Mp company overview 2014 0214 version 3

30
Technology Distribution 2014

description

Distribution of Data Security and Networking software in Israel.

Transcript of Mp company overview 2014 0214 version 3

Page 1: Mp company overview 2014 0214 version 3

Technology Distribution

2014

Page 2: Mp company overview 2014 0214 version 3

About MultiPoint

• MultiPoint was founded in April 2009• Managed by Arie Wolman and Ricardo Resnik• A Distributor of Security & Networking Software• Main exclusive product lines:― GFI Software, SpectorSoft, Centrify, IronKey,

Winmagic, GFI MAX, Sandbox, Data Point, etc.― Certified, Qualified and Credible Technical team― Value Added for the Channel and the End-Users

alike

Page 3: Mp company overview 2014 0214 version 3

About MultiPoint

" מ בע באפריל מולטיפוינט .2009נוסדה . רסניק וריקרדו וולמן אריה ידי על המנוהל

ברשתות וניהול מידע אבטחת תוכנות של מפיצה : עיקריים בלעדיים מוצר קווי

GFI Software, SpectorSoft, Centrify, IronKey, Winmagic, Secunia, GFI MAX, Sandbox, LiebSoft,

SecurEnvoy, Data Point, etc.ואמין מוסמך טכני צוות

כאחד קצה ומשתמשי שיווק לערוץ מוסף ערך

Page 4: Mp company overview 2014 0214 version 3

Customers

Page 5: Mp company overview 2014 0214 version 3

Network Security

• Security Scanning & Detection

• Network & SW Audit• End-Point Security• Email & Web Protection

Access Control

• Single Sign On• Network Access Control• Device Control• Application Control

Confidentiality

Compliance

Business Continuity

• Disk Encryption• Data in-Transit• Email Encryption

• Reporting• Auditing• SIM/SEM – Event Mgt

• Archiving• Data & System Backup• Disaster Recovery• Monitoring & Reporting

Risk Assessment

• Vulnerability Assessment• Patch & Remediation• Risk Management• Critical Assets & Network

RiskIT SecurityComponents

Solutions

Page 6: Mp company overview 2014 0214 version 3

Main Vendors

Page 7: Mp company overview 2014 0214 version 3

GFI solutions for business

» Email archiving

» Email compliance

» Fax management

Email and communications

» Granular Internet monitoring

» Detailed web filtering

» Browsing security

Web control

» Email security and anti-spam (both on premise and hosted)

Email security

» Antivirus

» Vulnerability scanning

» Patch management

Security

» Event monitoring and logging

» Network auditing and patch management

» Server monitoring

Auditing, monitoring and compliance

» Removable media management

Storage management

Page 8: Mp company overview 2014 0214 version 3

“I use GFI Cloud to ensureall my machines are operating at peak efficiency and to protect against threats.”

» Single integratedsolution to streamlineIT management

» Simple web-based interface

» Up and running in10 minutes or less

IT management

GFI Cloud

Page 9: Mp company overview 2014 0214 version 3

On-premise and SaaS/cloud

GFI on-premise catalogue GFI MSP/GFI Cloud platform

Remote access/Collaboration

Patch management

Vulnerability assessment

Email management, security, filtering

Email archiving

Mobile device management

Web monitoring

Anti-malware

Network monitoring

Monitoring

Patch management

Mobile device management

Anti-malware

Assetmanagement

Remoteaccess

Storage

GFI delivers software solutions to customers however they want it

Vulnerability assessment

Page 10: Mp company overview 2014 0214 version 3

“GFI LanGuard is like our company’s virtual security consultant. It’s a three-in-one power tool.”

