Mission Statement: Safe And Secured Data But Easyaccess Withpermission .

Transcription

Mission Statement:Safe and secured data but easy access with permission Vision Statement:Safe and most secured data world The Cyber Security Expertswww.nirajinfo.in

Type Of Protection Periphery Protection? Server Protection? Endpoint Protection?DATA AccessibilityAvailabilityBackupDLP, Risk ManagementDiscovery

SolutionsBrandsThe Cyber Security ExpertsDescriptionData Leak PreventionUser Behavior AnalysisAnti-Malware (Behavior based Prevention, AI, APT, EndpointSecurity)Data Discovery, Protection, Classification, Threat Detection & Response, ComplianceVulnerability Scanner & Assessment, PenetrationTestingData Backup & Disaster RecoveryAutomated DataBackupSecure Remote AccessBulk - Mail blast tool with automation andanalytics

Somansa: Privacy-i Endpoint DLPPrivacy-i and Data Security Process Privacy-i protects sensitive data at rest- Privacy-i is designed to follow phases set out in the data protectionslawsDISCOVER Sensitive Data Scan and Locate sensitive data(PCs, Servers, Databases) Encrypt or Delete DataPREVENT Data Breach Prevent data breach via removablestorage,printer, network services(e.g.email)REPORT Real-time Alerts ofincidents Event logs and forensicevidenceCentral Data ManagementEmployeesConsolePC AgentStrategy 1Strategy 2Strategy 3-Define, Who, What, Where Sensitive DataStored.- Complete visibility of sensitive data withinthe organization-Create breach prevention policy tuned foreach organization-Monitor for policy violations, blockunauthorized use of removable disk, printer, orupload on the internet-Real-time event monitoring, loganalysis,user/file activity analysis helpsecurity teamto detect, respond to potentialbreach-Audit trail for compliance

Somansa: Mail-i Network DLPMail-i: E-mail & NetApps Control/MonitorMail-i protects sensitive data in motion- Mail-i Logs outgoing data in a real-time (email, social media, messenger, cloud service, etc)Mail-i data Logging & Granular ControlInstant Messenger(Web,Apps)-E-mail data logging(real-time)-Access, Writing, File transfer-Support popular messengers-Access, Writing, File transferSocial MediaCloud Storage-Logs uploaded contents-Access, Writing, Filetransfer-Logs transferred data-Control over various SaaSiCloudYahoo!E-mail(SMTP, POP3,IMAP)SSLTrafficTraffic is decrypted andforwarded (overhead)Mail-i ModuleS/WData PreventionandRelay of traffic(overhead)Client PCPolicyRulesHIPAAPCI-DSSGBLAPrivacyLaws

SOMANSA’S STRENGTHSDo you want to use onlyMultiple products, One viewapproved USB?Unauthorized USB READ (X), WRITE (X)All products can be managed by oneAuthorized USB READ (O), WRITE (O)central consoleCentral ManagementMust obtain approval totransfer filesSOMANSAUnauthorized transfer of data fromRequestapprovaldesktop PC is blocked withoutSetPolicy/ApplyBlock/Allowlogs andcopiedfilesFast Search & Report Big Datapermission / approvalReturn search results in max. 3 minutes(in millions of logs / more than 30keywords)What if there’s sensitive data in the image ?Sensitive data in image file can be detected as OCRfeature (Optical Character Recognition)

Structure of SOMANSA’s DLPIntegrated PoliciesIntegrated Management Control

SOMANSA Who we are ?Over 20 years experiencein Electronic Data Security andManagement2000 worldwideWorld’s Top 10 GartnercustomerMagic Quadrantfrom large enterprises to smalland medium businessesFirst and Only AsianCompanyLeader in Data SecurityData loss prevention (DLP)and database activitymonitoring solutionsGartner Magic QuadrantListed as the world’s Top 10Enterprise DLP solution inGartner Magic Quadrant (16-17)( Out of 100 Products )Magic QuadrantEnterprise DLPForrester ResearchSC Magazine UKEndpoint DLP ProductGlobal Top 10 DLP,ReviewTop 7 Content-Aware DLP4.5/5.0 Rating

