1 / 13

Cloud Security for Endpoints Customer Presentation

Cloud Security for Endpoints Customer Presentation. Traditional security pitfalls. On-premise management server complexities Too cumbersome for organizations that lack servers and IT staff Costs extend beyond the AV solution license

Download Presentation

Cloud Security for Endpoints Customer Presentation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cloud Security for Endpoints Customer Presentation

  2. Traditional security pitfalls • On-premise management server complexities • Too cumbersome for organizations that lack servers and IT staff • Costs extend beyond the AV solution license • Visible costs - server hardware, dedicated IT to maintain onsite architecture • Hidden costs - server licensing and power, maintenance downtime • Lack of flexibility • Lack of easy support for remote users or offices

  3. Cloud Security for Endpoints by Bitdefender • Local scanning and hosted management console • Eliminates the complexity of onsite architecture, frees IT time and enables even less technical users to manage the solution • Cost-effective protection • Single subscription fee, no upfront costs • Reduce security costs as servers are hosted and maintained by the service provider • Single console for real time control of all remote users or offices • Best antimalware protection according to AV-Test reviews in 2011

  4. Readily available security service and web based administration • Cloud-based architecture • Security console available within minutes, no server installation and configuration required • Simple and fast to deploy protection remotely from the console • Intuitive security administration • Pre-configured policy templates • After deployment, only effort is to monitor security reports • Solution does not require advanced IT skills to administer

  5. Simplified security infrastructure generates immediate savings • Based on a hosted architecture, Cloud Security for Endpoints eliminates the following costs: • Server hardware • Server licenses, power and maintenance • Deployment and configuration of the onsite management component • Regular maintenance • Manual updates

  6. Centralized control of security for remote users and offices • Control all sites and roaming users in a single console • Enhanced security with real time control for the increasingly mobile workforce • Minimize IT travel costs • Highly efficient for geographically dispersed organizations Site 1 Site 2 Servers hosted and maintained in service provider cloud Company site Protect and manage all remote users or offices Mgt. Console

  7. Number-one-ranked antimalware technologies • Proactive defense against a wide array of threats • Stop viruses, spyware, trojans, worms, rootkits • Site advisor, antiphishing and data theft protection • Two way personal firewall with intrusion detection • Highest awards from the top independent testing organizations • AV-Test Best Protection 2011 and all 2012 testing rounds to date • AV-Comparatives highest protection rate in July 2012

  8. Value propositions • Enterprise-level security without complex onsite architecture • Cloud-based architecture eliminates onsite server and maintenance costs • Efficient and simple management of remote users and offices from a single console • Added value – besides regular antimalware features, also included are web filtering, antiphishing, user control and productivity modules • Improve security using number-one ranked security technologies

  9. Case study – Ideal Integrations • Profile • IT system integration company, clients ranging from SMB to VLE • Problem • Inefficient to deploy and manage security, using separate on-premise systems for each customer • Solution • Hosted deployment Cloud Security for Endpoints • Free up internal resources using centralized security management • Added flexibility and simplified customer licensing

  10. Features Cloud hosted central management console and local scanning Configurable security policies and reports per user, group, or company Antimalware, antiphishing and Internet protection for desktop, laptop and server endpoints Detects and uninstalls competing antimalware solutions Remote deployment and real-time control and monitoring of all systems no matter where they are located Productivity module that enables the administrator to control or restrict internet access or access to certain applications

  11. Key differentiators • Bitdefender technology is consistently ranked #1 • Bitdefender tops tests conducted by the top independent agencies • Other companies usually boast sporadic, older or less trusted tests • Unique console for all security needs • Simplified central management of all modules in a single console • More value • Not just antimalware but also firewall and IDS for web protection • Additional web control and productivity features also included

  12. Licensing • Free trial: 30 day period, after which product ceases to function • Subscriptions for 1 / 2 / 3 year models. • Special discounts apply for education, government, competitive upgrade and renewal • Licenses per endpoint (same price for server or workstation)

  13. Twitter: @virt_sec LinkedIn: www.linkedin.com/bitdefenderenterprise

More Related