modern threats require - 2o infocom security cyprus...12th annual info security pg's 2016...
TRANSCRIPT
![Page 1: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/1.jpg)
Modern ThreatsrequireSmart security!
![Page 2: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/2.jpg)
Business and the Internet
The Internetis the Viagra of big business.
- Jack Welch -
Internet «run» with a growth rate of 1,104 % from 2000 to 2019.
At the same it gave a huge boost to global business by giving an easy and direct access to every market.
Πηγή: internetworldstats.com
![Page 3: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/3.jpg)
In 2019 the Internet is an
indispensable part of global business
and not just another contemporary
medium or tool.
If your business is not on the Internet,Then your business will be out of business.
- Bill Gates -
Business and the Internet
![Page 4: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/4.jpg)
So, we can use the Internet in our business
as much as possible, with no problem
whatsoever.
Right?
Business and the Internet
![Page 5: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/5.jpg)
Not really!
Business and the Internet
![Page 6: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/6.jpg)
Modern Threats
The Internet is not a digital paradise!
The very same medium that makes our work easier, can become our worst nightmare if we don’t protect our business against cyber-attacks!
![Page 7: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/7.jpg)
Modern Threats: Attacks & Hackers
Hackers have developed many methods to launch their attacks.
• Viruses & trojans • Spamming• Malware • Spyware• Adware • Phishing• Social Engineering
![Page 8: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/8.jpg)
Modern Threats: Public WiFi
We can very well do our work in a caféor a hotel lobby these days.
But we may get in big trouble if we connect to a public WiFi!
• Man-in-the-Middle attacks• Unencrypted Networks• Malware• Snooping και sniffing• Malicious hotspots
![Page 9: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/9.jpg)
Modern Threats: Smartphones & ΙoΤ
Introducing smart devices in the workplace, made the dangers of security breach even bigger.
The data exchange through wireless connections and emails using smartphones, is already in the sight ofhackers.
![Page 10: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/10.jpg)
A person may be the weakest link in the chain that is security.
Our Bad habits can harm our network security!
• Easy or weak password• Use of pirate software• Insufficient or rare Backup• Exposed personal data
Modern Threats: The people factor
![Page 11: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/11.jpg)
Η έξυπνη προστασία!
Δε χρειάζεται να υπερβάλουμε, αλλά είναι απαραίτητο να προστατέψουμε την επιχείρησή μας αποτελεσματικά.
Με τις απειλές να γίνεται ολοένα πιο έξυπνες, θα πρέπει κι εμείς…
…να βρούμε την πιο έξυπνη λύση!
![Page 12: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/12.jpg)
Smart Security!
UTM Firewall
EndpointSecurity
DLP
DataEncryption
MobileSecurity
CloudSecurity
AntiRansomware
![Page 13: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/13.jpg)
Smart Security!
A simple and complete platform.
EndpointSecurity
Data Loss Prevention
Ransomware Protection
Web Filtering
Application Control
Asset Management
Vulnerability Scan
Patch Management
Advanced Device Control
File Activity Monitor
IDS / IPS Protection
![Page 14: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/14.jpg)
Smart Security!EndpointSecurity
Group Policy Management
Spam Protection
Third-party Antivirus Removal
Browsing Protection
Phishing Protection
Firewall Protection
Tuneup
Multiple Update Managers
Roaming Platform
Email and SMS Notifications
A simple an complete platform.
![Page 15: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/15.jpg)
Smart Security!
A clutch tool for secure sensitive data.
Manages sensitive files according to set policies.
Monitors files that include sensitive data.
Oversees, protects and reports anything relevant to sensitive data.
DLP EndpointSecurity
![Page 16: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/16.jpg)
DLP
At-Rest scanScans on schedule or on demand for any new files containing sensitive data that might have entered our Network.
Facts:• Sensitive data may derive from new
policies.• Email addresses are sensitive data.
EndpointSecurity
Smart Security!
A clutch tool for secure sensitive data.
![Page 17: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/17.jpg)
Smart Security!
Keeps malicious software off!
AntiRansomware
Behavioral analysis: A.I. that detects the «unusual» behavior of an app/malware and proceeds to actions.
DNA Scan: A deep file scan that finds malicious code without signatures.
Backup: All user files are backed up, encrypted and stored in the same drive and are accessible only via a special decryption key from SEQRITE.
EndpointSecurity
![Page 18: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/18.jpg)
Smart Security!
A malware hunting engine that combines impressive features with deep scanning
EndpointSecurity
![Page 19: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/19.jpg)
Smart Security!
