SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Falcongaze SecureTower:
effective protection against
insider threats
www.falcongaze.com
About Falcongaze
Falcongaze is a vendor of DLP software SecureTower which is a comprehensive
information security and user activity monitoring platform.
• Firm foothold in domestic information security market – is ranked in TOP 3
information security solutions
• Founded in 2007 and gradually growing ever since
• The wide range of customers from various industries with over 500 exclusive
projects for private and public companies and institutions
• Dynamically expanding business to new regions with current presence in
Europe, Asia and Africa
• Customer-centric operation model with “always-in-touch” attitude
www.falcongaze.com
What is SecureTower and why is it so special?
SecureTower is a multifunctional software solution for protection of a company
against leaks of confidential data caused by carelessness or intentional acts of
employees.
SecureTower is unconventional DLP system, which means comprehensive
control of all data transmission channels + user activity monitoring + archive of
all business communications.
Features:
• Ultimate control over communication channels
Detection, investigation and prevention of incidents
• Deep insight into user activity at an endpoint and in the network
All intercepted data are presented in an interactive and demonstrative form
• Immediate access to any intercepted data
Advanced search tool with diverse attributes and custom configuration options
• Proactive search of irregularities and suspicious activity
Retrospective analysis, graphical representation of workflow activities, analysis of user
communications with colleagues and external contacts
www.falcongaze.com
Insider threats: is it worth worrying about?
Most information security experts agree: insider attacks always come unexpected and
cause most painful impact on any company simply because insiders know exactly what
they want and where it is.
All of them were compromised by employees or contractors in 2014, bearing
multi-million dollar losses and inestimable reputation damage.
With new and effective technologies for protection from intrusions and external
attacks, insider threats are gaining more prominence than ever before.
No one wants to become a part of statistics.
Korea Credit Bureau Barclays Bank DuPont EnerVest AT&T
Conventional information security and data leak prevention practices have already
failed these companies:
www.falcongaze.com
How SecureTower manages insider threats
Control of information flows and data leak
prevention
Control of performance and effectiveness of
business processes
Monitoring loyalty of employees Archiving all business communications
www.falcongaze.com
Controlled data transfer channels
Control
of work hoursScreenshots
Application
control
Recording from
microphone
Network sharesKeyloggerSent filesIP-telephony
ClipboardPrinters
External
devices
Instant
messengers
Social networks
Visited sites
Mail servers
E-mail
www.falcongaze.com
Methods of data interception
Endpoint agents
• Mail (SMTP(S); POP3(S); MAPI (non-encrypted);
• WEB control: HTTP(S)
• Messenger control (including encrypted)
• External devices and peripherals
• FTP(S)
• Comprehensive user activity control
ICAP-server
• WEB control: HTTP(S)
SPAN-port
• MAIL control: SMTP, POP3, IMAP,
MAPI
• WEB control: HTTP
• Messengers control (non-encrypted)
• FTP
Mail processing server
• MS Exchange (EWS) and other systems
which use POP3 and SMTP protocols
(Lotus Domino, Kerio Connect, Postfix,
Sendmail and others).
www.falcongaze.com
Comprehensive control from single console
Office personnel
Network shares
& peripherals
Road warriors
Cloud storagesExternal contacts
www.falcongaze.com
External devices
System requirements and other numbers
System requirements
• CPU: 2,4 GHz
• Network adapter: 1 Gbit
• RAM: 8 GB and above
• HDD: 300 MB for program files and about
3% of intercepted traffic for search index
files
• Microsoft .Net Framework 4.0
• OS for server components: Microsoft
Windows Server 2003/2008 x64
• OS for client components: Microsoft
Windows XP/Vista/7/8/10/Server
2003/Server 2008/Server
2012 (x86 или x64)
• Supported DBMS: PostgreSQL, Microsoft
SQL Server, Oracle, MySQL, SQLite
Agent-Server
• Connection once a minute.
Immediate data transfer on
interception of 8Mb and more
Scalability
• Unlimited (SecureTower is 100%
software with modular structure)
Collected data
• 1200 MB per user per month
(full functionality)
Bandwidth impact
• Configurable data transfer speed
for low performance networks
www.falcongaze.com
SecureTower is an effective tool for
Information
Security Officers
Business owners Top management HR specialists
www.falcongaze.com
Target markets
Small and medium business Big corporations
www.falcongaze.com
The scope of application
– financial sector (banks and insurance companies)
– energy sector
– broadcasting and telecom
– public sector
– carriers, transport and logistics
– industrial enterprises
– retail sector and trade companies
– R&D and innovations
Most of our customers come from the following
industries:
Got sensitive data, classified
information, PII/PFI or
commercial secrets?
– healthcare
www.falcongaze.com
Main advantages of SecureTower
Control of information flows and data
leak prevention
Easy deployment and configuration
User-friendly
Multifunctional
Lowest TCO and fastest ROI
www.falcongaze.com
Main advantages of SecureTower
Control of all major data transfer
protocols
Vivid and interactive reporting
Smart user monitoring tool
Economic security and control of corporate
resources
Secure backup of transferred data and
business communications
www.falcongaze.com
SecureTower modules and server components
Modules Server components
М1. Corporate mail
М2. External mail and web resources
М3. Messengers
М4. External devices
М5. FTP(S)
М6. User activity monitoring
М7. Image recognition
S1. Data processing server
S2. Endpoint agent control server
S3. Interception server
S4. ICAP server
S5. Mail processing server
S6. Image recognition server
www.falcongaze.com
SecureTower modules and server components
Interception with Mail
processing server
Interception with
ICAP-server
Interception with
SPAN-port
Interception with
Endpoint agents
www.falcongaze.com
Licensing policy and TCO
Mail processing server interception = number of mailboxes + Data
processing server + Mail processing server
SPAN-port interception = N of users + Data interception server +
Data processing server;
Licensing is based on the number of users/machines (N), number of server
modules and types of data monitored:
Endpoint agent interception = N of users + Endpoint agent control
server + Data processing server;
ICAP server interception = N of users + Data interception server +
ICAP server
+
Combined interception = N of users (agent scheme) + Endpoint agent
control server + Data interception server + Data processing server;
www.falcongaze.com
Licensing policy and TCO
Subscription
SecureTower licensing models
Perpetual
YOU BUY – YOU OWN policy:
• Reasonable and highly competitive
cost of the Product;
• Once purchased SecureTower will be
fully operational for unlimited time;
• We charge only maintenance, updates
and technical support at only 25% of
the cost annually (first year is free);
• Maintenance, updates and technical
support payments are NOT
mandatory;
• Welcoming “come-back policy” for
renewal of maintenance, updates and
technical support contract.
RENT-A-SOFT policy:
• Most affordable prices;
• Clear and Convenient annual
payments;
• Use SecureTower only when you need,
save money when you don’t and
welcome back again soon!
• Get all benefits of full functionality for
less.
www.falcongaze.com
Thank you
Contact us or our regional partners for all inquiries
See more on www.Falcongaze.com
www.falcongaze.com

