how to threat proof your network endpoints
Download
Skip this Video
Download Presentation
How to Threat-Proof your Network Endpoints

Loading in 2 Seconds...

play fullscreen
1 / 36

How to Threat-Proof your Network Endpoints - PowerPoint PPT Presentation


  • 98 Views
  • Uploaded on

How to Threat-Proof your Network Endpoints. Typical Corporate Network.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'How to Threat-Proof your Network Endpoints' - tamira


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide3
The stand-alone antivirus market has been replaced with a broader suite of defensive technologies supported by an extensible management platform that can include horizontal products, such as data protection and device management capabilities.
where is the risk
Confidential PropertyWhere is the Risk ?
  • People

Internal versus external

  • Network

Eavesdropping

  • Computer

System vulnerabilities

Access control – (Users and Devices)

Physical security

top security threats
Confidential PropertyTop Security Threats
  • Compromised systems

Used to scan/probe other systems to find entry for unauthorized access

Used for denial of service attack

  • Spamming

Systems used to send unsolicited emails

  • Computer Virus

Mainly from PC via email attachment

Virus Hoax

Through Portable Storage devices like USB drives, Flash Cards, etc.

most vulnerable areas at endpoints
Confidential PropertyMost Vulnerable Areas at Endpoints
  • Usage of Portable Storage Devices
  • Usage of unauthorized Applications like Peer2Peer Software, File Sharing Software, Chat Software
  • External Vendors plugging into the network
  • Spam
  • Phishing Scams
problems faced by system and network administrators
Confidential PropertyProblems faced by system and network administrators
  • So many computers to look after by a few system/network administrators
  • Low budgets
  • Not enough training for both themselves and the users
  • Not enough time
  • Low user awareness on security
how to improve network security
Confidential PropertyHow to improve Network Security ?
  • Having a Security Policy for the network backed by a robust solution that can offer centralized management of the network security
  • General awareness of Network Security amongusers
  • Upgrading the skill of the system and network administrators
  • Sharing of network security information, knowledge and experience amongst system and network administrators
slide9
Confidential Property

In business for 15 years.

10 offices worldwide.

Developed patented technologies like MWL & NILP.

Products available in 11 languages.

Worldwide presence in 90 countries through channel partners.

Supports Windows and Linux Platforms.

24 x 7 technical support.

Local support office in South Africa.

microworld winsock layer mwl
Confidential PropertyMicroWorld Winsock Layer (MWL)
  • MWL scans all files, e-mails, attachments, websites, downloads & all possible e-contents passing through its layer.
  • MWL acts like a ‘transparent gateway’ on your system rather than like a ‘proxy gateway’
real time content security solutions from microworld
Confidential PropertyReal-time Content Security Solutions from MicroWorld
  • For Desktops and File Servers
    • eScan
  • For Mail Servers
    • MailScan
  • Firewall for both Desktops and Servers
    • eConceal
  • Anti Spam Solution
    • X-SPAM
antivirus content security
Confidential PropertyAntiVirus & Content Security

Presenting eScan Version 10....

.......A Robust Network Security Software

  • New User Friendly GUI
  • Faster On-Demand Scanning
  • Proactive Protection
  • Endpoint Security
  • Advanced Firewall
  • Asset Management
  • Web Protection
  • eScan Management Console
slide13
Confidential Property

eScan Version 10 - GUI

slide14
Confidential Property

Password Protection with read only access

slide16
Confidential Property

File Anti-Virus : Features

Features include:

  • New File Monitor (intelligent and Faster)
  • MWL Scanning
  • Real-Time AV Scanning
  • Application Control
  • Spyware, Adware, Keylogger, & Rootkit Blocker
  • Suspicious Application Detection
  • Registry Monitoring
slide18
Confidential Property

Mail Anti-Virus : Features

Features include:

  • Real-Time eMail Scan
  • Anti-Spam (NILP, RBL, SURBL)
  • Password Protected settings
  • Application Control
slide19
Confidential Property

Web Protection : Features

Features include:

  • Web/FTP/CHAT Scanning
  • Block websites with restricted words
  • Block web content (Multi-Media & Applications)
  • Block web applets, Cookies, Scripts
  • Block Pop-Ups
  • Time Restriction for Web access
  • MWL Scanning
a robust network security software
Confidential PropertyA Robust Network Security Software
  • Endpoint Security

Endpoint Security prevents data thefts and virus infections through USB/ Firewire based portable devices such as Flash Drives, Pen Drives, Portable Hard Disks etc.

Application Control allows to block/permit applications on the networks/personal systems. Suspicious files/applications can also be detected.

a robust network security software1
Confidential PropertyA Robust Network Security Software
  • eScan Management Console

The eScan Management Console (eMC) empowers system administrators to control from a central dashboard.

System administrators can enforce an Integrated Security Policy across the network of an enterprise.

eMC can also instantaneously display alerts about Live Applications, Live USB Detection and Live Site Browsing information.

System administrators can get an overview about the bandwidth usage, type and time of internet access by the individual users of the network.

Deploy Security measures such as updates of virus signatures & spam definitions. licenses, (un)installing and upgrading of eScan ` remotely, enabling or disabling of the eScan monitor.

a robust network security software2
Confidential PropertyA Robust Network Security Software

eScan Management Console

  • Create Security Policies (Rule Sets);
  • Administrative
  • Password
  • AntiSpam
  • Endpoint Security
  • Privacy Control
  • File AntiVirus
  • Web Protection
  • Firewalland many more…
slide30
Confidential Property

eScan 10 Product Comparison

ad