1 / 35

InterGuard The only complete internal threat platform

Total Visibility and Control. InterGuard The only complete internal threat platform. Data Loss Prevention. Web Filtering. Employee Monitoring. Laptop Security. Total Visibility and Control. Who is Awareness Technologies?. Based in Los Angeles, CA Founded in 2002

Download Presentation

InterGuard The only complete internal threat platform

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Total Visibility and Control InterGuard The only complete internal threat platform Data Loss Prevention Web Filtering Employee Monitoring Laptop Security

  2. Total Visibility and Control Who is Awareness Technologies? • Based in Los Angeles, CA • Founded in 2002 • Patented SaaS technology (Interguard) used by government and law enforcement agencies, financial service companies, banks, hospitals, schools, and more • Over 200,000 Total Users • Over 10,000 Corporate Customers

  3. Total Visibility and Control What is InterGuard? Competition • Single Point Solutions • Multiple Vendors • Multiple User Interfaces • A complete internal threat prevention platform • Data Loss Prevention • Web Filtering • Simple SaaS Solution • Fast download to try, easy to buy • No hardware required • End-Point Architecture (next gen technology) • Works everywhere (unmatched control) • Sees everything (unmatched visibility) • Laptop Recovery • Employee Monitoring Complex Network Trials/Installs • Hardware Required Works only on network and can only capture specified traffic

  4. Complete Internal Threat Platform Security 2000 - 2009 Viruses Hackers Company Network External Threats Spam Malware

  5. Complete Internal Threat Platform Security 2000 - 2009 Viruses Hackers Anti-Virus Firewall Company Network Advent of UTM Anti-Malware Anti-Spam Spam Malware

  6. Complete Internal Threat Platform Security 2010 and Beyond Viruses Hackers Anti-Virus Firewall ConfidentialData Company Network Company Network Internal threats are for more damaging LaptopTheft/Loss EmployeeProductivity Employee Errors& RegulatoryFailures Anti-Malware Anti-Spam Spam Malware

  7. Complete Internal Threat Platform Security 2010 and Beyond Viruses Hackers DLP Anti-Virus Firewall ConfidentialData Company Network Company Network Single PointSolutions InterGuard LaptopTheft/Loss EmployeeProductivity Web Filtering Laptop Recovery Employee Errors& RegulatoryFailures Anti-Malware Anti-Spam Employee Monitoring Spam Malware

  8. The Power of One Agent to Deploy User Interface Contract Bill Support Team

  9. Simple, Complete SaaS Solution Simplicity Try, Buy, Install and Manage

  10. Simple, Complete SaaS Solution INTERNET Easily download and installagents on each workstation ATI Data Center Employee On the Road Remote Employee Organization

  11. Simple, Complete SaaS Solution INTERNET ATI Data Center Employeeon the Road RemoteEmployee Reporting Organization

  12. Next Gen Technology – End-Point Architecture Vision Coverage Sees Everything Works Everywhere

  13. Next Gen – Works Everywhere OLD WAY

  14. Next Gen – Works Everywhere OLD WAY RemoteEmployee Employeeon the Road NO COVERAGE NO COVERAGE

  15. Next Gen – Works Everywhere INTERGUARD WAY

  16. Next Gen – Works Everywhere INTERGUARD WAY RemoteEmployee Employeeon the Road ALL WORKSTATIONS ARE COVERED – ON AND OFF NETWORK

  17. Next Gen Technology – End-Point Architecture Vision Coverage Sees Everything Works Everywhere

  18. Next Gen – Sees Everything Standard Web Filtering Is Web Browsing the only unproductive use of a computer? Web Browsing

  19. Next Gen – Sees Everything Standard Web Filtering Web Browsing is just one piece of the pie Web Browsing

  20. Next Gen – Sees Everything Next Generation Web Filtering Games File Sharing Web Browsing IM/Chat Media Player Personal Email Contextis Everything Business Email Microsoft Office

