentation
 
Verizon Data Breach Investigation Report
Verizon Data Breach Investigation ReportVerizon Data Breach Investigation Report
Verizon Data Breach Investigation Report
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Hipaa Omnibus Final-Rule-eResource
Hipaa Omnibus Final-Rule-eResourceHipaa Omnibus Final-Rule-eResource
Hipaa Omnibus Final-Rule-eResource
 
The Total Economic Impact™ Of Cisco Data Virtualization
The Total Economic Impact™ Of Cisco Data VirtualizationThe Total Economic Impact™ Of Cisco Data Virtualization
The Total Economic Impact™ Of Cisco Data Virtualization
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutions
 
Big Data, Little Data, and Everything in Between
Big Data, Little Data, and Everything in BetweenBig Data, Little Data, and Everything in Between
Big Data, Little Data, and Everything in Between
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysis
 
Charles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limitsCharles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limits
 
Iter supercomputing beyond_horizon
Iter supercomputing beyond_horizonIter supercomputing beyond_horizon
Iter supercomputing beyond_horizon
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Comguard expanding-portfolio

  • 1. CASE STUDY 4th Generation Intel®Core™i5 and i7 vPro™Processors Enterprise Security COMGUARD expands portfolio Value-add IT distributor COMGUARD continuously seeks to broaden the enterprise security services it offers to customers. This is essential to remain competitive within its market segment. Together with Intel, COMGUARD set up a demonstration suite within its Competency Center to highlight to customers the remote management capabilities of McAfee ePolicy Orchestrator (ePO) Deep Command* with Intel® Active Management Technology (Intel® AMT)1 . This new facility is helping open up new revenue streams for COMGUARD with both large enterprises and public sector organizations. Challenges • Continuous improvement. COMGUARD wanted to increase the range of enterprise security services it could offer its customers, boosting revenue Solutions • Demonstrable benefits. Together with Intel, COMGUARD set up a demonstration suite at its brand new Competency Center in Brno to help communicate the endpoint security management features of McAfee ePO Deep Command Impact • Initial interest. COMGUARD is already running several proofs of concepts (PoCs) with large organizations eager to take advantage of Intel® Remote Wake Technology (Intel® RWT) and Intel® KVM technology2 • Streamlined management. Intel AMT, together with McAfee ePO Deep Command, simplifies security and IT management, easing the burden on the IT manager, as well as decreasing costs • Beyond the endpoint. McAfee ePO Deep Command is a key differentiator for COMGUARD, extending its offering beyond single-endpoint security solutions and opening up new revenue streams McAfee ePolicy Orchestrator Deep Command* with Intel®Active Management Technology opens up new enterprise security revenue streams for COMGUARD “We have to continuously expand and develop the services we are able to offer our customers. For us, McAfee ePO Deep Command* with Intel® Active Management Tech- nology is central to that strategy.” Robert Šefr, Pre-Sales and Architect Engineer, COMGUARD In with the new COMGUARD is a multinational, value-add IT distrib- utor specializing in enterprise security and net- working solutions. In Central and Eastern Europe (CEE), it operates primarily in the Czech Republic and Slovakia. COMGUARD offers IT resellers, large enterprises and public sector organizations best- of-breed hardware and software, together with world-class training and consulting services, as well as IT implementation and management serv- ices if required. Two years ago, the European Union awarded COMGUARD CZK 42.7 million (USD 2.24 million), which it used in part to fund the construction of new headquarters in Brno in the Czech Republic. The four-story building offers improved office space as well as a specialist Training Center and Competency Center. Completed in late 2012, the Competency Center includes the latest high-end enterprise security solutions from major vendors, including McAfee. COMGUARD uses the facility to demonstrate these IT security technologies to its customers. It does this by simulating its customers’ client environ- ments so that they are able to see exactly how the technology will run and the benefits it can bring. To simulate almost any client environment, the Competency Center contains a range of desktop and mobile computing devices – including some running on the latest 4th generation Intel® Core i5 and i7 vPro™ processors, various operating systems (OS) and IT management systems, and applications from a range of manufacturers. Expanding horizons Traditionally, COMGUARD specialized in security solutions focused on network and perimeter se- curity (e.g. firewalls). However, it wanted to in- crease revenue by branching out into selling and managing security solutions across the full client infrastructure.
