ttaallkk ttoo rreennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · security products are a key...

14
__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410 The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on Complete Endpoint Protection • Web Security • Web Protection • Email Security / Encryption • Email archiving • UTM - Unified Threat Management • Encryption • Secure Storage Scalable Storage • Managed Security Services • Mobile Security Y Y O O U U R R D D A A T T A A S S E E C C U U R R I I T T Y Y P P A A R R T T N N E E R R S S Renaissance delivers data security solutions for Irish businesses, giving the protection and assurances needed to keep their IT environment safe and secure. Security products are a key element of an IT/data security policy and strategy. Process and policies are key to the delivery of a secure IT/data infrastructure. Our focus is to help you protect your organisation and data. T T a a l l k k t t o o R R e e n n a a i i s s s s a a n n c c e e t t o o d d a a y y , , t t o o d d i i s s c c u u s s s s h h o o w w w w e e c c a a n n h h e e l l p p y y o o u u w w i i t t h h y y o o u u r r d d a a t t a a s s e e c c u u r r i i t t y y n n e e e e d d s s . .

Upload: others

Post on 20-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · Security products are a key element of an IT/data security policy and strategy. Process and policies are key to

__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410

The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on

• Complete Endpoint Protection • Web Security • Web Protection • Email Security / Encryption • Email archiving • UTM - Unified Threat Management • Encryption • Secure Storage

Scalable Storage • Managed Security Services • Mobile Security

YYYOOOUUURRR DDDAAATTTAAA SSSEEECCCUUURRRIIITTTYYY PPPAAARRRTTTNNNEEERRRSSS

Renaissance delivers data security solutions for Irish businesses, giving the protection and

assurances needed to keep their IT environment safe and secure.

Security products are a key element of an IT/data security policy and strategy.

Process and policies are key to the delivery of a secure IT/data infrastructure.

Our focus is to help you protect your organisation and data.

TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ddiissccuussss hhooww wwee

ccaann hheellpp yyoouu wwiitthh yyoouurr ddaattaa sseeccuurriittyy nneeeeddss..

Page 2: TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · Security products are a key element of an IT/data security policy and strategy. Process and policies are key to

__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410

The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on

www.sophos.com

Sophos is the leading developer of integrated centrally deployed and managed security solutions

IT security is becoming more and more complex, with new challenges like smartphones and tablets as well as cloud storage, an ever increasing array of security products to manage and new apps to monitor, and ever more devious malware and hackers. Unfortunately, IT teams and IT security budgets are not growing at the same rate—something has to give.

Network Protection

Unified Threat Management The ultimate network security package.

Secure VPN Turn any location into a secure location.

Web Protection Complete web protection everywhere.

Web Application Firewall Uncommon protection from common threats.

Next-Generation Firewall This is where network threats go to die.

Secure Wi-Fi Super secure, super Wi-Fi.

Secure Email Gateway Simple protection for a complex problem.

Who Needs This Sophos UTM helps you consolidate your security without compromising its effectiveness. It’s security made simple, protecting your users everywhere while making security easier to deploy and manage. What's Protected? All computers, mobile devices and servers on a network Branch offices and remote users connected with VPN Email and web servers and even Wi-Fi users

Page 3: TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · Security products are a key element of an IT/data security policy and strategy. Process and policies are key to

__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410

The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on

End-user Protection

Endpoint Security Antivirus The all-in-one security suite. SafeGuard Encryption Encryption everywhere. Mobile Control Countless devices, one solution.

Server Protection

Server Security Pro-server. Anti-virus. Network Storage Antivirus High-tech security for high-tech storage. PureMessage Good news for you. Bad news for spam.

Who Needs This

Our endpoint protection will keep data in and malware out—all within your antivirus budget. And we protect your mobile devices and servers.

What's Protected?

All computers, mobile devices, and servers on a network.

Encryption for devices and file shares.

Mobile devices and laptops on the go

Who Needs This

Our antivirus protection delivers more effective, faster protection across your network of physical or virtual servers.

What's Protected?

Broad platform support for Windows, UNIX and Linux servers.

Small memory footprint won’t slow you down. Our antivirus agent has low performance impact, and is optimized for virtualization.

HIPS protection for Windows is easy to deploy and manage.

Page 4: TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · Security products are a key element of an IT/data security policy and strategy. Process and policies are key to

__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410

The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on

www.trustwave.com

Smart Security On Demand

Trustwave delivers Data Security products and Managed Security services through the channel. Trustwave is the leading provider of on-demand data security and payment card industry compliance management solutions to businesses and organizations throughout the world. Trustwave has helped thousands of organisations manage compliance and secure their network infrastructure, data communications and critical information assets.

