We are opening new horizons for your business! International distributor of IT security solutions www.datawaysecurity.com 1
Information security is one of the most important aspects of modern business. As soon as the development of communication technologies make it easier to access data through an internal network or the Internet, grow the risks of unauthorized access to personal or corporate data. Company Overview The group of companies Dataway Security covers such territory markets as: Russia Ukraine Poland Estonia Lithuania Latvia Kazakhstan Dataway Security Ltd. Georgia Armenia (founded in 2010) Azerbaijan Office in Ukraine: Dataway Security L.L.P. founded in 2008, England, the main and only founder of the group of companies Dataway Security. 04111, Kiev, Str. Scherbakova, 45A, Tel.: (+380 44) 501-11-51 info@datawaysecurity.com OÜ Dataway Security (founded in 2012) Office in Estonia: OÜ Dataway Security 10621, Tallinn, Mustamäe tee 55, Tel.: (+372) 660-33-30, 660-33-31 info@datawaysecurity.com www.datawaysecurity.com 2
Vendors Overview www.datawaysecurity.com 3
Barracuda Networks Barracuda Networks offers products that protect organizations from threats over email, Web, and IM. With a strong security heritage, Barracuda Networks offers networking products that improve application delivery and network access with SSL VPN, Internet link load balancing, and server load balancing product lines. Finally, Barracuda Networks offers world-class solutions for backup and data protection that include message archiving, backup software and appliances, and offsite backup services. Content Security Networking Storage Barracuda Spam & Virus Firewall Barracuda Web Filter Barracuda Load Balancer Barracuda Message Archiver Barracuda Backup Service Barracuda IM Firewall Barracuda Link Balancer Barracuda Web Application Firewall Barracuda SSL VPN Yosemite Server Yosemite Backup Desktop/Laptop Backup www.barracudanetworks.com www.datawaysecurity.com 4
Trustwave Trustwave is the leading provider of on-demand data security and payment card industry compliance management solutions to businesses and organizations throughout the world. Trustwave has helped thousands of organizations ranging from Fortune 500 businesses and large financial institutions to small and mediumsized retailers manage compliance and secure their network infrastructure, data communications and critical information assets. Encryption Intrusion Detection Network Access Control Web Application Firewall Authentication Application Security Secure Email Web Content Monitoring Event Management Data Loss Prevention Intrusion Prevention Unified Thread Management www.trustwave.com www.datawaysecurity.com 5
Stonesoft Stonesoft Corporation delivers software based, dynamic and customer driven network security solutions that secure the information flow and simplify security management. The company s product portfolio consists of the industry s first transformable Security Engine, standalone next generation firewalls and intrusion prevention systems, and SSL VPN solutions. At the core lies Stonesoft s Management Center, which unifies the management of entire networks. StoneGate Management Center provides unified management for StoneGate Firewall, VPN, and IPS solutions. StoneGate Firewall with VPN creates a protective perimeter around your network, prevents attacks, and secures you information flow with Virtual Private Network (VPN). StoneGate Intrusion Prevention System (IPS) protects your internal network and vulnerable servers, stopping attacks before damage occurs. StoneGate SSL VPN offers secure remote access to applications via web interface. The VPN solution can be used with a standard Web browser. www.stonesoft.com www.datawaysecurity.com 6
M86 Security M86 Security is the global expert in real-time threat protection and the industry's leading Secure Web Gateway provider. The company protects organizations of all sizes from advanced threats and data loss, while enabling productive access to the today's critical Internet tools, including Web 2.0 and social media. By offering appliance, Software as a Service, hybrid and cloud-based solutions, M86 Security is able to meet industry- and budget-specific requirements, as well as extend full security to remote and mobile users anywhere. M86 Email Gateway Security M86 Secure Web Gateway www.m86security.com www.datawaysecurity.com 7
GTB Technologies GTB's Complete Extrusion / Data Loss Prevention Platform Based on patent pending, proprietary technology; GTB's Extrusion Prevention / Data Loss Prevention Inspector is the cornerstone of it's award winning data security products. The Platform includes a centralized management and reporting framework with physical and virtual appliance delivery options. www.gtbtechnologies.com www.datawaysecurity.com 8
ObserveIT ObserveIT Enterprise for User Activity Monitoring: Get Compliant with Citrix, SSH and RDP Recording Captures video recording of all user activity; Generates textual audit logs for every app (even apps that have no internal logging!); Identifies shared-account users ('admin') and detects identity theft; Complete coverage: All applications; All users; All protocols and environments; All sessions www.observeit-sys.com www.datawaysecurity.com 9
LogRhythm LogRhythm is an enterprise-class platform that seamlessly combines Log Management & SIEM 2.0, File Integrity Monitoring, and Host Activity Monitoring into a single integrated solution. It is designed to address an everchanging landscape of threats and challenges, with a full suite of high-performance tools for security, compliance, and operations. LogRhythm delivers comprehensive, useful and actionable insight into what is really going on in and around an enterprise IT environment. www.logrhythm.com www.datawaysecurity.com 10
Winmagic Encryption of sensitive data and personal identifiable information (PII) is no longer optional. Whether it is data breach legislation, privacy regulation or good old fashioned intellectual property protection, organizations must protect their sensitive data. In today s increasingly mobile world, you must mitigate the risks and control the exposure associated with data at rest on hard drives, removable media, and other endpoints. WinMagic s SecureDoc solutions provide a complete and robust range of capability to help ensure your sensitive data is secure. www.winmagic.com www.datawaysecurity.com 11
