SlideShare a Scribd company logo
Safend Solution Set
About SAFEND and SUPERCOM
52% OF N.A. ENTERPRISESHAVE LOST CONFIDENTIAL DATA THROUGH REMOVABLE MEDIA
IN THE PAST 2 YEARS (FORRESTER)
OVER 70% OF SECURITY BREACHESORIGINATE FROM WITHIN (VISTA RESEARCH)
16,000 LAPTOPS ARE LOSTPER WEEK BY BUSINESS TRAVELERS
IN THE U.S., EUROPE, AND UNITED ARAB EMIRATES
5% DROP IN SHARE PRICESFOR EVERY INFORMATION BREACH
Facts
Average Incident Cost
per compromised record:
$217
CUSTOMER COSTS
• Brand damage
• Loss of existing
customers
• Recruiting new
customers
• Unbudgeted legal, audit and
accounting fees
• Notification to customers
• Free or discounted service
to customers
• Call center expenses
• Public and investor relations
• Internal investigations
INCREMENTAL COSTS
• Lost employee
productivity
PRODUCTIVITY COSTS
54%
30%
16%
Average Incident Cost:
$6.5 million
Cost of Data Breaches: Recovery Cost
SAFEND IS THE LEADER IN
ENDPOINT DATA
FOR ENTERPRISE PROTECTION AND REGULATORY COMPLIANCE
LEAKAGE PREVENTION
Why DPS?
PROTECTION AGAINST
LOSS AND THEFTFROM LAPTOPS TO USB MEMORY STICKS/CD/DVD
PROTECTION AGAINST
INTENTED AND UNINTENDED
OR WEB UPLOAD TO UNAUTHORIZED RECIPIENTS
PROTECTING
CLASSIFIED DATASTORED ON LAPTOPS
COPYING TO UNAUTHORIZED EXTERNAL STORAGE AND EMAIL
Value Proposition
Data Protection Suite (DPS)
Protector Encryptor
InspectorReporter
Data Protection Suite
Port & Device Control
• Wireless Control
• Removable Storage Control
• Removable Storage
Encryption
• CD/DVD Encryption
• Hardware Keylogger
Protection
Hard Disk Encryption
• Highly Secure
• Completely Transparent
– No Training Required
• Easy to Manage, Deploy
and Use
• Strong Tamper Resistant
Mechanism
Content Based DLP
• Data Classification
• Data Content
• Data Fingerprinting
• Data Leakage
Prevention Through:
• Email, IM and Web
• External Storage
• Printers
Auditor – Endpoint Security Status Audit
Reporter – Security and Compliance Analysis
Discoverer – Sensitive Data Location and Mapping
Protector Encryptor Inspector
• Single Lightweight Agent
• Agent Includes Multi-tiered Anti-tampering Mechanisms
• Simple and Reliable Installation Process
Protector
Encryptor
Inspector Discoverer
Reporter
Auditor
Visibility – Auditor
• Displays all the devices and wireless networks that your endpoints
connect to
Control – Protector
• Port and device control system
• Encrypts removable media and CD/DVD
Protection – Encryptor
• Enforces hard disk encryption of all data stored on laptops and PCs
• Easy recovery of machine and files
Prevention – Inspector
• Prevents sensitive data leakage through e-mail, web, removable storage,
cloud and additional data transfer channels
Inspection – Discoverer
• Locates and maps sensitive data on end-users’ machines
Analysis – Reporter
• Provides graphical security reports and analysis for the protected
environment
Regaining Control of Your Endpoints
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
Products
Visibility - Auditor
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Control - Protector
Auditor displays all the
devices and wireless
networks that your
endpoints connect with
Products
Control - Protector
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Products
Protector provides granular
port and device control and
encrypts removable media
and CD/DVD, allowing for
exceptions and whitelisting
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
Products
Encryptor enforces hard
disk encryption of all data
stored on laptops and PCs,
