Safend Solution Set
-
Upload
randy-neish -
Category
Software
-
view
14 -
download
0
Transcript of Safend Solution Set
![Page 1: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/1.jpg)
![Page 2: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/2.jpg)
About SAFEND and SUPERCOM
![Page 3: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/3.jpg)
52% OF N.A. ENTERPRISESHAVE LOST CONFIDENTIAL DATA THROUGH REMOVABLE MEDIAIN THE PAST 2 YEARS (FORRESTER)
OVER 70% OF SECURITY BREACHES ORIGINATE FROM WITHIN (VISTA RESEARCH)
16,000 LAPTOPS ARE LOST PER WEEK BY BUSINESS TRAVELERS IN THE U.S., EUROPE, AND UNITED ARAB EMIRATES
5% DROP IN SHARE PRICESFOR EVERY INFORMATION BREACH
Facts
![Page 4: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/4.jpg)
Average Incident Costper compromised record:
$217
CUSTOMER COSTS• Brand damage• Loss of existing
customers• Recruiting new
customers
• Unbudgeted legal, audit and accounting fees
• Notification to customers• Free or discounted service
to customers• Call center expenses• Public and investor relations• Internal investigations
INCREMENTAL COSTS
• Lost employee productivity
PRODUCTIVITY COSTS
54%
30%
16%
Average Incident Cost: $6.5 million
Cost of Data Breaches: Recovery Cost
![Page 5: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/5.jpg)
SAFEND IS THE LEADER INENDPOINT DATAFOR ENTERPRISE PROTECTION AND REGULATORY COMPLIANCELEAKAGE PREVENTION
Why DPS?
![Page 6: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/6.jpg)
PROTECTION AGAINSTLOSS AND THEFTFROM LAPTOPS TO USB MEMORY STICKS/CD/DVD
PROTECTION AGAINSTINTENTED AND UNINTENDED
OR WEB UPLOAD TO UNAUTHORIZED RECIPIENTS
PROTECTINGCLASSIFIED DATA
STORED ON LAPTOPS
COPYING TO UNAUTHORIZED EXTERNAL STORAGE AND EMAIL
Value Proposition
![Page 7: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/7.jpg)
Data Protection Suite (DPS)Protector Encryptor
InspectorReporter
![Page 8: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/8.jpg)
Data Protection Suite
Port & Device Control • Wireless Control• Removable Storage Control• Removable Storage
Encryption• CD/DVD Encryption• Hardware Keylogger
Protection
Hard Disk Encryption• Highly Secure• Completely Transparent
– No Training Required• Easy to Manage, Deploy
and Use• Strong Tamper Resistant
Mechanism
Content Based DLP• Data Classification
• Data Content• Data Fingerprinting
• Data Leakage Prevention Through:• Email, IM and Web• External Storage • Printers
Auditor – Endpoint Security Status AuditReporter – Security and Compliance Analysis
Discoverer – Sensitive Data Location and Mapping
Protector Encryptor Inspector
• Single Lightweight Agent• Agent Includes Multi-tiered Anti-tampering Mechanisms• Simple and Reliable Installation Process
![Page 9: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/9.jpg)
Protector
Encryptor
Inspector Discoverer
Reporter
Auditor
Visibility – Auditor • Displays all the devices and wireless networks that your endpoints
connect toControl – Protector
• Port and device control system• Encrypts removable media and CD/DVD
Protection – Encryptor• Enforces hard disk encryption of all data stored on laptops and PCs• Easy recovery of machine and files
Prevention – Inspector • Prevents sensitive data leakage through e-mail, web, removable storage,
cloud and additional data transfer channelsInspection – Discoverer
• Locates and maps sensitive data on end-users’ machinesAnalysis – Reporter
• Provides graphical security reports and analysis for the protected environment
Regaining Control of Your Endpoints
![Page 10: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/10.jpg)
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
Products
![Page 11: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/11.jpg)
Visibility - Auditor
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Control - ProtectorAuditor displays all the devices and wireless networks that your endpoints connect with
Products
![Page 12: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/12.jpg)
Control - Protector
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - AuditorProductsProtector provides granular port and device control and encrypts removable media and CD/DVD, allowing for exceptions and whitelisting
![Page 13: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/13.jpg)
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
ProductsEncryptor enforces hard disk encryption of all data stored on laptops and PCs, and easy recovery of machine and files