Products cover Mandates cover Managed Services cover

Application Security

Data Security

E-Mail Security

Big Data

Web Security

PCI Compliance

HIPAA Compliance

Data Privacy

ISO Compliance

SOX Compliance

SIEM Encryption Two Factor

Authentication Web Application Firewall NAC

www.egress.com

Email Encryption Software Egress operates in a market defined by compliance yet driven by convenience. Consequently, this modern day security paradox has led to confidential information being transferred electronically without appropriate protection. As a result, personal data is frequently lost or mishandled, exposing organisations and individuals to costly fines and damaged reputations.

Security Made Easy Desktop Encryption Gateway Encryption Automated Encryption

Page 5: TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · Security products are a key element of an IT/data security policy and strategy. Process and policies are key to

__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410

The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on

www.fastvue.co

www.clearmail.ie

Cloud Email Management If you need email redirected, copied, blind copied, encrypted, signed, stored and indexed, made available remotely, transformed with the company branding and marketing message, copied into your Salesforce service, and practically any other thing you can imagine wanting to do with your email, then ClearMail can help. ClearMail’s cloud based service is renowned for accuracy and resilience. The service is provided through a global network of data centres with strict security protocols in place for local data protection law.

Email security service which filters your email for spam and viruses. Email continuity service keeps your employees working even if the email service is

down. Email archiving service - from a company repository of email easily retrieve any

emails you may need to re-discover. Web security service a browsing protection service for all users, no matter where. Private Email Networks service providing an encrypted email connections Brand and Sign service transforms your email signatures to include marketing

Sophos Reporter is your new go-to application for reporting on bandwidth, employee productivity and current web based threats.

Designed by Fastvue, exclusively for

UTM

Know Your Network Easily investigate bandwidth, Internet misuse, and other network issues. Inform other automatically Delegate responsibility to department managers with automated reports sent to the right person Save Time: One application for all your log-reporting needs

The fastest and easiest way to report on

Microsoft Threat Management Gateway

Page 6: TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · Security products are a key element of an IT/data security policy and strategy. Process and policies are key to

__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410

The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on

www.securenvoy.com

The Inventors of Tokenless® Authentication SecurEnvoy is the trusted global leader of tokenless® two-factor authentication. As the pioneers of mobile phone based tokenless® authentication; SecurEnvoy lead the way with ground breaking solutions that others aspire too. Our innovative approach to the tokenless® market now sees thousands of users benefitting from our solutions all over the world.

www.wave.com

Much of the complexity, stress, and expense of data protection stems from hanging on to a failed, 20th-century approach to the problem. There is no “in” to keep them out of anymore. Just watch today’s increasingly mobile workforce, the proliferation of personal devices, and the growing use of web applications. The Wave alternative starts with the device. The security is built in—part of the hardware—not added on. With this foundation, you have unprecedented yet straightforward control over exactly who has access to your data, with what devices, over what networks, eliminating much of the complexity, stress, and expense. Total cost of ownership for Wave data protection can be almost half that of a traditional software-based system. Products

EMBASSY® Remote Administration Server for Self-encrypting Drives

EMBASSY® Remote Administration Server for Device Identification

Wave for BitLocker® Management EMBASSY Trust Suite 2.10x Wave Mobility Pro – Tablet Edition

Safend Data Protection Suite Safend Discoverer Safend Inspector Safend Encryptor Safend Protector Safend Auditor Safend Reporter

Page 7: TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · Security products are a key element of an IT/data security policy and strategy. Process and policies are key to

__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410

The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on

www.imation.com

RDX® REMOVABLE HARD DISK STORAGE

SMART, AGILE AND EFFICIENT...JUST LIKE YOUR BUSINESS.

Every SMB understands the importance of safeguarding its valuable information, but many balk at the cost and headache of deploying a data backup solution. Imation RDX Removable Hard Disk Storage Systems enable SMBs to simply and inexpensively backup their valuable data, and quickly recover it in the event of a disaster. RDX combines the best features of the world’s two leading storage technologies:

Utilising complementary, intelligent appliances within the same tiered (online, nearline, offline and offsite) infrastructure, Imation helps SMBs lower storage expenses, relay large datasets, ensure regulatory compliance and safeguard valuable data

Imation offer the scalable archive, backup, and portable storage solutions needed to take care of your data...while you grow your business.

www.ironkey.com

Imation mobile security solutions work together to protect your data, digital identities and applications no matter where your employees or contractors take them. From encrypted flash drives and hard drives to sophisticated identity management solutions and secure portable workspaces, Imation delivers a cost-effective, end-to-end solution that you can monitor and control via our centralized management platforms.

