SlideShare uma empresa Scribd logo
1 de 30
2014
About MultiPoint
• MultiPoint was founded in April 2009
• Managed by Arie Wolman and Ricardo Resnik
• A Distributor of Security & Networking Software
• Main exclusive product lines:
―GFI Software, SpectorSoft, Centrify, IronKey,
Winmagic, GFI MAX, Sandbox, Data Point, etc.
―Certified, Qualified and Credible Technical team
―Value Added for the Channel and the End-Users
alike
About MultiPoint
.
GFI Software, SpectorSoft, Centrify, IronKey,
Winmagic, Secunia, GFI MAX, Sandbox, LiebSoft,
SecurEnvoy, Data Point, etc.
Customers
• Security Scanning &
Detection
• Network & SW Audit
• End-Point Security
• Email & Web Protection• Single Sign On
• Network Access Control
• Device Control
• Application Control
• Disk Encryption
• Data in-Transit
• Email Encryption
• Reporting
• Auditing
• SIM/SEM – Event Mgt
• Archiving
• Data & System Backup
• Disaster Recovery
• Monitoring & Reporting
• Vulnerability Assessment
• Patch & Remediation
• Risk Management
• Critical Assets & Network
RiskIT Security
Components
Solutions
Main Vendors
GFI solutions for business
» Email archiving
» Email compliance
» Fax management
Email and communications
» Granular Internet monitoring
» Detailed web filtering
» Browsing security
Web control
» Email security and anti-spam (both on
premise and hosted)
Email security
» Antivirus
» Vulnerability scanning
» Patch management
Security
» Event monitoring and logging
» Network auditing and patch management
» Server monitoring
Auditing, monitoring and compliance
» Removable media management
Storage management
“I use GFI Cloud to ensure
all my machines are
operating at peak efficiency
and to protect against
threats.”
» Single integrated
solution to streamline
IT management
» Simple web-based
interface
» Up and running in
10 minutes or less
IT management
GFI Cloud
On-premise and SaaS/cloud
GFI on-premise catalogue GFI MSP/GFI Cloud platform
Remote access/Collaboration
Patch management
Vulnerability assessment
Email management, security, filtering
Email archiving
Mobile device management
Web monitoring
Anti-malware
Network monitoring
Monitoring
Patch
management
Mobile device
management
Anti-malware
Asset
management
Remote
access
Storage
GFI delivers software solutions to customers however they want it
Vulnerability
assessment
“GFI LanGuard is like our
company’s virtual security
consultant. It’s a three-in-
one power tool.”
» Centralizes patch
management,
vulnerability
assessment and network
auditing
» Help prove compliance
with security standards
» Increases productivity for
IT staff and end users
Patch management and vulnerability assessment
Solutions for service
providers
GFI MAX RemoteManagement™
» Server, workstation and network monitoring
and management for SMB networks
» Integrated remote access, patch
management and antivirus capability
» Platform for delivery of integrated
solution set to MSP customers
Remote monitoring and management
GFI MAX Cloud Monitoring
» Cloud infrastructure
» Cloud applications
Cloud services monitoring
GFI MAX Mail
» Hosted email security service
» Hosted email archive
Hosted email security, business continuity
and archive services
2FA with SMS from
SecurEnvoy
New “Voice Call” token option: users receive a
landline-based telephone call and enter a
passcode on the telephone key pad
More user control: switch seamlessly
between SMS delivery options, select soft
token app on all leading smart phones and
laptops or select the new voice call token type.
Multi SMS Gateway with smart global routing
permits the specifying of an unlimited number
of SMS providers world wide
Support for third party SMS Gateways that
are e-mail based
Improved cloud and multi-domain
configurations with “per domain settings” for
all major settings
New “Token Type” section: allows
administrator to specifying which types of
token can be used
New Soft Token for Apple Mac computers
WinMagic Encryption
WinMagic Encryption
»How PBConnex from WinMagic works
Secure Data Platform
Data Motion SecureMail
Spector 360 from Spectorsoft
Company-Wide Monitoring and Surveillance Software
Monitor All User and User Group Activity Across PCs, Macs, Laptops, and the Internet.
Email sent/received
Document tracking
File transfers
Network usage
Keystrokes typed
User activity
Applications used
Websites visited
& Web Filtering
Chat & IM
Online searches
Screen activity / inactivity
The Most Advanced Monitoring Software
Discreet snapshot or sequential recording of all
employee screen activities, files touched &
keystrokes typed
Identify trends and patterns of behavior across
company, department, group or individual
Find anything , including files touched, emails sent or