and easy recovery of
machine and files
Prevention - Inspector
Protection - Encryptor
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
Products
Inspector prevents sensitive
data leakage via web, e-
mail, removable storage,
cloud and additional data
transfer channels
Inspection - Discoverer
Products
Protection - Encryptor
Prevention - Inspector
Analysis - Reporter
Visibility - Auditor
Control - Protector
Discoverer searches and
maps sensitive data that
resides on end-users’
machines
Analysis - Reporter
Reporter provides
graphical security reports
and enables analysis of
the protected
environment
Products
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Visibility - Auditor
Control - Protector
AUTOMATIC DIRECTORY INTERGRATION
ROLE BASE MANAGEMENTBY ADMINISTRATIVE ACTION AND BY ORGANIZATIONAL UNIT
General Server Features
WITH ACTIVE DIRECTORY ENABLES POLICY ENFORCEMENT STARTING AT THE DOMAIN
LEVEL, THROUGH ORGANIZATIONAL UNITS, DOWN TO A SPECIFIC MACHINE AND USER
General Server Features
SCALABLE ARCHITECTUREA MANAGEMENT SERVER CAN MANAGE MORE THAN 75,000
ENDPOINTS
REAL TIME ALERTSVIA: EMAIL WINDOWS EVENT LOGS/SYSLOG, SNMP SYSTEMS,
AND CUSTOM ALERT DESTINATION
FUNCTIONS ONWINDOWS 7, 8, 8.1, AND 10
OUR SYSTEM SUPPORTSDEPLOYMENT WITH MOST COMMON DISTRUBUTION
TOOLS
OUR SYSTEM OFFERSTAMPERING RESISTANCE, CUSTOMIZABLE ALERTS,
MINIMAL END-USER INTERACTION AND OFFLINE POLICY
ENFORCEMENT AND LOGGING
Client Features
KEY FEATURES:
• PREVENTS DATA LEAKAGE AND PENETRATION VIA ENDPOINTS
• PORT, DEVICE AND STORAGE CONTROL
• REMOVABLE MEDIA ENCRYPTION
• GRANULAR WIFI CONTROL
• BLOCKS HYBRID NETWORK BRIDGING
• U3 AND AUTORUN CONTROL
• BLOCKS HARDWARE KEY LOGGERS
• FILE TYPE CONTROL
• PROVIDES INTEGRATION WITH 3RD PARTY AV SCANNER
Control : Protector
KEY FEATURES:
• TOTAL DATA ENCRYPTION ON LAPTOPS AND DESKTOPS
• TRUE SSO (SINGLE SIGN ON) TECHNOLOGY
• CENTRALLY MANAGED AND ENFORCED
• FULL AUDIT TRAIL OF THE ORGANIZATION ENCRYPTION STATUS
• STABLE AND FAULT TOLERANT ENCRYPTION
• STRONG ENCRYPTION ALGORITHM – AES 256 BITS
• NATIVE WINDOWS LOGIN
• NO PRE CONFIGURATION
• COMPLETELY TRANSPARENT END-USER AUTHENTICATION AND
SEAMLESS PATCH MANAGEMENT, NO HELPDESK OVERHEAD
Control : Encryptor
• CONTENT-AWARE APPLICATION CONTROL
• OUT-OF-THE-BOX, PREDEFINED CLASSIFICATIONS AND
POLICIES
• INTERACTIVE AND CONFIGURABLE MESSAGES FOR USER
EDUCATION
• DATA CONTENT: REGULAR EXPRESSIONS, MATHEMATICAL
AND HEURISTIC VERIFIERS
• DATA FINGERPRINTING
• MAPS SET OF FILES AS SENSITIVE WITHOUT POINTING TO
SPECIFIC TEXT- USING ORIGINATING APPLICATION
KEY FEATURES:
Control : Inspector
• VIEW SECURITY INCIDENTS BY USERS,
ORGANIZATIONAL UNITS, AND TYPE
• TRACK COMPANY-WIDE ENDPOINT
DEPLOYMENT AND ENCRYPTION STATUS
• SCHEDULED REPORTS ARE AUTOMATICALLY
GENERATED AND DELIVERED VIA EMAIL
• FULLY CUSTOMIZABLE REPORTS CAN BE
EXPORTED IN VARIOUS FORMATS
KEY FEATURES:
Control : Reporter
• FIND OUT WHAT DEVICE AND WIFI NETWORKS YOUR
ENDPOINTS CONNECT TO
• IDENTIFY AND MANAGE ENDPOINT VULNERABILITIES
• COMPATIBLE WITH EXISTING NETWORK
MANAGEMENT OR ADMIN TOOLS
• INTUITIVE, CLIENTLESS AND EASY TO USE
KEY FEATURES:
Control : Auditor
• ALLOWS SECURITY ADMINISTRATORS TO LOCATE SENSITIVE
DATA-AT-REST STORED ON ORGANIZATIONAL ENDPOINTS
• HELPS IN IDENTIFYING GAPS IN DATA PROTECTION AND
COMPLIANCE INITIATIVES
• PROVIDES INSIGHT INTO WHAT POLICIES SHOULD BE
IMPLEMENTED USING OTHER COMPONENTS OF THE DATA
PROTECTION SUITE
KEY FEATURES:
Control : Discoverer
THANK YOU
Safend Solution Set

