E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D...
Transcript of E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D...
E x p e r t s i n i n n o v a t i v e t e c h n o l o g i c a l s o l u t i o n so f c y b e r s e c u r i t y f o r c o m p a n i e s a n d o r g a n i z a t i o n s
S D MB E S T S A F ES I M A R K S
S i m a r ks i s a S p a n i s h co m p a ny
s p e c i a l i ze d i n te c h n o l o g i ca l
d eve l o p m e nt s o f c y b e rs e c u r i t y a n d
e n d p o i nt p ro te c t i o n .
Experts in innovative application-level security
solutions for workstations and servers.
CYBERSECURITY
SPANISH TECHNOLOGY
EXPERIENCE
ENDPOINT PROTECTION
S D MB E S T S A F ES I M A R K S
At S i m a r ks we a re co n sta nt l y re s e a rc h i n g , d eve l o p i n g a n d evo l v i n g .
For us it is always essential to comply with quality standards and current regulations in all our software design and implementation developments, as well as processes and procedures.
v
S D MB E S T S A F ES I M A R K S
O u r go a l i s i n n o vat i o n fo c u s e d o n t h e p r o t e c t i o n o f t h e m o st v u l n e ra b l e e l e m e nt : t h e h u m a n b e h av i o r.
PROTECTIONagainst
ANY TYPE OF MALWARE,
current or future
Real implementation of the Principle of
Least Privilege (POLP) in Microsoft Windows
environments.
SIMARKS Security Management
technologyat the process level
SIMARKS technology for Application Management
SIMARKSSuite
T h e t e c h n o l o g y t h at we h ave d eve l o p e d i n S I M A R KS a l l o ws u s to o f fe r p r eve nt i ve s o l u t i o n s to a ny t h re at .
S D MB E S T S A F ES I M A R K S
9 2 % o f v u l n e ra b i l i t i e s i n W i n d o ws Sys te m s u s e s u p e r u s e r p r i v i l e ge s .
( M i c r o s o f t S e c u r i t y B u l l e t i n s )
In most security breaches, the incorrect assignment of privileges is involved to minimize the impact on productivity, which greatly increases the level of risk in the face of threats.
140$Average cost
per record
327Attacks per
min worldwide.
u s e r s u p e r u s e r
S U P E R U S E R S
S D MB E S T S A F ES I M A R K S
We help you protect your business from the most vulnerable element:the human behavior
S D MB E S T S A F ES I M A R K S
60%e f f i c i e n c y
vs
+95%e f f i c i e n c y
c y b e r s e c u r i t y
Tra d i t i o n a l p ro te c t i o n sys te m s ( a nt i v i r u s )a re b a s e d o n d et e c t i o n : t h ey a re ef fe c t i v ea ga i n st k n o w n v i r u s e s .T h e p a c e o f m a l wa re c re a t i o n m a ke s t h e i rd at a b a s e s o u t d ate d , w h i c h m a ke s t h e mu n a b l e to re a c t .
S E C U R I T Y S Y S T E M S
Faced with a real threat, traditional systems are often not enough to neutralize the attack, resulting in unfavorable and damaging consequences for the organization:
economic losses
waste of time
losses of resources
loss of documents
compromised exposure of sensitive information
file hijacking
harm to corporate image
leakage of customers
etcetera
a n t i v i r u s
Protection against known viruses.
Protection against unknown attacks.
Protection against ransomware.
It acts when the virus enters the system.
Protection against known viruses.
Protection against unknown attacks.
Protection against ransomware.
Prevents malware from entering the system.
S D MB E S T S A F ES I M A R K S
W e ’ d l i k e y o u t o k n o w
The most effective solution,
in all safety
S D MB E S T S A F ES I M A R K S
B e st S afe i s t h e s o f t wa re t h at e f fe c t i ve l y re d u c e s t h e r i s k o f s e c u r i t y b re a c h e s o n W i n d o ws sys te m s
Based on Simarks' patented security at the application level technology with which the operating system itself prevents unwanted executions.
u s e r
A N I N N O V AT I V E T E C H N O L O G I C A L S O L U T I O N
Simarks BestSafe reduces the risk derived from the inappropriate use of ‘Administrator Privileges’
Controlled assignment of privileges.
