E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D...

Post on 24-Sep-2020

0 views 0 download

Transcript of E x p e r t s i n i n n o v a t i v e t e c h n o l o g i ... · S I M A R K S B E S T S A F E S D...

E x p e r t s i n i n n o v a t i v e t e c h n o l o g i c a l s o l u t i o n so f c y b e r s e c u r i t y f o r c o m p a n i e s a n d o r g a n i z a t i o n s

S D MB E S T S A F ES I M A R K S

S i m a r ks i s a S p a n i s h co m p a ny

s p e c i a l i ze d i n te c h n o l o g i ca l

d eve l o p m e nt s o f c y b e rs e c u r i t y a n d

e n d p o i nt p ro te c t i o n .

Experts in innovative application-level security

solutions for workstations and servers.

CYBERSECURITY

SPANISH TECHNOLOGY

EXPERIENCE

ENDPOINT PROTECTION

S D MB E S T S A F ES I M A R K S

At S i m a r ks we a re co n sta nt l y re s e a rc h i n g , d eve l o p i n g a n d evo l v i n g .

For us it is always essential to comply with quality standards and current regulations in all our software design and implementation developments, as well as processes and procedures.

v

S D MB E S T S A F ES I M A R K S

O u r go a l i s i n n o vat i o n fo c u s e d o n t h e p r o t e c t i o n o f t h e m o st v u l n e ra b l e e l e m e nt : t h e h u m a n b e h av i o r.

PROTECTIONagainst

ANY TYPE OF MALWARE,

current or future

Real implementation of the Principle of

Least Privilege (POLP) in Microsoft Windows

environments.

SIMARKS Security Management

technologyat the process level

SIMARKS technology for Application Management

SIMARKSSuite

T h e t e c h n o l o g y t h at we h ave d eve l o p e d i n S I M A R KS a l l o ws u s to o f fe r p r eve nt i ve s o l u t i o n s to a ny t h re at .

S D MB E S T S A F ES I M A R K S

9 2 % o f v u l n e ra b i l i t i e s i n W i n d o ws Sys te m s u s e s u p e r u s e r p r i v i l e ge s .

( M i c r o s o f t S e c u r i t y B u l l e t i n s )

In most security breaches, the incorrect assignment of privileges is involved to minimize the impact on productivity, which greatly increases the level of risk in the face of threats.

140$Average cost

per record

327Attacks per

min worldwide.

u s e r s u p e r u s e r

S U P E R U S E R S

S D MB E S T S A F ES I M A R K S

We help you protect your business from the most vulnerable element:the human behavior

S D MB E S T S A F ES I M A R K S

60%e f f i c i e n c y

vs

+95%e f f i c i e n c y

c y b e r s e c u r i t y

Tra d i t i o n a l p ro te c t i o n sys te m s ( a nt i v i r u s )a re b a s e d o n d et e c t i o n : t h ey a re ef fe c t i v ea ga i n st k n o w n v i r u s e s .T h e p a c e o f m a l wa re c re a t i o n m a ke s t h e i rd at a b a s e s o u t d ate d , w h i c h m a ke s t h e mu n a b l e to re a c t .

S E C U R I T Y S Y S T E M S

Faced with a real threat, traditional systems are often not enough to neutralize the attack, resulting in unfavorable and damaging consequences for the organization:

economic losses

waste of time

losses of resources

loss of documents

compromised exposure of sensitive information

file hijacking

harm to corporate image

leakage of customers

etcetera

a n t i v i r u s

Protection against known viruses.

Protection against unknown attacks.

Protection against ransomware.

It acts when the virus enters the system.

Protection against known viruses.

Protection against unknown attacks.

Protection against ransomware.

Prevents malware from entering the system.

S D MB E S T S A F ES I M A R K S

W e ’ d l i k e y o u t o k n o w

The most effective solution,

in all safety

S D MB E S T S A F ES I M A R K S

B e st S afe i s t h e s o f t wa re t h at e f fe c t i ve l y re d u c e s t h e r i s k o f s e c u r i t y b re a c h e s o n W i n d o ws sys te m s

Based on Simarks' patented security at the application level technology with which the operating system itself prevents unwanted executions.

u s e r

A N I N N O V AT I V E T E C H N O L O G I C A L S O L U T I O N

Simarks BestSafe reduces the risk derived from the inappropriate use of ‘Administrator Privileges’

Controlled assignment of privileges.

