SlideShare una empresa de Scribd logo
1 de 34
Total Visibility and Control

                                 InterGuard
The only complete internal threat platform
    Data Loss Prevention                      Laptop Security

                  Web Filtering                Employee Monitoring




   “Technology Made Easy”
Total Visibility and Control

  “Technology Made Easy”
                           About Our Solution Partner

• Based in Los Angeles, CA

• Founded in 2002

• Patented SaaS technology (InterGuard) used by
  government and law enforcement agencies,
  financial service companies, banks, hospitals,
  schools, and more

• Over 200,000 Total Users

• Over 10,000 Corporate Customers
“Technology Made Easy”
Total Visibility and Control
        “Technology Made Easy”




    What is InterGuard?                               Competition
1.   A complete internal threat prevention          1. Single Point
     platform
                               – Laptop
                                                       Solutions
     – Data Loss Prevention       Recovery                – Multiple Vendors
     – Web Filtering           – Employee                 – Multiple User
                                  Monitoring
                                                            Interfaces
2    Simple SaaS Solution                            2. Complex Network
                                                        Trials/Installs +
     – Fast download to try, easy to buy
     – No hardware require                              Hardware Required

                                                     3.     Works only on
3    End-Point Architecture (next gen technology)
                                                            network and can
     – Works everywhere (unmatched control)
                                                            only capture
     – Sees everything (unmatched visibility)

                                                            specified traffic
Complete Internal Threat Platform

“Technology Made Easy”
                           Security 2000 - 2009
                              External Threats

   Viruses                                           Hackers

                              Company Network




   Spam                                              Malware
Complete Internal Threat Platform
                              Security 2000 - 2009
“Technology Made Easy”          Advent of UTM

                                                     Hackers
      Viruses


                                Company Network




          Spam
                                                     Malware
Complete Internal Threat Platform
                                  Security 2010 and Beyond
  “Technology Made Easy”

                                                                                   Hackers
                           Viruses

                                                  Confidential
                                                     Data
Internal threats
                                                  Company Network
  are for more
   damaging
                                        Laptop                      Employee
                                     Theft/Loss                     Productivity


                                                  Employee Errors
                                                   & Regulatory
                                                     Failures


                           Spam
                                                                               Malware
Complete Internal Threat Platform
                            Security 2010 and Beyond
 “Technology Made Easy”
                                                                   DLP
                    Viruses                                                                                    Hackers

                                                               Confidential
InterGuard                                                        Data
                                                             Company Network


Single Point                  LAPTOP RECOVERY




                                                                                              WEB FILTERING
                                                   Laptop                      Employee
 Solutions                                      Theft/Loss                     Productivity



                                                             Employee Errors
                                                              & Regulatory
                                                                Failures



                      Spam                                                                                    Malware
                                                              EMPLOYEE MONITORING
Complete Internal Threat Platform
“Technology Made Easy”




The Power of One
Agent to Deploy
User Interface
Contract
Bill
Support Team
For A Free 1 Month No obligation Trial
Call Us at 800.236.2498 or e:mail info@mbmehs.com
For a free, no obligation demo & test drive, click below to login;
Online Demo Control Console
https://www.mycontrolconsole.com
Username: info@mbmehs.com
Password: MBMdemo
Check box to agree
Simple, Complete SaaS Solution
“Technology Made Easy”




                               Simplicity
                                Try, Buy, Install
                                   and Manage
Simple, Complete SaaS Solution
                                    INTERNET
  “Technology Made Easy”

                                        Easily download and install
                                        agents on each workstation

 Remote                    ATI Data Center                             Employee
Employee                                                              On the Road




                                   Organization
Simple, Complete SaaS Solution
                                     INTERNET
   “Technology Made Easy”




 Remote                     ATI Data Center   Reporting    Employee
Employee                                                  on the Road




                                    Organization
Next Gen – Works Everywhere
   “Technology Made Easy”
                               OLD WAY




  Remote                                           Employee
 Employee                                         on the Road




NO COVERAGE                                     NO COVERAGE
Next Gen – Works Everywhere

                          INTERGUARD WAY
 “Technology Made Easy”




 Remote
Employee

                                                 Employee
                                                on the Road




ALL WORKSTATIONS ARE COVERED – ON AND OFF
                NETWORK
Next Gen Technology – End-Point Architecture

“Technology Made Easy”




        Vision                             Coverage
                                           Works Everywhere
      Sees Everything
Next Gen – Sees Everything
  “Technology Made Easy”




     Standard Web Filtering
Web Browsing                       Is Web Browsing
                                            the only
                                   unproductive use
                                     of a computer?
Next Gen – Sees Everything

  “Technology Made Easy”