  21. Next Gen – Sees Everything Standard Web Filtering Records: Does the list of blocked URLs tell the whole story? • Aim.com • Amazon.com • Careerbuilder.com • Ebay.com • Etrade.com • Gambling.com • Google.com • Hotjobs.com • Espn.com • Facebook.com, etc. List of URLs

  22. Next Gen – Sees Everything InterGuard Records: Standard Web Filtering Records: List of URLS Screenshots: • Aim.com • Amazon.com • Careerbuilder.com • Ebay.com • Etrade.com, etc. • Aim.com • Amazon.com • Careerbuilder.com • Ebay.com • Etrade.com • Gambling.com • Google.com • Hotjobs.com • Espn.com • Facebook.com, etc. List of URLs List of Searches ESPN.com • Best ways to sue your employer • How to find a better job • Discount alcohol • How to beat a drug test • Best sick day excuses HotJobs.com

  23. Next Gen – Sees Everything Standard Data Loss Prevention Prevention is just a small piece of the pie… Prevent

  24. Next Gen – Sees Everything Standard Data Loss Prevention Are your policies perfect? Prevent If not, how would you know?

  25. Next Gen – Sees Everything Standard Data Loss Prevention Do you know where your sensitive data is? Prevent Record

  26. Next Gen – Sees Everything Standard Data Loss Prevention If information leaked, could you delete it? Prevention Record Discover

  27. Next Gen – Sees Everything Standard Data Loss Prevention Can you retrieve the laptop if it is lost? Prevention Delete Record Discover

  28. Next Gen – Sees Everything Next Generation Data Protection Locate/Disable Prevent Delete Record Discover

  29. Total Visibility and Control Unique Technology with No Equal Next Steps • A complete internal threat prevention platform • Data Loss Prevention • Web Filtering • Simple SaaS Solution • Fast download to try, easy to install; no hardware • End-Point Architecture (next gen technology) • Works everywhere (unmatched control) • Sees everything (unmatched visibility) Data Loss Prevention • Laptop Recovery • Employee Monitoring Web Filtering Employee Monitoring Laptop Security

  30. Total Visibility and Control Data Loss Prevention Screen all email (work and personal) and attachments for sensitive data and block if desired Protect from misuse or misappropriation of trade secrets, Non-Public Personal Information Control or stop use of removable media Block files, based on their content, from being copied to removable media Protect and enforce  policies governing each employee’s computer use, including those that never connect to a network (even laptops) Easy, intuitive policy creation Coach and educate employees to adopt protocol and best practices for protecting company data Reports back to secure server over standard HTTPS protocols, instead of network Identify, track, and control who accesses your data, what data they access, and what they can and cannot do with that data

  31. Total Visibility and Control Web Filtering Monitors and filters Internet use on and off the network (even on laptops) Blocks or limits applications like P2P, IM Screenshots taken whenever an alert word is typed or read on a webpage All Search Terms captured Works on and off network

  32. Total Visibility and Control Employee Monitoring Works invisibly and undetectably at each desktop, without impacting central network computer resources Records all employee communications - Email (including. webmail) & Instant Messaging Monitors and filters Internet use on and off the network (even on laptops) Blocks or limits applications like P2P, IM Records and analyzes all keystroke activity, regardless of the application used Formats all data into easy-to-read reports, making it easy to find and evaluate critical security lapses  Screenshots taken whenever an alert word is typed or read on a webpage Conclusive, actionable data hard-linked to a specific employee’s actions, with full individualized reporting on an employee’s computer activity

  33. Total Visibility and Control Laptop Security Remotely retrieve important files invisibly, using any internet connection Remotely delete files or an entire hard drive Secure and confirm deletion to the highest Pentagon standard of unrecoverability Geo-locate the stolen laptop, in real-time over any internet connection, often with greater accuracy than GPS Monitor and control everything a thief does – every keystroke they type and file they access will be visable Lock down laptop after disappearance so files can’t be accessed

More Related