welcometo sophos data leakage prevention and data protection seminar 28 jan 2010 hotel equatorial kl
TRANSCRIPT
![Page 1: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/1.jpg)
Welcometo
SOPHOS DATA LEAKAGE PREVENTION AND
DATA PROTECTION SEMINAR
28 JAN 2010HOTEL EQUATORIAL KL
![Page 2: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/2.jpg)
Thank you
SC Systems Sdn Bhd
![Page 3: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/3.jpg)
http://www.scsystems.com.my/
http://www.youtube.com/watch?v=bySYNTXtb6U
http://www.facebook.com
https://twitter.com/scsystems
![Page 4: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/4.jpg)
The Team
SC Systems Sdn Bhd
![Page 5: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/5.jpg)
Charles Kong Kevin Ho Caren Lee
Carol Chai Mohd Fedli
Eugene TEH Johnny Yeo
MF Che
SC Systems Sdn Bhd Team
Sophos Malaysia Team
![Page 6: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/6.jpg)
Invited Guest SpeakerMr Ogie Tabor
Sophos Philippines
![Page 7: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/7.jpg)
Our Support and Blogs
SC Systems Sdn Bhd
![Page 8: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/8.jpg)
Phone Support +603-9200 6220 (Normal Office Hour)+603-80767467 (03-80SOPHOS) 24 x 7
[email protected] [email protected]
Normal Office Hour – 2 to 4 hours respond
Normal Office Hour – Immediately *
www.sophos.com/support Sophos Products Knowledgebase- 24 x 7
![Page 9: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/9.jpg)
http://scsys.blogspot.com/
http://www.sophos.com/blogs/gc/
http://www.sophos.com/blogs/duck/
![Page 10: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/10.jpg)
Sophos Malaysia
Mr Che Mun Foong
![Page 11: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/11.jpg)
![Page 13: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/13.jpg)
15
What isData Leakage Prevention (DLP)?
![Page 14: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/14.jpg)
Lost Data = Big Problems
16
![Page 15: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/15.jpg)
How is this data exposed?
17
Loss of devices
Leakage via email and web
Leakage via USB
* Data is representative and uses an IDC data point on the split between accidental and deliberate data loss.
Email represents the single greatest potential liability for data loss
![Page 16: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/16.jpg)
Headlines To Be Avoided
![Page 17: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/17.jpg)
![Page 18: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/18.jpg)
NUS Data leakage – 1st April 2009
NUS accidentally leaks personal data of some 15,700 alumni
members
Consequences of personal data falling into the wrong hands
What can organisation do to prevent accidental data leakage?
Source : http://www.zaobao.com.sg/sp/sp090416_501.shtml
![Page 19: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/19.jpg)
NUS Dataleak recommendation
![Page 20: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/20.jpg)
CitiBank Staff Fine !
![Page 21: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/21.jpg)
![Page 22: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/22.jpg)
Hong Kong : Police confidential Data Leak
26th May 2008, police confidential and classified documents
discovered by Foxy King
The documents include information on three undercover police
officers who have bought illegal substances in a dubious Mong
Kok disco and cars used by people suspected of thefts from
motor vehicles in Wong Tai Sin
Source : HKCERTSource : HKCERT
![Page 23: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/23.jpg)
![Page 24: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/24.jpg)
![Page 25: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/25.jpg)
Headlines are the tip of the iceberg
27
Brand damage
Loss of customers
Incremental internal costs
Direct costs of intellectual property loss
![Page 26: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/26.jpg)
Today’s ChallengesRise of stolen/lost Confidential Information
???? Notebook
Lost or stolen weekly at the eight largest airports in EMEA
???? Notebooks
Lost or stolen weekly in US airports (estimated)
July 2008www.vnunet.com/vnunet/news/2223012/eu-travellers-losing-laptops-airports
![Page 27: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/27.jpg)
Today’s Challenges2. Rise of stolen/lost Confidential Information
3.300 Notebook
Lost or stolen weekly at the eight largest airports in EMEA
12.000 Notebooks
Lost or stolen weekly in US airports (estimated)
July 2008www.vnunet.com/vnunet/news/2223012/eu-travellers-losing-laptops-airports
5000 notebooks forgotten in London
Taxis during a 6 months period www.theregister.co.uk/2005/01/25/taxi_survey
![Page 28: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/28.jpg)
Lost laptop orother device
35%
2. Rise of stolen/lost Confidential Information
70% of all company data are stored redundant on Endpoints
(notebooks, desktops, USB Memory sticks), not only on
serversPonemon Institute, U.S. Survey: Confidential Data at Risk, August 2007
Cost of data break will increase 20% per year through 2009Gartner Symposium/ ITxpo , Oct. 2007
Top - reason for Data Breaches in EnterprisesPonemon Institute, 2007 , Anual Study: Costs of Security Breaches
![Page 29: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/29.jpg)
In Asia….
