Value Added Distribution Driven by Innovation€¦ · 1 7 100x reduction in malware incidents when...

Post on 08-May-2021

2 views 0 download

Transcript of Value Added Distribution Driven by Innovation€¦ · 1 7 100x reduction in malware incidents when...

© 1991 − 2018, CLICO sp. z o.o.

Milan Perać, Business Development Manager

Beograd, 04.10.2018.

Value Added Distribution Driven by Innovation

© 1991 − 2018, CLICO sp. z o.o.

RANJIVOST IT SISTEMA I ADAPTIVNA ODBRANA

© 1991 − 2018, CLICO sp. z o.o.

CLICO u Evropi

• Poland: Centrala u Krakovu, Kancelarije: Katovice, Rzeszów, iVaršava

• Bugarska: Sofia

• Češka, Slovačka: Prag

• Rumunija: Bukurešt

• Adriatic:Beograd, Zagreb, Ljubljana

• Mađarska: Budimpešta

• Snažno prisustvo u Baltičkim zemljama

© 1991 − 2018, CLICO sp. z o.o.

CLICO Architecture

© 1991 − 2018, CLICO sp. z o.o.

CLICO – Vendori

© 1991 − 2018, CLICO sp. z o.o.

© 1991 − 2018, CLICO sp. z o.o.

© 1991 − 2018, CLICO sp. z o.o.

FORCEPOINT NGFW Juniper

© 1991 − 2018, CLICO sp. z o.o.

Vektori napada – nekad i sad

Internal(Also Untrusted)

Outside(Untrusted)

Outside(Untrusted)

Internal(Trusted)

Outside(Untrusted)

© 1991 − 2018, CLICO sp. z o.o.

Perimetarska zaštita je veoma bitna ali ipak nije dovoljna!

Transform Data Into AnswersClarity, command, and confidence to securely move your business forward.

Am I Vulnerable? Am I Compromised? Am I Optimized?

Threat Exposure Management

VULNERABILITY MANAGEMENT

USER BEHAVIOR ANALYTICS

ATTACK SIMULATION

INCIDENT DETECTION & RESPONSE

Incident Detection & Response

Log Management & IT Analytics

APPLICATION SECURITY TESTING

ENDPOINT VISIBILITY & INTERROGATION

Software + Managed Services

Solve Critical Security & IT Questions

ENDPOINT VISIBILITY & ASSET MANAGEMENT

INFRASTRUCTURE MONITORING &

TROUBLESHOOTINGLOG MANAGEMENT &

COMPLIANCE

Rapid7 ConsultPenetration Testing

Security Maturity Assessment

Program Development & Benchmarking

Threat Modeling

Incident Response

IoT Strategy and Testing

© 1991 − 2018, CLICO sp. z o.o.

Forcepoint Security Solution

Adaptivna odbrana IT sistema

DATAPEOPLE

FOCUS ON THE TRUE CONSTANTS

Understanding the intersection

of people, critical data and IP

over networks of different trust

levels.

PEOPLE DATA

THE HUMAN POINT

VISIBILITY POLICY ENFORCEMENT COMPLIANCE

Know where your

critical IP is & who is

interacting with

it everywhere

One policy to manage

data movement &

access across ALL

distributed systems

Risk adaptive

protection to act on

change in human risk to

critical IP in real time

Effectively adhere to

compliance regulations no

matter where your

data resides

the rhythm of your people the flow of your data

PROTECT THE HUMAN POINT BY UNDERSTANDING

AND

17

100x reduction in

malware incidents when

deploying Forcepoint.1

Forcepoint

Web & Email

Security

Forcepoint

Data Guard

Eliminates costly and time-consuming

manual data transfers of highly-

regulated, sensitive data.

Forcepoint

NGFW

Cuts network expenses by 50%, reduces

cyberattacks by up to 86%, slashes

incident response time as much as 73%.

Forcepoint

CASB

Broadest cloud application support with unique

customized risk assessment based on user

behavior and data access classification.

Forcepoint

Insider Threat

The most comprehensive

understanding of user intent,

trusted on over 1M endpoints.

Forcepoint

DLP

Gartner Magic Quadrant

Leader in Enterprise DLP

9 consecutive times.

Forcepoint

UEBA

The leader in actionable

insights based on

risk-adaptive scoring.

BEST IN CLASS CAPABILITIES

Copyright © Forcepoint. | 18

FORCEPOINT HAS HIGHEST SECURITY AND EXCELLENT TCO

“The security effectiveness of the Forcepoint

NGFW 3301 was unsurpassed in the NSS Labs

2017 NGFW test. The Forcepoint NGFW

should be on every company’s short list.”

Thomas Skybakmoen,

Distinguished Research Director

NSS Labs

NGFW

5th Consecutive Time

Forcepoint

BEST TCO

ST

RO

NG

ES

T S

EC

UR

ITY

NGIPS

2nd Consecutive Time

NSS Labs 2017 NGFW Test

Copyright © 2018 Forcepoint. | 19

INTRODUCING DYNAMIC DATA PROTECTION DELIVERING RISK-ADAPTIVE PROTECTION

Copyright © 2017 Forcepoint. | 20

GRADUATED ENFORCEMENT BASED ON RISK

For policies governing compliance use-cases or highly sensitive information,

“Block All” can be the action plan for all risk levels.

For policies where additional context can help inform decisions, additional

granularity is now available.

Copyright © Forcepoint. | 21

BUILT-INCLUSTERING

The best clustering capabilities available on

the market place

SECURESD-WAN

Multi-Link VPN™ is unique and praised by end users VPN Mesh technology

OPERATIONALEFFICIENCY

Painless updates, upgrades and deployments

ENTERPRISE-GRADE SOLUTION

Lower TCO and higher flexibility

& scalability

CENTRALIZED MANAGEMENT

Simply the best management console in

the industry

KEY FORCEPOINT CUSTOMER BENEFITS

© 1991 − 2018, CLICO sp. z o.o.

Ko je i šta je na IT mreži?

© 1991 − 2018, CLICO sp. z o.o.

Network Access Control

GuestOnGuard

OnBoard

ClearPass

© 1991 − 2018, CLICO sp. z o.o.

HVALA NA PAŽNJI !

• info@clico.rs

• sales@clico.rs

• support@clico.rs

CLICO SRBIJA