1 / 25

Outpost Office Firewall

Outpost Office Firewall. Product presentation. What is Outpost Office Firewall?. Software firewall solution designed especially to meet small and medium business’s needs

Download Presentation

Outpost Office Firewall

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Outpost Office Firewall Product presentation

  2. What is Outpost Office Firewall? • Software firewall solution designed especially to meet small and medium business’s needs • Protects each and every company PC from both external (Internet) and Internal threats (e.g. hacker attacks, data theft, PC infiltrations, etc) • Allows system administrators to set networking rules for PCs and user applications to easily secure company IT infrastructure

  3. Contents • Outpost Office Firewall – why would your company need it? • Security threats • Possible solutions: Hardware Firewall, Anti-Virus, Outpost Office Firewall • What is Outpost Office Firewall • Package contents • How it all works? • System requirements • Support • How to purchase?

  4. IT security solutions – that’s what professionals think • The average survival time for an unprotected networked computer dropped from 40 minutes to 20 minutes over the last year - SANS Institute of Bethesda • For every in-house attack reported, there could be as many as 50 that go either unreported or undetected – The Computer Security Journal • Viruses and worms are the leading information security concerns and continue to generate the most media and public attention. But CIOs and other IT executives are increasingly recognizing the significance of internal threats... – Global Information Security Survey, Ernst&Young LLP • 86% of Computer Crimes originate from inside the company network – Intranet Security • It's bad enough for SOHO / individual users not to use a firewall - absolutely unconscionable for a business to operate without (a correctly configured) one - www.iway-safety.com

  5. Most cost-dangerous security threats Source: Ernst&Young LLP

  6. Security solutions available – Hardware Firewall • Strengths: • Blocks illegal inbound traffic • Analyses traffic on network interface layer • Standalone unit • Weaknesses: • Ignores web pages’ content (i.e. Active Content) • Regards all outbound traffic as trustworthy, thus leaving your company defenseless against Trojans and Spyware, should they infiltrate your employees’ PCs (e.g. through Active Content flaws) • Doesn’t monitor internal network traffic, so if a hacker gets inside your company networks, he becomes almost omnipotent

  7. Security solutions available – Anti-Virus • Strengths: • Monitors emails and web pages for potential viruses • Monitors files for malicious code contamination • Weaknesses: • Anti-virus database MUST contain the virus’s signature to allow ant-virus recognize it • Doesn’t offer any protection against hacker attacks, whether internal or external, exposing your company to risks of sensitive data losses and leakage • Loads some system resources on employees’ PCs

  8. Security solutions available – Outpost Office Firewall • Strengths: • Blocks illegal inbound and outbound traffic on each PC in your company network, protecting your company from both internal and external threats • Analyses traffic on both network interface and application layers, blocking communications for all potentially dangerous programs, like Trojans, Spyware etc. • Allows system administrators to set client firewalls to block potentially dangerous email attachments and web pages’ scripts • Weaknesses: • Doesn’t include anti-virus yet

  9. Multi-Layer Protection approach Hardware Firewall – to strengthen you protection against external attacks Outpost Office Firewall – core defensive element Anti-Virus ensures no malicious code is run on any PC in your company Outpost Office Firewall – Core Element of Your Company IT Security

  10. Contents • Outpost Office Firewall – why would your company need it? • Security threats • Possible solutions: Hardware Firewall, Anti-Virus, Outpost Office Firewall • What is Outpost Office Firewall • Package contents • How it all works? • System requirements • Support • How to purchase?

  11. Outpost Office Firewall Package • Agnitum Command Center • Outpost Office Firewall Client • Agnitum Update Service • Agnitum Publisher Service

  12. Outpost Office Firewall Client • Protecting company PCs from both external (Internet) and internal threats • Forcing firewall settings to client PCs • Remote deployment

  13. Agnitum Update Service • Centralized update deployment • Controlling software on the company PCs • Minimal system requirements

  14. Screenshots

  15. Agnitum Publisher Service • Centralized rules and configurations deployment • Minimal system requirements

  16. Screenshots

  17. Agnitum Command Center • Controlling network software on the company PCs • Setting up rules for the PCs and for separate applications as well • Update Service and Publisher Service management

  18. Screenshot

  19. Contents • Outpost Office Firewall – why would your company need it? • Security threats • Possible solutions: Hardware Firewall, Anti-Virus, Outpost Office Firewall • What is Outpost Office Firewall • Package contents • How it all works? • System requirements • Support • How to purchase?

  20. System requirements • To allow remote deployment • Windows 2000 or 2003 Domain Controller • Administrator PC • Windows XP, 2000 Pro or 2003 Server operating system • Client PCs • 233 MHz Intel Pentium or compatible CPU • 32 MB RAM • Windows 98, Me, 2000, XP or 2003 Server operating system • 30 MB of hard disk space • Agnitum Command Center doesn’t need to be installed on company server!

  21. Contents • Outpost Office Firewall – why would your company need it? • Security threats • Possible solutions: Hardware Firewall, Anti-Virus, Outpost Office Firewall • What is Outpost Office Firewall • Package contents • How it all works? • System requirements • Support • How to purchase?

  22. Support service for Outpost Office Firewall

  23. Contents • Outpost Office Firewall – why would your company need it? • Security threats • Possible solutions: Hardware Firewall, Anti-Virus, Outpost Office Firewall • What is Outpost Office Firewall • Package contents • How it all works? • System requirements • Support • How to purchase?

  24. How to download and purchase Outpost Office Firewall? • Download Outpost Office Firewall 15 day trial here: http://agnitum.com/download/oof.html • Purchase online here: http://agnitum.com/purchase/shop/oof/businesslicense.html • Purchase through the network of our Solutions Providers or Distributors. To locate your nearest partner, please follow this link: http://agnitum.com/purchase/buyoffline.html • For additional information please see Outpost Office Firewall page on our website: http://agnitum.com/products/oof/index.html or contact us via email: oof@agnitum.com or phone: +7-812-336-5246

  25. Thank you for your attention! Yours sincerely, Agnitum Ltd, Team

More Related