SlideShare a Scribd company logo
Outpost Network Security
Product presentation
What is Outpost Network Security?
• Combined manageable software firewall and anti-spyware solution
designed especially to meet small and medium business’s needs
• Protects each and every company PC from both external (Internet) and
internal threats (e.g. hacker attacks, data theft, PC infiltrations, etc)
• Allows system administrators to set networking rules for PCs and user
applications to easily secure company IT infrastructure
Outpost Network Security – combined power of Firewall and Ant-Spyware protection
to ensure maximum corporate network security
Contents
Outpost Network Security – why would your company need it?
Security threats
Possible solutions: Hardware Appliance, Anti-Virus, Outpost Network Security
What is Outpost Network Security
Package contents
How it all works?
System requirements
Support
Why Outpost Network Security?
How to purchase?
IT security solutions – that’s what professionals think
• The average survival time for an unprotected networked computer dropped from 40 minutes
to 20 minutes over the last year - SANS Institute of Bethesda
• For every in-house attack reported, there could be as many as 50 that go either unreported
or undetected – The Computer Security Journal
• Viruses and worms are the leading information security concerns and continue to generate
the most media and public attention. But CIOs and other IT executives are increasingly
recognizing the significance of internal threats... – Global Information Security Survey,
Ernst&Young LLP
• 86% of Computer Crimes originate from inside the company network – Intranet Security
• It's bad enough for SOHO / individual users not to use a firewall - absolutely unconscionable
for a business to operate without (a correctly configured) one - www.iway-safety.com
• Nearly 90% of US businesses suffered from a computer virus, spyware or other online attack
in 2004 or 2005 despite widespread use of security software. The average damage was at
$24,000 - FBI
Most cost-dangerous security threats
Spyware and viruses
35%
Email intrusions
3%
Denial of service
attacks
12%
Web site intrusion
7%
Loss of confidential
data
43%
Source: Ernst&Young LLP
Security solutions available – Hardware Appliance
Weaknesses:
Ignores web pages’ content (i.e. Active Content)
Regards all outbound traffic as trustworthy,
providing no protection against Trojans and
Spyware, should they infiltrate endpoints
Doesn’t monitor internal network traffic so if a
hacker gets inside your company networks, he
becomes almost omnipotent
Doesn’t provide endpoint Anti-Spyware
protection
Strengths:
Blocks illegal inbound traffic
Analyses traffic on network interface layer
Protects company perimeter from known malware
Standalone unit
Security solutions available – Anti-Virus
Weaknesses:
Anti-virus database MUST contain the virus’s
signature to allow ant-virus recognize it
Doesn’t offer any protection against hacker
attacks, whether internal or external, exposing
your company to risks of sensitive data losses
and leakage
Loads some system resources on employees’
PCs
Strengths:
 Monitors emails and web pages for potential
viruses
 Monitors files for malicious code contamination
Security solutions available – Outpost Network Security
Weaknesses:
Doesn’t include anti-virus yet
Strengths:
 Includes manageable integrated Anti-Spyware protection
 Blocks illegal inbound and outbound traffic on each PC in
your company network, protecting your company from
both internal and external threats
 Analyses traffic on both network interface and application
layers, blocking communications for all potentially
dangerous programs, like Trojans, Spyware etc.
 Allows system administrators to set endpoints to block
potentially dangerous email attachments and web pages’
scripts
Multi-Layer Protection approach
Outpost Network
Security – core
defensive
element
Hardware
Firewall – to
strengthen you
protection against
external attacks
Anti-Virus together
with Outpost
Network Secruity
Anti-Spyware
protection ensures
no malicious code is
run on any PC in
your company
Outpost Network Security – Core Element of Your Company IT Security
Contents
Outpost Network Security – why would your company need it?
Security threats
Possible solutions: Hardware Appliance, Anti-Virus, Outpost Network Security
What is Outpost Network Security
Package contents
How it all works?