![Page 14: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/14.jpg)
Prevention - Inspector
Protection - Encryptor
Inspection - Discoverer
Analysis - Reporter
Visibility - Auditor
Control - Protector
ProductsInspector prevents sensitive data leakage via web, e-mail, removable storage, cloud and additional data transfer channels
![Page 15: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/15.jpg)
Inspection - Discoverer
Products
Protection - Encryptor
Prevention - Inspector
Analysis - Reporter
Visibility - Auditor
Control - ProtectorDiscoverer searches and maps sensitive data that resides on end-users’ machines
![Page 16: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/16.jpg)
Analysis - Reporter
Reporter provides graphical security reports and enables analysis of the protected environment
Products
Protection - Encryptor
Prevention - Inspector
Inspection - Discoverer
Visibility - Auditor
Control - Protector
![Page 17: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/17.jpg)
AUTOMATIC DIRECTORY INTERGRATION
ROLE BASE MANAGEMENTBY ADMINISTRATIVE ACTION AND BY ORGANIZATIONAL UNIT
General Server Features
WITH ACTIVE DIRECTORY ENABLES POLICY ENFORCEMENT STARTING AT THE DOMAINLEVEL, THROUGH ORGANIZATIONAL UNITS, DOWN TO A SPECIFIC MACHINE AND USER
![Page 18: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/18.jpg)
General Server Features
SCALABLE ARCHITECTUREA MANAGEMENT SERVER CAN MANAGE MORE THAN 75,000 ENDPOINTS
REAL TIME ALERTSVIA: EMAIL WINDOWS EVENT LOGS/SYSLOG, SNMP SYSTEMS,AND CUSTOM ALERT DESTINATION
![Page 19: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/19.jpg)
FUNCTIONS ON WINDOWS 7, 8, 8.1, AND 10
OUR SYSTEM SUPPORTS DEPLOYMENT WITH MOST COMMON DISTRUBUTION TOOLS
OUR SYSTEM OFFERSTAMPERING RESISTANCE, CUSTOMIZABLE ALERTS, MINIMAL END-USER INTERACTION AND OFFLINE POLICY ENFORCEMENT AND LOGGING
Client Features
![Page 20: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/20.jpg)
KEY FEATURES:• PREVENTS DATA LEAKAGE AND PENETRATION VIA ENDPOINTS• PORT, DEVICE AND STORAGE CONTROL• REMOVABLE MEDIA ENCRYPTION• GRANULAR WIFI CONTROL• BLOCKS HYBRID NETWORK BRIDGING• U3 AND AUTORUN CONTROL• BLOCKS HARDWARE KEY LOGGERS• FILE TYPE CONTROL• PROVIDES INTEGRATION WITH 3RD PARTY AV SCANNER
Control : Protector
![Page 21: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/21.jpg)
KEY FEATURES:• TOTAL DATA ENCRYPTION ON LAPTOPS AND DESKTOPS• TRUE SSO (SINGLE SIGN ON) TECHNOLOGY• CENTRALLY MANAGED AND ENFORCED • FULL AUDIT TRAIL OF THE ORGANIZATION ENCRYPTION STATUS• STABLE AND FAULT TOLERANT ENCRYPTION• STRONG ENCRYPTION ALGORITHM – AES 256 BITS• NATIVE WINDOWS LOGIN• NO PRE CONFIGURATION• COMPLETELY TRANSPARENT END-USER AUTHENTICATION AND
SEAMLESS PATCH MANAGEMENT, NO HELPDESK OVERHEAD
Control : Encryptor
![Page 22: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/22.jpg)
• CONTENT-AWARE APPLICATION CONTROL• OUT-OF-THE-BOX, PREDEFINED CLASSIFICATIONS AND
POLICIES• INTERACTIVE AND CONFIGURABLE MESSAGES FOR USER
EDUCATION• DATA CONTENT: REGULAR EXPRESSIONS, MATHEMATICAL
AND HEURISTIC VERIFIERS• DATA FINGERPRINTING• MAPS SET OF FILES AS SENSITIVE WITHOUT POINTING TO
SPECIFIC TEXT- USING ORIGINATING APPLICATION
KEY FEATURES:
Control : Inspector
![Page 23: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/23.jpg)
• VIEW SECURITY INCIDENTS BY USERS, ORGANIZATIONAL UNITS, AND TYPE
• TRACK COMPANY-WIDE ENDPOINT DEPLOYMENT AND ENCRYPTION STATUS
• SCHEDULED REPORTS ARE AUTOMATICALLY GENERATED AND DELIVERED VIA EMAIL
• FULLY CUSTOMIZABLE REPORTS CAN BE EXPORTED IN VARIOUS FORMATS
KEY FEATURES:
Control : Reporter
![Page 24: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/24.jpg)
• FIND OUT WHAT DEVICE AND WIFI NETWORKS YOUR ENDPOINTS CONNECT TO
• IDENTIFY AND MANAGE ENDPOINT VULNERABILITIES • COMPATIBLE WITH EXISTING NETWORK
MANAGEMENT OR ADMIN TOOLS• INTUITIVE, CLIENTLESS AND EASY TO USE
KEY FEATURES:
Control : Auditor
![Page 25: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/25.jpg)
• ALLOWS SECURITY ADMINISTRATORS TO LOCATE SENSITIVE DATA-AT-REST STORED ON ORGANIZATIONAL ENDPOINTS
• HELPS IN IDENTIFYING GAPS IN DATA PROTECTION AND COMPLIANCE INITIATIVES
• PROVIDES INSIGHT INTO WHAT POLICIES SHOULD BE IMPLEMENTED USING OTHER COMPONENTS OF THE DATA PROTECTION SUITE
KEY FEATURES:
Control : Discoverer
![Page 26: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/26.jpg)
THANK YOU
![Page 27: Safend Solution Set](https://reader036.fdocuments.in/reader036/viewer/2022070600/58cec6f01a28ab09548b5b11/html5/thumbnails/27.jpg)