Presentation is loading. Please wait.

Presentation is loading. Please wait.

BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.

Similar presentations


Presentation on theme: "BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential."— Presentation transcript:

1 BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential

2  Breaches increased 48% in 2014 (PWC)  Threats are more sophisticated  Most start at the endpoint  The biggest attack surface  And the hardest to control  Users take risks  Browsing the web, opening email attachments, connecting to public WiFi  And they just want to work – security is not their top concern Users Endpoints Are the Biggest Attack Surface

3  We need to protect users from advanced threats  And $1 of prevention is worth $1,000,000 of detection  But security should not lower productivity  Restrict employee access to information  Get in their way with alarms and blocks  Weigh IT down with investigation and reimaging More Protection with Higher Productivity Gartner: Prevention is more cost-effective than detection But how do we make it work?

4  Most companies have only AV and other signature based protection  Application Control/Whitelisting  Detection based protection- Behavior based  Policy – no access to external storage, no internet browsing Today’s endpoint protection

5  Threats are constantly changing  IT is overwhelmed by non-stop alarms, investigation and remediation  User productivity is constantly interrupted Detection Is Never 100% Accurate Gartner: Prevention is more cost-effective than detection But how do we make it work?

6  Isolates browsers, email, removable media, Skype and more  Increases user productivity with unrestricted internet access  Protects against drive-bys, zero-days, advanced malware…w/o updates  Reduces alarms, enables users to work while IT investigates  Provides valuable data for incident investigation and forensics You can’t detect all threats. But you can contain them with BUFFERZONE. BUFFERZONE Advanced Endpoint Security

7  BUFFERZONE enables employees to browse the net safely  When the user browses to an untrusted location, the browser opens in the container (red)  Anything that is downloaded (intentionally or not) is stuck inside the container  IT can define trusted sites – e.g. SharePoint  They are automatically opened in a different window, outside the container Safe Browsing

8  Open any external media safely inside a container  USB memory, mobile phones, cameras…  Any file is opened inside a container  Users can view, edit and even save files back to the removable media without risk  Blocks auto-runs Safe Removable Media

9  Attachments are opened in a dedicated container separate from one used for web browsing  Provides protection from all types of malware, including phishing attempts and targeted attacks  It is “locked-down” to prevent any exfiltration of data  Employees can securely open attachments that contain personally identifiable information (PII) or other sensitive data, without risk of data leakage Safe Email Attachments

10 How it Works

11 Dimensions of Isolation

12  How it works animation How it works animation  User experience demo User experience demo  LANDESK management demo LANDESK management demo Demo

13 BUFFERZONE in the Enterprise

14  Users should view and save most files in the container  Optimal from the security perspective  If the user accidentally downloads malware it will be trapped inside the container and cannot infect the rest of the organization  The BUFFERZONE Bridge is used to:  Extract files from the container – e.g., to share them with another person or upload to an application  Move files between the internet and email containers Using the Bridge to Extract Files

15  Basic bridge  Extracts files from the container  Part of the standard product  Secure Bridge  Extracts files and then processes them to disarm and disable potentially malicious content  Optional addition  Compliant Bridge  Extracts files and scans them with up to 3 antivirus engines to provide compliance with regulatory standards  Optional addition Three Bridge Options

16  Downloaded files are automatically sent to the bridge server  Disarms malicious content in seconds  Makes invisible microchanges to file structure and metadata that destroy exploits  Extracts text, formatting and safe components  Supports Microsoft ® Office, RTF, PDF, images, archives  Optional – multiple AV scanners Secure Bridge – How it Works

17  Organizations need better endpoint data to:  Determine if an alarm indicates a real breach  Identify attacks that have spread across the organization  BUFFERZONE collects over 40 types of events: Registry alterations, file system activity, network activity and more  Shares directly with SIEM and other analytics platforms Endpoint Intelligence

18  Certified integration with LANDESK and McAfee  Install, update, manage policy and more  Can also be managed through Microsoft GPO  On-premise BUFFERZONE management server for smaller installations  Setup wizard for small installations  Easy to manage for thousands of endpoints Management Click a logo for more info

19 Protection from advanced threats  Isolates all types of threats  Configurable bridge  Valuable intelligence  Protects off-network devices Lower Total Cost of Ownership (TCO)  Easy to manage, no updates required  Reduces false positives  Complements existing security products Transparent User Experience  Unrestricted access to the internet  Access to removable media  Continue working while alerts are verified The BUFFERZONE Advantage

20 Thank You www.bufferzonesecurity.com


Download ppt "BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential."

Similar presentations


Ads by Google