E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D...

20
Experts in innovative technological solutions of cybersecurity for companies and organizations

Transcript of E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D...

Page 1: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

E x p e r t s i n i n n o v a t i v e t e c h n o l o g i c a l s o l u t i o n so f c y b e r s e c u r i t y f o r c o m p a n i e s a n d o r g a n i z a t i o n s

Page 2: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

S i m a r ks i s a S p a n i s h co m p a ny

s p e c i a l i ze d i n te c h n o l o g i ca l

d eve l o p m e nt s o f c y b e rs e c u r i t y a n d

e n d p o i nt p ro te c t i o n .

Experts in innovative application-level security

solutions for workstations and servers.

CYBERSECURITY

SPANISH TECHNOLOGY

EXPERIENCE

ENDPOINT PROTECTION

Page 3: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

At S i m a r ks we a re co n sta nt l y re s e a rc h i n g , d eve l o p i n g a n d evo l v i n g .

For us it is always essential to comply with quality standards and current regulations in all our software design and implementation developments, as well as processes and procedures.

v

Page 4: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

O u r go a l i s i n n o vat i o n fo c u s e d o n t h e p r o t e c t i o n o f t h e m o st v u l n e ra b l e e l e m e nt : t h e h u m a n b e h av i o r.

PROTECTIONagainst

ANY TYPE OF MALWARE,

current or future

Real implementation of the Principle of

Least Privilege (POLP) in Microsoft Windows

environments.

SIMARKS Security Management

technologyat the process level

SIMARKS technology for Application Management

SIMARKSSuite

T h e t e c h n o l o g y t h at we h ave d eve l o p e d i n S I M A R KS a l l o ws u s to o f fe r p r eve nt i ve s o l u t i o n s to a ny t h re at .

Page 5: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

9 2 % o f v u l n e ra b i l i t i e s i n W i n d o ws Sys te m s u s e s u p e r u s e r p r i v i l e ge s .

( M i c r o s o f t S e c u r i t y B u l l e t i n s )

In most security breaches, the incorrect assignment of privileges is involved to minimize the impact on productivity, which greatly increases the level of risk in the face of threats.

140$Average cost

per record

327Attacks per

min worldwide.

u s e r s u p e r u s e r

S U P E R U S E R S

Page 6: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

We help you protect your business from the most vulnerable element:the human behavior

Page 7: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

60%e f f i c i e n c y

vs

+95%e f f i c i e n c y

c y b e r s e c u r i t y

Tra d i t i o n a l p ro te c t i o n sys te m s ( a nt i v i r u s )a re b a s e d o n d et e c t i o n : t h ey a re ef fe c t i v ea ga i n st k n o w n v i r u s e s .T h e p a c e o f m a l wa re c re a t i o n m a ke s t h e i rd at a b a s e s o u t d ate d , w h i c h m a ke s t h e mu n a b l e to re a c t .

S E C U R I T Y S Y S T E M S

Faced with a real threat, traditional systems are often not enough to neutralize the attack, resulting in unfavorable and damaging consequences for the organization:

economic losses

waste of time

losses of resources

loss of documents

compromised exposure of sensitive information

file hijacking

harm to corporate image

leakage of customers

etcetera

a n t i v i r u s

Protection against known viruses.

Protection against unknown attacks.

Protection against ransomware.

It acts when the virus enters the system.

Protection against known viruses.

Protection against unknown attacks.

Protection against ransomware.

Prevents malware from entering the system.

Page 8: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

W e ’ d l i k e y o u t o k n o w

The most effective solution,

in all safety

Page 9: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

B e st S afe i s t h e s o f t wa re t h at e f fe c t i ve l y re d u c e s t h e r i s k o f s e c u r i t y b re a c h e s o n W i n d o ws sys te m s

Based on Simarks' patented security at the application level technology with which the operating system itself prevents unwanted executions.

u s e r

A N I N N O V AT I V E T E C H N O L O G I C A L S O L U T I O N

Simarks BestSafe reduces the risk derived from the inappropriate use of ‘Administrator Privileges’

Controlled assignment of privileges.

