PRESENTATION FOR SWERN

Similar documents
Information Technology Solutions

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

Symantec Endpoint Protection

Kaseya IT Automation Framework

Guide to Intel Rapid Storage

Endpoint Protection Small Business Edition 2013?

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

AllianceIT Managed Services

The User is Evolving. July 12, 2011

Symantec Endpoint Protection Datasheet

System Management. What are my options for deploying System Management on remote computers?

Symantec Mobile Management 7.1

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Symantec Endpoint Protection

The ROI of Automated Agentless Endpoint Management

Symantec Mobile Management 7.2

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

InfraStruxure TM Management Software

Patch and Vulnerability Management Program

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

Extreme Networks Security Analytics G2 Risk Manager

IBM Endpoint Manager for Mobile Devices

Symantec Protection Suite Small Business Edition

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

Sygate Secure Enterprise and Alcatel

Symantec Endpoint Protection

Industrial Security for Process Automation

Symantec Endpoint Protection Analyzer Report

Managed Services. Business Intelligence Solutions

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

See all, manage all is the new mantra at the corporate workplace today.

Chapter 9 Firewalls and Intrusion Prevention Systems

Network Security Guidelines. e-governance

Symantec Mobile Management 7.1

Critical Security Controls

Call us today Managed IT Services. Proactive, flexible and affordable

Symantec Protection Suite Small Business Edition

Microsoft Windows Intune: Cloud-based solution

Endpoint protection for physical and virtual desktops

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Technical Note. CounterACT: Powerful, Automated Network Protection Inside and Out

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, Kaseya Catalog Kaseya Copyright All rights reserved.

Systems Manager Cloud Based Mobile Device Management

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Unified Threat Management, Managed Security, and the Cloud Services Model

Why you need an Automated Asset Management Solution

Managed Security Services for Data

Symantec Endpoint Protection

INFORMATION PROTECTED

IP Telephony Management

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Office of Information Technology Hosted Services Service Level Agreement FY2009

Asset. Unicenter Management r11

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

WhatsUp Gold vs. Orion

Secure Your Mobile Workplace

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

FUNCTIONAL OVERVIEW

Threat Management: Incident Handling. Incident Response Plan

IBM Security QRadar Risk Manager

MaaS360 Mobile Service

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Der Weg, wie die Verantwortung getragen werden kann!

Best Practices & Deployment SurfControl Mobile Filter v

Concierge SIEM Reporting Overview

Payment Card Industry Data Security Standard

McAfee Server Security

Operations Manager Comprehensive, secure remote monitoring and management of your entire digital signage network infrastructure

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Verizon Managed SD WAN with Cisco IWAN. October 28, 2015

Symantec Mobile Management for Configuration Manager 7.2

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Network Immunity Solution. Technical White paper. ProCurve Networking

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Endpoint Security Project: Vendor Recommendation Report

Cisco ISR Web Security with Cisco ScanSafe

How can I ensure that I have the correct version of the McAfee epo client with VirusScan & AntiSpyware?

Accessing Restricted University Online Resources Using Network Connect. on the Secure Remote Access Service

Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network strategy to meet new threats and achieve expanded business imperatives

Proactive IT Solutions More Reliable Networks Are Our Business

GFI White Paper PCI-DSS compliance and GFI Software products

Symantec Security Information Manager Version 4.7

Transcription:

PRESENTATION FOR SWERN C lick to editm astersubtitle style Michael Queenan

HISTORY Established, Growing Company Privately held Management team have history of successfully growing a company Over 50% of the company is technical Public Sector Focused Over 150 Customers within the Education market Manage security for over 500,000 ports

OFFERINGS Unified Network Adaptive 24 Firewall Threat Behaviour xnetwork 7 Support Management & IPS Security Analysis ACCESS SECURITY SERVICES VISIBILITY Unified Communications Device Wireless & User & Network LAN Infrastructures Access Flexible Core Control Managed & Network Secure Services Remote Network, Services Access Security & Training Consult

TECHNOLOGY PARTNERS VISIBILITY ACCESS SECURITY

DRIVING INNOVATION NA N C C ontrol acces s A the network Wirele s s Delivering to S ervices over wireles s B lock rog ue devices Flexible Acces s Network Vis ibility S pot unus ual behavior on the network Alert on virus outbreak

Some of our Customers

REMOTE SCANNING C lick to editm astersubtitle style SOLUTION FOR NorMAN

Remote Policy Checker "By introducing the remote scan to our students prior to them rriving at our University, has significantly improved their user xperience It allows them or their parents to check their device from home, to ensure it has the orrect level of criteria (Anti-Virus, Anti-Spyware, Microsoft/Apple Mac service packs) to meet ur Acceptable Use Policy. This then improves not only the student experience but also ecreases registration time, meaning more students on line quicker with no IT support tervention. We had 6000 students register within 5 days with very little impact on our ervice desk." Andrew Stansfield, IT Services Durham University

What does this provide? NorMAN consortium University Remote Scan Solution A fully customised web link with; Institution s Logo Customised content i.e. Acceptable Use Policy Customised Security Policy Check, scanning for; Anti-Virus, Anti-Spyware Microsoft OS and Apple Mac Particular registry keys Generic policy scan for colleges supported by the NorMAN consortium; A single generic web page with content and generic scan Optional fully customised web link as above (NorMAN OOH Helpdesk/NorMAN colleges); Set up and Annual cost required

Remote Scan WWW KHIPU / NORMAN www.durham.ac.uk/remotescan www.newcastle.ac.uk/remotescan www.northumbria.ac.uk/remotescan

SOLUTION FOR EMMAN: C lick to editm astersubtitle style Unified Visibility for Evolving Networks

What is Unified Visibility? Lancope S tealthwatch is a unified s ys tem for network vis ibility and s ecurity that leverag es exis ting infras tructure. Networ k Flows

What it is providing EMMAN Indentify m alicious activity inside the netw ork perim eter Forensic toolforincidentresponse and netw ork abuse investigations Sum m arise a large num berofnetw ork intelligence into a few key data points Proactively m anages the utilisation ofthe netw ork Autom ates a num berofreal-tim e actions around things like virus outbreaks and w orm s as they start As a res ult more bandwidth is available for productive us e within EMMAN and the reliability and availability of the network is als o enhanced N etw ork M anager U niversity ofn ottingham

End-to-End Security

Network overview

VIS IB ILITY AllD evices Identified; C lientpc s, U sers,printers,sw itches,ap s, Servers,R outers,n /W ports in use, F/W s EVER YTHING! TOPOLOGY VIEW FullInventory /AuditofEvery N etw ork D evice Locations (sites,floors etc)ofn etwork D evices Vis ual Audit / Inventory of entire Network

MALIC IOUS activity Library

MALIC IOUS activity Library

ALER T Library

US ER LOC K ED OUT Library

e - enforce N otification Page Fully C ustom isable USER NOTIFICATION D isplay W arning M essage D isplay Acceptable U se Policy if required O ptions fordepartm ents to register devices on the fly Provide C ontactd etails

End-to-End Security Security and Perform ance M onitoring forphysicaland VirtualN etw orks Leveraging infrastructure you already ow n Sim ple and fast deploym ent C ontextual inform ation to m ake fast and accurate decisions

Q&A THANK YOU ANY QUESTIONS?