More Related Content

PDF
Pci Req
PPTX
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
PDF
Gen4 Raptor Flyer
PPT
UTM Basic Rev 1.2 (Modified)
PPTX
Segmenting your Network for Security - The Good, the Bad and the Ugly
PDF
Dmitry Kurbatov. Five Nightmares for a Telecom
PPTX
Scada security presentation by Stephen Miller
PDF
The journey to ICS - Extended
Pci Req
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Gen4 Raptor Flyer
UTM Basic Rev 1.2 (Modified)
Segmenting your Network for Security - The Good, the Bad and the Ugly
Dmitry Kurbatov. Five Nightmares for a Telecom
Scada security presentation by Stephen Miller
The journey to ICS - Extended

What's hot (20)

PDF
Industrial Control System Security Overview
PPTX
Identify and mitigate high risk port vulnerabilities
PDF
Blancco Mobile Device Eraser
PDF
DEF CON 23 - NSM 101 for ICS
PPTX
Increasing Challenges in Healthcare Privacy and Security
PPTX
Introduction to ICS/SCADA security
PPTX
Critical Infrastructure and Security
PDF
Genian NAC Datasheet
PDF
DTS Solution - SCADA Security Solutions
PDF
Nist 800 82 ICS Security Auditing Framework
PDF
CSIRS ICS BCS 2.2
PDF
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
PDF
PT-DTS SCADA Security using MaxPatrol
PPTX
Integrated Compliance
PDF
Cybersecurity in Industrial Control Systems (ICS)
PDF
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
PPTX
ICS Security 101 by Sandeep Singh
PDF
DTS Solution - Software Defined Security v1.0
PDF
SCADA Security Presentation
PPTX
PCI DSS & PA DSS Version 3.0
Industrial Control System Security Overview
Identify and mitigate high risk port vulnerabilities
Blancco Mobile Device Eraser
DEF CON 23 - NSM 101 for ICS
Increasing Challenges in Healthcare Privacy and Security
Introduction to ICS/SCADA security
Critical Infrastructure and Security
Genian NAC Datasheet
DTS Solution - SCADA Security Solutions
Nist 800 82 ICS Security Auditing Framework
CSIRS ICS BCS 2.2
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
PT-DTS SCADA Security using MaxPatrol
Integrated Compliance
Cybersecurity in Industrial Control Systems (ICS)
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
ICS Security 101 by Sandeep Singh
DTS Solution - Software Defined Security v1.0
SCADA Security Presentation
PCI DSS & PA DSS Version 3.0
Ad

Viewers also liked (18)

PPTX
Safend Solution Set
PPTX
Proquest y Dspace
PPTX
Plantilladeproyectociencias 170203014029 (1)
PPTX
Merits and demerits of economic systems
PPTX
національний
DOCX
Eric Jackson_My Literary Analysis of The Lion King
PPTX
Factors of production
PPTX
"Mi dossier fotográfico"
PPTX
Division of labour
PDF
Flamingo Automotive - Nick Lamping
PDF
Outputs and recommendations from the Mediterranean Sea-basin Checkpoint Workshop
PDF
Sahand STR8 EV
DOCX
Nghệ trắng - thần dược kỳ diệu của thiên nhiên
DOCX
Proyecto final liceo francisco g. billini(1)
PDF
Reversen #1
PDF
Pure Eats (1)
PPTX
Процессинговые решения Platon для Банков
Safend Solution Set
Proquest y Dspace
Plantilladeproyectociencias 170203014029 (1)
Merits and demerits of economic systems
національний
Eric Jackson_My Literary Analysis of The Lion King
Factors of production
"Mi dossier fotográfico"
Division of labour
Flamingo Automotive - Nick Lamping
Outputs and recommendations from the Mediterranean Sea-basin Checkpoint Workshop
Sahand STR8 EV
Nghệ trắng - thần dược kỳ diệu của thiên nhiên
Proyecto final liceo francisco g. billini(1)
Reversen #1
Pure Eats (1)
Процессинговые решения Platon для Банков
Ad