» Centralizes patch management, vulnerability assessment and network auditing

» Help prove compliance with security standards

» Increases productivity for IT staff and end users

Patch management and vulnerability assessment

Page 11: Mp company overview 2014 0214 version 3

Solutions for service providers

GFI MAX RemoteManagement™

» Server, workstation and network monitoring and management for SMB networks

» Integrated remote access, patch management and antivirus capability

» Platform for delivery of integrated solution set to MSP customers

Remote monitoring and management

GFI MAX Cloud Monitoring

» Cloud infrastructure

» Cloud applications

Cloud services monitoring

GFI MAX Mail

» Hosted email security service

» Hosted email archive

Hosted email security, business continuity and archive services

Page 12: Mp company overview 2014 0214 version 3

2FA with SMS from SecurEnvoy

New “Voice Call” token option: users receive a landline-based telephone call and enter a passcode on the telephone key pad More user control: switch seamlessly between SMS delivery options, select soft token app on all leading smart phones and laptops or select the new voice call token type. Multi SMS Gateway with smart global routing permits the specifying of an unlimited number of SMS providers world wide Support for third party SMS Gateways that are e-mail based Improved cloud and multi-domain configurations with “per domain settings” for all major settings New “Token Type” section: allows administrator to specifying which types of token can be used New Soft Token for Apple Mac computers

Page 13: Mp company overview 2014 0214 version 3

WinMagic Encryption

Page 14: Mp company overview 2014 0214 version 3

WinMagic Encryption

»How PBConnex from WinMagic works

Page 15: Mp company overview 2014 0214 version 3

Secure Data Platform

Page 16: Mp company overview 2014 0214 version 3

Data Motion SecureMail

Page 17: Mp company overview 2014 0214 version 3

Spector 360 from Spectorsoft

Company-Wide Monitoring and Surveillance SoftwareMonitor All User and User Group Activity Across PCs, Macs, Laptops, and the Internet.

Email sent/receivedDocument tracking

File transfers

Network usage

Keystrokes typed

User activity

Applications used

Websites visited& Web Filtering

Chat & IM

Online searches

Screen activity / inactivity

Page 18: Mp company overview 2014 0214 version 3

The Most Advanced Monitoring Software

Discreet snapshot or sequential recording of all employee screen activities, files touched & keystrokes typed

Identify trends and patterns of behavior across company, department, group or individual

Find anything , including files touched, emails sent or received, websites visited, IM chats and keywords

Forensic level investigation. What, who and when? What’s happening now? What’s already happened? Contextual recording – before, during and after.

Set-up automatic alerts, fully customisable and powerful reporting functionality, automatic management reporting

Centralised Management

• Monitor

• Analyse

• Search

• Investigate

• Report

Page 19: Mp company overview 2014 0214 version 3

VIPRE AV Premium

• High-performance, proactive endpoint malware protection

• Completely new agent, combines antivirus, antispyware, and firewall

• Provides powerful protection against today’s most relevant highly complex threats

• Field-tested administrative console for central management

• All the features of VIPRE Enterprise, plus advanced firewall protection at all times.

