How to threat proof your network endpoints
This presentation is the property of its rightful owner.
Sponsored Links
1 / 36

How to Threat-Proof your Network Endpoints PowerPoint PPT Presentation


  • 72 Views
  • Uploaded on
  • Presentation posted in: General

How to Threat-Proof your Network Endpoints. Typical Corporate Network.

Download Presentation

How to Threat-Proof your Network Endpoints

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


How to threat proof your network endpoints

How to Threat-Proof your Network Endpoints


Typical corporate network

Typical Corporate Network


How to threat proof your network endpoints

The stand-alone antivirus market has been replaced with a broader suite of defensive technologies supported by an extensible management platform that can include horizontal products, such as data protection and device management capabilities.


Where is the risk

Confidential Property

Where is the Risk ?

  • People

    Internal versus external

  • Network

    Eavesdropping

  • Computer

    System vulnerabilities

    Access control – (Users and Devices)

    Physical security


Top security threats

Confidential Property

Top Security Threats

  • Compromised systems

    Used to scan/probe other systems to find entry for unauthorized access

    Used for denial of service attack

  • Spamming

    Systems used to send unsolicited emails

  • Computer Virus

    Mainly from PC via email attachment

    Virus Hoax

    Through Portable Storage devices like USB drives, Flash Cards, etc.


Most vulnerable areas at endpoints

Confidential Property

Most Vulnerable Areas at Endpoints

  • Usage of Portable Storage Devices

  • Usage of unauthorized Applications like Peer2Peer Software, File Sharing Software, Chat Software

  • External Vendors plugging into the network

  • Spam

  • Phishing Scams


Problems faced by system and network administrators

Confidential Property

Problems faced by system and network administrators

  • So many computers to look after by a few system/network administrators

  • Low budgets

  • Not enough training for both themselves and the users

  • Not enough time

  • Low user awareness on security


How to improve network security

Confidential Property

How to improve Network Security ?

  • Having a Security Policy for the network backed by a robust solution that can offer centralized management of the network security

  • General awareness of Network Security amongusers

  • Upgrading the skill of the system and network administrators

  • Sharing of network security information, knowledge and experience amongst system and network administrators


How to threat proof your network endpoints

Confidential Property

In business for 15 years.

10 offices worldwide.

Developed patented technologies like MWL & NILP.

Products available in 11 languages.

Worldwide presence in 90 countries through channel partners.

Supports Windows and Linux Platforms.

24 x 7 technical support.

Local support office in South Africa.


Microworld winsock layer mwl

Confidential Property

MicroWorld Winsock Layer (MWL)

  • MWL scans all files, e-mails, attachments, websites, downloads & all possible e-contents passing through its layer.

  • MWL acts like a ‘transparent gateway’ on your system rather than like a ‘proxy gateway’


Real time content security solutions from microworld

Confidential Property

Real-time Content Security Solutions from MicroWorld

  • For Desktops and File Servers

    • eScan

  • For Mail Servers

    • MailScan

  • Firewall for both Desktops and Servers

    • eConceal

  • Anti Spam Solution

    • X-SPAM


Antivirus content security

Confidential Property

AntiVirus & Content Security

Presenting eScan Version 10....

.......A Robust Network Security Software

  • New User Friendly GUI

  • Faster On-Demand Scanning

  • Proactive Protection

  • Endpoint Security

  • Advanced Firewall

  • Asset Management

  • Web Protection

  • eScan Management Console


How to threat proof your network endpoints

Confidential Property

eScan Version 10 - GUI


How to threat proof your network endpoints

Confidential Property

Password Protection with read only access


Protection center file antivirus

Confidential Property

Protection Center – File AntiVirus


How to threat proof your network endpoints

Confidential Property

File Anti-Virus : Features

Features include:

  • New File Monitor (intelligent and Faster)

  • MWL Scanning

  • Real-Time AV Scanning

  • Application Control

  • Spyware, Adware, Keylogger, & Rootkit Blocker

  • Suspicious Application Detection

  • Registry Monitoring


Protection center mail antivirus

Confidential Property

Protection Center – Mail AntiVirus


How to threat proof your network endpoints

Confidential Property

Mail Anti-Virus : Features

Features include:

  • Real-Time eMail Scan

  • Anti-Spam (NILP, RBL, SURBL)

  • Password Protected settings

  • Application Control


How to threat proof your network endpoints

Confidential Property

Web Protection : Features

Features include:

  • Web/FTP/CHAT Scanning

  • Block websites with restricted words

  • Block web content (Multi-Media & Applications)

  • Block web applets, Cookies, Scripts

  • Block Pop-Ups

  • Time Restriction for Web access

  • MWL Scanning


Web filtering for business

Confidential Property

Web filtering for Business…


Web filtering for home users

Confidential Property

Web filtering for Home Users…


Web filtering features

Confidential Property

Web Filtering features ….


Econceal two way firewall

Confidential Property

eConceal – Two way Firewall


A robust network security software

Confidential Property

A Robust Network Security Software

  • Endpoint Security

    Endpoint Security prevents data thefts and virus infections through USB/ Firewire based portable devices such as Flash Drives, Pen Drives, Portable Hard Disks etc.

    Application Control allows to block/permit applications on the networks/personal systems. Suspicious files/applications can also be detected.


Endpoint security usb control

Confidential Property

Endpoint Security - USB Control


Application control

Confidential Property

Application Control


Privacy control

Confidential Property

Privacy Control


A robust network security software1

Confidential Property

A Robust Network Security Software

  • eScan Management Console

    The eScan Management Console (eMC) empowers system administrators to control from a central dashboard.

    System administrators can enforce an Integrated Security Policy across the network of an enterprise.

    eMC can also instantaneously display alerts about Live Applications, Live USB Detection and Live Site Browsing information.

    System administrators can get an overview about the bandwidth usage, type and time of internet access by the individual users of the network.

    Deploy Security measures such as updates of virus signatures & spam definitions. licenses, (un)installing and upgrading of eScan `remotely, enabling or disabling of the eScan monitor.


A robust network security software2

Confidential Property

A Robust Network Security Software

eScan Management Console

  • Create Security Policies (Rule Sets);

  • Administrative

  • Password

  • AntiSpam

  • Endpoint Security

  • Privacy Control

  • File AntiVirus

  • Web Protection

  • Firewalland many more…


How to threat proof your network endpoints

Confidential Property

eScan 10 Product Comparison


Escan 10 product comparison

Confidential Property

eScan 10 Product Comparison


Escan 10 product comparison1

Confidential Property

eScan 10 Product Comparison


Escan 10 product comparison2

Confidential Property

eScan 10 Product Comparison


Escan 10 product comparison3

Confidential Property

eScan 10 Product Comparison


Highly recommended by testing experts

Confidential Property

Highly recommended by Testing Experts


Thank you mornay viljoen managing director microworld technologies south africa

Confidential Property

THANK YOUMornay ViljoenManaging Director.MicroWorld Technologies South Africa


  • Login