System requirements
Support
Why Outpost Network Security?
How to purchase?
Outpost Network Security Package
• Agnitum Command Center
• Outpost Network Security Client
• Agnitum Update Service
• Agnitum Publisher Service
Outpost Network Security Client
• Combined anti-spyware and firewall protection
• Safeguards company PCs from both external (Internet) and internal threats and
• Forcing firewall and anti-spyware settings to client PCs
• Remote deployment
Agnitum Update Service
•Centralized update deployment
•Controlling Network Security Clients on the company PCs
•Minimal system requirements
Screenshots
Agnitum Publisher Service
•Centralized rules and configurations deployment
•Minimal system requirements
Screenshots
Agnitum Command Center
•Controlling Network Security Clients on the company PCs
•Defining user groups
•Setting up endpoint rules
•Update Service and Publisher Service management
•Unprecedentedly easy-to-use
Screenshot
Contents
Outpost Network Security – why would your company need it?
Security threats
Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security
What is Outpost Network Security
Package contents
How it all works?
System requirements
Support
Why Outpost Network Security
How to purchase?
System requirements
To allow remote deployment
• Windows 2000 or 2003 Domain Controller
Administrator PC
• Windows XP, 2000 Pro or 2003 Server operating system
Client PCs
• 233 MHz Intel Pentium or compatible CPU
• 32 MB RAM
• Windows 98, Me, 2000, XP or 2003 Server operating system
• 30 MB of hard disk space
Agnitum Command Center doesn’t need to be
installed on company server!
Contents
Outpost Network Security – why would your company need it?
Security threats
Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security
What is Outpost Network Security
Package contents
How it all works?
System requirements
Support
Why Outpost Network Security?
How to purchase?
Support service for Outpost Network Security
Contents
Outpost Network Security – why would your company need it?
Security threats
Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security
What is Outpost Network Security
Package contents
How it all works?
System requirements
Support
Why Outpost Network Security?
How to purchase?
Why Outpost Network Security?
Award-winning technology
The core of Outpost Network Security is award-winning Outpost Personal Firewall technology.
Recent awards:
Why Outpost Network Security?
• Advanced application
control (physical path
verification, system
registry path verification)
• Agnitum Update Service
and Agnitum Publisher
Service can run under
unprivileged user
account
• Advanced Ethernet
protection (anti-sniffing,
anti-spoofing, ARP
attack protection etc.)
Advanced security
features
Low system resources
consumption and
hardware requirements
Agnitum Command Center
is capable of working with
150 clients at the same
instant, which means the
system will successfully
with work thousands of
PCs
• Outpost Network
Security client flawlessly
runs on ANY PC suitable
for at least MS Windows
98 OS
• Agnitum Command
Center successfully runs
on ANY PC meeting
Windows 2000 hardware
requirements
• Agnitum Command
Center doesn’t have to
be installed on company
server
Scalability
Outpost Network Security is suitable for any network,
supports VPN and ensures your company is 105%
protected against all known attacks and spyware, whether
you have tens or thousands of PCs to secure
Contents
Outpost Network Security – why would your company need it?
Security threats
Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security
What is Outpost Network Security
Package contents
How it all works?
System requirements
Support
Why Outpost Network Security?
How to purchase?
How to download and purchase Outpost Network Security?
• Download Outpost Network Security 15 day trial here: http://
agnitum.com/download/ons.html
• Purchase online here: http://agnitum.com/purchase/shop/ons/businesslicense.html
• Purchase through the network of our Solutions Providers or Distributors. To locate
your nearest partner, please follow this link:
http://agnitum.com/purchase/buyoffline.html
• For additional information please see Outpost Network Security page on our
website: http://agnitum.com/products/ons/index.html or contact us via email:
ons@agnitum.com or phone: +7-812-336-5246
Thank you for your attention!