Page 20: Mp company overview 2014 0214 version 3

Performance Leadership

Page 21: Mp company overview 2014 0214 version 3

של גישה Centrify:החזון ניהולאחידה

ענן, מבוססות ולתשתית המקומיות לתשתית ובקרה אבטחה ניהול

Centrify Mgmt Platform

Personal Devices

Mobile Devices

ServersApps

Centrify the Enterprise

קיימת – שכבר התשתית את :Active Directoryלמנף ל

ניהול אבטחה בקרהלגשת יכול המשתמש לאן משתמש הרשאות עשה המשתמש מה

Page 22: Mp company overview 2014 0214 version 3

Centrify Suite

Single Sign-Onמודולים לאפליקציות

• Apache and J2EE web applications• SAP NetWeaver & GUI• DB2

Centrify ניידים למכשירים• IOS• Android

Centrify Insight

Splunk-based analytics solutions

EXPRESS STANDARD ENTERPRISE PLATINUM

DirectSecureהעברת בזמן שרתים של והגנה בידודהמידע

DirectAuditמשתמש פעילות על מפורטת ביקורת

DirectAuthorizeתפקידים מבוססות הרשאות

DirectControlמרכזי וגישה הזדהות ניהול

DirectManageמרכזי ואדמיניסטרציה ניהול

Page 23: Mp company overview 2014 0214 version 3

The IronKey family

IRONKEY H100 EXTERNAL HDD

IRONKEY WORKSPACE IRONKEY SECURE S250 AND D250 DRIVES

IRONKEY F200 BIOMETRIC FLASH DRIVES

IRONKEY H80 EXTERNAL HDD

Page 24: Mp company overview 2014 0214 version 3

Ironkey D80

IRONKEY D80 HARDWARE ENCRYPTED FLASH DRIVE Strong, enterprise-grade AES 256-bit encryption Always-on hardware encryption Encryption happens inside the drive and the key never leaves the drive. Tough, durable, tamper-resistant enclosure Longer life, high-quality flash memory Smart, self-defending IronKey drive automatically reformats after 7 failed logins

PROTECT YOUR MOST SENSITIVE DATA We live and work in a mobile world, and you need to make sure your data is always available no matter where you go. But you can’t entrust your most sensitive and confidential information to just any flash drive. A poorly made drive won’t stand up to heavy use or break-in attempts, and drives selected on price alone could leave your valuable information vulnerable to corruption, infection or theft. For an easy-to-use and reliable way to protect your most sensitive data, turn to the IronKey D80 Hardware Encrypted Flash Drive. Even if the drive is lost or stolen, your confidential information will remain safeguarded

Page 25: Mp company overview 2014 0214 version 3

Ironkey BYODSuccess in the enterprise

SUCCESS REQUIRES ALL THREE ELEMENTS

SIMPLE

A solution that is easy for end-

users to use so they will embrace

it and require minimal training

SECURE

A solution that is highly secure to

protect confidential

information and enable regulatory

compliance

MANAGABLE

A solution that is centrally

manageable and mass-deployable to

suit the needs of enterprise and

government

Page 26: Mp company overview 2014 0214 version 3

Privileged Identity Management Solutions from Liebsoft

Enterprise Random Password Manager:

Automatically discover, secure, and audit the administrator, root, domain and service account passwords in your cross-platform enterprise – detecting dependent accounts and synchronizing privileged password changes to safeguard your infrastructure.

Random Password Manager:

Discover and secure the local administrator and root accountpasswords in your enterprise from a single console, all at once.

Password Spreadsheet Manager:Migrate shared account passwords from spreadsheets into a centralized password store accessible only to authorized individuals with audited records of password retrievals.

Self-Service and Help Desk Password Reset Solution: Account Reset Console

Grant end-users and the Help Desk a fast, secure, and audited means to reset and unlock domain account passwords through any web browser.

Page 27: Mp company overview 2014 0214 version 3

Altaro Hyper-V Backup

• Hyper-V Backup in 5 clicks - Hyper Easy, Hyper Fast, Hyper Effective• Works with: Windows 2008 R2 & Windows Server 2012• Tight Integration with Microsoft Technologies• Why Altaro?: Better price/Easier to use than competition• Fully Hyper-V Aware

– Does all the complex configuration connections and allows you to back up any VM instance in 5 click or less

– It supports all guest operating systems on Hyper-V (Linux, old Windows versions)– Lightweight console, resides directly on a Hyper-V host – no need to license another

OS, no agent, little disk space, select exactly what needs to be backed up Down to the file

Page 28: Mp company overview 2014 0214 version 3

ThreatTrack Sandbox

Page 29: Mp company overview 2014 0214 version 3

Value Added Distributor

Value Resellers

Added

VAD We sell only to resellers and system integrators

Presales assistanceDeal protectionRenewal AlertsTech Support

Sales CertificationOnline Technical TrainingBig discounts and rebates Lead generation

Telemarketing

Page 30: Mp company overview 2014 0214 version 3

שאלות?