SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Outpost Network Security
Product presentation
What is Outpost Network Security?
• Combined manageable software firewall and anti-spyware solution
designed especially to meet small and medium business’s needs
• Protects each and every company PC from both external (Internet) and
internal threats (e.g. hacker attacks, data theft, PC infiltrations, etc)
• Allows system administrators to set networking rules for PCs and user
applications to easily secure company IT infrastructure
Outpost Network Security – combined power of Firewall and Ant-Spyware protection
to ensure maximum corporate network security
Contents
Outpost Network Security – why would your company need it?
Security threats
Possible solutions: Hardware Appliance, Anti-Virus, Outpost Network Security
What is Outpost Network Security
Package contents
How it all works?
System requirements
Support
Why Outpost Network Security?
How to purchase?
IT security solutions – that’s what professionals think
• The average survival time for an unprotected networked computer dropped from 40 minutes
to 20 minutes over the last year - SANS Institute of Bethesda
• For every in-house attack reported, there could be as many as 50 that go either unreported
or undetected – The Computer Security Journal
• Viruses and worms are the leading information security concerns and continue to generate
the most media and public attention. But CIOs and other IT executives are increasingly
recognizing the significance of internal threats... – Global Information Security Survey,
Ernst&Young LLP
• 86% of Computer Crimes originate from inside the company network – Intranet Security
• It's bad enough for SOHO / individual users not to use a firewall - absolutely unconscionable
for a business to operate without (a correctly configured) one - www.iway-safety.com
• Nearly 90% of US businesses suffered from a computer virus, spyware or other online attack
in 2004 or 2005 despite widespread use of security software. The average damage was at
$24,000 - FBI
Most cost-dangerous security threats
Spyware and viruses
35%
Email intrusions
3%
Denial of service
attacks
12%
Web site intrusion
7%
Loss of confidential
data
43%
Source: Ernst&Young LLP
Security solutions available – Hardware Appliance
Weaknesses:
Ignores web pages’ content (i.e. Active Content)
Regards all outbound traffic as trustworthy,
providing no protection against Trojans and
Spyware, should they infiltrate endpoints
Doesn’t monitor internal network traffic so if a
hacker gets inside your company networks, he
becomes almost omnipotent
Doesn’t provide endpoint Anti-Spyware
protection
Strengths:
Blocks illegal inbound traffic
Analyses traffic on network interface layer
Protects company perimeter from known malware
Standalone unit
Security solutions available – Anti-Virus
Weaknesses:
Anti-virus database MUST contain the virus’s
signature to allow ant-virus recognize it
Doesn’t offer any protection against hacker
attacks, whether internal or external, exposing
your company to risks of sensitive data losses
and leakage
Loads some system resources on employees’
PCs
Strengths:
 Monitors emails and web pages for potential
viruses
 Monitors files for malicious code contamination
Security solutions available – Outpost Network Security
Weaknesses:
Doesn’t include anti-virus yet
Strengths:
 Includes manageable integrated Anti-Spyware protection
 Blocks illegal inbound and outbound traffic on each PC in
your company network, protecting your company from
both internal and external threats
 Analyses traffic on both network interface and application
layers, blocking communications for all potentially
dangerous programs, like Trojans, Spyware etc.
 Allows system administrators to set endpoints to block
potentially dangerous email attachments and web pages’
scripts
Multi-Layer Protection approach
Outpost Network
Security – core
defensive
element
Hardware
Firewall – to
strengthen you
protection against
external attacks
Anti-Virus together
with Outpost
Network Secruity
Anti-Spyware
protection ensures
no malicious code is
run on any PC in
your company
Outpost Network Security – Core Element of Your Company IT Security
Contents
Outpost Network Security – why would your company need it?
Security threats
Possible solutions: Hardware Appliance, Anti-Virus, Outpost Network Security
What is Outpost Network Security
Package contents
