90 likes | 106 Views
About Safend. Venture capital backed by: Experienced management team Top talent researchers and security experts Customers in the forefront of security awareness Selected as Red Herring Top 100 Company. Innovative Endpoint Security. Bluetooth. USB. Serial. WiFi. IrDA. GPRS. FireWire.
E N D
About Safend • Venture capital backed by: • Experienced management team • Top talent researchers and security experts • Customers in the forefront of security awareness • Selected as Red Herring Top 100 Company Innovative Endpoint Security
Bluetooth USB Serial WiFi IrDA GPRS FireWire Current Situation: Devices can connect to each PC – no visibility, no control Endpoints Info-sec Team
Understanding the Threat • 39% of USB drive owners use it to transfer files between home & work • “Data theft accounted for over $50B in losses [in 2004] in America alone.”- The Economist (6/18/2005) • “Poor information security has exposed personal information of over 50 million Americans so far in 2005”-The Economist (6/18/2005) • “50% of security incidents originate from within an organization.”–2005 FBI / CSI Computer Crime and Security Survey • “70% of security breaches that involve losses over $100,000 are perpetrated from inside the enterprise.”-- Vista Research • “HIPAA mandates removable media controls. We must prevent copying of corporate data to plug-and-play storage devices of all types.”Large Safend Health Care Customer
Visibility:Safend Auditor Security audit for all enterprise endpoints • Audit device connections through communication ports • Provide both current and historical data • Clientless, immediate use • Audit results clearly show pain-points and risk levels • Easy to use • Available free at www.safend.com
Control :Safend Protector Security shield for all enterprise endpoints • Enforce granular policies throughout the organizations • Unique protocol analysis based security • Tamper-resistant • Centrally managed, integrated with Active Directory • Easy to use • Lowest TCO
Endorsements • “Safend's USB Protector … is capable of addressing the different communication protocols at the endpoints, providing a policy-based solution that is flexible enough to mitigate risks while allowing legitimate use” IDC, January 2005 • “We are always very happy when something WORKS AS ADVERTISED!Very clean product…very impressed with the Auditor too.”CIO of hospital chain in Memphis • “[Safend’s] granularity of control is exactly what we were looking for in a solution.”Director of Desktop Security, Pharmaceutical Company • 5 stars from ZDNet Germany for the USB Auditor
Questions • What elements have to be considered to implement the solution? • What can be the main benefit for a company that uses this product? • Is there a product that competes with this one?