multpoint ltd.company overview 2014 3214 short version
DESCRIPTION
In short what we do at MultiPoint.TRANSCRIPT
Technology Distribution
2014
About MultiPoint
• MultiPoint was founded in April 2009• Managed by Arie Wolman and Ricardo Resnik• A Distributor of Security & Networking Software• Main exclusive product lines:― GFI Software, SpectorSoft, Centrify, IronKey,
Winmagic, GFI MAX, Sandbox, Data Point, etc.― Certified, Qualified and Credible Technical team― Value Added for the Channel and the End-Users
alike
Customers
Network Security
• Security Scanning & Detection
• Network & SW Audit• End-Point Security• Email & Web Protection
Access Control
• Single Sign On• Network Access Control• Device Control• Application Control
Confidentiality
Compliance
Business Continuity
• Disk Encryption• Data in-Transit• Email Encryption
• Reporting• Auditing• SIM/SEM – Event Mgt
• Archiving• Data & System Backup• Disaster Recovery• Monitoring & Reporting
Risk Assessment
• Vulnerability Assessment• Patch & Remediation• Risk Management• Critical Assets & Network
RiskIT SecurityComponents
Solutions
Main Vendors
On-premise and SaaS/cloud
GFI on-premise catalogue GFI MSP/GFI Cloud platform
Remote access/Collaboration
Patch management
Vulnerability assessment
Email management, security, filtering
Email archiving
Mobile device management
Web monitoring
Anti-malware
Network monitoring
Monitoring
Patch management
Mobile device management
Anti-malware
Assetmanagement
Remoteaccess
Storage
GFI delivers software solutions to customers however they want it
Vulnerability assessment
2FA with SMS from SecurEnvoy
New “Voice Call” token option: users receive a landline-based telephone call and enter a passcode on the telephone key pad More user control: switch seamlessly between SMS delivery options, select soft token app on all leading smart phones and laptops or select the new voice call token type. Multi SMS Gateway with smart global routing permits the specifying of an unlimited number of SMS providers world wide Support for third party SMS Gateways that are e-mail based Improved cloud and multi-domain configurations with “per domain settings” for all major settings New “Token Type” section: allows administrator to specifying which types of token can be used New Soft Token for Apple Mac computers
WinMagic Encryption
Data Motion SecureMail
The Most Advanced Monitoring Software
Discreet snapshot or sequential recording of all employee screen activities, files touched & keystrokes typed
Identify trends and patterns of behavior across company, department, group or individual
Find anything , including files touched, emails sent or received, websites visited, IM chats and keywords
Forensic level investigation. What, who and when? What’s happening now? What’s already happened? Contextual recording – before, during and after.
Set-up automatic alerts, fully customisable and powerful reporting functionality, automatic management reporting
Centralised Management
• Monitor
• Analyse
• Search
• Investigate
• Report
Centrify Suite
Single Sign-Onמודולים לאפליקציות
• Apache and J2EE web applications• SAP NetWeaver & GUI• DB2
Centrify ניידים למכשירים• IOS• Android
Centrify Insight
Splunk-based analytics solutions
EXPRESS STANDARD ENTERPRISE PLATINUM
DirectSecureהעברת בזמן שרתים של והגנה בידודהמידע
DirectAuditמשתמש פעילות על מפורטת ביקורת
DirectAuthorizeתפקידים מבוססות הרשאות
DirectControlמרכזי וגישה הזדהות ניהול
DirectManageמרכזי ואדמיניסטרציה ניהול
The IronKey family
IRONKEY H100 EXTERNAL HDD
IRONKEY WORKSPACE IRONKEY SECURE S250 AND D250 DRIVES
IRONKEY F200 BIOMETRIC FLASH DRIVES
IRONKEY H80 EXTERNAL HDD
Ironkey D80
IRONKEY D80 HARDWARE ENCRYPTED FLASH DRIVE Strong, enterprise-grade AES 256-bit encryption Always-on hardware encryption Encryption happens inside the drive and the key never leaves the drive. Tough, durable, tamper-resistant enclosure Longer life, high-quality flash memory Smart, self-defending IronKey drive automatically reformats after 7 failed logins
PROTECT YOUR MOST SENSITIVE DATA We live and work in a mobile world, and you need to make sure your data is always available no matter where you go. But you can’t entrust your most sensitive and confidential information to just any flash drive. A poorly made drive won’t stand up to heavy use or break-in attempts, and drives selected on price alone could leave your valuable information vulnerable to corruption, infection or theft. For an easy-to-use and reliable way to protect your most sensitive data, turn to the IronKey D80 Hardware Encrypted Flash Drive. Even if the drive is lost or stolen, your confidential information will remain safeguarded
Value Added Distributor
Value Resellers
Added
VAD We sell only to resellers and system integrators
Presales assistanceDeal protectionRenewal AlertsTech Support
Sales CertificationOnline Technical TrainingBig discounts and rebates Lead generation
Telemarketing