Presentation is loading. Please wait.

Presentation is loading. Please wait.

Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.

Similar presentations


Presentation on theme: "Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have."— Presentation transcript:

1 Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have become the common interface for accessing information that drives business activity. Yet concerns remain about data breaches, compliance requirements and malware threats for sensitive corporate web-based data, as the average cost of a single data breach is $5.5 million. Web applications are the third most common breach vector and account for over one-third of data loss. Quarri Technologies enables organizations to protect their most valuable data by delivering and enforcing secure web sessions on demand. Our patented technology prevents malicious and careless internal and external threats from replicating data in transport and in use. Quarri Sales Guide Quarri Protect On Q Enable IT administrators to enforce security policies that prevent unauthorized use and replication of confidential data by malware or end users, both careless and malicious. Quarri Protect On Q Mobile for iOS Enable IT administrators to enforce security policies that prevent unauthorized use and replication of confidential data on iOS devices. Quarri Protect On Q Mobile for Android Enable IT administrators to enforce security policies that prevent unauthorized use and replication of confidential data on Android devices. Prevent data replication such as copying, printing, screen-capturing or saving information, including from browser-launched processes like Acrobat, Microsoft Office and ZIP Shield sensitive data from key loggers, session hijacking, cache miners and other malware, while also blocking inbound attacks on managed and unmanaged endpoints Disk-based session data—cache, cookies, password store and history— encrypted and securely deleted post-session Centrally log users' browser-related file operations including copy, save, print, etc. for auditing requirements Centralized, administrator-defined policies enforce use and security controls Visually distinct, session-based browser No user installation, system modification, software installation or software left behind Prevent data replication such as copying and saving information, including from browser-launched processes like Acrobat, Microsoft Office and ZIP Centralized, administrator-defined policies enforce use and security controls Detects if iOS devices are jailbroken and if true, enables site owner to block access to the protected web application from that device Blocks hostile code injection attacks such as Man-in- the-Browser as well as potentially hostile browser add-ons (i.e., plug-ins) from launching All disk-based session data—cache, cookies, password store and history—is securely deleted post-session Prevent data replication such as copying and saving information, including from browser-launched processes like Acrobat, Microsoft Office and ZIP Centralized, administrator-defined policies enforce use and security controls Detects if Android devices are rooted and if true, enables site owner to block access to the protected web application from that device Blocks hostile code injection attacks such as Man-in-the- Browser as well as potentially hostile browser add-ons (i.e., plug-ins) from launching All disk-based session data—cache, cookies, password store and history—is securely deleted post-session Business Benefits Mitigate Risk and Maintain Compliance Cost Effective No client software installation or management Deploys off existing infrastructure Subscription pricing by user, not application Increased Business Productivity Extend data access while managing risk No change in user behavior 3. Deliver site-specific hardened browser 4. Protected web sessions (with token) 1. User connects to protected web app (no token) Protect On Q Deployment Employees Business Partners Customers Products Web Site Data Center Protect On Q 2. Enforcement check (token valid?)

2 Qualifying Questions Do you have end users accessing enterprise web, SaaS or cloud applications? Are you concerned about the security of your data in the cloud? Do these applications operate in an environment that requires regulatory compliance? Are you concerned that sensitive data, such as intellectual property, strategic plans, financial reports, customer data and sensitive webmail /attachments, can be copied or saved by authorized users? Do you have customers that are accessing data from your website? Are you worried your users’ authentication credentials can be stolen? Are you worried about malware hijacking your users’ sessions or redirecting your users to a malicious web site? Are your employees or customers accessing data with personal mobile devices? Are you using Web Application Firewalls or Load Balancers in your infrastructure? OWA/SharePoint/Private and public cloud/SaaS and CRM Systems Telecommuting/Remote Users Account Credential Theft Web Apps/Cloud Computing/ SaaS Online Banking/Insurance PCI Compliance Call Center Online Transactions Windows, Android and iOS platforms Managed and unmanaged endpoints Desktops, laptops, phones, tablets BYOD Markets ©2012 Quarri ▪ 7500 Rialto Blvd. ▪ Building 2, Suite 210 ▪ Austin, TX 78746 ▪ USA ▪ +1.512.590.7731 ▪ sales@quarri.com ▪ www.quarri.comsales@quarri.com Competitors Security Features Trusteer, PrevX, Sandboxie, Trend Quarri POQ Single Session SecurityNY On-the-flyNY Site-based policyNY Site enforcementNY Anti-malware defenseYY Data leakage preventionNY Clients


Download ppt "Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have."

Similar presentations


Ads by Google