4. هیل کوییک درباره
هیل کوییک جهانی حضور
Quick Heal has pan-India presence
through its own offices
33 cities
Retail
vertical with around
15,000
partners
Mobile vertical with around
1,500 partners.
Partnership with service
providers, bankers, etc.
Enterprise vertical with
separate partners
of around
2,000
Dedicated
Government
& Education
vertical
Marketing activities are coordinated
by the Head Office – Pune
Quick Heal
Head Office
Quick Heal
Technologies
Japan K.K
Quick Heal
Technologies
America Inc
Quick Heal
Technologies
Africa Ltd.,
Nairobi
Quick Heal Tech
(MENA) FZE,
Dubai
End Customers Over 85 Million
7. بدافزارها خطرات و تهدیدها افزایش
هیل کوییک درباره
THREATS DAILY
On an average
R&D receives
100,000
Phishing Attacks were
Detected in 2014
18,000
Over Top web categories hosting Phishing Sites:
•Finance
•Search Engines & Portals
•Government
Potentially Unwanted Downloads:
Trojans
1,145,488
Malicious Applications
1,255,437
Worms
159,536
Backdoor
90,606
8. خطرات دیگر و هدفمند پیشرفته حمالت افزایش
هیل کوییک درباره
Advanced Persistent Threats (APTs) are
targeted cyber-attacks designed to dodge an
organization’s technical countermeasures.
APTs are specifically designed to bypass
firewalls, intrusion detection systems, and anti-
malware programs.
Source: PWC
3.4
million
9.4
million
22.7
million
24.9
million
28.9
million
42.8
million
2009 2010 2011 2012 2013 2014
Total number of Security
Incidents to grow 66% CAGR
22. Seqrite
TERMINATOR
Seqrite Endpoint Security
File Activity
Monitor
Redirection of
Specific
Groups/Clients
License History
Web Security
Advanced
Device Control
Data Loss
Prevention
EPS Total & EPS
Business
Automatic
Link Failover
Firewall
Content
Filtering
VPN
Gateway
Antivirus
Bandwidth
Manager
1+ million Enterprise Workstations
Seqrite
MDM
New
Cloud-based
solution
Easy and quick
enrollment
Profile
management
Security
management
Asset
management
Unified
management
console
Seqrite
Cloud
سازمانی محصوالت
23. Endpoint Security – An Overview
Let’s You Be In Control of All Endpoints in Your Network.
Prevention & Monitoring
Data Loss Prevention
Asset Management
Web Security
Phishing Protection
Browsing Protection
Core Protection
IDS / IPS
Firewall Protection
Deployment & Redirection
Easy Deployment and Maintenance
Redirection of Specific Groups/Clients
Group Policy Management
Scan & Update Management
Vulnerability Scan
System Scan
24. Endpoint Security – Integrated Technologies Under One Console
Let’s You Be In Control of All Endpoints in Your Network.
Prevention &
Monitoring
Web
Security
Core
Protection
Scan & Update
Management
Deployment &
Redirection
Prevention &
Monitoring
Web
Security
Core
Protection
Scan & Update
Management
Deployment &
Redirection
Results:
Increased Protection, Control and Manageability
Reduced Cost, Complexity and Exposure to Risks
25. Endpoint Security – How we lower costs, and increase protection?
Threats Difficulty Cost
• Patented core-antivirus engine
combined with IPS/IDS defends
against zero-day and targeted
attacks.
• Browser sandbox runs websites in
a safe environment so malicious
threats are blocked.
• Locating source of infection
enables immediate action.
• Data Loss Prevention and
Advanced Device control help
protect against data loss and
intellectual property theft.
• Monitoring file activity notifies on
actions (copy, delete, move)
taken on sensitive files.
• Single, centralized consoles
allows regularization of
technologies.
• Easy-to-use UI allows simple
configuration of IT policies and
deployment.
• Boot-time scan provides a hassle-
free way to disinfect malware that
cannot be removed manually.
• Single product, license, Business
Critical Services program – includes
(Incident Response Team)
• Operational efficiency
• Seqrite-Cloud implementation
allows management of security in
multiple branches and remote
offices thereby reducing manpower
investment.
26. Unified Threat Management Solution
Firewall
IDS/IPS (Intrusion
detection/prevention)
Content Filtering
Anti Spam/Anti
Malware
Remote
Users
Second End User
VPN
Internet
Unfiltered Network Stream
Filtered Network Stream
TERMINATOR
27. Unified platform for managing and monitoring multiple mobile devices
Unified Management
Console
Proactive Security
Management
Panoramic Asset
Management
Effortless Device
Enrollment
Instant & Detailed
Audits
Flexible Profile
Management
Mobile Device Management
28. کنترل و مدیریت ،سازی امن
•Strong, fast, scalable defense for every device
and every threat
•Security against stealthy attacks, behavioral
anti-malware and dynamic whitelisting in
addition to the essential antivirus, antispam,
web security, firewall and intrusion prevention
Smart, Robust Protection
•Safeguards all the OS platforms in your
enterprise: Windows, Macs, Linux systems
•Trim costs, reduce endpoint management
complexity and quickly respond to events with in-
depth reports.
•Integrated tools for effective virus protection,
web security and antispam.
Simple-to-manage Suite
Seqrite Endpoint Security
30. ناش و شده شناخته تهدیدات بالدرنگ شناساییناس
Sample Collection
Automated Analysis
(Execution of samples
under various virtual
environments & using
different tools like
sandboxing etc.)
Categorization
(Based on behaviour
and characteristics)
Detection
Release Virus
Definition Updates
Customers, DNA
Scan technology,
Honey pot, etc.
Seqrite Endpoint Security
35. دارایی مدیریتAsset Management
Gives administrators comprehensive knowledge about the
hardware and software configuration of every endpoint.
Administrators can get information on hardware configuration,
system information, updates installation and
hardware/software changes for every system.
Seqrite Endpoint Security
36. اطالعات نشت از محافظتData Loss Prevention
With DLP, you can quickly and easily monitor real-time events
and apply centrally managed security policies to regulate and
restrict how employees use and transfer sensitive data without
impacting employee productivity.
How Data Loss Prevention works
STEP 1 STEP 2 STEP 3 STEP 4
An Employee tries to
send confidential data
out of the company
via email or USB.
Seqrite DLP Scans It checks the
document for
policy violations.
Violations Detected
Action Blocked
X
Violation?
Seqrite Endpoint Security
40. یکپارچه مدیریتی کنسول
Seqrite Endpoint Security
The Web based Administrative & Reporting interface meets
the needs of management and IT security staff.
Gives real-time information about organization-wide
controlled devices and data transfer activity.
43. Research &
Development
850+ R&D Engineers
Support
170+ Support Engineers;
Multi-lingual and
Multi-modal Support
Product Availability
& Reach to Our
Customers
33 branches in India, 4
Global Offices, 15000+
Channel Partners
WHAT MAKES US DIFFERENT