value added distribution driven by innovation€¦ · 1 7 100x reduction in malware incidents when...
TRANSCRIPT
© 1991 − 2018, CLICO sp. z o.o.
Milan Perać, Business Development Manager
Beograd, 04.10.2018.
Value Added Distribution Driven by Innovation
© 1991 − 2018, CLICO sp. z o.o.
RANJIVOST IT SISTEMA I ADAPTIVNA ODBRANA
© 1991 − 2018, CLICO sp. z o.o.
CLICO u Evropi
• Poland: Centrala u Krakovu, Kancelarije: Katovice, Rzeszów, iVaršava
• Bugarska: Sofia
• Češka, Slovačka: Prag
• Rumunija: Bukurešt
• Adriatic:Beograd, Zagreb, Ljubljana
• Mađarska: Budimpešta
• Snažno prisustvo u Baltičkim zemljama
© 1991 − 2018, CLICO sp. z o.o.
CLICO Architecture
© 1991 − 2018, CLICO sp. z o.o.
CLICO – Vendori
© 1991 − 2018, CLICO sp. z o.o.
© 1991 − 2018, CLICO sp. z o.o.
© 1991 − 2018, CLICO sp. z o.o.
FORCEPOINT NGFW Juniper
© 1991 − 2018, CLICO sp. z o.o.
Vektori napada – nekad i sad
Internal(Also Untrusted)
Outside(Untrusted)
Outside(Untrusted)
Internal(Trusted)
Outside(Untrusted)
© 1991 − 2018, CLICO sp. z o.o.
Perimetarska zaštita je veoma bitna ali ipak nije dovoljna!
Transform Data Into AnswersClarity, command, and confidence to securely move your business forward.
Am I Vulnerable? Am I Compromised? Am I Optimized?
Threat Exposure Management
VULNERABILITY MANAGEMENT
USER BEHAVIOR ANALYTICS
ATTACK SIMULATION
INCIDENT DETECTION & RESPONSE
Incident Detection & Response
Log Management & IT Analytics
APPLICATION SECURITY TESTING
ENDPOINT VISIBILITY & INTERROGATION
Software + Managed Services
Solve Critical Security & IT Questions
ENDPOINT VISIBILITY & ASSET MANAGEMENT
INFRASTRUCTURE MONITORING &
TROUBLESHOOTINGLOG MANAGEMENT &
COMPLIANCE
Rapid7 ConsultPenetration Testing
Security Maturity Assessment
Program Development & Benchmarking
Threat Modeling
Incident Response
IoT Strategy and Testing
© 1991 − 2018, CLICO sp. z o.o.
Forcepoint Security Solution
Adaptivna odbrana IT sistema
DATAPEOPLE
FOCUS ON THE TRUE CONSTANTS
Understanding the intersection
of people, critical data and IP
over networks of different trust
levels.
PEOPLE DATA
THE HUMAN POINT
VISIBILITY POLICY ENFORCEMENT COMPLIANCE
Know where your
critical IP is & who is
interacting with
it everywhere
One policy to manage
data movement &
access across ALL
distributed systems
Risk adaptive
protection to act on
change in human risk to
critical IP in real time
Effectively adhere to
compliance regulations no
matter where your
data resides
the rhythm of your people the flow of your data
PROTECT THE HUMAN POINT BY UNDERSTANDING
AND
17
100x reduction in
malware incidents when
deploying Forcepoint.1
Forcepoint
Web & Email
Security
Forcepoint
Data Guard
Eliminates costly and time-consuming
manual data transfers of highly-
regulated, sensitive data.
Forcepoint
NGFW
Cuts network expenses by 50%, reduces
cyberattacks by up to 86%, slashes
incident response time as much as 73%.
Forcepoint
CASB
Broadest cloud application support with unique
customized risk assessment based on user
behavior and data access classification.
Forcepoint
Insider Threat
The most comprehensive
understanding of user intent,
trusted on over 1M endpoints.
Forcepoint
DLP
Gartner Magic Quadrant
Leader in Enterprise DLP
9 consecutive times.
Forcepoint
UEBA
The leader in actionable
insights based on
risk-adaptive scoring.
BEST IN CLASS CAPABILITIES
Copyright © Forcepoint. | 18
FORCEPOINT HAS HIGHEST SECURITY AND EXCELLENT TCO
“The security effectiveness of the Forcepoint
NGFW 3301 was unsurpassed in the NSS Labs
2017 NGFW test. The Forcepoint NGFW
should be on every company’s short list.”
Thomas Skybakmoen,
Distinguished Research Director
NSS Labs
NGFW
5th Consecutive Time
Forcepoint
BEST TCO
ST
RO
NG
ES
T S
EC
UR
ITY
NGIPS
2nd Consecutive Time
NSS Labs 2017 NGFW Test
Copyright © 2018 Forcepoint. | 19
INTRODUCING DYNAMIC DATA PROTECTION DELIVERING RISK-ADAPTIVE PROTECTION
Copyright © 2017 Forcepoint. | 20
GRADUATED ENFORCEMENT BASED ON RISK
For policies governing compliance use-cases or highly sensitive information,
“Block All” can be the action plan for all risk levels.
For policies where additional context can help inform decisions, additional
granularity is now available.
Copyright © Forcepoint. | 21
BUILT-INCLUSTERING
The best clustering capabilities available on
the market place
SECURESD-WAN
Multi-Link VPN™ is unique and praised by end users VPN Mesh technology
OPERATIONALEFFICIENCY
Painless updates, upgrades and deployments
ENTERPRISE-GRADE SOLUTION
Lower TCO and higher flexibility
& scalability
CENTRALIZED MANAGEMENT
Simply the best management console in
the industry
KEY FORCEPOINT CUSTOMER BENEFITS
© 1991 − 2018, CLICO sp. z o.o.
Ko je i šta je na IT mreži?
© 1991 − 2018, CLICO sp. z o.o.
Network Access Control
GuestOnGuard
OnBoard
ClearPass
© 1991 − 2018, CLICO sp. z o.o.
HVALA NA PAŽNJI !
CLICO SRBIJA