International distributor of IT security solutions



Similar documents
IT Security. Muscat 15+ ABOUT US IN A GLANCE

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Securing the Service Desk in the Cloud

Security Overview Enterprise-Class Secure Mobile File Sharing

RSA SecurID Two-factor Authentication

How to Turn the Promise of the Cloud into an Operational Reality

Managed Security Services for Data

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

BMC s Security Strategy for ITSM in the SaaS Environment

Using Entrust certificates with VPN

Achieving PCI-Compliance through Cyberoam

Unified Threat Management, Managed Security, and the Cloud Services Model

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT

Security Considerations for DirectAccess Deployments. Whitepaper

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

STRONGER AUTHENTICATION for CA SiteMinder

mcard CPK Supported Solutions

How To Protect Your Data From Being Hacked

UNCLASSIFIED. UK Archiving powered by Mimecast Service Description

Longmai Mobile PKI Solution

Strong Authentication for Secure VPN Access

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

EasiShare Whitepaper - Empowering Your Mobile Workforce

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

SecureAge SecureDs Data Breach Prevention Solution

Payment Card Industry Data Security Standard

Readiness Assessments: Vital to Secure Mobility

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

Is Your Vendor CJIS-Certified?

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

DOBUS And SBL Cloud Services Brochure

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

Sophistication of attacks will keep improving, especially APT and zero-day exploits

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

White Paper. ZyWALL USG Trade-In Program

IT Security. Securing Your Business Investments

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

The Convergence of IT Security and Physical Access Control

Guardian365. Managed IT Support Services Suite

The Convergence of IT Security and Physical Access Control

How To Protect Your Network From Attack From A Network Security Threat

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Cloud and Data Center Security

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Research Information Security Guideline

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

overview Enterprise Security Solutions

Preemptive security solutions for healthcare

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Simplify Your Network Security with All-In-One Unified Threat Management

Enterprise Data Protection

2012 North American Managed Security Service Providers Growth Leadership Award

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

ADDING STRONGER AUTHENTICATION for VPN Access Control

Tenzing Security Services and Best Practices

Authentication Solutions

Cisco SecureX Product Brochure

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

How To Secure Your Store Data With Fortinet

Symantec Messaging Gateway 10.6

custom hosting for how you do business

Security Architecture Whitepaper

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

PCI DSS COMPLIANCE DATA

Injazat s Managed Services Portfolio

A brief on Two-Factor Authentication

Network and Security Controls

A Guide to New Features in Propalms OneGate 4.0

We are an IT solutions based company that prides itself on excellent customer service with a commitment to providing quality workmanship.

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Brainloop Cloud Security

Barracuda Backup. Michael Ulrich Channel Sales Manager Switzerland

TABLE OF CONTENTS. Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13

SafeNet Securing Microsoft Solutions

Devising a Server Protection Strategy with Trend Micro

PULSE SECURE FOR GOOGLE ANDROID

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

OVERVIEW. Enterprise Security Solutions

Integrating Single Sign-on Across the Cloud By David Strom

Outlook. Sharepoint. Lync. BlackBerry. McAfee. Microsoft Hosted Exchange

Network Security Guidelines. e-governance

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)

Transcription:

We are opening new horizons for your business! International distributor of IT security solutions www.datawaysecurity.com 1

Information security is one of the most important aspects of modern business. As soon as the development of communication technologies make it easier to access data through an internal network or the Internet, grow the risks of unauthorized access to personal or corporate data. Company Overview The group of companies Dataway Security covers such territory markets as: Russia Ukraine Poland Estonia Lithuania Latvia Kazakhstan Dataway Security Ltd. Georgia Armenia (founded in 2010) Azerbaijan Office in Ukraine: Dataway Security L.L.P. founded in 2008, England, the main and only founder of the group of companies Dataway Security. 04111, Kiev, Str. Scherbakova, 45A, Tel.: (+380 44) 501-11-51 info@datawaysecurity.com OÜ Dataway Security (founded in 2012) Office in Estonia: OÜ Dataway Security 10621, Tallinn, Mustamäe tee 55, Tel.: (+372) 660-33-30, 660-33-31 info@datawaysecurity.com www.datawaysecurity.com 2

Vendors Overview www.datawaysecurity.com 3

Barracuda Networks Barracuda Networks offers products that protect organizations from threats over email, Web, and IM. With a strong security heritage, Barracuda Networks offers networking products that improve application delivery and network access with SSL VPN, Internet link load balancing, and server load balancing product lines. Finally, Barracuda Networks offers world-class solutions for backup and data protection that include message archiving, backup software and appliances, and offsite backup services. Content Security Networking Storage Barracuda Spam & Virus Firewall Barracuda Web Filter Barracuda Load Balancer Barracuda Message Archiver Barracuda Backup Service Barracuda IM Firewall Barracuda Link Balancer Barracuda Web Application Firewall Barracuda SSL VPN Yosemite Server Yosemite Backup Desktop/Laptop Backup www.barracudanetworks.com www.datawaysecurity.com 4