Cidway Authentication and transactions should be safe, reliable and easy for anyone, anywhere, anytime This vision is fuelled by: Meeting virtually all authentication requirements; Making Authentication & Transactions simple, easy, accessible, secure and user friendly; Addressing virtually unlimited vertical applications from one platform; One server for multiple tokens SESAMI Mobile Time based OTP Software token for mobile phones. GAIA Server Authentication platform Hardware Tokens Convergence of physical & logical access SESAMI Mobile SDK Time based OTP Token SDK for mobile phones GAIA SDK Authentication platform SDK SESAMI SMS SMS based OTP for mobile phones www.cidway.com www.datawaysecurity.com 12
FEITIAN Feitian's major business covers Software Protection, Strong Authentication, Smartcard COS and Peripherals. Feitian cooperates closely with global leading smartcard chip providers, serves valuable customers with the world's latest technologies via its expanding sales and services network internationally. Feitian's USB interfaced Software Protection Dongle, Strong Authentication USB Key, and Smartcard Reader are CE and FCC certified and RoHS compliant. CPU or smart card based security device, providing secured information storage, designed for software licensing, data encryption, software copy protection and software piracy protection. Smart card based two-factor authentication security device, designed for strong authentication, used for networking logon, access control, identification management, digital signature, document encryption, etc. Feitian provides a wide range of smart card products including GSM SIM card, CDMA RUIM card, Java card,.net card, PKI card, Creative card, payment card and ID card, etc. OTP, One-Time Password strong authentication token, providing zero footprint solution. Feitian OTP tokens are developed based on OATH, it can be seamlessly integrated with any other 3rd party authentication server that supports OATH standard. The smart card reader is an intermediate device between the smart card and the host computer. It communicates with the smartcard in accordance with a contact or contactless communication protocol. It is absolutely necessary to test, manage, distribute and search the smart card with a computer. www.ftsafe.com www.datawaysecurity.com 13
BlockMaster A central management solution will take you beyond data confidentiality and further ensure the integrity and availability of your stored data. Share and synchronize data over a secure PIPE with clients, partners and coworkers back and forth without risking data leaks or non-compliance. YOUR PORTABLE DATA IS NO LONGER AT RISK With SafeStick, even if lost, your data is always secure. Password-protected, militarygrade encrypted and capable of securing up to 128GB of data, SafeConsole Ready Devices can help you eliminate the risk of data breach. NEVER LOSE YOUR PORTABLE DATA By managing your secure USB drives with SafeConsole, you will never lose all those work-hours spent on the content of the drives. The Backup feature in SafeConsole makes sure that all your files are securely stored, ready to be recovered on a new drive, whenever you need them. www.blockmastersecurity.com www.datawaysecurity.com 14
Zenprise Zenprise is the leader in secure mobile device management, protecting the mobile enterprise end-to-end with the industry s easiest-to-use MDM solution. Zenprise Mobile Manager, our on-premise solution lets you secure and manage the most comprehensive array of mobile devices, gain visibility into and control over mobile apps, and shield the corporate network from mobile threats. Zenprise MobileManager : Zenprise is the leader in secure mobile device management, protecting the mobile enterprise end-to-end with the industry s easiest-to-use MDM solution. Zenprise MobileManager, our onpremise solution lets you secure and manage the most comprehensive array of mobile devices, gain visibility into and control over mobile apps, and shield the corporate network from mobile threats. www.zenprise.com www.datawaysecurity.com 15
istorage istorage is fast establishing itself as the leading global provider of PIN activated, hardware encrypted, portable data storage solutions. We provide enterprise and government clients as well as consumers with products that enable them to securely compute, protecting their data, whenever and wherever. diskashur The diskashur is the world's most secure and portable encrypted USB 3.0 Hard Drive, enabling you to access the drive with your own unique pin and now at data transfer speeds of up to 10X faster than USB 2. diskashurdt The istorage Desktop Secure Hard Drive is the world's first portable hardware encrypted hard drive and solid state drive (SSD) with PIN code access and capacities of up to 3TB. It utilises military grade AES 256-bit hardware encryption, which encrypts all data stored on the drive in real time. datashur The istorage datashur is the world' s most secure, easy to use and affordable USB flash drive, employing PIN code access with military grade AES 256-bit hardware encryption. diskg The diskg* is the world's most secure, compact and affordable USB2 portable hard drive and solid state drive (SSD), employing PIN code access with AES 128 or 256 bit hardware encryption. www.istorage-uk.com www.datawaysecurity.com 16
Products and Solutions Customers Worldwide www.datawaysecurity.com 17
Products and Solutions Customers in Ukraine www.datawaysecurity.com 18
Thank you! Office in Ukraine: Company Dataway Security 04111, Kiev, Str. Scherbakova, 45A Tel.: (+380 44) 501-11-51 info@datawaysecurity.com www.datawaysecurity.com Office in Estonia: OÜ Dataway Security 10621, Tallinn, Mustamäe tee 55 Tel.: (+372) 660-33-30, 660-33-31 info@datawaysecurity.com www.datawaysecurity.com www.datawaysecurity.com 19