isheriff CLOUD SECURITY

Similar documents
INTRODUCING isheriff CLOUD SECURITY

HIPAA DATA SECURITY & PRIVACY COMPLIANCE

The Advantages of Security as a Service versus On-Premise Security

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

WEBSENSE SECURITY SOLUTIONS OVERVIEW

V1.4. Spambrella Continuity SaaS. August 2

Putting Web Threat Protection and Content Filtering in the Cloud

Managing Web Security in an Increasingly Challenging Threat Landscape

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.6

Advantages of Managed Security Services

Endpoint Protection Small Business Edition 2013?

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Total Defense Endpoint Premium r12

What Do You Mean My Cloud Data Isn t Secure?

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

ThreatSTOP Technology Overview

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center

BitDefender Client Security Workstation Security and Management

Cisco Cloud Web Security

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Symantec Protection Suite Add-On for Hosted and Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Symantec Endpoint Protection

WHITE PAPER. Understanding How File Size Affects Malware Detection

Fighting Advanced Threats

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

AVeS Cloud Security powered by SYMANTEC TM

Intelligent, Scalable Web Security

The Hillstone and Trend Micro Joint Solution

Types of cyber-attacks. And how to prevent them

STPIC/Admin/002/ / Date: Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Symantec Endpoint Protection

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Symantec Messaging Gateway powered by Brightmail

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

McAfee Endpoint Protection Products

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

anomaly, thus reported to our central servers.

IBM Internet Security Systems

Marble & MobileIron Mobile App Risk Mitigation

AVG AntiVirus. How does this benefit you?

WEBSENSE TRITON SOLUTIONS

Building a Business Case:

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Protect Your Business and Customers from Online Fraud

Finding Security in the Cloud

Firewall and UTM Solutions Guide

Trend Micro Hosted Security Stop Spam. Save Time.

Commtouch RPD Technology. Network Based Protection Against -Borne Threats

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Advanced Persistent Threats

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Trend Micro Healthcare Compliance Solutions

Websense Messaging Security Solutions. Websense Security Websense Hosted Security Websense Hybrid Security

Content Security: Protect Your Network with Five Must-Haves

IBM Security X-Force Threat Intelligence

PULSE SECURE FOR GOOGLE ANDROID

SafeNet Content Security Product Overview. Protecting the Network Edge

TRITON APX. Websense TRITON APX

Top five strategies for combating modern threats Is anti-virus dead?

Spyware: Securing gateway and endpoint against data theft

The Challenge of a Comprehensive Network Protection. Introduction

Streamlining Web and Security

Protecting the Infrastructure: Symantec Web Gateway

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

WildFire. Preparing for Modern Network Attacks

Advantages of Managed Security Services

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Enterprise-Grade Security from the Cloud

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

On-Premises DDoS Mitigation for the Enterprise

Transcription:

isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console with a single set of enforceable security policies. isheriff ENDPOINT SECURITY Advanced anti-malware technology that protects your organization s endpoint devices from malware, secures & controls applications being used by end users and protects against threats from removable media (e.g. USB drives). isheriff WEB SECURITY Cloud-based URL filtering including sophisticated anti-malware security, application controls, real-time content analysis, outbound data leakage prevention, file download and upload management, and policy compliance. The service enables you to manage access to over 50 categories of Web content and applications with clear, useful Web activity reporting and detailed drilldown & alerting capabilities. isheriff EMAIL SECURITY Cloud-based, anti-spam and email threat prevention service. It rids your organization s email of spam and malware, providing a clean email connection and secures against viruses, blended threats, unwanted content and outgoing email data leakage.

