270 likes | 288 Views
Insert title here. December 11, 2018. Color Palette Example. New Template Table. To Add or remove banded rows. Icon Fields 5. Icon descriptor with two lines of text max. Icon descriptor with two lines of text max. Icon descriptor with two lines of text max.
E N D
Insert title here December 11, 2018
Color Palette Example Proprietary & Confidential
New Template Table To Add or remove banded rows Proprietary & Confidential
Icon Fields 5 Icon descriptor with two lines of text max Icon descriptor with two lines of text max Icon descriptor with two lines of text max Icon descriptor with two lines of text max Icon descriptor with two lines of text max Proprietary & Confidential
Section Divider Subtitle Proprietary & Confidential
Images The images in this presentation are currently in the Slide Master and can be changed there. For more imagery please visit: https://www.dropbox.com/sh/26ui0pamxn6d1vb/AAALGr9Z33HWBX9KArMB-73_a?dl=0
Quadrant Color Layout with Photo Proprietary & Confidential
4 Box Layout Visibility • Can’t verify what’s on the corporate network • Endpoint compliance gaps enable malware, IoT, breach risks Scalability & Reliability • Load balancing complexity hinders scale • Unable to dynamically shift access to IT services in emergency User Experience • Multiple security clients frustrate users (and IT) • Multiple logins & access points impede user productivity Compliance • Can’t consistently apply access protection by role, device, app • BYOD smartphones cause data leakage Proprietary & Confidential
4 Box Layout 2 • Insert Text • Insert Text • Insert Text • Insert Text Proprietary & Confidential
Quadrant Icon Layout • Insert Text • Insert Text • Insert Text • Insert Text Proprietary & Confidential
Example Protect against WannaCry and other ransomware with “comply to connect” hostchecking Enforce compliance via Always-on VPN policy with lockdown Secure BYOD and corporate-owned mobile devices without EMM complexity Extend data center access security to Office 365 and other SaaS applications Proprietary & Confidential
Quadrant Color Layout • Insert Text • Insert Text • Insert Text • Insert Text Proprietary & Confidential
Quadrant Gray Layout • Insert Text • Insert Text • Insert Text • Insert Text Proprietary & Confidential
2 Column Image Layout € Subtitle for section Auditable Security (Article 32)Organizations must implement policy-based and auditable security controls for every user and system that has access to personal data Data Breach Notification (Article 34)Organizations must quickly communicate the nature of the breach and who was affected Financial Penalties Organizations in breach of GDPR may be fined up to 4% of annual global turnover or €20 Million Proprietary & Confidential
Implementing Article 32 Controls • Strong user authentication and authorization • Protected connectivity between users, devices, applications and data stores • Compliance checking and reporting • Mobile containers and device security • Consistent policy enforcement across mobile devices, on premise equipment, and in cloud-based systems • An active, retained and consistently utilized audit trail Proprietary & Confidential
Blank Image Container • Insert Text Proprietary & Confidential
5 Grid Layout with Image title title title title title Proprietary & Confidential Insert Text Insert Text Insert Text Insert Text Insert Text
Large Point Slide Insert Text Proprietary & Confidential
Secure Access Portfolio • Pulse Connect Secure • VPN, EndpointCompliance • Pulse Policy Secure • Visibility, NAC • Pulse Workspace • Mobile Device Access & Compliance • Pulse vADC • Application Delivery Control • Pulse One • Centralized Management Proprietary & Confidential
Chart Example Proprietary & Confidential
Light Content Slide Subtitle Proprietary & Confidential
Pie Chart Example Add 5th level Lorem ipsum dolor sit amet, sea easolutafabulasblandit. Ferriepicuri ne sed, usu id consul singuliseleifend. Eos meis postulant no, his sintcotidieque ne. Ne suscipitliberavisseeam. Necmutatvivendo nostrum et. Ad vim veritussensibuspericulis, sedeuomnesqueantiopam. Proprietary & Confidential
Chart Example 1 Proprietary & Confidential
Chart Example 2 Proprietary & Confidential
This is a Video Slide. In my opinion all videos should be as full screen as possible to give a more cinematic effect. A dark background allows the video can give more of a letterbox look. Proprietary & Confidential
Grid Layouts Proprietary & Confidential
Questions? Proprietary & Confidential