SecureTower – DLP UBA Control of Data Transfer Channels Detection of Sensitive Data Content Data Leak Prevention Incident Response Productivity Analysis Employee Monitoring Archive of Intercepted Data Extensive & Custom Reports Modular, group wise access for policies & reports

SecureTower – DLP UBASolution for Control of confidential information Control of remote workstations Detection of internal threats Incident investigation Business processes optimizationProductivity Enhancement Monitoring of Employees UBA Management & HoD get full picture of employees’ working to adjust distribution of tasks,terms, build effective project teams Improve Productivity HR ReportsArchive of Business Communication All data on move are saved. Even if they are deleted from a particular workstation, they willbe available and restored, if necessary.

SecureTower – DLP UBA SecureTower Information security Risks managementOptimization of workflows Functions Monitoring of employees Data leak preventionArchive of Business Communication Security Features E-mailMessengers Social networksWeb activity Cloud storageApplications Personnel controlWorkstation control Workstation indexingPersonnel interactions Reports

SecureTower – DLP UBASecureTower controls data-in-use, data-at-rest and data-in-motionNetwork controlMail processing server EWS (MS Exchange) POP3 SMTP IMAP SPAN-portMail WEBWEBMessengersFTPData discovery Full archive of all intercept data Indexing files Search engine Security center & Reportsengine OCR, Voice, Identity Credit Cards, PAN, Aadhar, AccountICAP-serverEndpoint controlEndpoint agents Mail, WEB Messengers External devices, Printer FTP(S), Apps, Torrents User activityE-mail Protocols: POP3, SMTP, IMAP,MAPI Mail servers: Microsoft Exchange Server, LotusNotes, Postfix, Sendmail Web-based: Gmail, O365, Yahoo.Mail, and otherWorkstationcontrol Scanners Printers External devices CD/DVD ClipboardCloud storage Clients: OneDrive, iCloud, Google Drive, Dropbox,Yandex.Drive Web-access: allSocial networks Integrations: Facebook, LinkedIn, Vk.com Other: blogs, online chats, forums

SecureTower – DLP UBA

SecureTower – DLP UBA

SecureTower – DLP UBA

SecureTower – DLP UBA

SecureTower – DLP UBA

What is Malware

EmsisoftAnti-MalwareANTIVIRUS NOT ENOUGH, YOU NEED ANTI-MALWARE

EmsisoftAnti-Malware

EmsisoftAnti-MalwareStops Ransomware. Before it encrypts your files.Emsisoft’s Anti-Ransomware protection layer is custom-built to detect behavioralpatterns of ransomware attacks and stop them before your files can be encrypted.Other anti-ransomware solutions rely on detection of repeated encryption, so yourmost valuable files may already be lost before they act.

Comprehensive Backup & Disaster Recovery withVembu BDR Suite

Few of Vembucustomers

VMware Backup & Replication - VMware vSphere ESXihost/vCenter ServerHyper-V Backup -Hyper-V Standalone host, Cluster, CSV & SMBWindows Image Backup - Windows Servers & WorkstationsFile & Application Backup -Files/Folders on Windows, Linux, Mac, NAS & MS-AppsOffsite DR - Replicate a copy of your backup data to Remote/Branch Office

Hybrid Cloud - Replicate a copy of your backup data to Vembu CloudOffice 365 Backup - Backup Office 365 mails, calendars, contacts & onedrive toVembu CloudG- Suite Backup CloudBDR 360 -Backup G-suite mails, calendars, contacts & drive to VembuCentralized MonitoringTool

Customer hosted deploymentBackup data is stored in the customer’s on-premise storage.For additional data protection, a secondary copy of backups can be replicated to: Customer’s Offsite (Remote/Branch office) Service Provider’s siteAlsoAvailable:Service-Provider hosted DeploymentVembu hosted Deployment