Why Do I Need isheriff Cloud Security? Securing your organization from threats should be simple yet robust. With the increasing amount of malware, more sophisticated security threats, and increasingly complex security solutions, IT administrators face a daunting task in managing security. In addition, the growth of malware through the web and email has resulted in IT administrators having to manage multiple security products and multiple security policies. Organizations also have to contend with complex legal compliance requirements for the protection of private information, and employer obligations to ensure employees have a safe and productive working environment, free of offensive and malicious content. isheriff provides a simple, integrated, cloud-based security solution for endpoint, Web and email protection with the fast deployment, ease-of-use and cost efficiencies that IT has been demanding. Top 6 Reason To Choose isheriff Cloud Security 1. MULTI-LAYERED SECURITY isheriff is the only cloud-based security solution in the market to provide advanced endpoint, Web and email security with an integrated management console and a robust and highly flexible single policy engine 2. REMOTE USER PROTECTION isheriff Cloud Security protects all users irrespective of location corporate or remote office or airport or home by applying and enforcing your policies across users anywhere in the world 3. RAPID DEPLOYMENT & SIMPLE ADMINISTRATION Connect to the cloud service and you re immediately up and running. No tedious upgrades, no maintenance requirements: you always have the latest and best protection 4. NO UPFRONT EXPENDITURE & PREDICTABLE COSTS No additional hardware or IT staff training. isheriff s simple subscription fee fits into any budget and makes maintenance costs predictable 5. SCALABLE & PROVEN You gain the benefit of enterprise-scale email and web security infrastructure through isheriff s global data center network. Over 900 points of presence enable world-wide user access and roaming 6. THE EXPERTS WORK FOR YOU - Your endpoint, email, Web traffic is monitored 24/7 by Internet security experts and modeled against other networks to detect traffic anomalies. Maintenance and upgrades are managed via the cloud with no need to retouch every endpoint

ENHANCED SECURITY COMPREHENSIVE SECURITY IN A SINGLE SOLUTION ADVANCED ENDPOINT SECURITY FLEXIBLE APPLICATION CONTROLS SIMPLE AND EFFECTIVE WEB SECURITY ADVANCED CONTENT FILTERING REMOTE USER PROTECTION EMAIL PROTECTION DATA LOSS PREVENTION INTEGRATED POLICY ENGINE MULTI-PLATFORM SUPPORT MULTIPLE ANTI-MALWARE ENGINES Multi-layered protection, integrating endpoint anti-malware, secure Web filtering and email protection to block complex threats Protection from the latest Viruses, Spyware, Trojans, and other malware Create and enforce policies for which applications are permitted to be used by specific user profiles Secure against malware spreading through HTTP Enforce acceptable use policies and monitor and report on web content usage Secure corporate users and their data no matter where they are in the office, at home or at an airport Protect employees from spam, phishing emails, and blended threats Enforce data protection policies to prevent certain files types from being transmitted out of the company or from being downloaded through Web or email to an endpoint Administrators need to set up only one policy to protect endpoints, email and Web Traffic Support for Windows, Mac and Linux operating systems to ensure security coverage for most common platforms Multiple award winning anti-malware engines for Web, email and endpoint security provide multi-layered and superior protection against today s threats SIMPLIFIED SECURITY MANAGEMENT CLOUD-BASED MANAGEMENT CONSOLE SIMPLE SETUP AND QUICK DEPLOYMENT INFORMATIVE DASHBOARDS GRANULAR REPORTING LOWER TOTAL COST OF OWNERSHIP 24 X 7 SUPPORT Single cloud based console to manage endpoint, Web, and email security. Administrators no longer need to maintain and manage multiple security products IT Administrators just need to login to the cloud console to start using the product. There is no tedious installation required. The single policy engine, user based policy enforcement and integration with all major directory services makes deployment simple and straightforward Easy monitoring and tracking of key metrics and information related to Web, email, and endpoint security. Additional information such as bandwidth usage and top file types help administrators fine tune security policies Comprehensive and configurable reports give visibility into all events and user level activity to administrators isheriff s cloud-based product and simple subscription model enable administrators to avoid any upfront software licensing costs, hardware procurement & maintenance costs, and IT personnel & training costs. You can rest assured that isheriff s support organization is available round the clock to assist with any questions