Weitere ähnliche Inhalte

Was ist angesagt?

Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
michaelbasoah
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
tswong
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
Harry Gunns
 
MOP Product Presentation
MOP Product PresentationMOP Product Presentation
MOP Product Presentation
tswong
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Features
lukky753
 

Was ist angesagt? (20)

SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
What You Cant See Can Hurt You
What You Cant See Can Hurt You What You Cant See Can Hurt You
What You Cant See Can Hurt You
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
BalaBit 2015: Control Your IT Staff
BalaBit 2015: Control Your IT StaffBalaBit 2015: Control Your IT Staff
BalaBit 2015: Control Your IT Staff
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public Cloud
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
MOP Product Presentation
MOP Product PresentationMOP Product Presentation
MOP Product Presentation
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Features
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 

Andere mochten auch

MD Live Casino Audition - Course
MD Live Casino Audition - CourseMD Live Casino Audition - Course
MD Live Casino Audition - Course
Kathy Avila
 
CWT-AnalytIQs---Online-Press-Kit
CWT-AnalytIQs---Online-Press-KitCWT-AnalytIQs---Online-Press-Kit
CWT-AnalytIQs---Online-Press-Kit
Robert Cole
 
MD Live Casino Audition - Facilitators Guide_Final
MD Live Casino Audition - Facilitators Guide_FinalMD Live Casino Audition - Facilitators Guide_Final
MD Live Casino Audition - Facilitators Guide_Final
Kathy Avila
 
Air Mission Planning Brochure
Air Mission Planning BrochureAir Mission Planning Brochure
Air Mission Planning Brochure
Paul Deller
 
World Cultures - South Asia - Hinduism
World Cultures - South Asia -  HinduismWorld Cultures - South Asia -  Hinduism
World Cultures - South Asia - Hinduism
guest2749813
 

Andere mochten auch (16)

Computer operator
Computer operatorComputer operator
Computer operator
 
MD Live Casino Audition - Course
MD Live Casino Audition - CourseMD Live Casino Audition - Course
MD Live Casino Audition - Course
 
Big Brother's dark side - The Carillon
Big Brother's dark side - The CarillonBig Brother's dark side - The Carillon
Big Brother's dark side - The Carillon
 
Challan fee payment_hq_10_jan17
Challan fee payment_hq_10_jan17Challan fee payment_hq_10_jan17
Challan fee payment_hq_10_jan17
 