Yours sincerely,
Agnitum Ltd. Team

More Related Content

PPTX
Firewall, Router and Switch Configuration Review
PPT
Auditing Check Point Firewalls
PPTX
Introduction of firewall slides
PPTX
Checkpoint Firewall for Dummies
PPTX
OwnYIT CSAT + SIEM
PPTX
Multi domain security-management_technical_presentation
PPT
Advanced Internet Final
PPTX
Check Point sizing security
Firewall, Router and Switch Configuration Review
Auditing Check Point Firewalls
Introduction of firewall slides
Checkpoint Firewall for Dummies
OwnYIT CSAT + SIEM
Multi domain security-management_technical_presentation
Advanced Internet Final
Check Point sizing security

What's hot (18)

PPT
UTM Basic Rev 1.2 (Modified)
PPTX
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
PPTX
Hardware firewall
PPTX
ICS case studies v2
PPT
Firewall Penetration Testing
PPTX
Check Point Virtual Systems
PPT
checkpoint
PDF
Fire Eye Appliance Quick Start
PPTX
Checkpoint Firewall Training | Checkpoint Firewall Online Course
PPTX
Dncybersecurity
PPT
Fortigate Training
PDF
Check point presentation june 2014
PDF
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
PPTX
How to Audit Firewall, what are the standard Practices for Firewall Audit
PPT
Android Firewall project
PDF
Ce hv6 module 49 creating security policies
PDF
Review of network diagram
PDF
VIPER Labs - VOIP Security - SANS Summit
UTM Basic Rev 1.2 (Modified)
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Hardware firewall
ICS case studies v2
Firewall Penetration Testing
Check Point Virtual Systems
checkpoint
Fire Eye Appliance Quick Start
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Dncybersecurity
Fortigate Training
Check point presentation june 2014
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
How to Audit Firewall, what are the standard Practices for Firewall Audit
Android Firewall project
Ce hv6 module 49 creating security policies
Review of network diagram
VIPER Labs - VOIP Security - SANS Summit
Ad

Similar to Outpost networksecurity (20)

PDF
Agnitum Outpost Pro product line
PPT
Agnitum Introduces Outpost Network Security 3 0
PPT
Outpost Network Security Suite 3.0
PDF
Outpost Security Pro 7.5: What's Inside?
PDF
Outpost Anti-Malware 7.5
PDF
Outpost Security Pro 7.5 - Extended Tour
PDF
Cybersecurity Concerns You Should be Thinking About
PDF
What’s the State of Your Endpoint Security?
PPT
Agnitum Technology Licensing
PDF
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
PPT
Redefining Endpoint Security
PPTX
unit 2 IT security solution.pptx
PPTX
Isday 2017 - Atelier Cisco
PDF
Eximbank security presentation
PPTX
stackArmor - Security MicroSummit - McAfee
PDF
Total Defense Product Information
PDF
Security Operation Center : Le Centre des Opérations de Sécurité est une div...
PDF
Complete Endpoint protection
PPT
Advanced internetfinal
PDF
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Agnitum Outpost Pro product line
Agnitum Introduces Outpost Network Security 3 0
Outpost Network Security Suite 3.0
Outpost Security Pro 7.5: What's Inside?
Outpost Anti-Malware 7.5
Outpost Security Pro 7.5 - Extended Tour
Cybersecurity Concerns You Should be Thinking About
What’s the State of Your Endpoint Security?
Agnitum Technology Licensing
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Redefining Endpoint Security
unit 2 IT security solution.pptx
Isday 2017 - Atelier Cisco
Eximbank security presentation
stackArmor - Security MicroSummit - McAfee
Total Defense Product Information
Security Operation Center : Le Centre des Opérations de Sécurité est une div...
