350 likes | 436 Views
Total Visibility and Control. InterGuard The only complete internal threat platform. Data Loss Prevention. Web Filtering. Employee Monitoring. Laptop Security. Total Visibility and Control. Who is Awareness Technologies?. Based in Los Angeles, CA Founded in 2002
E N D
Total Visibility and Control InterGuard The only complete internal threat platform Data Loss Prevention Web Filtering Employee Monitoring Laptop Security
Total Visibility and Control Who is Awareness Technologies? • Based in Los Angeles, CA • Founded in 2002 • Patented SaaS technology (Interguard) used by government and law enforcement agencies, financial service companies, banks, hospitals, schools, and more • Over 200,000 Total Users • Over 10,000 Corporate Customers
Total Visibility and Control What is InterGuard? Competition • Single Point Solutions • Multiple Vendors • Multiple User Interfaces • A complete internal threat prevention platform • Data Loss Prevention • Web Filtering • Simple SaaS Solution • Fast download to try, easy to buy • No hardware required • End-Point Architecture (next gen technology) • Works everywhere (unmatched control) • Sees everything (unmatched visibility) • Laptop Recovery • Employee Monitoring Complex Network Trials/Installs • Hardware Required Works only on network and can only capture specified traffic
Complete Internal Threat Platform Security 2000 - 2009 Viruses Hackers Company Network External Threats Spam Malware
Complete Internal Threat Platform Security 2000 - 2009 Viruses Hackers Anti-Virus Firewall Company Network Advent of UTM Anti-Malware Anti-Spam Spam Malware
Complete Internal Threat Platform Security 2010 and Beyond Viruses Hackers Anti-Virus Firewall ConfidentialData Company Network Company Network Internal threats are for more damaging LaptopTheft/Loss EmployeeProductivity Employee Errors& RegulatoryFailures Anti-Malware Anti-Spam Spam Malware
Complete Internal Threat Platform Security 2010 and Beyond Viruses Hackers DLP Anti-Virus Firewall ConfidentialData Company Network Company Network Single PointSolutions InterGuard LaptopTheft/Loss EmployeeProductivity Web Filtering Laptop Recovery Employee Errors& RegulatoryFailures Anti-Malware Anti-Spam Employee Monitoring Spam Malware
The Power of One Agent to Deploy User Interface Contract Bill Support Team
Simple, Complete SaaS Solution Simplicity Try, Buy, Install and Manage
Simple, Complete SaaS Solution INTERNET Easily download and installagents on each workstation ATI Data Center Employee On the Road Remote Employee Organization
Simple, Complete SaaS Solution INTERNET ATI Data Center Employeeon the Road RemoteEmployee Reporting Organization
Next Gen Technology – End-Point Architecture Vision Coverage Sees Everything Works Everywhere
Next Gen – Works Everywhere OLD WAY
Next Gen – Works Everywhere OLD WAY RemoteEmployee Employeeon the Road NO COVERAGE NO COVERAGE
Next Gen – Works Everywhere INTERGUARD WAY
Next Gen – Works Everywhere INTERGUARD WAY RemoteEmployee Employeeon the Road ALL WORKSTATIONS ARE COVERED – ON AND OFF NETWORK
Next Gen Technology – End-Point Architecture Vision Coverage Sees Everything Works Everywhere
Next Gen – Sees Everything Standard Web Filtering Is Web Browsing the only unproductive use of a computer? Web Browsing
Next Gen – Sees Everything Standard Web Filtering Web Browsing is just one piece of the pie Web Browsing
Next Gen – Sees Everything Next Generation Web Filtering Games File Sharing Web Browsing IM/Chat Media Player Personal Email Contextis Everything Business Email Microsoft Office
Next Gen – Sees Everything Standard Web Filtering Records: Does the list of blocked URLs tell the whole story? • Aim.com • Amazon.com • Careerbuilder.com • Ebay.com • Etrade.com • Gambling.com • Google.com • Hotjobs.com • Espn.com • Facebook.com, etc. List of URLs
Next Gen – Sees Everything InterGuard Records: Standard Web Filtering Records: List of URLS Screenshots: • Aim.com • Amazon.com • Careerbuilder.com • Ebay.com • Etrade.com, etc. • Aim.com • Amazon.com • Careerbuilder.com • Ebay.com • Etrade.com • Gambling.com • Google.com • Hotjobs.com • Espn.com • Facebook.com, etc. List of URLs List of Searches ESPN.com • Best ways to sue your employer • How to find a better job • Discount alcohol • How to beat a drug test • Best sick day excuses HotJobs.com
Next Gen – Sees Everything Standard Data Loss Prevention Prevention is just a small piece of the pie… Prevent
Next Gen – Sees Everything Standard Data Loss Prevention Are your policies perfect? Prevent If not, how would you know?
Next Gen – Sees Everything Standard Data Loss Prevention Do you know where your sensitive data is? Prevent Record
Next Gen – Sees Everything Standard Data Loss Prevention If information leaked, could you delete it? Prevention Record Discover
Next Gen – Sees Everything Standard Data Loss Prevention Can you retrieve the laptop if it is lost? Prevention Delete Record Discover
Next Gen – Sees Everything Next Generation Data Protection Locate/Disable Prevent Delete Record Discover
Total Visibility and Control Unique Technology with No Equal Next Steps • A complete internal threat prevention platform • Data Loss Prevention • Web Filtering • Simple SaaS Solution • Fast download to try, easy to install; no hardware • End-Point Architecture (next gen technology) • Works everywhere (unmatched control) • Sees everything (unmatched visibility) Data Loss Prevention • Laptop Recovery • Employee Monitoring Web Filtering Employee Monitoring Laptop Security
Total Visibility and Control Data Loss Prevention Screen all email (work and personal) and attachments for sensitive data and block if desired Protect from misuse or misappropriation of trade secrets, Non-Public Personal Information Control or stop use of removable media Block files, based on their content, from being copied to removable media Protect and enforce policies governing each employee’s computer use, including those that never connect to a network (even laptops) Easy, intuitive policy creation Coach and educate employees to adopt protocol and best practices for protecting company data Reports back to secure server over standard HTTPS protocols, instead of network Identify, track, and control who accesses your data, what data they access, and what they can and cannot do with that data
Total Visibility and Control Web Filtering Monitors and filters Internet use on and off the network (even on laptops) Blocks or limits applications like P2P, IM Screenshots taken whenever an alert word is typed or read on a webpage All Search Terms captured Works on and off network
Total Visibility and Control Employee Monitoring Works invisibly and undetectably at each desktop, without impacting central network computer resources Records all employee communications - Email (including. webmail) & Instant Messaging Monitors and filters Internet use on and off the network (even on laptops) Blocks or limits applications like P2P, IM Records and analyzes all keystroke activity, regardless of the application used Formats all data into easy-to-read reports, making it easy to find and evaluate critical security lapses Screenshots taken whenever an alert word is typed or read on a webpage Conclusive, actionable data hard-linked to a specific employee’s actions, with full individualized reporting on an employee’s computer activity
Total Visibility and Control Laptop Security Remotely retrieve important files invisibly, using any internet connection Remotely delete files or an entire hard drive Secure and confirm deletion to the highest Pentagon standard of unrecoverability Geo-locate the stolen laptop, in real-time over any internet connection, often with greater accuracy than GPS Monitor and control everything a thief does – every keystroke they type and file they access will be visable Lock down laptop after disappearance so files can’t be accessed