received, websites visited, IM chats and keywords
Forensic level investigation. What, who and when?
What’s happening now? What’s already happened?
Contextual recording – before, during and after.
Set-up automatic alerts, fully customisable and
powerful reporting functionality, automatic
management reporting
Centralised
Management
• Monitor
• Analyse
• Search
• Investigate
• Report
VIPRE AV Premium
• High-performance, proactive endpoint malware protection
• Completely new agent, combines antivirus, antispyware, and firewall
• Provides powerful protection against today’s most relevant highly complex threats
• Field-tested administrative console for central management
• All the features of VIPRE Enterprise, plus advanced firewall protection at all times.
Performance Leadership
:Centrify
Centrify Mgmt Platform
Personal
Devices
Mobile
Devices
Servers
Apps
Centrify the Enterprise
–Active Directory
Centrify Suite
Single Sign-On
• Apache and J2EE web applications
• SAP NetWeaver & GUI
• DB2
Centrify
• IOS
• Android
Centrify Insight
Splunk-based analytics solutions
EXPRESS STANDARD ENTERPRISE PLATINUM
DirectSecure
DirectAudit
DirectAuthorize
DirectControl
DirectManage
The IronKey family
IRONKEY H100 EXTERNAL HDD
IRONKEY WORKSPACE IRONKEY SECURE S250 AND D250 DRIVES
IRONKEY F200 BIOMETRIC FLASH DRIVES
IRONKEY H80 EXTERNAL HDD
Ironkey D80
IRONKEY D80 HARDWARE ENCRYPTED FLASH DRIVE
Strong, enterprise-grade AES 256-bit encryption
Always-on hardware encryption
Encryption happens inside the drive and the key never leaves the drive.
Tough, durable, tamper-resistant enclosure
Longer life, high-quality flash memory
Smart, self-defending IronKey drive automatically reformats after 7
failed logins
PROTECT YOUR MOST SENSITIVE DATA
We live and work in a mobile world, and you need to make sure your data
is always available no matter where you go. But you can’t entrust your
most sensitive and confidential information to just any flash drive. A
poorly made drive won’t stand up to heavy use or break-in attempts, and
drives selected on price alone could leave your valuable information
vulnerable to corruption, infection or theft.
For an easy-to-use and reliable way to protect your most sensitive data,
turn to the IronKey D80 Hardware Encrypted Flash Drive. Even if the drive
is lost or stolen, your confidential information will remain safeguarded
Ironkey BYOD
Success in the enterprise
SUCCESS REQUIRES ALL THREE ELEMENTS
SIMPLE
A solution that is
easy for end-
users to use so
they will embrace
it and require
minimal training
SECURE
A solution that is
highly secure to
protect
confidential
information and
enable regulatory
compliance
MANAGABLE
A solution that is
centrally
manageable and
mass-deployable to
suit the needs of
enterprise and
government
Privileged Identity Management
Solutions from Liebsoft
Enterprise Random Password Manager:
Automatically discover, secure, and audit the administrator, root, domain and service account
passwords in your cross-platform enterprise – detecting dependent accounts and synchronizing
privileged password changes to safeguard your infrastructure.
Random Password Manager:
Discover and secure the local administrator and root account
passwords in your enterprise from a single console, all at once.
Password Spreadsheet Manager:
Migrate shared account passwords from spreadsheets into a
centralized password store accessible only to authorized
individuals with audited records of password retrievals.
Self-Service and Help Desk Password Reset Solution: Account Reset Console
Grant end-users and the Help Desk a fast, secure, and audited means to reset and unlock
domain account passwords through any web browser.
Altaro Hyper-V Backup
• Hyper-V Backup in 5 clicks - Hyper Easy, Hyper Fast, Hyper Effective
• Works with: Windows 2008 R2 & Windows Server 2012
• Tight Integration with Microsoft Technologies
• Why Altaro?: Better price/Easier to use than competition
• Fully Hyper-V Aware
– Does all the complex configuration connections and allows you to back up any
VM instance in 5 click or less
– It supports all guest operating systems on Hyper-V (Linux, old Windows
versions)
– Lightweight console, resides directly on a Hyper-V host – no need to license
another OS, no agent, little disk space, select exactly what needs to be backed
up Down to the file
ThreatTrack Sandbox
Value Added Distributor
Value Resellers
Added
VAD We sell only to
resellers and
system
integrators
Presales assistance
Deal protection
Renewal Alerts
Tech Support
Sales Certification
Online Technical Training
Big discounts and rebates Lead generation
Telemarketing
MultiPoint 2014 Security Solutions Overview