Complete Endpoint protection
Advanced internetfinal
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Ad

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Spectroscopy.pptx food analysis technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25 Week I
MIND Revenue Release Quarter 2 2025 Press Release
“AI and Expert System Decision Support & Business Intelligence Systems”
sap open course for s4hana steps from ECC to s4
Spectral efficient network and resource selection model in 5G networks
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectroscopy.pptx food analysis technology
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
Building Integrated photovoltaic BIPV_UPV.pdf
Big Data Technologies - Introduction.pptx
cuic standard and advanced reporting.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
MYSQL Presentation for SQL database connectivity
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Outpost networksecurity

  • 2. What is Outpost Network Security? • Combined manageable software firewall and anti-spyware solution designed especially to meet small and medium business’s needs • Protects each and every company PC from both external (Internet) and internal threats (e.g. hacker attacks, data theft, PC infiltrations, etc) • Allows system administrators to set networking rules for PCs and user applications to easily secure company IT infrastructure Outpost Network Security – combined power of Firewall and Ant-Spyware protection to ensure maximum corporate network security
  • 3. Contents Outpost Network Security – why would your company need it? Security threats Possible solutions: Hardware Appliance, Anti-Virus, Outpost Network Security What is Outpost Network Security Package contents How it all works? System requirements Support Why Outpost Network Security? How to purchase?
  • 4. IT security solutions – that’s what professionals think • The average survival time for an unprotected networked computer dropped from 40 minutes to 20 minutes over the last year - SANS Institute of Bethesda • For every in-house attack reported, there could be as many as 50 that go either unreported or undetected – The Computer Security Journal • Viruses and worms are the leading information security concerns and continue to generate the most media and public attention. But CIOs and other IT executives are increasingly recognizing the significance of internal threats... – Global Information Security Survey, Ernst&Young LLP • 86% of Computer Crimes originate from inside the company network – Intranet Security • It's bad enough for SOHO / individual users not to use a firewall - absolutely unconscionable for a business to operate without (a correctly configured) one - www.iway-safety.com • Nearly 90% of US businesses suffered from a computer virus, spyware or other online attack in 2004 or 2005 despite widespread use of security software. The average damage was at $24,000 - FBI
  • 5. Most cost-dangerous security threats Spyware and viruses 35% Email intrusions 3% Denial of service attacks 12% Web site intrusion 7% Loss of confidential data 43% Source: Ernst&Young LLP
  • 6. Security solutions available – Hardware Appliance Weaknesses: Ignores web pages’ content (i.e. Active Content) Regards all outbound traffic as trustworthy, providing no protection against Trojans and Spyware, should they infiltrate endpoints Doesn’t monitor internal network traffic so if a hacker gets inside your company networks, he becomes almost omnipotent Doesn’t provide endpoint Anti-Spyware protection Strengths: Blocks illegal inbound traffic Analyses traffic on network interface layer Protects company perimeter from known malware Standalone unit
  • 7. Security solutions available – Anti-Virus Weaknesses: Anti-virus database MUST contain the virus’s signature to allow ant-virus recognize it Doesn’t offer any protection against hacker attacks, whether internal or external, exposing your company to risks of sensitive data losses and leakage Loads some system resources on employees’ PCs Strengths:  Monitors emails and web pages for potential viruses  Monitors files for malicious code contamination
  • 8. Security solutions available – Outpost Network Security Weaknesses: Doesn’t include anti-virus yet Strengths:  Includes manageable integrated Anti-Spyware protection  Blocks illegal inbound and outbound traffic on each PC in your company network, protecting your company from both internal and external threats  Analyses traffic on both network interface and application layers, blocking communications for all potentially dangerous programs, like Trojans, Spyware etc.  Allows system administrators to set endpoints to block potentially dangerous email attachments and web pages’ scripts
  • 9. Multi-Layer Protection approach Outpost Network Security – core defensive element Hardware Firewall – to strengthen you protection against external attacks Anti-Virus together with Outpost Network Secruity Anti-Spyware protection ensures no malicious code is run on any PC in your company Outpost Network Security – Core Element of Your Company IT Security
  • 10. Contents Outpost Network Security – why would your company need it? Security threats Possible solutions: Hardware Appliance, Anti-Virus, Outpost Network Security What is Outpost Network Security Package contents How it all works? System requirements Support Why Outpost Network Security? How to purchase?
