modern threats require - 2o infocom security cyprus...12th annual info security pg's 2016...

32
Modern Threats require Smart security!

Upload: others

Post on 31-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Modern ThreatsrequireSmart security!

Page 2: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Business and the Internet

The Internetis the Viagra of big business.

- Jack Welch -

Internet «run» with a growth rate of 1,104 % from 2000 to 2019.

At the same it gave a huge boost to global business by giving an easy and direct access to every market.

Πηγή: internetworldstats.com

Page 3: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

In 2019 the Internet is an

indispensable part of global business

and not just another contemporary

medium or tool.

If your business is not on the Internet,Then your business will be out of business.

- Bill Gates -

Business and the Internet

Page 4: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

So, we can use the Internet in our business

as much as possible, with no problem

whatsoever.

Right?

Business and the Internet

Page 5: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Not really!

Business and the Internet

Page 6: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Modern Threats

The Internet is not a digital paradise!

The very same medium that makes our work easier, can become our worst nightmare if we don’t protect our business against cyber-attacks!

Page 7: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Modern Threats: Attacks & Hackers

Hackers have developed many methods to launch their attacks.

• Viruses & trojans • Spamming• Malware • Spyware• Adware • Phishing• Social Engineering

Page 8: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Modern Threats: Public WiFi

We can very well do our work in a caféor a hotel lobby these days.

But we may get in big trouble if we connect to a public WiFi!

• Man-in-the-Middle attacks• Unencrypted Networks• Malware• Snooping και sniffing• Malicious hotspots

Page 9: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Modern Threats: Smartphones & ΙoΤ

Introducing smart devices in the workplace, made the dangers of security breach even bigger.

The data exchange through wireless connections and emails using smartphones, is already in the sight ofhackers.

Page 10: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

A person may be the weakest link in the chain that is security.

Our Bad habits can harm our network security!

• Easy or weak password• Use of pirate software• Insufficient or rare Backup• Exposed personal data

Modern Threats: The people factor

Page 11: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Η έξυπνη προστασία!

Δε χρειάζεται να υπερβάλουμε, αλλά είναι απαραίτητο να προστατέψουμε την επιχείρησή μας αποτελεσματικά.

Με τις απειλές να γίνεται ολοένα πιο έξυπνες, θα πρέπει κι εμείς…

…να βρούμε την πιο έξυπνη λύση!

Page 12: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!

UTM Firewall

EndpointSecurity

DLP

DataEncryption

MobileSecurity

CloudSecurity

AntiRansomware

Page 13: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!

A simple and complete platform.

EndpointSecurity

Data Loss Prevention

Ransomware Protection

Web Filtering

Application Control

Asset Management

Vulnerability Scan

Patch Management

Advanced Device Control

File Activity Monitor

IDS / IPS Protection

Page 14: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!EndpointSecurity

Group Policy Management

Spam Protection

Third-party Antivirus Removal

Browsing Protection

Phishing Protection

Firewall Protection

Tuneup

Multiple Update Managers

Roaming Platform

Email and SMS Notifications

A simple an complete platform.

Page 15: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!

A clutch tool for secure sensitive data.

Manages sensitive files according to set policies.

Monitors files that include sensitive data.

Oversees, protects and reports anything relevant to sensitive data.

DLP EndpointSecurity

Page 16: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

DLP

At-Rest scanScans on schedule or on demand for any new files containing sensitive data that might have entered our Network.

Facts:• Sensitive data may derive from new

policies.• Email addresses are sensitive data.

EndpointSecurity

Smart Security!

A clutch tool for secure sensitive data.

Page 17: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!

Keeps malicious software off!

AntiRansomware

Behavioral analysis: A.I. that detects the «unusual» behavior of an app/malware and proceeds to actions.

DNA Scan: A deep file scan that finds malicious code without signatures.

Backup: All user files are backed up, encrypted and stored in the same drive and are accessible only via a special decryption key from SEQRITE.

EndpointSecurity

Page 18: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!