Maximum levels of security.
No impact on productivity or performance.
Accessgranted
Accessblocked
Accessrestricted
S D MB E S T S A F ES I M A R K S
B e st S afe a c t s avo i d i n g atta c ks a n d t h e i r co n s e q u e n c e s :
I N F O R M AT I O N T H E F TR A N S O M WA R E AT TA C K SR A N D O M I Z E D / D I R E C T E D AT TA C K SF I L E H I J A C K I N G
E C O N O M I C L O S S E SI N D E F I N I T E S T O P SC U S T O M E R L E A KR E P U TAT I O N A F F E C T E DI N F O R M AT I O N L O S S E S
E F F E C T I V E S E C U R I T Y: G O O D B Y E T H R E AT S
FIGHTEFFECTIVELY
AGAINSTRansomware
S D MB E S T S A F ES I M A R K S
E F F I C I E N T S E C U R I T Y: A L L B E N E F I T S
EFFICIENCYhigher than 95%
SAVEtime
IT DOESN’TSLOW DOWN
computers or processes
PROTECTSfrom human
mistakes
ENDORSEScompliance with
regulations
ENSURESthe operation
of the business
OFFERStechnical support
APPLIESvalidated
innovativetechnology
CONSTANT EVOLUTION Feedbacks
S D MB E S T S A F ES I M A R K S
I N N O V AT I V E T E C H N O L O G Y O F E A S Y A P P L I C AT I O N
B e st S afe i s a m o d u l a r s o l u t i o n b a s e d o n s i m p l e r u l e s o f ve r y e a sy a p p l i cat i o n .
PRIVILEGE LEVELSFOR USERS AND PROCESSESBlocking, permissions to execute tasks and run applications...
White lists.Gray lists.Black lists.Ransomware.
PRIVILEGE MANAGEMENT
At the application level.At the user level.
CENTRALIZED MANAGEMENTWith all the power, flexibility and scalability of the Active Directory.
PERSONALIZEDRULES / PARAMETERSIn users, computers, groups... to establish permissions and privileges.
ANALYTICS AND REPORTS OF APPLICATION OF RULESIntegration with SIEM systems. Creation of alerts and alarms.
MONITORING / CONTROL OF EXECUTION AND USEFor computers, processes and applications.
HARDENINGIt turns the most critical assets impregnable.
PASSWORD MANAGEMENTDaily password change, different per device.
S o l u t i o n s a n d f u n c t i o n a l i t i e s
The Simarks BestSafe technology does not require any specific infrastructure for its installation and subsequent operation.
S D MB E S T S A F ES I M A R K S
W e i n v i t e y o u t o k n o w
The most efficient
management, in all safety
S D MB E S T S A F ES I M A R K S
S i m a r ks D e p l oy m e nt M a n a ge r i s a n i n n o vat i ve p o r ta l fo r co r p o rate a p p l i cat i o n s t h at re d u c e s t h e r i s k o f s e c u r i t y b re a c h e s .
Based on Simarks' patented process-level privilege management technology, it is the user who performs the installation of applications, without having to access with an administrator profile.
A N I N N O V AT I V E A P P L I C AT I O N M A N A G E R
SDM performs a programmed application management automatically and silently
Controlled application management.
Automatic uninstallation of non-corporate software.
Increase productivity.