Capsulization of red indians
Capsulization of red indiansCapsulization of red indians
Capsulization of red indians
 
hal notice for recruitment
hal notice for recruitmenthal notice for recruitment
hal notice for recruitment
 
Online store with Magento
Online store with MagentoOnline store with Magento
Online store with Magento
 
CWT-AnalytIQs---Online-Press-Kit
CWT-AnalytIQs---Online-Press-KitCWT-AnalytIQs---Online-Press-Kit
CWT-AnalytIQs---Online-Press-Kit
 
MD Live Casino Audition - Facilitators Guide_Final
MD Live Casino Audition - Facilitators Guide_FinalMD Live Casino Audition - Facilitators Guide_Final
MD Live Casino Audition - Facilitators Guide_Final
 
Pela liberdade de expressão em 1971
Pela liberdade de expressão em 1971Pela liberdade de expressão em 1971
Pela liberdade de expressão em 1971
 
Air Mission Planning Brochure
Air Mission Planning BrochureAir Mission Planning Brochure
Air Mission Planning Brochure
 
La célula clase demostrativa tecnologia
La célula clase demostrativa tecnologiaLa célula clase demostrativa tecnologia
La célula clase demostrativa tecnologia
 
Artículos de actualización bpm
Artículos de actualización bpmArtículos de actualización bpm
Artículos de actualización bpm
 
Clase 16 cardiotónicos
Clase 16 cardiotónicosClase 16 cardiotónicos
Clase 16 cardiotónicos
 
Glucósidos cardenolidos saponinas cianogeneticos
Glucósidos cardenolidos saponinas cianogeneticosGlucósidos cardenolidos saponinas cianogeneticos
Glucósidos cardenolidos saponinas cianogeneticos
 
World Cultures - South Asia - Hinduism
World Cultures - South Asia -  HinduismWorld Cultures - South Asia -  Hinduism
World Cultures - South Asia - Hinduism
 

Ähnlich wie SecureTower General Info

Invea - Jiri Tobola
Invea - Jiri TobolaInvea - Jiri Tobola
Invea - Jiri Tobola
Jan Fried
 
Company Profile
Company ProfileCompany Profile
Company Profile
3SC World
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
ssusera76ea9
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
Finite Moments
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
Brian Kesecker
 

Ähnlich wie SecureTower General Info (20)

Invea - Jiri Tobola
Invea - Jiri TobolaInvea - Jiri Tobola
Invea - Jiri Tobola
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
Information Security
Information SecurityInformation Security
Information Security
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINT
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
 
Mintivo business IT service catalogue
Mintivo business IT service catalogueMintivo business IT service catalogue
Mintivo business IT service catalogue
 