With Imation solutions, you can: Avoid costly and damaging data breaches Drive down the total cost of managing and securing mobile storage Simplify the task of meeting strict compliance mandates Couple identity management with military-grade secure storage Securely keep employees productive at work, at home, or on the road

Page 8: TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · Security products are a key element of an IT/data security policy and strategy. Process and policies are key to

__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410

The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on

The iStorage datAshur® is the world' s most secure, easy to

use and affordable USB flash drive, employing PIN code

access with military grade AES 256-bit hardware encryption.

www.cryoserver.com

Cryoserver — A leading forensic archiving and compliance solution for electronic records. SECURE, FAST & RELIABLE ARCHIVING & STORAGE OF EMAILS

Cryoserver™ email archiving solution allows organisations to collect, store and save every email and instant message in a secure, tamper-evident repository.

Users can sift through catalogued data quickly and easily – where email and attachments can be found in split seconds.

Safely stored and never edited, the Cryoserver archive allows forensic eDiscovery of an organisation’s entire email history.

Stored data is readily available for any need in a Legal Procedure, Dispute Resolutions, HR investigations, Subject Access Requests, Freedom of Information requests, Regulatory Compliance or Data Protection.

www.istorage-uk.com

The diskG* is the world's most secure, compact and

affordable USB2 portable hard drive and solid state drive

(SSD), employing PIN code access with AES 128 or 256 bit

hardware encryption

The diskAshur® is the world's most secure and portable

encrypted USB 3.0 Hard Drive, enabling you to access the

drive with your own unique pin and now at data transfer

speeds of up to 10X faster than USB 2

The iStorage diskAshurDT® is the world's first PIN operated portable hard drive with built-in hardware encryption and capacities of up to 4TB.

Page 9: TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · Security products are a key element of an IT/data security policy and strategy. Process and policies are key to

__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410

The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on

www.cyberoam.com

Cyberoam Unified Threat Management appliances, available as hardware and virtual appliances, offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. Multiple security features integrated over a single, Layer 8 Identity-based platform make security simple, yet highly effective. Cyberoam, with its Extensible Security Architecture (ESA) and multi-core technology carries the ability to combat future threats to organizations’ security. Unified Threat Management

Stateful Inspection Firewall Web Application Firewall

VPN (SSL VPN & IPSec) 3G / 4G / WiMAX Connectivity * Intrusion Prevention System IM Archiving & Controls

Anti-Virus & Anti-Spyware Multiple Link Management Anti-Spam On-Appliance Reporting

Outbound Spam Protection IPv6 Ready

Web Filtering Wi-Fi Appliances * Bandwidth Management FleXi Ports (XP) *

Application Visibility & Control

* Not supported by Cyberoam virtual UTMs

Page 10: TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · Security products are a key element of an IT/data security policy and strategy. Process and policies are key to

__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410

The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on

www.netwrix.com

Configuration auditing of information systems is the essential process of maintaining every organisation's security, governance and compliance requirements. Organisations must track changes to their IT environments to detect security violations, troubleshoot issues, prevent downtimes and maintain continuous compliance with security standards and industry regulations.

Netwrix has developed a comprehensive line of simple, efficient and affordable configuration auditing solutions and has evolved as #1 for configuration auditing. Netwrix solutions resolve the most common challenges associated with configuration auditing (including change and "state-in-time" auditing).

Netwrix is proven #1 Netwrix is simple Netwrix is efficient Netwrix is affordable

www.covertix.com

Covertix develops solutions to equip enterprise organizations with independent file-level surveillance and control, protecting sensitive data, inside and outside the organization. The company's innovative technology secures and monitors confidential and sensitive documents, by automatically tagging digital assets according to file context and content, continuously tracking and securing files, at any point or method of usage. Covertix solutions enable employees, business partners and third-party vendors to collaborate freely while significantly reducing overall risk and with a minimal interruption to the organization's workflow. SmartCipher™, the company's flagship product, is currently used by a wide variety of public and private tier-one enterprise customers around the world.

Page 11: TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · Security products are a key element of an IT/data security policy and strategy. Process and policies are key to

__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410

The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on

www.observeit.com

ObserveIT Enterprise for User Activity Monitoring:

Get Compliant with Citrix, SSH and RDP Recording

What ObserveIT Does

Captures video recording of all user activity

Generates textual audit logs for every app (even apps that have no internal logging!)