How it all works?
System requirements
Support
Why Outpost Network Security?
How to purchase?
Outpost Network Security Package
• Agnitum Command Center
• Outpost Network Security Client
• Agnitum Update Service
• Agnitum Publisher Service
Outpost Network Security Client
• Combined anti-spyware and firewall protection
• Safeguards company PCs from both external (Internet) and internal threats and
• Forcing firewall and anti-spyware settings to client PCs
• Remote deployment
Agnitum Update Service
•Centralized update deployment
•Controlling Network Security Clients on the company PCs
•Minimal system requirements
Screenshots
Agnitum Publisher Service
•Centralized rules and configurations deployment
•Minimal system requirements
Screenshots
Agnitum Command Center
•Controlling Network Security Clients on the company PCs
•Defining user groups
•Setting up endpoint rules
•Update Service and Publisher Service management
•Unprecedentedly easy-to-use
Screenshot
Contents
Outpost Network Security – why would your company need it?
Security threats
Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security
What is Outpost Network Security
Package contents
How it all works?
System requirements
Support
Why Outpost Network Security
How to purchase?
System requirements
To allow remote deployment
• Windows 2000 or 2003 Domain Controller
Administrator PC
• Windows XP, 2000 Pro or 2003 Server operating system
Client PCs
• 233 MHz Intel Pentium or compatible CPU
• 32 MB RAM
• Windows 98, Me, 2000, XP or 2003 Server operating system
• 30 MB of hard disk space
Agnitum Command Center doesn’t need to be
installed on company server!
Contents
Outpost Network Security – why would your company need it?
Security threats
Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security
What is Outpost Network Security
Package contents
How it all works?
System requirements
Support
Why Outpost Network Security?
How to purchase?
Support service for Outpost Network Security
Contents
Outpost Network Security – why would your company need it?
Security threats
Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security
What is Outpost Network Security
Package contents
How it all works?
System requirements
Support
Why Outpost Network Security?
How to purchase?
Why Outpost Network Security?
Award-winning technology
The core of Outpost Network Security is award-winning Outpost Personal Firewall technology.
Recent awards:
Why Outpost Network Security?
• Advanced application
control (physical path
verification, system
registry path verification)
• Agnitum Update Service
and Agnitum Publisher
Service can run under
unprivileged user
account
• Advanced Ethernet
protection (anti-sniffing,
anti-spoofing, ARP
attack protection etc.)
Advanced security
features
Low system resources
consumption and
hardware requirements
Agnitum Command Center
is capable of working with
150 clients at the same
instant, which means the
system will successfully
with work thousands of
PCs
• Outpost Network
Security client flawlessly
runs on ANY PC suitable
for at least MS Windows
98 OS
• Agnitum Command
Center successfully runs
on ANY PC meeting
Windows 2000 hardware
requirements
• Agnitum Command
Center doesn’t have to
be installed on company
server
Scalability
Outpost Network Security is suitable for any network,
supports VPN and ensures your company is 105%
protected against all known attacks and spyware, whether
you have tens or thousands of PCs to secure
Contents
Outpost Network Security – why would your company need it?
Security threats
Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security
What is Outpost Network Security
Package contents
How it all works?
System requirements
Support
Why Outpost Network Security?
How to purchase?
How to download and purchase Outpost Network Security?
• Download Outpost Network Security 15 day trial here: http://
agnitum.com/download/ons.html
• Purchase online here: http://agnitum.com/purchase/shop/ons/businesslicense.html
• Purchase through the network of our Solutions Providers or Distributors. To locate
your nearest partner, please follow this link:
http://agnitum.com/purchase/buyoffline.html
• For additional information please see Outpost Network Security page on our
website: http://agnitum.com/products/ons/index.html or contact us via email:
ons@agnitum.com or phone: +7-812-336-5246
Thank you for your attention!
Yours sincerely,
Agnitum Ltd. Team

