2. About MultiPoint
• MultiPoint was founded in April 2009
• Managed by Arie Wolman and Ricardo Resnik
• A Distributor of Security & Networking Software
• Main exclusive product lines:
―GFI
Software, SpectorSoft, Centrify, IronKey, Winmagi
c, GFI MAX, Sandbox, Data Point, etc.
―Certified, Qualified and Credible Technical team
―Value Added for the Channel and the End-Users
alike
6. On-premise and SaaS/cloud
GFI on-premise catalogue GFI MSP/GFI Cloud platform
Remote access/Collaboration
Patch management
Vulnerability assessment
Email management, security, filtering
Email archiving
Mobile device management
Web monitoring
Anti-malware
Network monitoring
Monitoring
Patch
management
Mobile device
management
Anti-malware
Asset
management
Remote
access
Storage
GFI delivers software solutions to customers however they want it
Vulnerability
assessment
7. 2FA with SMS from
SecurEnvoy
New “Voice Call” token option: users receive a
landline-based telephone call and enter a
passcode on the telephone key pad
More user control: switch seamlessly
between SMS delivery options, select soft
token app on all leading smart phones and
laptops or select the new voice call token type.
Multi SMS Gateway with smart global routing
permits the specifying of an unlimited number
of SMS providers world wide
Support for third party SMS Gateways that
are e-mail based
Improved cloud and multi-domain
configurations with “per domain settings” for
all major settings
New “Token Type” section: allows
administrator to specifying which types of
token can be used
New Soft Token for Apple Mac computers
10. The Most Advanced Monitoring Software
Discreet snapshot or sequential recording of all
employee screen activities, files touched &
keystrokes typed
Identify trends and patterns of behavior across
company, department, group or individual
Find anything , including files touched, emails sent or
received, websites visited, IM chats and keywords
Forensic level investigation. What, who and when?
What’s happening now? What’s already happened?
Contextual recording – before, during and after.
Set-up automatic alerts, fully customisable and
powerful reporting functionality, automatic
management reporting
Centralised
Management
• Monitor
• Analyse
• Search
• Investigate
• Report
11. Centrify Suite
Single Sign-On
• Apache and J2EE web applications
• SAP NetWeaver & GUI
• DB2
Centrify
• IOS
• Android
Centrify Insight
Splunk-based analytics solutions
EXPRESS STANDARD ENTERPRISE PLATINUM
DirectSecure
DirectAudit
DirectAuthorize
DirectControl
DirectManage
12. The IronKey family
IRONKEY H100 EXTERNAL HDD
IRONKEY WORKSPACE IRONKEY SECURE S250 AND D250 DRIVES
IRONKEY F200 BIOMETRIC FLASH DRIVES
IRONKEY H80 EXTERNAL HDD
13. Ironkey D80
IRONKEY D80 HARDWARE ENCRYPTED FLASH DRIVE
Strong, enterprise-grade AES 256-bit encryption
Always-on hardware encryption
Encryption happens inside the drive and the key never leaves the drive.
Tough, durable, tamper-resistant enclosure
Longer life, high-quality flash memory
Smart, self-defending IronKey drive automatically reformats after 7
failed logins
PROTECT YOUR MOST SENSITIVE DATA
We live and work in a mobile world, and you need to make sure your data
is always available no matter where you go. But you can’t entrust your
most sensitive and confidential information to just any flash drive. A
poorly made drive won’t stand up to heavy use or break-in attempts, and
drives selected on price alone could leave your valuable information
vulnerable to corruption, infection or theft.
For an easy-to-use and reliable way to protect your most sensitive data,
turn to the IronKey D80 Hardware Encrypted Flash Drive. Even if the drive
is lost or stolen, your confidential information will remain safeguarded
14. Value Added Distributor
Value Resellers
Added
VAD We sell only to
resellers and
system
integrators
Presales assistance
Deal protection
Renewal Alerts
Tech Support
Sales Certification
Online Technical Training
Big discounts and rebates Lead generation
Telemarketing
Notas do Editor
With SPECTOR 360 you can monitor employee desktop activity. This could range from everything they do, right down to event driven recording e.g. if they type a keyword, or access a particular file or website.You can look at the big picture by analysing data across the whole company, a department or a specified group of individuals. E.g. which websites are visited most across a company? Which department consumes the most bandwidth? If you identify something requiring further investigation, you can drill right down to individual screen level and easily view all relevant activity.With SPECTOR 360’s comprehensive search functionality, you can quickly find exactly what you are looking for. E.g. who touched all files with the work confidential in the file name? Who searched the web for ‘download mp3’? Who emailed the file ‘customerlist.xls’?SPECTOR 360 provides forensic level evidence that something has happened. It has been used in law enforcement to convict criminals. When recording events, it’s critical to capture both the action and the context. E.g. it’s not sufficient to just know that someone accessed a particular file. You also need to see what happened immediately before and what they actually did with it. Was their action legitimate, an error of judgment or a deliberate act of misconduct?SPECTOR 360 has over 75 predefined reports available, or you can customise your own. With keyword and event alerts, you’ll also be automatically informed when something has happened, allowing you to act ... rapidly, appropriately, decisively, and with confidence.