Maximum levels of security.

No impact on productivity or performance.

Accessgranted

Accessblocked

Accessrestricted

S D MB E S T S A F ES I M A R K S

B e st S afe a c t s avo i d i n g atta c ks a n d t h e i r co n s e q u e n c e s :

I N F O R M AT I O N T H E F TR A N S O M WA R E AT TA C K SR A N D O M I Z E D / D I R E C T E D AT TA C K SF I L E H I J A C K I N G

E C O N O M I C L O S S E SI N D E F I N I T E S T O P SC U S T O M E R L E A KR E P U TAT I O N A F F E C T E DI N F O R M AT I O N L O S S E S

E F F E C T I V E S E C U R I T Y: G O O D B Y E T H R E AT S

FIGHTEFFECTIVELY

AGAINSTRansomware

S D MB E S T S A F ES I M A R K S

E F F I C I E N T S E C U R I T Y: A L L B E N E F I T S

EFFICIENCYhigher than 95%

SAVEtime

IT DOESN’TSLOW DOWN

computers or processes

PROTECTSfrom human

mistakes

ENDORSEScompliance with

regulations

ENSURESthe operation

of the business

OFFERStechnical support

APPLIESvalidated

innovativetechnology

CONSTANT EVOLUTION Feedbacks

S D MB E S T S A F ES I M A R K S

I N N O V AT I V E T E C H N O L O G Y O F E A S Y A P P L I C AT I O N

B e st S afe i s a m o d u l a r s o l u t i o n b a s e d o n s i m p l e r u l e s o f ve r y e a sy a p p l i cat i o n .

PRIVILEGE LEVELSFOR USERS AND PROCESSESBlocking, permissions to execute tasks and run applications...

White lists.Gray lists.Black lists.Ransomware.

PRIVILEGE MANAGEMENT

At the application level.At the user level.

CENTRALIZED MANAGEMENTWith all the power, flexibility and scalability of the Active Directory.

PERSONALIZEDRULES / PARAMETERSIn users, computers, groups... to establish permissions and privileges.

ANALYTICS AND REPORTS OF APPLICATION OF RULESIntegration with SIEM systems. Creation of alerts and alarms.

MONITORING / CONTROL OF EXECUTION AND USEFor computers, processes and applications.

HARDENINGIt turns the most critical assets impregnable.

PASSWORD MANAGEMENTDaily password change, different per device.

S o l u t i o n s a n d f u n c t i o n a l i t i e s

The Simarks BestSafe technology does not require any specific infrastructure for its installation and subsequent operation.

S D MB E S T S A F ES I M A R K S

W e i n v i t e y o u t o k n o w

The most efficient

management, in all safety

S D MB E S T S A F ES I M A R K S

S i m a r ks D e p l oy m e nt M a n a ge r i s a n i n n o vat i ve p o r ta l fo r co r p o rate a p p l i cat i o n s t h at re d u c e s t h e r i s k o f s e c u r i t y b re a c h e s .

Based on Simarks' patented process-level privilege management technology, it is the user who performs the installation of applications, without having to access with an administrator profile.

A N I N N O V AT I V E A P P L I C AT I O N M A N A G E R

SDM performs a programmed application management automatically and silently

Controlled application management.

Automatic uninstallation of non-corporate software.

Increase productivity.