Weitere ähnliche Inhalte

Was ist angesagt?

Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsAyulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsVertexMon VertexMon
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2Nguyen Binh
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration TestingChirag Jain
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Chapter 5 Networking and Server Attacks
Chapter 5 Networking and Server AttacksChapter 5 Networking and Server Attacks
Chapter 5 Networking and Server AttacksDr. Ahmed Al Zaidy
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014David Berkelmans
 
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET Journal
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Auditkeyuradmin
 
Ce hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesCe hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesVi Tính Hoàng Nam
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitShah Sheikh
 

Was ist angesagt? (20)

Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)
 
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsAyulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration Testing
 
Check Point Virtual Systems
Check Point Virtual SystemsCheck Point Virtual Systems
Check Point Virtual Systems
 
checkpoint
checkpointcheckpoint
checkpoint
 
Fire Eye Appliance Quick Start
Fire Eye Appliance Quick StartFire Eye Appliance Quick Start
Fire Eye Appliance Quick Start
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Chapter 5 Networking and Server Attacks
Chapter 5 Networking and Server AttacksChapter 5 Networking and Server Attacks
Chapter 5 Networking and Server Attacks
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014
 
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
 
Android Firewall project
Android Firewall projectAndroid Firewall project
Android Firewall project
 
Ce hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesCe hv6 module 49 creating security policies
Ce hv6 module 49 creating security policies
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
 

Ähnlich wie Outpost networksecurity

Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentationtswong
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Jiunn-Jer Sun
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinalmordannon
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
Materi cyber sec.pdf
Materi cyber sec.pdfMateri cyber sec.pdf
Materi cyber sec.pdfindinhasan
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceChristopher Gerritz
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptxLakshayYadav46
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL PANKAJKUMAR2519
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 

Ähnlich wie Outpost networksecurity (20)

Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
S T M U T M
S T M  U T MS T M  U T M
S T M U T M
 
Day4
Day4Day4
Day4
 
TSS_Overview
TSS_OverviewTSS_Overview
TSS_Overview
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Materi cyber sec.pdf
Materi cyber sec.pdfMateri cyber sec.pdf
Materi cyber sec.pdf
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Find the key features of an advanced firewall
Find the key features of an advanced firewallFind the key features of an advanced firewall
Find the key features of an advanced firewall
 

Kürzlich hochgeladen

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Kürzlich hochgeladen (20)