Recovery Time Objectives (RTO)Vembu offers Industry best RTO which is less than 15 minutes.Quick VM RecoveryInstant File RecoveryFailover and FailbackExplorer for Microsoft Exchange,SharePoint, SQL and Active DirectoryTRUSTED BY OVER 60,000 BUSINESSES

Recovery Point Objective (RPO)Vembu offers near continuous data protection without affecting the production data center. Automated Backup & Replication scheduling Backup frequencies starts from 15 mins So you can assure RPO less than15 minsTRUSTED BY OVER 60,000 BUSINESSES

Automatic Backup VerificationBackup data should be recoverable. If not, it is worthless. Vembu provides the ability to runautomatic backup verification for all backed up VMs and physical machines Backup verification can be automated to run post completion ofevery backup schedule or once in a day. In the process, booting of backed up VM or physical machine willbe carried out and screenshot of boot screen will be captured.This screenshot details will be sent to administrators via email.TRUSTED BY OVER 60,000 BUSINESSES

Efficient Storage ManagementVembu BDR Backup Server utilizes VembuHIVE file system to effectively manage storagerepositories. VembuHIVE is an efficient cloud file system designed for large-scale backup anddisaster recovery application with support for advanced use-cases. VembuHIVE can be defined as afilesystem for filesystem . Supports SAN, NAS and DAS Automatically scale up/out the storage devices In-built version control and error correction In-built Compression & Deduplication EncryptionMigration Plan (P2V, V2V & V2P)TRUSTED BY OVER 60,000 BUSINESSES

Hybrid Deployment - Scenario 1 (CloudDR)VMBackupVembu CloudImageBackupLANWANCloud DRVembu BDR Backup ServerNetworkBackupSetup DR site in your local environment and backup via LAN connectionsand send another copy ofbackup data to Vembu Cloud via WAN connection by signing up to Vembu CloudDR serviceTRUSTED BY OVER 60,000 BUSINESSES

Remote office/Branch officeVMBackupLANImageBackupSite1OffsiteDRLANBDR Backup ServerNetworkBackupOffsiteDR fsiteDR ServerBDR Backup ServerNetworkBackupSetup Vembu BDR Backup Server and Vembu OffsiteDR Server in both Remoteoffice and Branch office and sync backup data between both the locationsTRUSTED BY OVER 60,000 BUSINESSES

All-in-one BackupSolution21One Edition for allBusinesses3QuickVMRecoveryScale-Out StorageRepositories5Cross PlatformRecovery74Top 10Hybrid Cloud Deployment6Patented In-House FileSystem8Universal Recovery ToolReasons to Choose24/7/365 FreeSupportTRUSTED BY OVER 60,000 BUSINESSES910Affordable Pricing

New Generation Data cronis.comfacebook.com/acronis

Acronis:15 YearsProtecting Digital Lives & Businesses Worldwide5,000 Global Headquarters in Singaporepetabytes of data underAcronis protection50,000 10,000 partnerscloud partnersEUROPE 40%AMERICAS 40%APJ/MEA 20% 200,000 SMBs 200,000 SMBs 100,000 SMBs500,000 business customers5,000,000 consumer customers50,000,000 OEM licenses

Acronis Hybrid CloudArchitectureUnified Centralized Data ProtectionWeb-based User Interface Deployed On-premises or in theCloudAny ManagementManagement software deployed and controlled independently, enabling control of data protectionby customer, service provider, vendor, partner, or 3rd party from public/partner/private cloud or customerpremisesAny ProtectionAny DeploymentArchivingAny WorkloadAny StorageCLOUDCLOUDAny Recovery Data RecoveryUBERCLOUDBackupCloud StorageFTP/SFTPVENDORCLOUDe-DiscoveryFile Sync and ONSNASMOBILESANFile RecoveryMailbox & E-mail Recovery Database Recovery System RecoveryPUBLICCLOUDDisaster Recovery Bare-Metal RecoveryActive Restore Instant Restore vmFlashBack Dissimilar HardwareRecovery & Migration P2V, V2V, V2P, P2P P2C, V2C, C2C, C2V, C2PPhysical Data ShipmentCloud DisasterRecoveryReplicationHigh AvailabilityAcronis Protects Your Entire Business – On-premises, Remote, Private Cloud, Public Cloud,Mobile