Similar to Safend Solution Set (20)

PPTX
Safend General Presentation 2010
PDF
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
PPTX
The ARUBA Kind of new Proposal Umum .pptx
PPTX
Acculink systems end user presentation
PPTX
Acculink systems end user presentation
PPT
Information systems
PDF
Bezpečnost není jen antivirus
PDF
CyberSecurity Update Slides
PPTX
The Benefits of Having Nerds On Site Monitoring Your Technology
PPTX
NAC_p3.pptx
PPTX
The Benefits of Having Nerds On Site Monitoring Your Technology
PPT
IM Unit 4 Security and its a control.ppt
PPTX
SecureTower General Info
PDF
Scalar Security Roadshow April 2015
PPTX
Security and control in mis
PPTX
Security & control in mis
PPTX
199 baseline security
PDF
Company Profile 2016
PDF
Automated Thermal Imaging for Remote Substation Monitoring
PDF
Managed Vulnerability Scan
Safend General Presentation 2010
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
The ARUBA Kind of new Proposal Umum .pptx
Acculink systems end user presentation
Acculink systems end user presentation
Information systems
Bezpečnost není jen antivirus
CyberSecurity Update Slides
The Benefits of Having Nerds On Site Monitoring Your Technology
NAC_p3.pptx
The Benefits of Having Nerds On Site Monitoring Your Technology
IM Unit 4 Security and its a control.ppt
SecureTower General Info
Scalar Security Roadshow April 2015
Security and control in mis
Security & control in mis
199 baseline security
Company Profile 2016
Automated Thermal Imaging for Remote Substation Monitoring
Managed Vulnerability Scan

Recently uploaded (20)

PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Digital Systems & Binary Numbers (comprehensive )
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Digital Strategies for Manufacturing Companies
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
L1 - Introduction to python Backend.pptx
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
medical staffing services at VALiNTRY
PPTX
Transform Your Business with a Software ERP System
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Digital Systems & Binary Numbers (comprehensive )
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PTS Company Brochure 2025 (1).pdf.......
Odoo Companies in India – Driving Business Transformation.pdf
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Navsoft: AI-Powered Business Solutions & Custom Software Development
Digital Strategies for Manufacturing Companies
wealthsignaloriginal-com-DS-text-... (1).pdf
Which alternative to Crystal Reports is best for small or large businesses.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Wondershare Filmora 15 Crack With Activation Key [2025
How to Choose the Right IT Partner for Your Business in Malaysia
L1 - Introduction to python Backend.pptx
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
medical staffing services at VALiNTRY
Transform Your Business with a Software ERP System