  • 2. This document and the information given are for the convenience of Intel’s customer base and are provided “AS IS” WITH NO WARRANTIES WHATSOEVER, EXPRESS OR IMPLIED, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. Receipt or possession of this document does not grant any license to any of the intellectual property described, displayed, or contained herein. Intel® products are not intended for use in medical, lifesaving, life-sustaining, critical control, or safety systems, or in nuclear facility applications. Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect per- formance of systems available for purchase. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/performance. 1 Intel®Active Management Technology Security features enabled by Intel® Active Management Technology require an enabled chipset, network hardware and software, and a corporate network connection. Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating, or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks, and modifications or implementation of new business processes. For more information, visit http://www.intel.com/technology/manage/iamt. 2 Intel®KVM Remote Control (Keyboard, Video, Mouse) is only available with Intel® Core™ i5 vPro™ and Core™ i7 vPro™ processors with Intel® Active Management technology activated and configured and with integrated graphics active. Discrete graphics are not supported. Copyright ©2013, Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Core, Intel vPro, Core vPro inside, Intel KVM Technology, Intel Active Management Technology and Intel Remote Wake Technology are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. 1113/JNW/RLC/XX/PDF 329900-001EN Robert Šefr, pre-sales and architect engineer at COMGUARD, explains: “In order to remain competitive in our market segment, we have to continuously expand and develop the services we are able to offer customers. For us, McAfee ePO Deep Command with Intel AMT is central to that strategy.” McAfee ePO Deep Command provides IT adminis- trators with secure remote access to PCs regard- less of the PC’s power or encrypted state. This enables them to remotely remediate compromised systems, enable energy-saving initiatives, wake systems and apply proactive security. Customer demonstrations COMGUARD turned to Intel to help it set up a McAfee ePO Deep Command demonstration suite at its Competency Center. Its primary use is to demonstrate to customers the remote security management benefits of McAfee ePO Deep Com- mand, and show how it can work hand in hand with existing security software solutions such as McAfee Endpoint Encryption*. “We were very impressed with the speed at which we were able to get McAfee ePO Deep Command up and running and familiarize ourselves with it," says Šefr. "It was a matter of days rather than weeks, which meant that we were able to get potential customers through the door as soon as the Competency Center opened for business. “Presently," Šefr continued, "we are running sev- eral PoCs for large enterprise customers. We have found the Intel Remote Wake Technology and KVM Remote Control features to be of particular ben- efit to large organizations spread over several offices and geographies. “For example," Šefr said, "one of our customers’ goals is to run anti-virus scheduled scans over night which is easier said than done when multiple lo- cations are involved. Using Intel Remote Wake Technology, the customer is able to power on and wake up a PC out of office hours, enabling it to update anti-virus signatures, perform software updates and scan whole drives without impacting end-user productivity. “Using Intel KVM technology, IT administrators are able to take control of users’ computers, even mobile and home workers," Šefr said, "from the management console, enabling them to see what’s on the monitor even if the OS crashes. This greatly simplifies the task of client management, easing the burden on the IT manager and reducing asso- ciated maintenance costs. They are able to resolve more problems remotely, which means less in- convenience to the business.” Bottom-line benefits It’s not just customers who stand to benefit from McAfee ePO Deep Command. It will be a key differ- entiator for COMGUARD itself. McAfee ePO Deep Command with Intel AMT extends COMGUARD’s offering to customers beyond single endpoint security solutions to those which cover the full client infrastructure. Spotlight on COMGUARD COMGUARD is a leading value-added distributor of security and networking products. In Central and Eastern Europe, it operates primarily in the Czech Republic and Slovakia. COMGUARD’s Competency Center, located at its headquar- ters in Brno, is the first facility in the Czech Republic dedicated to demonstrating the latest enterprise security solutions to combat gro- wing and rapidly changing security threats. Knowledge gained from PoCs means that COM- GUARD can now consult with customers on how to approach large requests for proposals (RFPs) focused on endpoint management as well as se- curity. All this helps to broaden COMGUARD’s customer base. Find the solution that’s right for your organization. Contact your Intel representative, visit Intel’s Business Success Stories for IT Managers (www.intel.co.uk/Itcasestudies) or explore the Intel.co.uk IT Center (www.intel.co.uk/itcenter). McAfee ePO Deep Command is a key differentiator for COMGUARD