THREAT TRENDS MALWARE Over 60,000 new pieces of malware are released daily, and over 75 million unique threats are currently in the wild The primary motivation behind malware is cybercrime, and its resultant costs are growing at over 400% annually Cybercriminals enjoy relative impunity due to low barriers of entry and commercially available malware kits Malware is becoming increasingly sophisticated: from mass attacks that can rapidly infect millions of computers turning them into bots to do the attacker s bidding, to scareware that intimidates victims into purchasing bogus malware-remediation solutions, to polymorphic malware that constantly changes making detection and blocking highly challenging, to banking Trojans designed to steal credentials Targeted Attacks such as Advanced Persistent Threats are especially dangerous: targeted at a particular organization or even specific employees, they utilize multi-vector attacks across Web and email in conjunction with zero-day vulnerabilities Threats can remain undetected for weeks or months, enabling criminals to steal sensitive corporate data and wreak financial havoc Infection has significant costs: from IT time spent remediating the attached, to lost data, valuable Intellectual Property and damage to the targeted organization s reputation WEB THREATS Over 85% of all threats are coming through the Web More than 6,000 Websites are infected with malware every day, and over 50% of the top daily search terms lead to infected sites many of which are legitimate sites that have become infected, rendering legacy black-list URL categorization and IP Reputation detection practically useless Web 2.0 and Social Media sites can be sources of new attack techniques such as like-jacking or photo-tagging to malicious applications and links, often spoofed to appear to be coming from contacts within your own trusted network EMAIL THREATS Over 75% of email is spam, consuming corporate bandwidth and requiring continual upgrades to network spending and email storage capacity Over 50% of malicious spam is blended attacks that are designed to trick recipients into clicking on a URL linking to a malicious Web page Spam volumes will continue to increase, driven by botnet growth and spammers efforts to overcome anti-spam technologies

isheriff SECURITY SPECIALISTS At isheriff, our commitment to our customers is the driving force behind everything we do. That s why isheriff goes beyond the standard customer service functions at competitive companies by assigning a designated Security Specialist to you. isheriff is the only cloud-based security company that provides a trained, knowledgeable single point of contact whose job is to guide you and keep you informed about the best ways to protect your most critical asset, your data. Our Security Specialists provide an additional layer of service and support. They are trained to advise you in this new era of cybercrime, and they are dedicated to both customers and partners based on your locations. Your Security Specialists Can: Design a security solution customized to meet the needs of your business Provide full security assessments as well as demos and trials of our solutions Engage and manage any tech support, license or account management questions Provide the latest info on current threats Help select the right channel partner for your specific needs Provide you with the highest levels of personal service in the industry Develop a Cloud Security Strategy Share Product Road Maps and Future Release schedules Provide competitive pricing, references and Free Trial copies upon request Contact a isheriff Security Specialist today at www.isheriff.com/specialist

About isheriff isheriff is the leading provider of content and endpoint security from the cloud. We keep organizations and individuals safe from cybercrime, malware and digital threats. Thousands of businesses across a wide array of industries have deployed our solutions, including some of the most sophisticated buyers of security technology worldwide. isheriff has operations in New York, California, Ireland and Asia. Free Trial isheriff s services can be easily and freely evaluated. Just provide us with some simple details via an online sign-up form and we can have a free 15-day trial of isheriff Cloud Security up and running for you within 24 hours. There is no obligation to subscribe and it is quick and easy to disconnect the service if you don t wish to continue. Sign up now at www.isheriff.com/cloudtrial isheriff Resources CLOUD SECURITY OVERVIEW CUSTOMER CASE STUDIES FREE TRIAL WHITEPAPERS SECURITY SPECIALISTS CUSTOMER SUPPORT OFFICE LOCATIONS www.isheriff.com/cloud www.isheriff.com/resources www.isheriff.com/cloudtrial www.isheriff.com/resources www.isheriff.com/specialist www.isheriff.com/support www.isheriff.com/contact