SecureTower General Info

  • 1. Falcongaze SecureTower: effective protection against insider threats www.falcongaze.com
  • 2. About Falcongaze Falcongaze is a vendor of DLP software SecureTower which is a comprehensive information security and user activity monitoring platform. • Firm foothold in domestic information security market – is ranked in TOP 3 information security solutions • Founded in 2007 and gradually growing ever since • The wide range of customers from various industries with over 500 exclusive projects for private and public companies and institutions • Dynamically expanding business to new regions with current presence in Europe, Asia and Africa • Customer-centric operation model with “always-in-touch” attitude www.falcongaze.com
  • 3. What is SecureTower and why is it so special? SecureTower is a multifunctional software solution for protection of a company against leaks of confidential data caused by carelessness or intentional acts of employees. SecureTower is unconventional DLP system, which means comprehensive control of all data transmission channels + user activity monitoring + archive of all business communications. Features: • Ultimate control over communication channels Detection, investigation and prevention of incidents • Deep insight into user activity at an endpoint and in the network All intercepted data are presented in an interactive and demonstrative form • Immediate access to any intercepted data Advanced search tool with diverse attributes and custom configuration options • Proactive search of irregularities and suspicious activity Retrospective analysis, graphical representation of workflow activities, analysis of user communications with colleagues and external contacts www.falcongaze.com
  • 4. Insider threats: is it worth worrying about? Most information security experts agree: insider attacks always come unexpected and cause most painful impact on any company simply because insiders know exactly what they want and where it is. All of them were compromised by employees or contractors in 2014, bearing multi-million dollar losses and inestimable reputation damage. With new and effective technologies for protection from intrusions and external attacks, insider threats are gaining more prominence than ever before. No one wants to become a part of statistics. Korea Credit Bureau Barclays Bank DuPont EnerVest AT&T Conventional information security and data leak prevention practices have already failed these companies: www.falcongaze.com
  • 5. How SecureTower manages insider threats Control of information flows and data leak prevention Control of performance and effectiveness of business processes Monitoring loyalty of employees Archiving all business communications www.falcongaze.com
  • 6. Controlled data transfer channels Control of work hoursScreenshots Application control Recording from microphone Network sharesKeyloggerSent filesIP-telephony ClipboardPrinters External devices Instant messengers Social networks Visited sites Mail servers E-mail www.falcongaze.com
  • 7. Methods of data interception Endpoint agents • Mail (SMTP(S); POP3(S); MAPI (non-encrypted); • WEB control: HTTP(S) • Messenger control (including encrypted) • External devices and peripherals • FTP(S) • Comprehensive user activity control ICAP-server • WEB control: HTTP(S) SPAN-port • MAIL control: SMTP, POP3, IMAP, MAPI • WEB control: HTTP • Messengers control (non-encrypted) • FTP Mail processing server • MS Exchange (EWS) and other systems which use POP3 and SMTP protocols (Lotus Domino, Kerio Connect, Postfix, Sendmail and others). www.falcongaze.com
  • 8. Comprehensive control from single console Office personnel Network shares & peripherals Road warriors Cloud storagesExternal contacts www.falcongaze.com External devices
  • 9. System requirements and other numbers System requirements • CPU: 2,4 GHz • Network adapter: 1 Gbit • RAM: 8 GB and above • HDD: 300 MB for program files and about 3% of intercepted traffic for search index files • Microsoft .Net Framework 4.0 • OS for server components: Microsoft Windows Server 2003/2008 x64 • OS for client components: Microsoft Windows XP/Vista/7/8/10/Server 2003/Server 2008/Server 2012 (x86 или x64) • Supported DBMS: PostgreSQL, Microsoft SQL Server, Oracle, MySQL, SQLite Agent-Server • Connection once a minute. Immediate data transfer on interception of 8Mb and more Scalability • Unlimited (SecureTower is 100% software with modular structure) Collected data • 1200 MB per user per month (full functionality) Bandwidth impact • Configurable data transfer speed for low performance networks www.falcongaze.com
  • 10. SecureTower is an effective tool for Information Security Officers Business owners Top management HR specialists www.falcongaze.com
  • 11. Target markets Small and medium business Big corporations www.falcongaze.com
  • 12. The scope of application – financial sector (banks and insurance companies) – energy sector – broadcasting and telecom – public sector – carriers, transport and logistics – industrial enterprises – retail sector and trade companies – R&D and innovations Most of our customers come from the following industries: Got sensitive data, classified information, PII/PFI or commercial secrets? – healthcare www.falcongaze.com
  • 13. Main advantages of SecureTower Control of information flows and data leak prevention Easy deployment and configuration User-friendly Multifunctional Lowest TCO and fastest ROI www.falcongaze.com
  • 14. Main advantages of SecureTower Control of all major data transfer protocols Vivid and interactive reporting Smart user monitoring tool Economic security and control of corporate resources Secure backup of transferred data and business communications www.falcongaze.com
  • 15. SecureTower modules and server components Modules Server components М1. Corporate mail М2. External mail and web resources М3. Messengers М4. External devices М5. FTP(S) М6. User activity monitoring М7. Image recognition S1. Data processing server S2. Endpoint agent control server S3. Interception server S4. ICAP server S5. Mail processing server S6. Image recognition server www.falcongaze.com
  • 16. SecureTower modules and server components Interception with Mail processing server Interception with ICAP-server Interception with SPAN-port Interception with Endpoint agents www.falcongaze.com
  • 17. Licensing policy and TCO Mail processing server interception = number of mailboxes + Data processing server + Mail processing server SPAN-port interception = N of users + Data interception server + Data processing server; Licensing is based on the number of users/machines (N), number of server modules and types of data monitored: Endpoint agent interception = N of users + Endpoint agent control server + Data processing server; ICAP server interception = N of users + Data interception server + ICAP server + Combined interception = N of users (agent scheme) + Endpoint agent control server + Data interception server + Data processing server; www.falcongaze.com
  • 18. Licensing policy and TCO Subscription SecureTower licensing models Perpetual YOU BUY – YOU OWN policy: • Reasonable and highly competitive cost of the Product; • Once purchased SecureTower will be fully operational for unlimited time; • We charge only maintenance, updates and technical support at only 25% of the cost annually (first year is free); • Maintenance, updates and technical support payments are NOT mandatory; • Welcoming “come-back policy” for renewal of maintenance, updates and technical support contract. RENT-A-SOFT policy: • Most affordable prices; • Clear and Convenient annual payments; • Use SecureTower only when you need, save money when you don’t and welcome back again soon! • Get all benefits of full functionality for less. www.falcongaze.com
  • 19. Thank you Contact us or our regional partners for all inquiries See more on www.Falcongaze.com www.falcongaze.com