  • 11. Outpost Network Security Package • Agnitum Command Center • Outpost Network Security Client • Agnitum Update Service • Agnitum Publisher Service
  • 12. Outpost Network Security Client • Combined anti-spyware and firewall protection • Safeguards company PCs from both external (Internet) and internal threats and • Forcing firewall and anti-spyware settings to client PCs • Remote deployment
  • 13. Agnitum Update Service •Centralized update deployment •Controlling Network Security Clients on the company PCs •Minimal system requirements
  • 15. Agnitum Publisher Service •Centralized rules and configurations deployment •Minimal system requirements
  • 17. Agnitum Command Center •Controlling Network Security Clients on the company PCs •Defining user groups •Setting up endpoint rules •Update Service and Publisher Service management •Unprecedentedly easy-to-use
  • 19. Contents Outpost Network Security – why would your company need it? Security threats Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security What is Outpost Network Security Package contents How it all works? System requirements Support Why Outpost Network Security How to purchase?
  • 20. System requirements To allow remote deployment • Windows 2000 or 2003 Domain Controller Administrator PC • Windows XP, 2000 Pro or 2003 Server operating system Client PCs • 233 MHz Intel Pentium or compatible CPU • 32 MB RAM • Windows 98, Me, 2000, XP or 2003 Server operating system • 30 MB of hard disk space Agnitum Command Center doesn’t need to be installed on company server!
  • 21. Contents Outpost Network Security – why would your company need it? Security threats Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security What is Outpost Network Security Package contents How it all works? System requirements Support Why Outpost Network Security? How to purchase?
  • 22. Support service for Outpost Network Security
  • 23. Contents Outpost Network Security – why would your company need it? Security threats Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security What is Outpost Network Security Package contents How it all works? System requirements Support Why Outpost Network Security? How to purchase?
  • 24. Why Outpost Network Security? Award-winning technology The core of Outpost Network Security is award-winning Outpost Personal Firewall technology. Recent awards:
  • 25. Why Outpost Network Security? • Advanced application control (physical path verification, system registry path verification) • Agnitum Update Service and Agnitum Publisher Service can run under unprivileged user account • Advanced Ethernet protection (anti-sniffing, anti-spoofing, ARP attack protection etc.) Advanced security features Low system resources consumption and hardware requirements Agnitum Command Center is capable of working with 150 clients at the same instant, which means the system will successfully with work thousands of PCs • Outpost Network Security client flawlessly runs on ANY PC suitable for at least MS Windows 98 OS • Agnitum Command Center successfully runs on ANY PC meeting Windows 2000 hardware requirements • Agnitum Command Center doesn’t have to be installed on company server Scalability Outpost Network Security is suitable for any network, supports VPN and ensures your company is 105% protected against all known attacks and spyware, whether you have tens or thousands of PCs to secure
  • 26. Contents Outpost Network Security – why would your company need it? Security threats Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security What is Outpost Network Security Package contents How it all works? System requirements Support Why Outpost Network Security? How to purchase?
  • 27. How to download and purchase Outpost Network Security? • Download Outpost Network Security 15 day trial here: http:// agnitum.com/download/ons.html • Purchase online here: http://agnitum.com/purchase/shop/ons/businesslicense.html • Purchase through the network of our Solutions Providers or Distributors. To locate your nearest partner, please follow this link: http://agnitum.com/purchase/buyoffline.html • For additional information please see Outpost Network Security page on our website: http://agnitum.com/products/ons/index.html or contact us via email: ons@agnitum.com or phone: +7-812-336-5246
  • 28. Thank you for your attention! Yours sincerely, Agnitum Ltd. Team