Trustwave Trustwave is the leading provider of on-demand data security and payment card industry compliance management solutions to businesses and organizations throughout the world. Trustwave has helped thousands of organizations ranging from Fortune 500 businesses and large financial institutions to small and mediumsized retailers manage compliance and secure their network infrastructure, data communications and critical information assets. Encryption Intrusion Detection Network Access Control Web Application Firewall Authentication Application Security Secure Email Web Content Monitoring Event Management Data Loss Prevention Intrusion Prevention Unified Thread Management www.trustwave.com www.datawaysecurity.com 5

Stonesoft Stonesoft Corporation delivers software based, dynamic and customer driven network security solutions that secure the information flow and simplify security management. The company s product portfolio consists of the industry s first transformable Security Engine, standalone next generation firewalls and intrusion prevention systems, and SSL VPN solutions. At the core lies Stonesoft s Management Center, which unifies the management of entire networks. StoneGate Management Center provides unified management for StoneGate Firewall, VPN, and IPS solutions. StoneGate Firewall with VPN creates a protective perimeter around your network, prevents attacks, and secures you information flow with Virtual Private Network (VPN). StoneGate Intrusion Prevention System (IPS) protects your internal network and vulnerable servers, stopping attacks before damage occurs. StoneGate SSL VPN offers secure remote access to applications via web interface. The VPN solution can be used with a standard Web browser. www.stonesoft.com www.datawaysecurity.com 6

M86 Security M86 Security is the global expert in real-time threat protection and the industry's leading Secure Web Gateway provider. The company protects organizations of all sizes from advanced threats and data loss, while enabling productive access to the today's critical Internet tools, including Web 2.0 and social media. By offering appliance, Software as a Service, hybrid and cloud-based solutions, M86 Security is able to meet industry- and budget-specific requirements, as well as extend full security to remote and mobile users anywhere. M86 Email Gateway Security M86 Secure Web Gateway www.m86security.com www.datawaysecurity.com 7

GTB Technologies GTB's Complete Extrusion / Data Loss Prevention Platform Based on patent pending, proprietary technology; GTB's Extrusion Prevention / Data Loss Prevention Inspector is the cornerstone of it's award winning data security products. The Platform includes a centralized management and reporting framework with physical and virtual appliance delivery options. www.gtbtechnologies.com www.datawaysecurity.com 8

ObserveIT ObserveIT Enterprise for User Activity Monitoring: Get Compliant with Citrix, SSH and RDP Recording Captures video recording of all user activity; Generates textual audit logs for every app (even apps that have no internal logging!); Identifies shared-account users ('admin') and detects identity theft; Complete coverage: All applications; All users; All protocols and environments; All sessions www.observeit-sys.com www.datawaysecurity.com 9

LogRhythm LogRhythm is an enterprise-class platform that seamlessly combines Log Management & SIEM 2.0, File Integrity Monitoring, and Host Activity Monitoring into a single integrated solution. It is designed to address an everchanging landscape of threats and challenges, with a full suite of high-performance tools for security, compliance, and operations. LogRhythm delivers comprehensive, useful and actionable insight into what is really going on in and around an enterprise IT environment. www.logrhythm.com www.datawaysecurity.com 10

Winmagic Encryption of sensitive data and personal identifiable information (PII) is no longer optional. Whether it is data breach legislation, privacy regulation or good old fashioned intellectual property protection, organizations must protect their sensitive data. In today s increasingly mobile world, you must mitigate the risks and control the exposure associated with data at rest on hard drives, removable media, and other endpoints. WinMagic s SecureDoc solutions provide a complete and robust range of capability to help ensure your sensitive data is secure. www.winmagic.com www.datawaysecurity.com 11

Cidway Authentication and transactions should be safe, reliable and easy for anyone, anywhere, anytime This vision is fuelled by: Meeting virtually all authentication requirements; Making Authentication & Transactions simple, easy, accessible, secure and user friendly; Addressing virtually unlimited vertical applications from one platform; One server for multiple tokens SESAMI Mobile Time based OTP Software token for mobile phones. GAIA Server Authentication platform Hardware Tokens Convergence of physical & logical access SESAMI Mobile SDK Time based OTP Token SDK for mobile phones GAIA SDK Authentication platform SDK SESAMI SMS SMS based OTP for mobile phones www.cidway.com www.datawaysecurity.com 12