     Standard Web Filtering
Web Browsing                                    Web
                                        Browsing is
                                            just one
                                        piece of the
                                                  pie
Next Gen – Sees Everything
  “Technology Made Easy”


                  Next Generation Web Filtering
                                               File Games
                                                     Sharing
         Web Browsing                               IM/Chat
                                               Media Player
 Context
    is                                         Personal Email
Everything



                                            Microsoft Office
        Business Email
Next Gen – Sees Everything
 “Technology Made Easy”

Standard Web Filtering
Records:
  List of URLs
• Aim.com
                                Does the list
• Amazon.com
• Careerbuilder.co
                                 of blocked
  m
• Ebay.com                       URLs tell
• Etrade.com
• Gambling.com                   the whole
• Google.com
• Hotjobs.com
                                   story?
• Espn.com
• Facebook.com,
  etc.
Next Gen – Sees Everything
                                       InterGuard Records:
      “Technology Made Easy”   List of URLS                 Screenshots:
                                •    Aim.com
Standard Web
Filtering Records:              •    Amazon.com
                                •    Careerbuilder.co
List of URLs                         m
                                •    Ebay.com
•   Aim.com
•   Amazon.com                  •    Etrade.com, etc.
                                                               ESPN.com
•   Careerbuilder.com          List of Searches
•   Ebay.com                    •    Best ways to sue
                                     your employer
•   Etrade.com
                                •    How to find a better
•   Gambling.com
                                     job
•   Google.com
                                •    Discount alcohol
•   Hotjobs.com
                                •    How to beat a drug
•   Espn.com                         test                      HotJobs.com
•   Facebook.com,               •    Best sick day
    etc.                             excuses
Next Gen – Sees Everything
 “Technology Made Easy”




Standard Data Loss Prevention
  Prevention is                              Prevent
  just a small
  piece of the
  pie…
Next Gen – Sees Everything
  “Technology Made Easy”




Standard Data Loss Prevention
Are your policies                             Prevent
perfect?
 If not, how
would you
know?
Next Gen – Sees Everything
  “Technology Made Easy”




Standard Data Loss Prevention
                                               Prevent
Do you know where
your sensitive data
is?
                                                 Record
Next Gen – Sees Everything
  “Technology Made Easy”



Standard Data Loss Prevention
                                              Prevention

If information leaked,
could you delete it?
                                                  Record




                                 Discover
Next Gen – Sees Everything
 “Technology Made Easy”




Standard Data Loss Prevention
Can you retrieve                             Prevention

the laptop if it
is lost?
             Delete                              Record




                                Discover
Next Gen – Sees Everything
 “Technology Made Easy”




Next Generation Data Protection
 Locate/Disable                             Prevent




       Delete                                   Record




                              Discover
Total Visibility and Control
      “Technology Made Easy”




Unique Technology with No Equal                          Next Steps

1.   A complete internal threat prevention platform    Data Loss Prevention
     – Data Loss Prevention    – Laptop Recovery
     – Web Filtering           – Employee Monitoring
                                                           Web Filtering
2.   Simple SaaS Solution
     – Fast download to try, easy to install; no hardware Employee Monitoring

3.   End-Point Architecture (next gen technology)
     – Works everywhere (unmatched control)
                                                         Laptop Security
     – Sees everything (unmatched visibility)
Total Visibility and Control
    “Technology Made Easy”



                 Data Loss Prevention
•   Screen all email (work and personal) and attachments for sensitive data and
    block if desired
•   Protect from misuse or misappropriation of trade secrets, Non-Public
    Personal Information Control or stop use of removable media
•   Block files, based on their content, from being copied to removable media
•   Protect and enforce policies governing each employee’s computer use,
    including those that never connect to a network (even laptops)
•   Easy, intuitive policy creation
•   Coach and educate employees to adopt protocol and best practices for
    protecting company data
•   Reports back to secure server over standard HTTPS protocols, instead of
    network
•   Identify, track, and control who accesses your data, what data they access,
    and what they can and cannot do with that data
Total Visibility and Control
   “Technology Made Easy”




                            Web Filtering
• Monitors and filters Internet use on and off the
  network (even on laptops)
• Blocks or limits applications like P2P, IM
• Screenshots taken whenever an alert word is
  typed or read on a webpage
• All Search Terms captured
• Works on and off network
Total Visibility and Control
     “Technology Made Easy”