Safend Solution Set

  • 2. About SAFEND and SUPERCOM
  • 3. 52% OF N.A. ENTERPRISESHAVE LOST CONFIDENTIAL DATA THROUGH REMOVABLE MEDIA IN THE PAST 2 YEARS (FORRESTER) OVER 70% OF SECURITY BREACHESORIGINATE FROM WITHIN (VISTA RESEARCH) 16,000 LAPTOPS ARE LOSTPER WEEK BY BUSINESS TRAVELERS IN THE U.S., EUROPE, AND UNITED ARAB EMIRATES 5% DROP IN SHARE PRICESFOR EVERY INFORMATION BREACH Facts
  • 4. Average Incident Cost per compromised record: $217 CUSTOMER COSTS • Brand damage • Loss of existing customers • Recruiting new customers • Unbudgeted legal, audit and accounting fees • Notification to customers • Free or discounted service to customers • Call center expenses • Public and investor relations • Internal investigations INCREMENTAL COSTS • Lost employee productivity PRODUCTIVITY COSTS 54% 30% 16% Average Incident Cost: $6.5 million Cost of Data Breaches: Recovery Cost
  • 5. SAFEND IS THE LEADER IN ENDPOINT DATA FOR ENTERPRISE PROTECTION AND REGULATORY COMPLIANCE LEAKAGE PREVENTION Why DPS?
  • 6. PROTECTION AGAINST LOSS AND THEFTFROM LAPTOPS TO USB MEMORY STICKS/CD/DVD PROTECTION AGAINST INTENTED AND UNINTENDED OR WEB UPLOAD TO UNAUTHORIZED RECIPIENTS PROTECTING CLASSIFIED DATASTORED ON LAPTOPS COPYING TO UNAUTHORIZED EXTERNAL STORAGE AND EMAIL Value Proposition
  • 7. Data Protection Suite (DPS) Protector Encryptor InspectorReporter
  • 8. Data Protection Suite Port & Device Control • Wireless Control • Removable Storage Control • Removable Storage Encryption • CD/DVD Encryption • Hardware Keylogger Protection Hard Disk Encryption • Highly Secure • Completely Transparent – No Training Required • Easy to Manage, Deploy and Use • Strong Tamper Resistant Mechanism Content Based DLP • Data Classification • Data Content • Data Fingerprinting • Data Leakage Prevention Through: • Email, IM and Web • External Storage • Printers Auditor – Endpoint Security Status Audit Reporter – Security and Compliance Analysis Discoverer – Sensitive Data Location and Mapping Protector Encryptor Inspector • Single Lightweight Agent • Agent Includes Multi-tiered Anti-tampering Mechanisms • Simple and Reliable Installation Process
  • 9. Protector Encryptor Inspector Discoverer Reporter Auditor Visibility – Auditor • Displays all the devices and wireless networks that your endpoints connect to Control – Protector • Port and device control system • Encrypts removable media and CD/DVD Protection – Encryptor • Enforces hard disk encryption of all data stored on laptops and PCs • Easy recovery of machine and files Prevention – Inspector • Prevents sensitive data leakage through e-mail, web, removable storage, cloud and additional data transfer channels Inspection – Discoverer • Locates and maps sensitive data on end-users’ machines Analysis – Reporter • Provides graphical security reports and analysis for the protected environment Regaining Control of Your Endpoints
  • 10. Protection - Encryptor Prevention - Inspector Inspection - Discoverer Analysis - Reporter Visibility - Auditor Control - Protector Products
  • 11. Visibility - Auditor Protection - Encryptor Prevention - Inspector Inspection - Discoverer Analysis - Reporter Control - Protector Auditor displays all the devices and wireless networks that your endpoints connect with Products
  • 12. Control - Protector Protection - Encryptor Prevention - Inspector Inspection - Discoverer Analysis - Reporter Visibility - Auditor Products Protector provides granular port and device control and encrypts removable media and CD/DVD, allowing for exceptions and whitelisting
  • 13. Protection - Encryptor Prevention - Inspector Inspection - Discoverer Analysis - Reporter Visibility - Auditor Control - Protector Products Encryptor enforces hard disk encryption of all data stored on laptops and PCs, and easy recovery of machine and files
  • 14. Prevention - Inspector Protection - Encryptor Inspection - Discoverer Analysis - Reporter Visibility - Auditor Control - Protector Products Inspector prevents sensitive data leakage via web, e- mail, removable storage, cloud and additional data transfer channels