Mais conteúdo relacionado

Mais procurados

Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Iftikhar Ali Iqbal
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Iftikhar Ali Iqbal
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаBAKOTECH
 
[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech SupportSamsung Biz Mobile
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolationSierraware
 
Cisco contact center
Cisco contact centerCisco contact center
Cisco contact centerCisco Canada
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence ServiceF5 Networks
 
Identiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingIdentiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingJoshuaCiccone2
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)Kimber Spradlin
 
Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Bunmi Sowande
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Wen-Pai Lu
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 

Mais procurados (20)

Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
 
F5 Cloud Story
F5 Cloud StoryF5 Cloud Story
F5 Cloud Story
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
 
[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolation
 
F5 TMOS v13.0
F5 TMOS v13.0F5 TMOS v13.0
F5 TMOS v13.0
 
Cisco contact center
Cisco contact centerCisco contact center
Cisco contact center
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
Identiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingIdentiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffing
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)
 
Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
Knox Customization Sales Deck
Knox Customization Sales DeckKnox Customization Sales Deck
Knox Customization Sales Deck
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 

Semelhante a MultiPoint 2014 Security Solutions Overview

Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Data power use cases
Data power use casesData power use cases
Data power use casessflynn073
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerPresentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerEnrique Gustavo Dutra
 
MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version Ricardo Resnik
 
Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to IvantiIvanti
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgDNUG e.V.
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.sflynn073
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SASrobbuddingh
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfoliojclauer
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data powersflynn073
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 

Semelhante a MultiPoint 2014 Security Solutions Overview (20)

Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Data power use cases
Data power use casesData power use cases
Data power use cases
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerPresentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
 
MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch Salzburg
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
Aruba Networks - Overview ClearPass
Aruba Networks - Overview ClearPassAruba Networks - Overview ClearPass
Aruba Networks - Overview ClearPass
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 

Mais de Ricardo Resnik

Psb ec sales presentation
Psb ec sales presentation Psb ec sales presentation
Psb ec sales presentation Ricardo Resnik
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014Ricardo Resnik
 
Whatsnew gfi languard2014partners_en_gen
Whatsnew gfi languard2014partners_en_genWhatsnew gfi languard2014partners_en_gen
Whatsnew gfi languard2014partners_en_genRicardo Resnik
 
Two factor Authentication
Two factor AuthenticationTwo factor Authentication
Two factor AuthenticationRicardo Resnik
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014Ricardo Resnik
 
Gfi corporate presentation_en_gen
Gfi corporate presentation_en_genGfi corporate presentation_en_gen
Gfi corporate presentation_en_genRicardo Resnik
 

Mais de Ricardo Resnik (8)

Psb ec sales presentation
Psb ec sales presentation Psb ec sales presentation
Psb ec sales presentation
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
 
Whatsnew gfi languard2014partners_en_gen
Whatsnew gfi languard2014partners_en_genWhatsnew gfi languard2014partners_en_gen
Whatsnew gfi languard2014partners_en_gen
 
Two factor Authentication
Two factor AuthenticationTwo factor Authentication
Two factor Authentication
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014
 
Ironkey Windows to go
Ironkey Windows to goIronkey Windows to go
Ironkey Windows to go
 
Gfi corporate presentation_en_gen
Gfi corporate presentation_en_genGfi corporate presentation_en_gen
Gfi corporate presentation_en_gen
 

Último

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Último (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