Maximum levels of security.

No impact on productivity or performance.

Accessgranted

Accessblocked

Accessrestricted

Page 10: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

B e st S afe a c t s avo i d i n g atta c ks a n d t h e i r co n s e q u e n c e s :

I N F O R M AT I O N T H E F TR A N S O M WA R E AT TA C K SR A N D O M I Z E D / D I R E C T E D AT TA C K SF I L E H I J A C K I N G

E C O N O M I C L O S S E SI N D E F I N I T E S T O P SC U S T O M E R L E A KR E P U TAT I O N A F F E C T E DI N F O R M AT I O N L O S S E S

E F F E C T I V E S E C U R I T Y: G O O D B Y E T H R E AT S

FIGHTEFFECTIVELY

AGAINSTRansomware

Page 11: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

E F F I C I E N T S E C U R I T Y: A L L B E N E F I T S

EFFICIENCYhigher than 95%

SAVEtime

IT DOESN’TSLOW DOWN

computers or processes

PROTECTSfrom human

mistakes

ENDORSEScompliance with

regulations

ENSURESthe operation

of the business

OFFERStechnical support

APPLIESvalidated

innovativetechnology

CONSTANT EVOLUTION Feedbacks

Page 12: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

I N N O V AT I V E T E C H N O L O G Y O F E A S Y A P P L I C AT I O N

B e st S afe i s a m o d u l a r s o l u t i o n b a s e d o n s i m p l e r u l e s o f ve r y e a sy a p p l i cat i o n .

PRIVILEGE LEVELSFOR USERS AND PROCESSESBlocking, permissions to execute tasks and run applications...

White lists.Gray lists.Black lists.Ransomware.

PRIVILEGE MANAGEMENT

At the application level.At the user level.

CENTRALIZED MANAGEMENTWith all the power, flexibility and scalability of the Active Directory.

PERSONALIZEDRULES / PARAMETERSIn users, computers, groups... to establish permissions and privileges.

ANALYTICS AND REPORTS OF APPLICATION OF RULESIntegration with SIEM systems. Creation of alerts and alarms.

MONITORING / CONTROL OF EXECUTION AND USEFor computers, processes and applications.

HARDENINGIt turns the most critical assets impregnable.

PASSWORD MANAGEMENTDaily password change, different per device.

S o l u t i o n s a n d f u n c t i o n a l i t i e s

The Simarks BestSafe technology does not require any specific infrastructure for its installation and subsequent operation.

Page 13: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

W e i n v i t e y o u t o k n o w

The most efficient

management, in all safety

Page 14: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

S i m a r ks D e p l oy m e nt M a n a ge r i s a n i n n o vat i ve p o r ta l fo r co r p o rate a p p l i cat i o n s t h at re d u c e s t h e r i s k o f s e c u r i t y b re a c h e s .

Based on Simarks' patented process-level privilege management technology, it is the user who performs the installation of applications, without having to access with an administrator profile.

A N I N N O V AT I V E A P P L I C AT I O N M A N A G E R

SDM performs a programmed application management automatically and silently

Controlled application management.

Automatic uninstallation of non-corporate software.

Increase productivity.