  • 15. Inspection - Discoverer Products Protection - Encryptor Prevention - Inspector Analysis - Reporter Visibility - Auditor Control - Protector Discoverer searches and maps sensitive data that resides on end-users’ machines
  • 16. Analysis - Reporter Reporter provides graphical security reports and enables analysis of the protected environment Products Protection - Encryptor Prevention - Inspector Inspection - Discoverer Visibility - Auditor Control - Protector
  • 17. AUTOMATIC DIRECTORY INTERGRATION ROLE BASE MANAGEMENTBY ADMINISTRATIVE ACTION AND BY ORGANIZATIONAL UNIT General Server Features WITH ACTIVE DIRECTORY ENABLES POLICY ENFORCEMENT STARTING AT THE DOMAIN LEVEL, THROUGH ORGANIZATIONAL UNITS, DOWN TO A SPECIFIC MACHINE AND USER
  • 18. General Server Features SCALABLE ARCHITECTUREA MANAGEMENT SERVER CAN MANAGE MORE THAN 75,000 ENDPOINTS REAL TIME ALERTSVIA: EMAIL WINDOWS EVENT LOGS/SYSLOG, SNMP SYSTEMS, AND CUSTOM ALERT DESTINATION
  • 19. FUNCTIONS ONWINDOWS 7, 8, 8.1, AND 10 OUR SYSTEM SUPPORTSDEPLOYMENT WITH MOST COMMON DISTRUBUTION TOOLS OUR SYSTEM OFFERSTAMPERING RESISTANCE, CUSTOMIZABLE ALERTS, MINIMAL END-USER INTERACTION AND OFFLINE POLICY ENFORCEMENT AND LOGGING Client Features
  • 20. KEY FEATURES: • PREVENTS DATA LEAKAGE AND PENETRATION VIA ENDPOINTS • PORT, DEVICE AND STORAGE CONTROL • REMOVABLE MEDIA ENCRYPTION • GRANULAR WIFI CONTROL • BLOCKS HYBRID NETWORK BRIDGING • U3 AND AUTORUN CONTROL • BLOCKS HARDWARE KEY LOGGERS • FILE TYPE CONTROL • PROVIDES INTEGRATION WITH 3RD PARTY AV SCANNER Control : Protector
  • 21. KEY FEATURES: • TOTAL DATA ENCRYPTION ON LAPTOPS AND DESKTOPS • TRUE SSO (SINGLE SIGN ON) TECHNOLOGY • CENTRALLY MANAGED AND ENFORCED • FULL AUDIT TRAIL OF THE ORGANIZATION ENCRYPTION STATUS • STABLE AND FAULT TOLERANT ENCRYPTION • STRONG ENCRYPTION ALGORITHM – AES 256 BITS • NATIVE WINDOWS LOGIN • NO PRE CONFIGURATION • COMPLETELY TRANSPARENT END-USER AUTHENTICATION AND SEAMLESS PATCH MANAGEMENT, NO HELPDESK OVERHEAD Control : Encryptor
  • 22. • CONTENT-AWARE APPLICATION CONTROL • OUT-OF-THE-BOX, PREDEFINED CLASSIFICATIONS AND POLICIES • INTERACTIVE AND CONFIGURABLE MESSAGES FOR USER EDUCATION • DATA CONTENT: REGULAR EXPRESSIONS, MATHEMATICAL AND HEURISTIC VERIFIERS • DATA FINGERPRINTING • MAPS SET OF FILES AS SENSITIVE WITHOUT POINTING TO SPECIFIC TEXT- USING ORIGINATING APPLICATION KEY FEATURES: Control : Inspector
  • 23. • VIEW SECURITY INCIDENTS BY USERS, ORGANIZATIONAL UNITS, AND TYPE • TRACK COMPANY-WIDE ENDPOINT DEPLOYMENT AND ENCRYPTION STATUS • SCHEDULED REPORTS ARE AUTOMATICALLY GENERATED AND DELIVERED VIA EMAIL • FULLY CUSTOMIZABLE REPORTS CAN BE EXPORTED IN VARIOUS FORMATS KEY FEATURES: Control : Reporter
  • 24. • FIND OUT WHAT DEVICE AND WIFI NETWORKS YOUR ENDPOINTS CONNECT TO • IDENTIFY AND MANAGE ENDPOINT VULNERABILITIES • COMPATIBLE WITH EXISTING NETWORK MANAGEMENT OR ADMIN TOOLS • INTUITIVE, CLIENTLESS AND EASY TO USE KEY FEATURES: Control : Auditor
  • 25. • ALLOWS SECURITY ADMINISTRATORS TO LOCATE SENSITIVE DATA-AT-REST STORED ON ORGANIZATIONAL ENDPOINTS • HELPS IN IDENTIFYING GAPS IN DATA PROTECTION AND COMPLIANCE INITIATIVES • PROVIDES INSIGHT INTO WHAT POLICIES SHOULD BE IMPLEMENTED USING OTHER COMPONENTS OF THE DATA PROTECTION SUITE KEY FEATURES: Control : Discoverer

Editor's Notes

  • #5: 19% of consumers affected by a data breach terminate their relationship with the offending company; 40% consider a termination
  • #11: Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  • #12: Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  • #13: Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  • #14: Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  • #15: Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  • #16: Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector
  • #17: Additionally add: Common Breach occurrences… Loss/Theft of Laptop - Encryptor Loss/Theft of USB memory stick/CD/DVD- Protector Intentional copy to unauthorized external storage - Protector/Inspector Email to unintended recipients - Inspector Web upload or intentional mail to unauthorized recipients - Inspector Classified data stored on Laptops - Discoverer Copy to any network based application or share - Inspector