Acronis BackupCloudNew GenerationData Protection for:A powerful, hybrid cloud backup solution for service providers thatprotects more than 20 platforms and lets them quickly realizeincremental revenues with zero upfront costs and a pay-as-you-gobusiness erOffice365Red HatVirtualization Market leading Hypervisors Market leading Clouds Market leading OperatingSystems Market leadingApplications Office 365 MailboxesMobile workforce Web sitesLinuxKVMCitrixXenServer

Acronis GlobalOn-Prem Solutions14 Acronis CloudData Centers nowInnovative Technologies,Fastest Backup & RecoveryStrong presence in Asia-Pacific:Singapore, Japan, Korea, Australia

SecPoint Penetrator 64 Bit High PerformanceScans Local & Public IPsBest Vulnerability & Assessment ScanningEasy Solutions to found vulnerabilitiesVirtual VMware & Hyper-V SupportSecPoint Cloud Penetrator Web Vulnerability ScannerSQL Injection, XSS ScanningScans Websites, Webshops, FirewallsNo Software RequiredSCADA Vulnerability Scanning11 Scan Profiles

Features and BenefitsNo Data Collection, Backdoor FreeDistributed Scanning CapabilityOS Independent Interface11 Scan Profiles, HIPAA,OWASPtop 10, Prepare forAdvanced Web Crawler - SQLInjection - XSS - SSLBugtraq ID / Mitre CVE / UbuntuUSN /Microsoft / OSBDBPCI, Firewall Scan, SCADA & moreAudits any OSAutomatic Web Crawl Script EngineLaunch Real ExploitsScan any OS and Network devicesMulti User SupportAdvanced AuditOptionsReports BrandingLaunch Real ExploitsSchedule scans daily, weekly,monthlyDetailed Remedies for IdentifiedVulnerabilitiesTicket System for full VulnerabilityManagementPrevent Hackers ToAccess YourServerSecure Design All Data Stored onUnitOption for centralized update pointVulnerability ScanningOption for syslog remote ulnerabilityAuditXML, PDF and HTMLReports60.000 VulnerabilitiesLaunch DoS & DDoS attacksFinds SQL Injection

Rapidly reduce risk, detect advanced threats, and prove compliance

COMPANYOVERVIEWVaronis is a pioneer in data security and analytics,specializing in software for data security, governance,compliance, classification, and analytics. Varonis detectsinsider threats and cyber attacks by analyzing file activityand user behavior; prevents disaster by locking downsensitive data; and efficiently sustains a secure state withautomation.

IF YOUARE Enterprise that has file shares on Windows, Active Directory,Office 365, UNIX/Linux, NAS, SharePoint, or Exchange Enterprise with data on-premises, in the cloud, and especiallyboth CISO / C-Level Looking for Security Having huge IT Storage Looking for Governance & Compliance Big data analytics

QUESTIONS Where is your sensitive data, and where is it overexposed?Do you know where your sensitive data lives - and who can access it?What data is being used, and what’s stale?Who does it belong to, and who has access they don’t need?What does normal user behavior look like? Who abuses their access?Do you know what your service & privileged accounts are doing?How can you tell if your data is secure and living in the right location?Can you tell if your core systems are being attacked by malware,insider threats, or other security threats?

KEY PAINPOINTS Unable to discover, identify, and classify sensitive data Vulnerable to data breaches, cyberattacks, and insider threats Unable to detect security violations or potential attacks (includingmalware and ransomware) Difficulty managing permissions and understanding who is accessing,deleting, moving data Unable to identify data owners No way of identifying stale data or knowing what data can (or should) bearchived or deleted Compliance and regulatory requirements, including GDPR, PCI, SOX,HIPAA, HITECH, etc.

