Top Banner
1
26

1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

Dec 16, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

1

Page 2: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

2

Presentation outline

» The problem

» Scenario

» The product

» Testimonials

» Conclusion

Page 3: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

3

THE PROBLEMTHE PROBLEM

THE PROBLEMTHE PROBLEM

Page 4: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

4

IT pain points

In the UK, only 45% of SME had security measures in place to manage portable storage device network access

– GFI SME Security Report, 2009

59% of ex-employees admit to stealing confidential company information, such as customer contact lists

– Ponemon Institute, 2009

Insider abuse of networks was second-most frequently occurring threat, at 44%, followed by theft of laptops and other mobile devices (42%)

– CSI Survey, 2008

67% of UK businesses do nothing to prevent confidential data leaving on USB sticks, etc.

– Information Security Breaches Survey, 2008

Page 5: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

5

Scenario

» Employee has an iPod with 80GB storage space

» Transfers half a gigabyte of corporate data in less than 10 minutes

» Sensitive company information (such as product plans and designs, sales and accounting information, product design, human resources track records) are sold to a third-party, that could be a competitor

Page 6: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

6

A look at conventional control methods

» Banning all device usage in an organization

» Blocking drives on every computer

» Blocking connection ports on every computer

» Physically monitoring all connections

» None of these are feasible solutions in today’s business environment

Page 7: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

7

THE PRODUCTTHE PRODUCT

THE PRODUCTTHE PRODUCT

Page 8: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

8

Regain control with GFI EndPointSecurity™

» The key to managing portable device use is to install an endpoint security solution that gives administrators control over what devices are in use, have been used and by whom and in-depth knowledge of what data has been copied

» GFI EndPointSecurity provides comprehensive control on use of iPods, USB sticks and all other popular portable devices

» Actively manage user access and log the activity of:□ Media players, including iPod, Creative Zen and others

□ USB sticks, CompactFlash, memory cards, CDs, floppies and other portable storage devices

□ Smartphones, Blackberry handhelds, mobile phones and similar communication devices

□ Network cards, laptops and other network connections

Page 9: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

9

Top features (1/2)

» Granular access control, through the use of read-only and read/write permissions on a user-by-user and device-by-device basis

» Automated client-side agent deployment

» Group-based protection control

» Logs device-related user activity

Page 10: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

10

Top features (2/2)

» Allows administrators to block devices by class, file extensions, physical port or device ID from a single location

» Allows administrators to grant temporary device or port access for a stipulated timeframe

» Centrally monitors the network, detects connected devices and performs various tasks

» Allows data on removable devices to be encrypted to prevent data loss or theft

Page 11: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

11

GFI EndPointSecurity management console

Product snapshot (1/3)

Page 12: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

12

GFI EndPointSecurity configuration options

Product snapshot (2/3)

Page 13: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

13

Product snapshot (3/3)

Device access statisticsGFI EndPointSecurity monitors and controls device usage

Page 14: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

14

Product benefits

» A thorough and complete solution to control use of portable storage media such as PDAs, Flash drives, iPods, smartphones, digital cameras

» Prevents data leakage/theft and prevents productivity loss

» Prevents introduction of malware and unauthorized software on the network through the use of endpoint devices

» Easy-to-follow user interface

» Supports Windows 7 BitLocker To Go Encrypted devices

Available in the following languages:

Page 15: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

15

GFI EndPointSecurity ReportPack add-on

» The GFI EndPointSecurity ReportPack is a full-fledged reporting add-onto GFI EndPointSecurity

» This reporting package can be scheduled to automatically generate graphical IT-level and management reports based on data collected by GFI EndPointSecurity

» Report on devices connected to the network, device usage trends by machine or by user, files copied to and from devices (including actual names of files copied) and much more

Page 16: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

16

Device usage report

ReportPack snapshot (1/2)

Page 17: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

17

ReportPack snapshot (2/2)

Executive trend report

Page 18: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

18

What’s new in GFI EndPointSecurity 2012 (1/2)

Volume encryption for removable devices

» When users plug in a USB device with unencrypted data, GFI EndPointSecurity will encrypt all the contents on the device. From then on, access to the data will work normally with the added benefit of being encrypted using a strong AES 128-bit algorithm.

Traveler application

» GFI EndPointSecurity also ships with a program called Traveler Application, which enables users to access encrypted content when away from the office, in locations where the GFI EndPointSecurity agent might not be installed.

Page 19: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

19

What’s new in GFI EndPointSecurity 2012 (2/2)

Product update mechanism

» The product now updates itself automatically via GFI’s servers – this functionality allows GFI to roll out fixes immediately without troubling the administrator with downloads and installation of upgrades.

Database maintenance – rollover functionality

» GFI EndPointSecurity already downloads, installs and configures Microsoft® SQL Server ® Express Edition for its users and it now removes another administrative headache – database size limits. Based on the database size limit (4 GB) imposed by SQL Server Express, the product now also automatically rolls over and starts report logging in a new database once the original one is full.

Page 20: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

20

TESTIMONIALSTESTIMONIALS

TESTIMONIALSTESTIMONIALS

Page 21: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

21

Product testimonials

“Information is our business. Our Firm’s client data is confidential. As Forensic Accounting and work with large Corporate customers represents circa 40% of our business, we need to be able to stop anyone unauthorized from gaining access to the data and then from removing it. GFI LanGuard Portable Storage Control (now GFI EndPointSecurity) allows us to control who can put information onto a computer or take information from a computer.”

– Timothy O’Reilly, Managing Partner, MKO Partners Chartered Accountants, Dublin, Ireland

Click here for more testimonials!

Page 22: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

22

Product kudos

» Thousands of customers worldwide use GFI EndPointSecurity

» Numerous product awards, a few listed below:

Page 23: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

23

GFI product complements

» Best incorporated with:

□ GFI LanGuard™ for security scanning and patch management

□ GFI EventsManager™for network-wide event log management

Page 24: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

24

Conclusion

» The quantum leap in portable storage device technology has made it easier for data thieves to get away with sensitive corporate data

» Administrators must have a way to technologically control the use of portable storage devices

» GFI EndPointSecurity is the technological solution which:□ Prevents data theft and protects intellectual property

□ Safeguards network operability by blocking malicious software

□ Supports productivity by blocking games and other non-work related files

□ Supports legal compliance by blocking objectionable material and pirate software

» Excellent pricing!

Page 25: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

25

» Offices located around the globe: USA (North Carolina, California and Florida), UK (London and Dundee), Australia, Austria, Romania, and Malta

» Hundreds of thousands of installations worldwide

» Trusted by thousands of companies around the world

» GFI products are sold by a global network of thousands of partners

All product and company names herein may be trademarks of their respective owners.

Corporate overview

Page 26: 1. 2 Presentation outline » The problem » Scenario » The product » Testimonials » Conclusion.

26

More info and downloads

» Click here to learn more about the product

» Check out our competitive pricing

» Download your FREE trial of GFI EndPointSecurity

» Email: [email protected]

» Visit: www.gfi.com/endpointsecurity