A malware hunting engine that combines impressive features with deep scanning

EndpointSecurity

Page 19: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!

Advanced Behavior Detection SystemMonitors all apps and blocks whichever behaves in a pattern similar to a malware’s.

DNA ScanA boot time scan that detects and fixes infected system files. It uses minimum resources and it is very effective even withZero Day attacks.

Cloud Based Deep Learning ModuleLearns and remembers every malware threat there is and stores the archive in the cloud.

EndpointSecurity

Page 20: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!

Multilayered DefenseCombines Α.Ι. with anti-key logger for a better defense against ransomware and malware.

Seed AnalysisRecognizes possible threats, their origins, their severity and the damage they may inflict, and neutralizes them before they act.

EndpointSecurity

Page 21: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!Data

EncryptionPowerful encryption algorithms.

Full Encryption of Removable Disks, SD cards, Flash drives etc.

Traveler Tool

Full Disk Encryption that ensures unbreachable data even in the case of physical loss of the disk.FDE

Page 22: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!Mobile

SecurityMobile productivity without limitations.

Page 23: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!Mobile

Security

Device ManagementCentral management console for all mobile devices.

Security ManagementEffective security and anti-theft.

App ManagementRemote app management of every device.

Data Monitoring & ManagementControls and issues user permissions based on geolocation.

Page 24: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!Mobile

Security

Email ClientSecure and complete with attachments, links and antivirus.

Secure BrowserWith military grade encryption and audit-compliant container.

Email ContactsSecure contacts list Global Address List (GAL)

Notes & CalendarWith secure access only through MobiSMART.

Page 25: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!

Διανέμει και προσαρμόζει ιδανικά το bandwidthκαι το traffic του δικτύου σε πραγματικό χρόνο ανταλλάσσοντας ευαίσθητα δεδομένα μόνο με συγκεκριμένες ασφαλείς συνδέσεις.

Προστατεύει το σύστημα με gateway antivirus, gateway mail protection, firewall και δυνατότητα DLPσε επίπεδο αρχείων ανά χρήστη ή ομάδα.

Καλύπτει και ελέγχει διαρροές σε επίπεδο περιμέτρου.

UTM Firewall

Page 26: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!

Stops and controls leeks on perimeter level.

UTM Firewall

Gateway Antivirus & Mail Protection

IDS & IPS

URL Filtering

IT Policy Management

Application Control

Load Balancing

VPN

Firewall Protection

Automatic Link Failover

Bandwidth Manager

Page 27: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Smart Security!

Secure management of all Endpoints and UTM from the cloud.

CloudSecurity

Single Management Console

Global implementation of enterprise policies.

Multi-level Administration

Manage Product Users

Detailed Reports and notifications

Backup και restore

Page 28: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Why SEQRITE?

A world-class Enterprise Security brand defined by innovationand simplicity. SEQRITE solutions combine value for moneywith effective security that is light on the systems.

20 years history of research and development.

Over 7 million activeLicenses in 80 countries.

More than 1300employees in 36 cities

worldwide.

16.9% year-on-yeargrowth rate the last 3 years.

Page 29: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Seqrite Endpoint Security (v.7.2) rated 'Top Product' by AV-TEST.

Seqrite Endpoint Security (v.16) for Windows.

Seqrite Endpoint Security v7.2 receives BEST+++ certification from AVLab.

Seqrite Endpoint Security (EPS) Enterprise Suite Edition v.7.0.

Seqrite Endpoint Security (v.15 and v.16) for Windows.

12th Annual Info Security PG's 2016 Global Excellence Awards, USA.

IMC Information Technology Award 2015.

2016 Excellence in Information Security Testing Award.

Why SEQRITE?

Page 30: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Phone

Online chat

Email

Support ticket

Free technical support in real time for all active product license customers:

Why SEQRITE?

Page 31: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Brought to you by PartnerNET

The complete network security solution Of SEQRITE is brought to Europe

Exclusively by PartnerNET.

Page 32: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information

Thank you!