IF YOUARE LOOKING FOR User Behavior Analytics (UBA or UEBA)Security AnalyticsData Classification and/or IndexingData Loss Prevention (DLP)e-DiscoverySecurity Information and Events Management (SIEM)Information Lifecycle Management (ILM)Hierarchical Storage Management (HSM)Identity and Access Management (IAM)Data Restructuring / Migration / ConsolidationGovernance, Risk, and Compliance (GRC)Compliance regulations: GDPR, SOX, HIPPA, PCI

ENTERPRISE DATAAND THEINSIDERTHREAT Varonis protects enterprise data stored on premises and in the cloud:sensitive files and emails; confidential customer, patient andemployee data; financial records; strategic and product plans; andother intellectual property. Recognizing the complexities of datasecurity, we have built a single integrated platform for security andanalytics to simplify and streamline security and data management. Gartner estimates over 80% of organizational data is unstructured,and it’s growing 50% year over year Nearly every major security breach starts with an insider, or anattacker using an insider’s credentials – stealing unstructured data. It’s a guarantee that some of these insiders exist in your organization.Every company has them. Varonis helps you stop them.

HOW DOES VARONIS PROTECTDATAFROM THE INSIDEOUT? Prevent data breaches: Detect malware, investigatesuspicious user behavior, and monitor activity on yourdata stores. Reduce Risk: Discover and classify sensitive data,manage permissions, and achieve least privilege. Achieve Compliance: GDPR PCI DSS HIPAA ISO27001 NIST and more.

ROI Reduce OP EX: By introducing automation driven by bigdata analytics, Varonis measurably reduces overhead andimproves the effectiveness of your IT department, andreduces the risk of a data breach by protecting your mostsensitive data from insider threats. Reduce CAP EX: Varonis helps organizations identifyand automatically migrate, archive, or delete stale data, inmany cases saving thousands of dollars in storage costsper year.

Netop Remote Control Netop Remote Control gives you flexible access across platforms, devices andnetwork segments from a single, secure solution. Secure Remote Access Connect with confidence to any device, platform, or network. Consolidated Connectivity Across Multiple Platforms, One solution. All devices. Cross-platform support, including Windows, Linux, Mac and Android Centralized management of individual and group roles and permissions Secure access into complex networks – BFSI, POS, Production Support for embedded operating systems Self-hosted or cloud-based Internetcommunication protocolconnectivitythroughNetop'ssecure Multiple options for multi-factor authentication, including Microsoft Azure Simplify maintenance and reduce network vulnerability by consolidating support witha single solution

Netop Remote ControlMAKINGCONNECTIONS WHO CHOOSES NETOP?50%60%Fortune 100Financial Times Top 10023%42%World Top 100 RetailersWorld Top 50 Banks

Netop Remote Control

Netop Remote Control Secure remote access and supportNetop Remote ControlNetop On DemandNetop Mobile & Embedded Flagship product Classic remote support LAN/WAN/Internet Attended & unattended Client/Server based Windows, Linux & Mac Agent-less remote support Attended internet-based Temporary application No footprint Windows only Mobile remote support Embedded remote support Attended & unattended Client/Server based Windows Mobile & CE Symbian, Android,iOS

The Cyber Security Experts#Somansa #FalconGaze #SecureTower #Emsisoft Vembu #GDATA #Acronis #SecPoint #Varonis #Netop#DALP #Data Leak Prevention #Employee Monitoring #User Behavior Analysis #Productivity Enhancement # Anti Malware#Backup & Disaster Recovery #Data Backup VAPT #Firewall #Data Backup #Vulnerability Scanner #Penetration Testing #RiskManagement # Threat Analysis #Insider Threats #Compliance #Governance #Remote Control #Remote Access #ATP #EDR#APT #Endpoint Security #Microsoft #Symantec #McAfee #TrendMicro #Kaspersky #CISCO #Fortinet #Dell #HP #Lenovo#Storage #NAS #Server #IT Security #Network Security #Antivirus #Virtualization

Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification, and analytics. Varonis detects insider threats and cyber attacks by analyzing file activity and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with .