MultiPoint 2014 Security Solutions Overview

  • 2. About MultiPoint • MultiPoint was founded in April 2009 • Managed by Arie Wolman and Ricardo Resnik • A Distributor of Security & Networking Software • Main exclusive product lines: ―GFI Software, SpectorSoft, Centrify, IronKey, Winmagic, GFI MAX, Sandbox, Data Point, etc. ―Certified, Qualified and Credible Technical team ―Value Added for the Channel and the End-Users alike
  • 3. About MultiPoint . GFI Software, SpectorSoft, Centrify, IronKey, Winmagic, Secunia, GFI MAX, Sandbox, LiebSoft, SecurEnvoy, Data Point, etc.
  • 5. • Security Scanning & Detection • Network & SW Audit • End-Point Security • Email & Web Protection• Single Sign On • Network Access Control • Device Control • Application Control • Disk Encryption • Data in-Transit • Email Encryption • Reporting • Auditing • SIM/SEM – Event Mgt • Archiving • Data & System Backup • Disaster Recovery • Monitoring & Reporting • Vulnerability Assessment • Patch & Remediation • Risk Management • Critical Assets & Network RiskIT Security Components Solutions
  • 7. GFI solutions for business » Email archiving » Email compliance » Fax management Email and communications » Granular Internet monitoring » Detailed web filtering » Browsing security Web control » Email security and anti-spam (both on premise and hosted) Email security » Antivirus » Vulnerability scanning » Patch management Security » Event monitoring and logging » Network auditing and patch management » Server monitoring Auditing, monitoring and compliance » Removable media management Storage management
  • 8. “I use GFI Cloud to ensure all my machines are operating at peak efficiency and to protect against threats.” » Single integrated solution to streamline IT management » Simple web-based interface » Up and running in 10 minutes or less IT management GFI Cloud
  • 9. On-premise and SaaS/cloud GFI on-premise catalogue GFI MSP/GFI Cloud platform Remote access/Collaboration Patch management Vulnerability assessment Email management, security, filtering Email archiving Mobile device management Web monitoring Anti-malware Network monitoring Monitoring Patch management Mobile device management Anti-malware Asset management Remote access Storage GFI delivers software solutions to customers however they want it Vulnerability assessment
  • 10. “GFI LanGuard is like our company’s virtual security consultant. It’s a three-in- one power tool.” » Centralizes patch management, vulnerability assessment and network auditing » Help prove compliance with security standards » Increases productivity for IT staff and end users Patch management and vulnerability assessment
  • 11. Solutions for service providers GFI MAX RemoteManagement™ » Server, workstation and network monitoring and management for SMB networks » Integrated remote access, patch management and antivirus capability » Platform for delivery of integrated solution set to MSP customers Remote monitoring and management GFI MAX Cloud Monitoring » Cloud infrastructure » Cloud applications Cloud services monitoring GFI MAX Mail » Hosted email security service » Hosted email archive Hosted email security, business continuity and archive services
  • 12. 2FA with SMS from SecurEnvoy New “Voice Call” token option: users receive a landline-based telephone call and enter a passcode on the telephone key pad More user control: switch seamlessly between SMS delivery options, select soft token app on all leading smart phones and laptops or select the new voice call token type. Multi SMS Gateway with smart global routing permits the specifying of an unlimited number of SMS providers world wide Support for third party SMS Gateways that are e-mail based Improved cloud and multi-domain configurations with “per domain settings” for all major settings New “Token Type” section: allows administrator to specifying which types of token can be used New Soft Token for Apple Mac computers
  • 14. WinMagic Encryption »How PBConnex from WinMagic works
  • 17. Spector 360 from Spectorsoft Company-Wide Monitoring and Surveillance Software Monitor All User and User Group Activity Across PCs, Macs, Laptops, and the Internet. Email sent/received Document tracking File transfers Network usage Keystrokes typed User activity Applications used Websites visited & Web Filtering Chat & IM Online searches Screen activity / inactivity
  • 18. The Most Advanced Monitoring Software Discreet snapshot or sequential recording of all employee screen activities, files touched & keystrokes typed Identify trends and patterns of behavior across company, department, group or individual Find anything , including files touched, emails sent or received, websites visited, IM chats and keywords Forensic level investigation. What, who and when? What’s happening now? What’s already happened? Contextual recording – before, during and after. Set-up automatic alerts, fully customisable and powerful reporting functionality, automatic management reporting Centralised Management • Monitor • Analyse • Search • Investigate • Report
  • 19. VIPRE AV Premium • High-performance, proactive endpoint malware protection • Completely new agent, combines antivirus, antispyware, and firewall • Provides powerful protection against today’s most relevant highly complex threats • Field-tested administrative console for central management • All the features of VIPRE Enterprise, plus advanced firewall protection at all times.
  • 22. Centrify Suite Single Sign-On • Apache and J2EE web applications • SAP NetWeaver & GUI • DB2 Centrify • IOS • Android Centrify Insight Splunk-based analytics solutions EXPRESS STANDARD ENTERPRISE PLATINUM DirectSecure DirectAudit DirectAuthorize DirectControl DirectManage
  • 23. The IronKey family IRONKEY H100 EXTERNAL HDD IRONKEY WORKSPACE IRONKEY SECURE S250 AND D250 DRIVES IRONKEY F200 BIOMETRIC FLASH DRIVES IRONKEY H80 EXTERNAL HDD
  • 24. Ironkey D80 IRONKEY D80 HARDWARE ENCRYPTED FLASH DRIVE Strong, enterprise-grade AES 256-bit encryption Always-on hardware encryption Encryption happens inside the drive and the key never leaves the drive. Tough, durable, tamper-resistant enclosure Longer life, high-quality flash memory Smart, self-defending IronKey drive automatically reformats after 7 failed logins PROTECT YOUR MOST SENSITIVE DATA We live and work in a mobile world, and you need to make sure your data is always available no matter where you go. But you can’t entrust your most sensitive and confidential information to just any flash drive. A poorly made drive won’t stand up to heavy use or break-in attempts, and drives selected on price alone could leave your valuable information vulnerable to corruption, infection or theft. For an easy-to-use and reliable way to protect your most sensitive data, turn to the IronKey D80 Hardware Encrypted Flash Drive. Even if the drive is lost or stolen, your confidential information will remain safeguarded
  • 25. Ironkey BYOD Success in the enterprise SUCCESS REQUIRES ALL THREE ELEMENTS SIMPLE A solution that is easy for end- users to use so they will embrace it and require minimal training SECURE A solution that is highly secure to protect confidential information and enable regulatory compliance MANAGABLE A solution that is centrally manageable and mass-deployable to suit the needs of enterprise and government
  • 26. Privileged Identity Management Solutions from Liebsoft Enterprise Random Password Manager: Automatically discover, secure, and audit the administrator, root, domain and service account passwords in your cross-platform enterprise – detecting dependent accounts and synchronizing privileged password changes to safeguard your infrastructure. Random Password Manager: Discover and secure the local administrator and root account passwords in your enterprise from a single console, all at once. Password Spreadsheet Manager: Migrate shared account passwords from spreadsheets into a centralized password store accessible only to authorized individuals with audited records of password retrievals. Self-Service and Help Desk Password Reset Solution: Account Reset Console Grant end-users and the Help Desk a fast, secure, and audited means to reset and unlock domain account passwords through any web browser.
  • 27. Altaro Hyper-V Backup • Hyper-V Backup in 5 clicks - Hyper Easy, Hyper Fast, Hyper Effective • Works with: Windows 2008 R2 & Windows Server 2012 • Tight Integration with Microsoft Technologies • Why Altaro?: Better price/Easier to use than competition • Fully Hyper-V Aware – Does all the complex configuration connections and allows you to back up any VM instance in 5 click or less – It supports all guest operating systems on Hyper-V (Linux, old Windows versions) – Lightweight console, resides directly on a Hyper-V host – no need to license another OS, no agent, little disk space, select exactly what needs to be backed up Down to the file
  • 29. Value Added Distributor Value Resellers Added VAD We sell only to resellers and system integrators Presales assistance Deal protection Renewal Alerts Tech Support Sales Certification Online Technical Training Big discounts and rebates Lead generation Telemarketing

