1 / 28

Outpost Network Security

Outpost Network Security. Product presentation. What is Outpost Network Security?. Combined manageable software firewall and anti-spyware solution designed especially to meet small and medium business’s needs

corbin
Download Presentation

Outpost Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Outpost Network Security Product presentation

  2. What is Outpost Network Security? • Combined manageable software firewall and anti-spyware solution designed especially to meet small and medium business’s needs • Protects each and every company PC from both external (Internet) and internal threats (e.g. hacker attacks, data theft, PC infiltrations, etc) • Allows system administrators to set networking rules for PCs and user applications to easily secure company IT infrastructure Outpost Network Security – combined power of Firewall and Ant-Spyware protection to ensure maximum corporate network security

  3. Contents • Outpost Network Security – why would your company need it? • Security threats • Possible solutions: Hardware Appliance, Anti-Virus, Outpost Network Security • What is Outpost Network Security • Package contents • How it all works? • System requirements • Support • Why Outpost Network Security? • How to purchase?

  4. IT security solutions – that’s what professionals think • The average survival time for an unprotected networked computer dropped from 40 minutes to 20 minutes over the last year - SANS Institute of Bethesda • For every in-house attack reported, there could be as many as 50 that go either unreported or undetected – The Computer Security Journal • Viruses and worms are the leading information security concerns and continue to generate the most media and public attention. But CIOs and other IT executives are increasingly recognizing the significance of internal threats... – Global Information Security Survey, Ernst&Young LLP • 86% of Computer Crimes originate from inside the company network – Intranet Security • It's bad enough for SOHO / individual users not to use a firewall - absolutely unconscionable for a business to operate without (a correctly configured) one -www.iway-safety.com • Nearly 90% of US businesses suffered from a computer virus, spyware or other online attack in 2004 or 2005 despite widespread use of security software. The average damage was at $24,000 - FBI

  5. Most cost-dangerous security threats Source: Ernst&Young LLP

  6. Security solutions available – Hardware Appliance • Strengths: • Blocks illegal inbound traffic • Analyses traffic on network interface layer • Protects company perimeter from known malware • Standalone unit • Weaknesses: • Ignores web pages’ content (i.e. Active Content) • Regards all outbound traffic as trustworthy, providing no protection against Trojans and Spyware, should they infiltrate endpoints • Doesn’t monitor internal network traffic so if a hacker gets inside your company networks, he becomes almost omnipotent • Doesn’t provide endpoint Anti-Spyware protection

  7. Security solutions available – Anti-Virus • Strengths: • Monitors emails and web pages for potential viruses • Monitors files for malicious code contamination • Weaknesses: • Anti-virus database MUST contain the virus’s signature to allow ant-virus recognize it • Doesn’t offer any protection against hacker attacks, whether internal or external, exposing your company to risks of sensitive data losses and leakage • Loads some system resources on employees’ PCs

  8. Security solutions available – Outpost Network Security • Strengths: • Includes manageable integrated Anti-Spyware protection • Blocks illegal inbound and outbound traffic on each PC in your company network, protecting your company from both internal and external threats • Analyses traffic on both network interface and application layers, blocking communications for all potentially dangerous programs, like Trojans, Spyware etc. • Allows system administrators to set endpoints to block potentially dangerous email attachments and web pages’ scripts • Weaknesses: • Doesn’t include anti-virus yet

  9. Multi-Layer Protection approach Hardware Firewall – to strengthen you protection against external attacks Outpost Network Security – core defensive element Anti-Virus together with Outpost Network Secruity Anti-Spyware protection ensures no malicious code is run on any PC in your company Outpost Network Security – Core Element of Your Company IT Security

  10. Contents • Outpost Network Security – why would your company need it? • Security threats • Possible solutions: Hardware Appliance, Anti-Virus, Outpost Network Security • What is Outpost Network Security • Package contents • How it all works? • System requirements • Support • Why Outpost Network Security? • How to purchase?

  11. Outpost Network Security Package • Agnitum Command Center • Outpost Network Security Client • Agnitum Update Service • Agnitum Publisher Service

  12. Outpost Network Security Client • Combined anti-spyware and firewall protection • Safeguards company PCs from both external (Internet) and internal threats and • Forcing firewall and anti-spyware settings to client PCs • Remote deployment

  13. Agnitum Update Service • Centralized update deployment • Controlling Network Security Clients on the company PCs • Minimal system requirements

  14. Screenshots

  15. Agnitum Publisher Service • Centralized rules and configurations deployment • Minimal system requirements

  16. Screenshots

  17. Agnitum Command Center • Controlling Network Security Clients on the company PCs • Defining user groups • Setting up endpoint rules • Update Service and Publisher Service management • Unprecedentedly easy-to-use

  18. Screenshot

  19. Contents • Outpost Network Security – why would your company need it? • Security threats • Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security • What is Outpost Network Security • Package contents • How it all works? • System requirements • Support • Why Outpost Network Security • How to purchase?

  20. System requirements • To allow remote deployment • Windows 2000 or 2003 Domain Controller • Administrator PC • Windows XP, 2000 Pro or 2003 Server operating system • Client PCs • 233 MHz Intel Pentium or compatible CPU • 32 MB RAM • Windows 98, Me, 2000, XP or 2003 Server operating system • 30 MB of hard disk space • Agnitum Command Center doesn’t need to be installed on company server!

  21. Contents • Outpost Network Security – why would your company need it? • Security threats • Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security • What is Outpost Network Security • Package contents • How it all works? • System requirements • Support • Why Outpost Network Security? • How to purchase?

  22. Support service for Outpost Network Security

  23. Contents • Outpost Network Security – why would your company need it? • Security threats • Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security • What is Outpost Network Security • Package contents • How it all works? • System requirements • Support • Why Outpost Network Security? • How to purchase?

  24. Why Outpost Network Security? Award-winning technology The core of Outpost Network Security is award-winning Outpost Personal Firewall technology. Recent awards:

  25. Why Outpost Network Security? Low system resources consumption and hardware requirements Advanced security features Scalability • Advanced application control (physical path verification, system registry path verification) • Agnitum Update Service and Agnitum Publisher Service can run under unprivileged user account • Advanced Ethernet protection (anti-sniffing, anti-spoofing, ARP attack protection etc.) • Outpost Network Security client flawlessly runs on ANY PC suitable for at least MS Windows 98 OS • Agnitum Command Center successfully runs on ANY PC meeting Windows 2000 hardware requirements • Agnitum Command Center doesn’t have to be installed on company server Agnitum Command Center is capable of working with 150 clients at the same instant, which means the system will successfully with work thousands of PCs Outpost Network Security is suitable for any network, supports VPN and ensures your company is 105% protected against all known attacks and spyware, whether you have tens or thousands of PCs to secure

  26. Contents • Outpost Network Security – why would your company need it? • Security threats • Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security • What is Outpost Network Security • Package contents • How it all works? • System requirements • Support • Why Outpost Network Security? • How to purchase?

  27. How to download and purchase Outpost Network Security? • Download Outpost Network Security 15 day trial here: http://agnitum.com/download/ons.html • Purchase online here: http://agnitum.com/purchase/shop/ons/businesslicense.html • Purchase through the network of our Solutions Providers or Distributors. To locate your nearest partner, please follow this link: http://agnitum.com/purchase/buyoffline.html • For additional information please see Outpost Network Security page on our website: http://agnitum.com/products/ons/index.html or contact us via email: ons@agnitum.com or phone: +7-812-336-5246

  28. Thank you for your attention! Yours sincerely, Agnitum Ltd. Team

More Related