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

Outpost networksecurity

  • 2. What is Outpost Network Security? • Combined manageable software firewall and anti-spyware solution designed especially to meet small and medium business’s needs • Protects each and every company PC from both external (Internet) and internal threats (e.g. hacker attacks, data theft, PC infiltrations, etc) • Allows system administrators to set networking rules for PCs and user applications to easily secure company IT infrastructure Outpost Network Security – combined power of Firewall and Ant-Spyware protection to ensure maximum corporate network security
  • 3. Contents Outpost Network Security – why would your company need it? Security threats Possible solutions: Hardware Appliance, Anti-Virus, Outpost Network Security What is Outpost Network Security Package contents How it all works? System requirements Support Why Outpost Network Security? How to purchase?
  • 4. IT security solutions – that’s what professionals think • The average survival time for an unprotected networked computer dropped from 40 minutes to 20 minutes over the last year - SANS Institute of Bethesda • For every in-house attack reported, there could be as many as 50 that go either unreported or undetected – The Computer Security Journal • Viruses and worms are the leading information security concerns and continue to generate the most media and public attention. But CIOs and other IT executives are increasingly recognizing the significance of internal threats... – Global Information Security Survey, Ernst&Young LLP • 86% of Computer Crimes originate from inside the company network – Intranet Security • It's bad enough for SOHO / individual users not to use a firewall - absolutely unconscionable for a business to operate without (a correctly configured) one - www.iway-safety.com • Nearly 90% of US businesses suffered from a computer virus, spyware or other online attack in 2004 or 2005 despite widespread use of security software. The average damage was at $24,000 - FBI
  • 5. Most cost-dangerous security threats Spyware and viruses 35% Email intrusions 3% Denial of service attacks 12% Web site intrusion 7% Loss of confidential data 43% Source: Ernst&Young LLP
  • 6. Security solutions available – Hardware Appliance Weaknesses: Ignores web pages’ content (i.e. Active Content) Regards all outbound traffic as trustworthy, providing no protection against Trojans and Spyware, should they infiltrate endpoints Doesn’t monitor internal network traffic so if a hacker gets inside your company networks, he becomes almost omnipotent Doesn’t provide endpoint Anti-Spyware protection Strengths: Blocks illegal inbound traffic Analyses traffic on network interface layer Protects company perimeter from known malware Standalone unit
  • 7. Security solutions available – Anti-Virus Weaknesses: Anti-virus database MUST contain the virus’s signature to allow ant-virus recognize it Doesn’t offer any protection against hacker attacks, whether internal or external, exposing your company to risks of sensitive data losses and leakage Loads some system resources on employees’ PCs Strengths:  Monitors emails and web pages for potential viruses  Monitors files for malicious code contamination
  • 8. Security solutions available – Outpost Network Security Weaknesses: Doesn’t include anti-virus yet Strengths:  Includes manageable integrated Anti-Spyware protection  Blocks illegal inbound and outbound traffic on each PC in your company network, protecting your company from both internal and external threats  Analyses traffic on both network interface and application layers, blocking communications for all potentially dangerous programs, like Trojans, Spyware etc.  Allows system administrators to set endpoints to block potentially dangerous email attachments and web pages’ scripts
  • 9. Multi-Layer Protection approach Outpost Network Security – core defensive element Hardware Firewall – to strengthen you protection against external attacks Anti-Virus together with Outpost Network Secruity Anti-Spyware protection ensures no malicious code is run on any PC in your company Outpost Network Security – Core Element of Your Company IT Security
  • 10. Contents Outpost Network Security – why would your company need it? Security threats Possible solutions: Hardware Appliance, Anti-Virus, Outpost Network Security What is Outpost Network Security Package contents How it all works? System requirements Support Why Outpost Network Security? How to purchase?
  • 11. Outpost Network Security Package • Agnitum Command Center • Outpost Network Security Client • Agnitum Update Service • Agnitum Publisher Service
  • 12. Outpost Network Security Client • Combined anti-spyware and firewall protection • Safeguards company PCs from both external (Internet) and internal threats and • Forcing firewall and anti-spyware settings to client PCs • Remote deployment
  • 13. Agnitum Update Service •Centralized update deployment •Controlling Network Security Clients on the company PCs •Minimal system requirements
  • 15. Agnitum Publisher Service •Centralized rules and configurations deployment •Minimal system requirements
  • 17. Agnitum Command Center •Controlling Network Security Clients on the company PCs •Defining user groups •Setting up endpoint rules •Update Service and Publisher Service management •Unprecedentedly easy-to-use
  • 19. Contents Outpost Network Security – why would your company need it? Security threats Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security What is Outpost Network Security Package contents How it all works? System requirements Support Why Outpost Network Security How to purchase?
  • 20. System requirements To allow remote deployment • Windows 2000 or 2003 Domain Controller Administrator PC • Windows XP, 2000 Pro or 2003 Server operating system Client PCs • 233 MHz Intel Pentium or compatible CPU • 32 MB RAM • Windows 98, Me, 2000, XP or 2003 Server operating system • 30 MB of hard disk space Agnitum Command Center doesn’t need to be installed on company server!
  • 21. Contents Outpost Network Security – why would your company need it? Security threats Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security What is Outpost Network Security Package contents How it all works? System requirements Support Why Outpost Network Security? How to purchase?
  • 22. Support service for Outpost Network Security
  • 23. Contents Outpost Network Security – why would your company need it? Security threats Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security What is Outpost Network Security Package contents How it all works? System requirements Support Why Outpost Network Security? How to purchase?
  • 24. Why Outpost Network Security? Award-winning technology The core of Outpost Network Security is award-winning Outpost Personal Firewall technology. Recent awards:
  • 25. Why Outpost Network Security? • Advanced application control (physical path verification, system registry path verification) • Agnitum Update Service and Agnitum Publisher Service can run under unprivileged user account • Advanced Ethernet protection (anti-sniffing, anti-spoofing, ARP attack protection etc.) Advanced security features Low system resources consumption and hardware requirements Agnitum Command Center is capable of working with 150 clients at the same instant, which means the system will successfully with work thousands of PCs • Outpost Network Security client flawlessly runs on ANY PC suitable for at least MS Windows 98 OS • Agnitum Command Center successfully runs on ANY PC meeting Windows 2000 hardware requirements • Agnitum Command Center doesn’t have to be installed on company server Scalability Outpost Network Security is suitable for any network, supports VPN and ensures your company is 105% protected against all known attacks and spyware, whether you have tens or thousands of PCs to secure
  • 26. Contents Outpost Network Security – why would your company need it? Security threats Possible solutions: Hardware Firewall, Anti-Virus, Outpost Network Security What is Outpost Network Security Package contents How it all works? System requirements Support Why Outpost Network Security? How to purchase?
  • 27. How to download and purchase Outpost Network Security? • Download Outpost Network Security 15 day trial here: http:// agnitum.com/download/ons.html • Purchase online here: http://agnitum.com/purchase/shop/ons/businesslicense.html • Purchase through the network of our Solutions Providers or Distributors. To locate your nearest partner, please follow this link: http://agnitum.com/purchase/buyoffline.html • For additional information please see Outpost Network Security page on our website: http://agnitum.com/products/ons/index.html or contact us via email: ons@agnitum.com or phone: +7-812-336-5246
  • 28. Thank you for your attention! Yours sincerely, Agnitum Ltd. Team