Access granted
Accessblocked
Accessrestricted
S D MB E S T S A F ES I M A R K S
W I T H E F F I C I E N T M A N A G E M E N T, A L L B E N E F I T S
CONTROLLED ACCESS
FAST AND SIMPLE
PROCESS
PROGRAMMED INSTALLATIONSAND UPDATES
REMOTE AND AUTOMATIC
INSTALLATIONS
VALIDATED INNOVATIVE
TECHNOLOGY
AUTHORIZED USER WITHOUT ‘ADMIN’
PROFILE
UNIFIES SOFTWARE VERSIONS
SOFTWARE ALWAYS
UPDATED
EXECUTE PLANNED SCRIPTS
INCLUDES SUPPORT AND
TRAINING
CONSTANT EVOLUTION FEEDBACKS
COST REDUCTION
AVOIDLOSING
TIME
AVOIDPIRATED
SOFTWARE
S D MB E S T S A F ES I M A R K S
S i m a r ks D e p l oy m e nt M a n a ge r i s a C o r p o rat e A p p l i cat i o n Po r t a l i n w h i c h i t i s t h e e n d u s e r w h o p e r fo r m s t h e i n s ta l l a t i o n w i t h o u t t h e n e e d fo r p r i v i l e ge s .
The SDM technology does not require any specific infrastructure for its installation and subsequent operation.
I N N O V AT I V E T E C H N O L O G Y O F E A S Y A P P L I C AT I O N
FLEXIBILITY AND EFFICIENCYTo be done by the user himself or automatically and unattended.
PLANNED ACTIVATIONMandatory/automatic updates, uninstallations, repairs, automatic execution of administrative tasks, emergency distributions...
INVENTORY AND REPORTSHardware and software by computer/terminal, application execution...
ELEVATION OF PRIVILEGES AT RUNTIMEGranted to applications at installation times and in execution times.
CATEGORIZATION AND LABELINGCustom structure of categories and labeling of applications.
LEVELS OF PRIVILEGES FOR USERS AND PROCESSESBlocking, permissions to execute tasks and applications...
DEPENDENT SOFTWARE AND INSTALLATIONSAllows installation/ maintenance/ removal of software and dependent installations.
S o l u t i o n s a n d f u n c t i o n a l i t i e s
S D MB E S T S A F ES I M A R K S
E n a b l e s d e l e gat i o n o f a d m i n i s t rat i ve ta s ks to t h e e n d u s e r.
G L O B A L C E N T R A L I Z E D M A N A G E M E N TS E C U R I T YC O S T R E D U C T I O NE F F I C I E N C YC O N T R O LI M P R O V E M E N T S I N :
A p p l i c a t i o n i n s t a l l a t i o nVe r s i o n u n i f i c a t i o nU p d a t e sA c c e s s i b i l i t yP r o d u c t i v i t y NO
ADMINISTRATOR PRIVILEGES
I M P R O V I N G C O N T R O L I M P R O V E S P R O D U C T I V I T Y
S D MB E S T S A F ES I M A R K S
S i m a r k s h a s b e e n N a t i o n a l F i n a l i s t i n t h e 1 1 t h e d i t i o n o f t h e E m p r e n d e d o r X X I A w a r d sa r r a n g e d b y C a i x a b a n k
B e s t S a f e h a s b e e n a w a r d e d w i t h t h e M o s t I n n o v a t i v e P r o d u c t A w a r d i n t h e 1 1 t h e d i t i o n o f t h e C I T S e c u r i t y Tr o p h i e s b y R e d S e g u r i d a d .
A C K N O W L E D G E M E N T S
S D MB E S T S A F ES I M A R K S
M a n y c o m p a n i e s a l r e a d y r e l y o n S i m a r k s a n d o u r i n n o v a t i v e a n d e f f i c i e n t p r o d u c t s .
T h e i r c o n f i d e n c e s t r e n g t h e n s u s , e v e r y d a y m o r e , a s a n a t i o n a l a n d i n t e r n a t i o n a l r e f e r e n c e i n S o f t w a r e S o l u t i o n s o f Te c h n o l o g i c a l I n n o v a t i o n i n t h e f i e l d o f C y b e r s e c u r i t y f o r c o m p a n i e s a n d o r g a n i z a t i o n s .
C L I E N T S
Simarks Software S.L.C/ Copenhague 12, PosteriorEdificio Tifan28232 Las RozasMadrid – Spain
(+34) 910 534 [email protected]
T h a n k y o u