Advanced Behavior Detection SystemMonitors all apps and blocks whichever behaves in a pattern similar to a malware’s.
DNA ScanA boot time scan that detects and fixes infected system files. It uses minimum resources and it is very effective even withZero Day attacks.
Cloud Based Deep Learning ModuleLearns and remembers every malware threat there is and stores the archive in the cloud.
EndpointSecurity
![Page 20: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/20.jpg)
Smart Security!
Multilayered DefenseCombines Α.Ι. with anti-key logger for a better defense against ransomware and malware.
Seed AnalysisRecognizes possible threats, their origins, their severity and the damage they may inflict, and neutralizes them before they act.
EndpointSecurity
![Page 21: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/21.jpg)
Smart Security!Data
EncryptionPowerful encryption algorithms.
Full Encryption of Removable Disks, SD cards, Flash drives etc.
Traveler Tool
Full Disk Encryption that ensures unbreachable data even in the case of physical loss of the disk.FDE
![Page 22: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/22.jpg)
Smart Security!Mobile
SecurityMobile productivity without limitations.
![Page 23: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/23.jpg)
Smart Security!Mobile
Security
Device ManagementCentral management console for all mobile devices.
Security ManagementEffective security and anti-theft.
App ManagementRemote app management of every device.
Data Monitoring & ManagementControls and issues user permissions based on geolocation.
![Page 24: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/24.jpg)
Smart Security!Mobile
Security
Email ClientSecure and complete with attachments, links and antivirus.
Secure BrowserWith military grade encryption and audit-compliant container.
Email ContactsSecure contacts list Global Address List (GAL)
Notes & CalendarWith secure access only through MobiSMART.
![Page 25: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/25.jpg)
Smart Security!
Διανέμει και προσαρμόζει ιδανικά το bandwidthκαι το traffic του δικτύου σε πραγματικό χρόνο ανταλλάσσοντας ευαίσθητα δεδομένα μόνο με συγκεκριμένες ασφαλείς συνδέσεις.
Προστατεύει το σύστημα με gateway antivirus, gateway mail protection, firewall και δυνατότητα DLPσε επίπεδο αρχείων ανά χρήστη ή ομάδα.
Καλύπτει και ελέγχει διαρροές σε επίπεδο περιμέτρου.
UTM Firewall
![Page 26: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/26.jpg)
Smart Security!
Stops and controls leeks on perimeter level.
UTM Firewall
Gateway Antivirus & Mail Protection
IDS & IPS
URL Filtering
IT Policy Management
Application Control
Load Balancing
VPN
Firewall Protection
Automatic Link Failover
Bandwidth Manager
![Page 27: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/27.jpg)
Smart Security!
Secure management of all Endpoints and UTM from the cloud.
CloudSecurity
Single Management Console
Global implementation of enterprise policies.
Multi-level Administration
Manage Product Users
Detailed Reports and notifications
Backup και restore
![Page 28: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/28.jpg)
Why SEQRITE?
A world-class Enterprise Security brand defined by innovationand simplicity. SEQRITE solutions combine value for moneywith effective security that is light on the systems.
20 years history of research and development.
Over 7 million activeLicenses in 80 countries.
More than 1300employees in 36 cities
worldwide.
16.9% year-on-yeargrowth rate the last 3 years.
![Page 29: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/29.jpg)
Seqrite Endpoint Security (v.7.2) rated 'Top Product' by AV-TEST.
Seqrite Endpoint Security (v.16) for Windows.
Seqrite Endpoint Security v7.2 receives BEST+++ certification from AVLab.
Seqrite Endpoint Security (EPS) Enterprise Suite Edition v.7.0.
Seqrite Endpoint Security (v.15 and v.16) for Windows.
12th Annual Info Security PG's 2016 Global Excellence Awards, USA.
IMC Information Technology Award 2015.
2016 Excellence in Information Security Testing Award.
Why SEQRITE?
![Page 30: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/30.jpg)
Phone
Online chat
Support ticket
Free technical support in real time for all active product license customers:
Why SEQRITE?
![Page 31: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/31.jpg)
Brought to you by PartnerNET
The complete network security solution Of SEQRITE is brought to Europe
Exclusively by PartnerNET.
![Page 32: Modern Threats require - 2o InfoCom Security Cyprus...12th Annual Info Security PG's 2016 Global Excellence Awards, USA. IMC Information Technology Award 2015. 2016 Excellence in Information](https://reader035.vdocument.in/reader035/viewer/2022071107/5fe1c8706186f92dfd1959cc/html5/thumbnails/32.jpg)
Thank you!