FEITIAN Feitian's major business covers Software Protection, Strong Authentication, Smartcard COS and Peripherals. Feitian cooperates closely with global leading smartcard chip providers, serves valuable customers with the world's latest technologies via its expanding sales and services network internationally. Feitian's USB interfaced Software Protection Dongle, Strong Authentication USB Key, and Smartcard Reader are CE and FCC certified and RoHS compliant. CPU or smart card based security device, providing secured information storage, designed for software licensing, data encryption, software copy protection and software piracy protection. Smart card based two-factor authentication security device, designed for strong authentication, used for networking logon, access control, identification management, digital signature, document encryption, etc. Feitian provides a wide range of smart card products including GSM SIM card, CDMA RUIM card, Java card,.net card, PKI card, Creative card, payment card and ID card, etc. OTP, One-Time Password strong authentication token, providing zero footprint solution. Feitian OTP tokens are developed based on OATH, it can be seamlessly integrated with any other 3rd party authentication server that supports OATH standard. The smart card reader is an intermediate device between the smart card and the host computer. It communicates with the smartcard in accordance with a contact or contactless communication protocol. It is absolutely necessary to test, manage, distribute and search the smart card with a computer. www.ftsafe.com www.datawaysecurity.com 13

BlockMaster A central management solution will take you beyond data confidentiality and further ensure the integrity and availability of your stored data. Share and synchronize data over a secure PIPE with clients, partners and coworkers back and forth without risking data leaks or non-compliance. YOUR PORTABLE DATA IS NO LONGER AT RISK With SafeStick, even if lost, your data is always secure. Password-protected, militarygrade encrypted and capable of securing up to 128GB of data, SafeConsole Ready Devices can help you eliminate the risk of data breach. NEVER LOSE YOUR PORTABLE DATA By managing your secure USB drives with SafeConsole, you will never lose all those work-hours spent on the content of the drives. The Backup feature in SafeConsole makes sure that all your files are securely stored, ready to be recovered on a new drive, whenever you need them. www.blockmastersecurity.com www.datawaysecurity.com 14

Zenprise Zenprise is the leader in secure mobile device management, protecting the mobile enterprise end-to-end with the industry s easiest-to-use MDM solution. Zenprise Mobile Manager, our on-premise solution lets you secure and manage the most comprehensive array of mobile devices, gain visibility into and control over mobile apps, and shield the corporate network from mobile threats. Zenprise MobileManager : Zenprise is the leader in secure mobile device management, protecting the mobile enterprise end-to-end with the industry s easiest-to-use MDM solution. Zenprise MobileManager, our onpremise solution lets you secure and manage the most comprehensive array of mobile devices, gain visibility into and control over mobile apps, and shield the corporate network from mobile threats. www.zenprise.com www.datawaysecurity.com 15

istorage istorage is fast establishing itself as the leading global provider of PIN activated, hardware encrypted, portable data storage solutions. We provide enterprise and government clients as well as consumers with products that enable them to securely compute, protecting their data, whenever and wherever. diskashur The diskashur is the world's most secure and portable encrypted USB 3.0 Hard Drive, enabling you to access the drive with your own unique pin and now at data transfer speeds of up to 10X faster than USB 2. diskashurdt The istorage Desktop Secure Hard Drive is the world's first portable hardware encrypted hard drive and solid state drive (SSD) with PIN code access and capacities of up to 3TB. It utilises military grade AES 256-bit hardware encryption, which encrypts all data stored on the drive in real time. datashur The istorage datashur is the world' s most secure, easy to use and affordable USB flash drive, employing PIN code access with military grade AES 256-bit hardware encryption. diskg The diskg* is the world's most secure, compact and affordable USB2 portable hard drive and solid state drive (SSD), employing PIN code access with AES 128 or 256 bit hardware encryption. www.istorage-uk.com www.datawaysecurity.com 16

Products and Solutions Customers Worldwide www.datawaysecurity.com 17

Products and Solutions Customers in Ukraine www.datawaysecurity.com 18

Thank you! Office in Ukraine: Company Dataway Security 04111, Kiev, Str. Scherbakova, 45A Tel.: (+380 44) 501-11-51 info@datawaysecurity.com www.datawaysecurity.com Office in Estonia: OÜ Dataway Security 10621, Tallinn, Mustamäe tee 55 Tel.: (+372) 660-33-30, 660-33-31 info@datawaysecurity.com www.datawaysecurity.com www.datawaysecurity.com 19