1 / 36

How to Threat-Proof your Network Endpoints

How to Threat-Proof your Network Endpoints. Typical Corporate Network.

tamira
Download Presentation

How to Threat-Proof your Network Endpoints

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How to Threat-Proof your Network Endpoints

  2. Typical Corporate Network

  3. The stand-alone antivirus market has been replaced with a broader suite of defensive technologies supported by an extensible management platform that can include horizontal products, such as data protection and device management capabilities.

  4. Confidential Property Where is the Risk ? • People Internal versus external • Network Eavesdropping • Computer System vulnerabilities Access control – (Users and Devices) Physical security

  5. Confidential Property Top Security Threats • Compromised systems Used to scan/probe other systems to find entry for unauthorized access Used for denial of service attack • Spamming Systems used to send unsolicited emails • Computer Virus Mainly from PC via email attachment Virus Hoax Through Portable Storage devices like USB drives, Flash Cards, etc.

  6. Confidential Property Most Vulnerable Areas at Endpoints • Usage of Portable Storage Devices • Usage of unauthorized Applications like Peer2Peer Software, File Sharing Software, Chat Software • External Vendors plugging into the network • Spam • Phishing Scams

  7. Confidential Property Problems faced by system and network administrators • So many computers to look after by a few system/network administrators • Low budgets • Not enough training for both themselves and the users • Not enough time • Low user awareness on security

  8. Confidential Property How to improve Network Security ? • Having a Security Policy for the network backed by a robust solution that can offer centralized management of the network security • General awareness of Network Security amongusers • Upgrading the skill of the system and network administrators • Sharing of network security information, knowledge and experience amongst system and network administrators

  9. Confidential Property In business for 15 years. 10 offices worldwide. Developed patented technologies like MWL & NILP. Products available in 11 languages. Worldwide presence in 90 countries through channel partners. Supports Windows and Linux Platforms. 24 x 7 technical support. Local support office in South Africa.

  10. Confidential Property MicroWorld Winsock Layer (MWL) • MWL scans all files, e-mails, attachments, websites, downloads & all possible e-contents passing through its layer. • MWL acts like a ‘transparent gateway’ on your system rather than like a ‘proxy gateway’

  11. Confidential Property Real-time Content Security Solutions from MicroWorld • For Desktops and File Servers • eScan • For Mail Servers • MailScan • Firewall for both Desktops and Servers • eConceal • Anti Spam Solution • X-SPAM

  12. Confidential Property AntiVirus & Content Security Presenting eScan Version 10.... .......A Robust Network Security Software • New User Friendly GUI • Faster On-Demand Scanning • Proactive Protection • Endpoint Security • Advanced Firewall • Asset Management • Web Protection • eScan Management Console

  13. Confidential Property eScan Version 10 - GUI

  14. Confidential Property Password Protection with read only access

  15. Confidential Property Protection Center – File AntiVirus

  16. Confidential Property File Anti-Virus : Features Features include: • New File Monitor (intelligent and Faster) • MWL Scanning • Real-Time AV Scanning • Application Control • Spyware, Adware, Keylogger, & Rootkit Blocker • Suspicious Application Detection • Registry Monitoring

  17. Confidential Property Protection Center – Mail AntiVirus

  18. Confidential Property Mail Anti-Virus : Features Features include: • Real-Time eMail Scan • Anti-Spam (NILP, RBL, SURBL) • Password Protected settings • Application Control

  19. Confidential Property Web Protection : Features Features include: • Web/FTP/CHAT Scanning • Block websites with restricted words • Block web content (Multi-Media & Applications) • Block web applets, Cookies, Scripts • Block Pop-Ups • Time Restriction for Web access • MWL Scanning

  20. Confidential Property Web filtering for Business…

  21. Confidential Property Web filtering for Home Users…

  22. Confidential Property Web Filtering features ….

  23. Confidential Property eConceal – Two way Firewall

  24. Confidential Property A Robust Network Security Software • Endpoint Security Endpoint Security prevents data thefts and virus infections through USB/ Firewire based portable devices such as Flash Drives, Pen Drives, Portable Hard Disks etc. Application Control allows to block/permit applications on the networks/personal systems. Suspicious files/applications can also be detected.

  25. Confidential Property Endpoint Security - USB Control

  26. Confidential Property Application Control

  27. Confidential Property Privacy Control

  28. Confidential Property A Robust Network Security Software • eScan Management Console The eScan Management Console (eMC) empowers system administrators to control from a central dashboard. System administrators can enforce an Integrated Security Policy across the network of an enterprise. eMC can also instantaneously display alerts about Live Applications, Live USB Detection and Live Site Browsing information. System administrators can get an overview about the bandwidth usage, type and time of internet access by the individual users of the network. Deploy Security measures such as updates of virus signatures & spam definitions. licenses, (un)installing and upgrading of eScan ` remotely, enabling or disabling of the eScan monitor.

  29. Confidential Property A Robust Network Security Software eScan Management Console • Create Security Policies (Rule Sets); • Administrative • Password • AntiSpam • Endpoint Security • Privacy Control • File AntiVirus • Web Protection • Firewalland many more…

  30. Confidential Property eScan 10 Product Comparison

  31. Confidential Property eScan 10 Product Comparison

  32. Confidential Property eScan 10 Product Comparison

  33. Confidential Property eScan 10 Product Comparison

  34. Confidential Property eScan 10 Product Comparison

  35. Confidential Property Highly recommended by Testing Experts

  36. Confidential Property THANK YOUMornay ViljoenManaging Director.MicroWorld Technologies South Africa

More Related