![Page 30: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/30.jpg)
32
Data Leakage Prevention And Regulatory Compliance
![Page 31: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/31.jpg)
Compliance – worldwide explosion
33
Regulation Country Topic
HIPAA Health Insurance Portability and Accountability Act
USA Protection of patients data
GLBA Gramm-Leach-Bliley Act USA Protection of personal financial data
SB 1386 California Senate Bill 1386
CA, USA Protection of personal data
of residents in the state of California
PIPEDAPersonal Information Protection and Electronic Documents Act
Canada Protection of personal data
in business relations
PIPLPersonal Information Protection Law
Japan Comparable to German data protection act
BDSG Bundesdatenschutzgesetz Germany Protection of personal data
DPA Data Protection Act UK Protection of personal data
95/46/EC European Union Directive
Europe European data protection directive
SOX (Euro SOX)Sarbanes-Oxley Act
USA(worldwide)
Increased liability of companies concerning the
presentation of business development
Basel II Europe Policies to control and mitigate operational risk. Optimization of risk management as necessary
![Page 32: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/32.jpg)
34
Finding Data Leaks
![Page 33: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/33.jpg)
Eg;Customer presentation, competitive information
![Page 34: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/34.jpg)
36
Encryption keys lost or stolen
Lost or stolendata on mobile devices
Data theft via removablemedia
Unauthorizedinternal serveraccess
E-mailinterception
Insecure outsourcing
Today’s Challenges
Intellectual Property
![Page 35: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/35.jpg)
![Page 36: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/36.jpg)
![Page 37: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/37.jpg)
39
How Sophos addresses Data Loss Protection
![Page 38: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/38.jpg)
Real integration with unified console, engine and agent
Anti-Virus
Application Control
Behavior (HIPS)
Anti-Spyware
Firewall
PUAs
GenotypeNAC LIGHT
Device Control
Wireless Block
Anti-Rootkit
Endpoint
Security and
Control 9
Data Leakage
Prevention
![Page 39: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/39.jpg)
Real integration with unified console, engine and agent
Anti-Virus
Application Control
Behavior (HIPS)
Anti-Spyware
Firewall
PUAs
GenotypeNAC LIGHT
Device Control
Wireless Block
Anti-RootkitEndpoint
Security and
Control 9.5
Data Leakage
Prevention
Encyrption
![Page 40: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/40.jpg)
42
![Page 41: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/41.jpg)
![Page 42: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/42.jpg)
Data Leakage Prevention- How Sophos Protects You!
![Page 43: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/43.jpg)
So how does it all actually work ?
58
Best explained with a typical “use case”
![Page 44: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/44.jpg)
An example = Bill in HR and his laptop
59
At 4:30pm Bill‘s boss asks him to get some budget figures together
about staffing levels and wages for next year. Bill‘s boss needs it
10am Monday morning for a meeting
Bill‘s bus leaves at 5:10pm and he doesn‘t like taking his laptop on
the bus......so he exports the raw staff data from the ERP sytem and
dumps it to a spreadsheet on his hard drive.