Identifies shared-account users ('admin') and detects identity theft Key Features

Intelligent audit logs: Video logs and Textual metadata logs for every user action, including legacy apps, cloud and commercial software, and apps with no internal logging

Record & Replay: Precise forensic investigation that shows visually exactly what the user did

Identity Management Suite: Tie generic 'administrator' logins to specific named user and detect identity theft

SIEM Integration: Simple tie-in of intelligent log data for any SIEM, Log Management and System Monitor platform

Policy messaging: Satisfies policy training compliance regulations How it Works ObserveIT identifies any new server session, and associates the session with a specific user During the session, all user actions on screen are recorded for video replay

Page 12: TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · Security products are a key element of an IT/data security policy and strategy. Process and policies are key to

__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410

The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on

www.prot-on.com

What is Prot-On?

Prot-On is an application that ensures that the files you send by email, upload to the cloud or share on social networks can only be accessed by authorized users.

Control all existing copies: with Prot-On you´re in control of the copies that you share or that are made of your files. You can decide and track who, how and when accessed your files regardless of where they are stored. Protect your information and all of your documents: with Prot-On you can protect photos, MS Office, PDF documents, videos, audios etc… as well as email texts, blog and wall entries. Take-away permissions: restrict access to users at any time and block documents that have already been shared.

Page 13: TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · Security products are a key element of an IT/data security policy and strategy. Process and policies are key to

__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410

The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on

www.beyondtrust.com

VULNERABILITY MANAGEMENTPRIVILEGE MANAGEMENT The BeyondInsight IT Risk Management Platform fuses user and asset intelligence, enabling you to better understand and manage risk.

BeyondTrust solutions provide a comprehensive view of the vulnerabilities that provide doors into an environment, as well as the privileges that present corridors to sensitive assets. This fusion of asset and user intelligence enables IT and security teams to collectively reduce risk across complex environments.

PowerBroker Privileged Account Management solutions enforce and audit access control policies, enabling IT teams to limit access to key systems, applications and data. Retina Vulnerability Management solutions enable security teams to assess risk, measure breach likelihood, and make remediation recommendations. The BeyondInsight IT Risk Management Platform unifies many of our privileged account management and vulnerability management solutions, providing IT and security teams a single, contextual lens through which to view user and asset risk.

A Unified Platform for Privileged Account Management and Vulnerability Management to:

Reduce user-based risk and mitigate threats to information assets

Address security exposures across large, diverse IT environments Comply with internal, industry and government mandates

By unifying BeyondTrust privileged account management and vulnerability management solutions, BeyondInsight provides IT and security teams a single, contextual lens through which to view and address user and asset risk.

Page 14: TTaallkk ttoo RReennaaiissssaannccee ttooddaayy,, ttoo ...€¦ · Security products are a key element of an IT/data security policy and strategy. Process and policies are key to

__________________________________________________________________________ W: www.renaissance.ie E: [email protected] T: +353 1 2809410

The Mews, 15 Adelaide Street, Dun Laoghaire, Co. Dublin, Ireland. Follow us on Connect with us on

RRREEENNNAAAIIISSSSSSAAANNNCCCEEE ––– YYYOOOUUURRR PPPAAARRRTTTNNNEEERRR TTTOOO HHHEEELLLPPP

TTTHHHEEE GGGRRROOOWWWTTTHHH OOOFFF YYYOOOUUURRR BBBUUUSSSIIINNNEEESSSSSS!!!!!!!!!!!! At Renaissance our focus is to help you develop your business profitably through security. We want to work with you to develop a profitable sustainable security business which protects your customers. We deliver state of the art IT Security solutions targeted to meet the needs of Irish businesses. We provide pre sales consultancy and post-sales support. We work with you in developing and converting Data Security opportunities.

Renaissance will: Develop new sales opportunities Maximise returns on your existing customer base Cross sell and upsell to your customers

Renaissance provides your business with:

Marketing Pre Sales Support Post-Sales Support Technical Support Price and Product Sales training Technical training.

Our Account Managers are: Here to develop your business Here to identify opportunities Here to make YOU Money

Please contact Renaissance to meet your account manager or discuss specific customer requirements. Call Today!!!!!!

WWWOOORRRKKKIIINNNGGG WWWIIITTTHHH RRREEENNNAAAIIISSSSSSAAANNNCCCEEE ------------ BBBUUUIIILLLDDDIIINNNGGG PPPRRROOOFFFIIITTT TTTHHHRRROOOUUUGGGHHH DDDAAATTTAAA SSSEEECCCUUURRRIIITTTYYY