Notas do Editor

  1. SPECTOR 360 provides the most comprehensive monitoring solution of computer usage across the whole organisation. Emails written, sent, received, forwarded and deleted from any email environment, including email clients and webmailSelected document activity – be alerted to who accessed which files, when, what they did with them, who they sent them to, when they print them ect.Which files have been transferred externally, either to plug-in devices, cloud environments or sent as attachments.Who is consuming the most bandwidth and for what purpose?Any keystrokes typed, even if it gets deleted, the keystrokes will be logged.Facebook, Youtube, Hotmail, Excel and The company CRM system may be open for 8 hours, but which one is the active window and for how long?What are users actually doing? They may well log in at 9am, the CRM window may be active, but how long do they spend actually using applications?Track the day and time a program is launched and the total duration of activity in that program.Which websites are visited? How often and for how long? Specify which sites can or cannot be viewed, either all the time or within set time periods.Who is using Chat/IM and for what purpose? Are the chat’s appropriate?Is online searching used within acceptable parameters and mainly for business purposes? Or is it a major distraction?You can monitor all of this and much more with SPECTOR 360.
  2. With SPECTOR 360 you can monitor employee desktop activity. This could range from everything they do, right down to event driven recording e.g. if they type a keyword, or access a particular file or website.You can look at the big picture by analysing data across the whole company, a department or a specified group of individuals. E.g. which websites are visited most across a company? Which department consumes the most bandwidth? If you identify something requiring further investigation, you can drill right down to individual screen level and easily view all relevant activity.With SPECTOR 360’s comprehensive search functionality, you can quickly find exactly what you are looking for. E.g. who touched all files with the work confidential in the file name? Who searched the web for ‘download mp3’? Who emailed the file ‘customerlist.xls’?SPECTOR 360 provides forensic level evidence that something has happened. It has been used in law enforcement to convict criminals. When recording events, it’s critical to capture both the action and the context. E.g. it’s not sufficient to just know that someone accessed a particular file. You also need to see what happened immediately before and what they actually did with it. Was their action legitimate, an error of judgment or a deliberate act of misconduct?SPECTOR 360 has over 75 predefined reports available, or you can customise your own. With keyword and event alerts, you’ll also be automatically informed when something has happened, allowing you to act ... rapidly, appropriately, decisively, and with confidence.