Bill‘s plan is to copy the file to his usb sitck and
leave a bit early (he‘s going to be working all
weekend anyway......)
![Page 45: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/45.jpg)
An example = Bill in HR and his laptop
60
So he plugs in his trusty US key and tries to save the spreadsheet to
his E:
He get‘s a nice pop up messages from SESC9 explaining that the file
trasfer has been blocked. Bill shouldn‘t be doing this (a customisable
message)
![Page 46: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/46.jpg)
An example = Bill in HR and his laptop
61
So he opens explorer and tries copying the file to E:
![Page 47: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/47.jpg)
An example = Bill in HR and his laptop
62
Next he tries to burn to a CD....
![Page 48: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/48.jpg)
An example = Bill in HR and his laptop
63
..... I know !!
![Page 49: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/49.jpg)
An example = Bill in HR and his laptop
64
So he tries to email it to home, via the corporate Outlook email
client....
![Page 50: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/50.jpg)
An example = Bill in HR and his laptop
65
So he tries his Gmail account .....
![Page 51: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/51.jpg)
It’s 4:50... Bill is getting desperate. His bus leave in 20 minutes
66
![Page 52: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/52.jpg)
An example = Bill in HR and his laptop
67
So he tries one last option. Bill zips and encypts the file and
password protects it. And then he tries copying that to his USB
stick....
![Page 53: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/53.jpg)
Potential CNN Moment Averted !!!
68
At 4:55pm Bill realises that he needs to pack up his laptop and take it
with him.
![Page 54: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/54.jpg)
What about encryption ?
You might think that Bill would have been OK to
encrypt the file and take it home.
Bill’s I.T. Department would disagree. While it’s
true that a properly encrypted file, provides
protection for the data transit, what happens when
he unzips it on his home PC ?
Does the I.T. Department control the state of Bill’s
home PC ?
Can they be sure it has up to date AV and is not
compromised by hackers ?
69
![Page 55: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/55.jpg)
![Page 56: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/56.jpg)
71
Demo
![Page 57: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/57.jpg)
![Page 58: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/58.jpg)
SOPHOS Endpoint Security and Data Protection
77
Terms and Conditions apply-excluded migration services-Promo valid until 01 MARCH 2010
Pls acknowledge.
Anti-Virus
Application Control
Behavior (HIPS)
Anti-Spyware
Firewall
PUAs
GenotypeNAC LIGHT
Device Control
Wireless Block
Anti-Rootkit
Endpoint
Security and
Control 9
Data Leakage Prevention
![Page 59: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/59.jpg)
Validity 01 March 2010
No of Devices 12 + 3 months software Support and subscription10-24 RM 21625-49 RM 19450-99 RM 174
100-249 RM 157 250-499 RM 138
500 and above RM 118
78
Free Media Kit (worth RM 250), Free Home Use, Extra 3 months Free software support.
FREE 3 months Software Support and subscription
![Page 60: Welcometo SOPHOS DATA LEAKAGE PREVENTION AND DATA PROTECTION SEMINAR 28 JAN 2010 HOTEL EQUATORIAL KL](https://reader038.vdocuments.net/reader038/viewer/2022102805/551788805503463e368b53d5/html5/thumbnails/60.jpg)
CNY Services Promo
Version Upgrade Onsite Services (within Klang Valley)
RM 1800 RM 1288 *
Onsite Maintenance (within Klang Valley)
RM 8000 RM 6688 ^ (500 devices and below)
RM 12500 RM 9988 ^ (501 – 999 devices)
Validity by 01 March 2010
79
(*) Upgrade from Ver 8 Management server only(^) total 50 support hours within 1 year. Includes preventive maintenance, version onsite upgrade, hands-on training,Documentation, infection alert, remote monitoring (if applicable), priority support.