Access granted

Accessblocked

Accessrestricted

S D MB E S T S A F ES I M A R K S

W I T H E F F I C I E N T M A N A G E M E N T, A L L B E N E F I T S

CONTROLLED ACCESS

FAST AND SIMPLE

PROCESS

PROGRAMMED INSTALLATIONSAND UPDATES

REMOTE AND AUTOMATIC

INSTALLATIONS

VALIDATED INNOVATIVE

TECHNOLOGY

AUTHORIZED USER WITHOUT ‘ADMIN’

PROFILE

UNIFIES SOFTWARE VERSIONS

SOFTWARE ALWAYS

UPDATED

EXECUTE PLANNED SCRIPTS

INCLUDES SUPPORT AND

TRAINING

CONSTANT EVOLUTION FEEDBACKS

COST REDUCTION

AVOIDLOSING

TIME

AVOIDPIRATED

SOFTWARE

S D MB E S T S A F ES I M A R K S

S i m a r ks D e p l oy m e nt M a n a ge r i s a C o r p o rat e A p p l i cat i o n Po r t a l i n w h i c h i t i s t h e e n d u s e r w h o p e r fo r m s t h e i n s ta l l a t i o n w i t h o u t t h e n e e d fo r p r i v i l e ge s .

The SDM technology does not require any specific infrastructure for its installation and subsequent operation.

I N N O V AT I V E T E C H N O L O G Y O F E A S Y A P P L I C AT I O N

FLEXIBILITY AND EFFICIENCYTo be done by the user himself or automatically and unattended.

PLANNED ACTIVATIONMandatory/automatic updates, uninstallations, repairs, automatic execution of administrative tasks, emergency distributions...

INVENTORY AND REPORTSHardware and software by computer/terminal, application execution...

ELEVATION OF PRIVILEGES AT RUNTIMEGranted to applications at installation times and in execution times.

CATEGORIZATION AND LABELINGCustom structure of categories and labeling of applications.

LEVELS OF PRIVILEGES FOR USERS AND PROCESSESBlocking, permissions to execute tasks and applications...

DEPENDENT SOFTWARE AND INSTALLATIONSAllows installation/ maintenance/ removal of software and dependent installations.

S o l u t i o n s a n d f u n c t i o n a l i t i e s

S D MB E S T S A F ES I M A R K S

E n a b l e s d e l e gat i o n o f a d m i n i s t rat i ve ta s ks to t h e e n d u s e r.

G L O B A L C E N T R A L I Z E D M A N A G E M E N TS E C U R I T YC O S T R E D U C T I O NE F F I C I E N C YC O N T R O LI M P R O V E M E N T S I N :

A p p l i c a t i o n i n s t a l l a t i o nVe r s i o n u n i f i c a t i o nU p d a t e sA c c e s s i b i l i t yP r o d u c t i v i t y NO

ADMINISTRATOR PRIVILEGES

I M P R O V I N G C O N T R O L I M P R O V E S P R O D U C T I V I T Y

S D MB E S T S A F ES I M A R K S

S i m a r k s h a s b e e n N a t i o n a l F i n a l i s t i n t h e 1 1 t h e d i t i o n o f t h e E m p r e n d e d o r X X I A w a r d sa r r a n g e d b y C a i x a b a n k

B e s t S a f e h a s b e e n a w a r d e d w i t h t h e M o s t I n n o v a t i v e P r o d u c t A w a r d i n t h e 1 1 t h e d i t i o n o f t h e C I T S e c u r i t y Tr o p h i e s b y R e d S e g u r i d a d .

A C K N O W L E D G E M E N T S

S D MB E S T S A F ES I M A R K S

M a n y c o m p a n i e s a l r e a d y r e l y o n S i m a r k s a n d o u r i n n o v a t i v e a n d e f f i c i e n t p r o d u c t s .

T h e i r c o n f i d e n c e s t r e n g t h e n s u s , e v e r y d a y m o r e , a s a n a t i o n a l a n d i n t e r n a t i o n a l r e f e r e n c e i n S o f t w a r e S o l u t i o n s o f Te c h n o l o g i c a l I n n o v a t i o n i n t h e f i e l d o f C y b e r s e c u r i t y f o r c o m p a n i e s a n d o r g a n i z a t i o n s .

C L I E N T S

Simarks Software S.L.C/ Copenhague 12, PosteriorEdificio Tifan28232 Las RozasMadrid – Spain

(+34) 910 534 037info@simarks.comwww.simarks.com

T h a n k y o u