32
Herzlich Willkommen. Überblick

G Data Businessportfolio 10.5 & E P P English

Embed Size (px)

DESCRIPTION

To know more what can G-Data Antivirus do to help business environment, please view the slide presentation.

Citation preview

Page 1: G  Data  Businessportfolio 10.5 &  E P P  English

Herzlich Willkommen.

Überblick

Page 2: G  Data  Businessportfolio 10.5 &  E P P  English

G Data business solutions

Page 3: G  Data  Businessportfolio 10.5 &  E P P  English

Available now

Page 4: G  Data  Businessportfolio 10.5 &  E P P  English

ClientSecurity 10.5 G Data ManagementServer

G Data AntiVirus Client

G Data AntiSpam Client

NEW: Client-Firewall

• 100% remote administration

• Autopilot or central rulesets

• Optional offsite configuration for notebooks

• easy, intuitive handling

Page 5: G  Data  Businessportfolio 10.5 &  E P P  English
Page 6: G  Data  Businessportfolio 10.5 &  E P P  English
Page 7: G  Data  Businessportfolio 10.5 &  E P P  English
Page 8: G  Data  Businessportfolio 10.5 &  E P P  English
Page 9: G  Data  Businessportfolio 10.5 &  E P P  English

IT security in company networks

Page 10: G  Data  Businessportfolio 10.5 &  E P P  English

What do companies want? Malware protection Spam protection Firewall protection

Page 11: G  Data  Businessportfolio 10.5 &  E P P  English
Page 12: G  Data  Businessportfolio 10.5 &  E P P  English

What do companies want? Malware protection Spam protection Firewall protection Safe IT infrastructure

Data privacy Legal certainty Productivity …

Page 13: G  Data  Businessportfolio 10.5 &  E P P  English

IT workaday life in companies

Page 14: G  Data  Businessportfolio 10.5 &  E P P  English

2/3 of all Internet visits at work are because of private reasons.(Source: Berliner Rechnungshof)

7 of 10 porn surfers

do it at work.(Source: IDC)

Page 15: G  Data  Businessportfolio 10.5 &  E P P  English

The problem:

Private usage of company PCs

Page 16: G  Data  Businessportfolio 10.5 &  E P P  English

Financial harm• Lost of manpower

• Decrease in productivityEconomic loss in Germany 2007:

54 Billion Euro!(Source: Berliner Rechnungshof)

Page 17: G  Data  Businessportfolio 10.5 &  E P P  English

Safety consequences

• Infiltration of new malware

• Damage through unauthorized software

• Lost/theft of sensitive data

Page 18: G  Data  Businessportfolio 10.5 &  E P P  English

Legal risk

• copyright infringement(pirate copies, illegal media)

• Illegal content (e.g. child porn)

Page 19: G  Data  Businessportfolio 10.5 &  E P P  English

Legal risk

• personal data made public

• company secrets are

revealed

Page 20: G  Data  Businessportfolio 10.5 &  E P P  English

MUST HAVE: The Policy• Written definition of content and

extent of private Internet usage

• Use of software to secure the adherence to the policy

Page 21: G  Data  Businessportfolio 10.5 &  E P P  English

G Data EndpointProtection AntiVirus & AntiSpyware

Client Antispam

Client Firewall

100% central administration

Remotely controlled clients

NEW: G Data PolicyManager

Page 22: G  Data  Businessportfolio 10.5 &  E P P  English

Device control USB mass memory / hard disks

CD- / DVD- / Floppy- drives

Webcams

Firewire devices

Allow / disallow / read-only

Certifiable by the administrator

Page 23: G  Data  Businessportfolio 10.5 &  E P P  English
Page 24: G  Data  Businessportfolio 10.5 &  E P P  English

Application control Whitelist or blacklist

Applications can be defined viao Vendor signatureo Checksumo Name, product name, version

Large No. of predefined applications (File sharing, games, messaging etc.)

Page 25: G  Data  Businessportfolio 10.5 &  E P P  English
Page 26: G  Data  Businessportfolio 10.5 &  E P P  English
Page 27: G  Data  Businessportfolio 10.5 &  E P P  English

Content filter > 80 different categories, e.g.:

o Sex / pornography / violenceo Chats / forums / blogso Online auctions / job exchangeo Gambling / gaming…

Daily updates (server-side)

Page 28: G  Data  Businessportfolio 10.5 &  E P P  English
Page 29: G  Data  Businessportfolio 10.5 &  E P P  English

Internet usage time

Blocking times can be defined per-weekday with hourly precision

Total usage time can be limited per-weekday, per-week or per-month

Page 30: G  Data  Businessportfolio 10.5 &  E P P  English
Page 31: G  Data  Businessportfolio 10.5 &  E P P  English

G Data EndpointProtection… targets global IT security.

… secures the important company policy.

… upgrades the protection of data and IT infrastructure.

… offers more legal certainty.

… increases the productivity of companies.

Page 32: G  Data  Businessportfolio 10.5 &  E P P  English

Thank you...