Access granted

Accessblocked

Accessrestricted

Page 15: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

W I T H E F F I C I E N T M A N A G E M E N T, A L L B E N E F I T S

CONTROLLED ACCESS

FAST AND SIMPLE

PROCESS

PROGRAMMED INSTALLATIONSAND UPDATES

REMOTE AND AUTOMATIC

INSTALLATIONS

VALIDATED INNOVATIVE

TECHNOLOGY

AUTHORIZED USER WITHOUT ‘ADMIN’

PROFILE

UNIFIES SOFTWARE VERSIONS

SOFTWARE ALWAYS

UPDATED

EXECUTE PLANNED SCRIPTS

INCLUDES SUPPORT AND

TRAINING

CONSTANT EVOLUTION FEEDBACKS

COST REDUCTION

AVOIDLOSING

TIME

AVOIDPIRATED

SOFTWARE

Page 16: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

S i m a r ks D e p l oy m e nt M a n a ge r i s a C o r p o rat e A p p l i cat i o n Po r t a l i n w h i c h i t i s t h e e n d u s e r w h o p e r fo r m s t h e i n s ta l l a t i o n w i t h o u t t h e n e e d fo r p r i v i l e ge s .

The SDM technology does not require any specific infrastructure for its installation and subsequent operation.

I N N O V AT I V E T E C H N O L O G Y O F E A S Y A P P L I C AT I O N

FLEXIBILITY AND EFFICIENCYTo be done by the user himself or automatically and unattended.

PLANNED ACTIVATIONMandatory/automatic updates, uninstallations, repairs, automatic execution of administrative tasks, emergency distributions...

INVENTORY AND REPORTSHardware and software by computer/terminal, application execution...

ELEVATION OF PRIVILEGES AT RUNTIMEGranted to applications at installation times and in execution times.

CATEGORIZATION AND LABELINGCustom structure of categories and labeling of applications.

LEVELS OF PRIVILEGES FOR USERS AND PROCESSESBlocking, permissions to execute tasks and applications...

DEPENDENT SOFTWARE AND INSTALLATIONSAllows installation/ maintenance/ removal of software and dependent installations.

S o l u t i o n s a n d f u n c t i o n a l i t i e s

Page 17: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

E n a b l e s d e l e gat i o n o f a d m i n i s t rat i ve ta s ks to t h e e n d u s e r.

G L O B A L C E N T R A L I Z E D M A N A G E M E N TS E C U R I T YC O S T R E D U C T I O NE F F I C I E N C YC O N T R O LI M P R O V E M E N T S I N :

A p p l i c a t i o n i n s t a l l a t i o nVe r s i o n u n i f i c a t i o nU p d a t e sA c c e s s i b i l i t yP r o d u c t i v i t y NO

ADMINISTRATOR PRIVILEGES

I M P R O V I N G C O N T R O L I M P R O V E S P R O D U C T I V I T Y

Page 18: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

S i m a r k s h a s b e e n N a t i o n a l F i n a l i s t i n t h e 1 1 t h e d i t i o n o f t h e E m p r e n d e d o r X X I A w a r d sa r r a n g e d b y C a i x a b a n k

B e s t S a f e h a s b e e n a w a r d e d w i t h t h e M o s t I n n o v a t i v e P r o d u c t A w a r d i n t h e 1 1 t h e d i t i o n o f t h e C I T S e c u r i t y Tr o p h i e s b y R e d S e g u r i d a d .

A C K N O W L E D G E M E N T S

Page 19: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

S D MB E S T S A F ES I M A R K S

M a n y c o m p a n i e s a l r e a d y r e l y o n S i m a r k s a n d o u r i n n o v a t i v e a n d e f f i c i e n t p r o d u c t s .

T h e i r c o n f i d e n c e s t r e n g t h e n s u s , e v e r y d a y m o r e , a s a n a t i o n a l a n d i n t e r n a t i o n a l r e f e r e n c e i n S o f t w a r e S o l u t i o n s o f Te c h n o l o g i c a l I n n o v a t i o n i n t h e f i e l d o f C y b e r s e c u r i t y f o r c o m p a n i e s a n d o r g a n i z a t i o n s .

C L I E N T S

Page 20: E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D M 92% of vulnerabilities in Windows Systems use superuser privileges. (Mic ro so

Simarks Software S.L.C/ Copenhague 12, PosteriorEdificio Tifan28232 Las RozasMadrid – Spain

(+34) 910 534 [email protected]

T h a n k y o u