370 likes | 509 Views
How to Threat-Proof your Network Endpoints. Typical Corporate Network.
E N D
The stand-alone antivirus market has been replaced with a broader suite of defensive technologies supported by an extensible management platform that can include horizontal products, such as data protection and device management capabilities.
Confidential Property Where is the Risk ? • People Internal versus external • Network Eavesdropping • Computer System vulnerabilities Access control – (Users and Devices) Physical security
Confidential Property Top Security Threats • Compromised systems Used to scan/probe other systems to find entry for unauthorized access Used for denial of service attack • Spamming Systems used to send unsolicited emails • Computer Virus Mainly from PC via email attachment Virus Hoax Through Portable Storage devices like USB drives, Flash Cards, etc.
Confidential Property Most Vulnerable Areas at Endpoints • Usage of Portable Storage Devices • Usage of unauthorized Applications like Peer2Peer Software, File Sharing Software, Chat Software • External Vendors plugging into the network • Spam • Phishing Scams
Confidential Property Problems faced by system and network administrators • So many computers to look after by a few system/network administrators • Low budgets • Not enough training for both themselves and the users • Not enough time • Low user awareness on security
Confidential Property How to improve Network Security ? • Having a Security Policy for the network backed by a robust solution that can offer centralized management of the network security • General awareness of Network Security amongusers • Upgrading the skill of the system and network administrators • Sharing of network security information, knowledge and experience amongst system and network administrators
Confidential Property In business for 15 years. 10 offices worldwide. Developed patented technologies like MWL & NILP. Products available in 11 languages. Worldwide presence in 90 countries through channel partners. Supports Windows and Linux Platforms. 24 x 7 technical support. Local support office in South Africa.
Confidential Property MicroWorld Winsock Layer (MWL) • MWL scans all files, e-mails, attachments, websites, downloads & all possible e-contents passing through its layer. • MWL acts like a ‘transparent gateway’ on your system rather than like a ‘proxy gateway’
Confidential Property Real-time Content Security Solutions from MicroWorld • For Desktops and File Servers • eScan • For Mail Servers • MailScan • Firewall for both Desktops and Servers • eConceal • Anti Spam Solution • X-SPAM
Confidential Property AntiVirus & Content Security Presenting eScan Version 10.... .......A Robust Network Security Software • New User Friendly GUI • Faster On-Demand Scanning • Proactive Protection • Endpoint Security • Advanced Firewall • Asset Management • Web Protection • eScan Management Console
Confidential Property eScan Version 10 - GUI
Confidential Property Password Protection with read only access
Confidential Property Protection Center – File AntiVirus
Confidential Property File Anti-Virus : Features Features include: • New File Monitor (intelligent and Faster) • MWL Scanning • Real-Time AV Scanning • Application Control • Spyware, Adware, Keylogger, & Rootkit Blocker • Suspicious Application Detection • Registry Monitoring
Confidential Property Protection Center – Mail AntiVirus
Confidential Property Mail Anti-Virus : Features Features include: • Real-Time eMail Scan • Anti-Spam (NILP, RBL, SURBL) • Password Protected settings • Application Control
Confidential Property Web Protection : Features Features include: • Web/FTP/CHAT Scanning • Block websites with restricted words • Block web content (Multi-Media & Applications) • Block web applets, Cookies, Scripts • Block Pop-Ups • Time Restriction for Web access • MWL Scanning
Confidential Property Web filtering for Business…
Confidential Property Web filtering for Home Users…
Confidential Property Web Filtering features ….
Confidential Property eConceal – Two way Firewall
Confidential Property A Robust Network Security Software • Endpoint Security Endpoint Security prevents data thefts and virus infections through USB/ Firewire based portable devices such as Flash Drives, Pen Drives, Portable Hard Disks etc. Application Control allows to block/permit applications on the networks/personal systems. Suspicious files/applications can also be detected.
Confidential Property Endpoint Security - USB Control
Confidential Property Application Control
Confidential Property Privacy Control
Confidential Property A Robust Network Security Software • eScan Management Console The eScan Management Console (eMC) empowers system administrators to control from a central dashboard. System administrators can enforce an Integrated Security Policy across the network of an enterprise. eMC can also instantaneously display alerts about Live Applications, Live USB Detection and Live Site Browsing information. System administrators can get an overview about the bandwidth usage, type and time of internet access by the individual users of the network. Deploy Security measures such as updates of virus signatures & spam definitions. licenses, (un)installing and upgrading of eScan ` remotely, enabling or disabling of the eScan monitor.
Confidential Property A Robust Network Security Software eScan Management Console • Create Security Policies (Rule Sets); • Administrative • Password • AntiSpam • Endpoint Security • Privacy Control • File AntiVirus • Web Protection • Firewalland many more…
Confidential Property eScan 10 Product Comparison
Confidential Property eScan 10 Product Comparison
Confidential Property eScan 10 Product Comparison
Confidential Property eScan 10 Product Comparison
Confidential Property eScan 10 Product Comparison
Confidential Property Highly recommended by Testing Experts
Confidential Property THANK YOUMornay ViljoenManaging Director.MicroWorld Technologies South Africa