                 Employee Monitoring
•   Works invisibly and undetectably at each desktop, without impacting
    central network computer resources
•   Records all employee communications - Email (including. webmail)
    & Instant Messaging
•   Monitors and filters Internet use on and off the network (even on
    laptops)
•   Blocks or limits applications like P2P, IM
•   Records and analyzes all keystroke activity, regardless of the
    application used
•   Formats all data into easy-to-read reports, making it easy to find and
    evaluate critical security lapses
•   Screenshots taken whenever an alert word is typed or read on a
    webpage
•   Conclusive, actionable data hard-linked to a specific employee’s
Total Visibility and Control
   “Technology Made Easy”




                            Laptop Security
• Remotely retrieve important files invisibly, using any internet
  connection
• Remotely delete files or an entire hard drive
• Secure and confirm deletion to the highest Pentagon
  standard of unrecoverability
• Geo-locate the stolen laptop, in real-time over any internet
  connection, often with greater accuracy than GPS
• Monitor and control everything a thief does – every keystroke
  they type and file they access will be visible
• Lock down laptop after disappearance so files can’t be
  accessed
“Technology Made Easy


Total Visibility and Control
    Contact Information
  MBM eHealthCare Solutions
     Toll: 800-236-2498
     Local: 678.648.1255
      Fax: 678.264.2197
   email: info@mbmehs.com
      www.mbmehs.com

Más contenido relacionado

La actualidad más candente

Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
HyTrust
 
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
AIP Foundation
 
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
ITCamp
 

La actualidad más candente (19)

Andersson Elffers Felix integrates physical and digital access with SafeNet e...
Andersson Elffers Felix integrates physical and digital access with SafeNet e...Andersson Elffers Felix integrates physical and digital access with SafeNet e...
Andersson Elffers Felix integrates physical and digital access with SafeNet e...
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Presentatie mc afee emm 2011
Presentatie mc afee emm 2011Presentatie mc afee emm 2011
Presentatie mc afee emm 2011
 
Network Environments
Network EnvironmentsNetwork Environments
Network Environments
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
 
Protecting Data on Laptops
Protecting Data on LaptopsProtecting Data on Laptops
Protecting Data on Laptops
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Patch management
Patch managementPatch management
Patch management
 
Emerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesEmerging Threats and Attack Surfaces
Emerging Threats and Attack Surfaces
 
Ensure Software Security already during development
Ensure Software Security already during developmentEnsure Software Security already during development
Ensure Software Security already during development
 
Vunvulea radu it camp-ro 2012 - building metro style applications on window...
Vunvulea radu   it camp-ro 2012 - building metro style applications on window...Vunvulea radu   it camp-ro 2012 - building metro style applications on window...
Vunvulea radu it camp-ro 2012 - building metro style applications on window...
 
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
 
The Cloud Security Landscape
The Cloud Security LandscapeThe Cloud Security Landscape
The Cloud Security Landscape
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
Empower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, AmytimeEmpower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, Amytime
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 

Destacado

Презентация по биологии 10х классов по теме "Курение"
Презентация по биологии 10х классов по теме "Курение"Презентация по биологии 10х классов по теме "Курение"
Презентация по биологии 10х классов по теме "Курение"
mo-phythmath-121
 
Ondeo IS Corporate Brochure
Ondeo IS Corporate BrochureOndeo IS Corporate Brochure
Ondeo IS Corporate Brochure
avanhaaften
 
Degremont Innovaties 2012
Degremont Innovaties 2012Degremont Innovaties 2012
Degremont Innovaties 2012
avanhaaften
 
TuckerHEDPSummer2016Presentation
TuckerHEDPSummer2016PresentationTuckerHEDPSummer2016Presentation
TuckerHEDPSummer2016Presentation
Tucker Hartland
 
11 12-13 wie niet verbonden is, is gezien
11 12-13 wie niet verbonden is, is gezien11 12-13 wie niet verbonden is, is gezien
11 12-13 wie niet verbonden is, is gezien
Wouter Slob
 

Destacado (20)

MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk AnalysisMBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
 
Своя игра
Своя играСвоя игра
Своя игра
 
Своя Игра
Своя ИграСвоя Игра
Своя Игра
 
Презентация по биологии 10х классов по теме "Курение"
Презентация по биологии 10х классов по теме "Курение"Презентация по биологии 10х классов по теме "Курение"
Презентация по биологии 10х классов по теме "Курение"
 
5 Hidden Benefits of an EHR Adoption
 5 Hidden Benefits of an EHR Adoption 5 Hidden Benefits of an EHR Adoption
5 Hidden Benefits of an EHR Adoption
 
Abx introduction janice majewski, ihcd milestone pllc_margaret_paola
Abx introduction janice majewski, ihcd milestone pllc_margaret_paolaAbx introduction janice majewski, ihcd milestone pllc_margaret_paola
Abx introduction janice majewski, ihcd milestone pllc_margaret_paola
 
Ondeo IS Corporate Brochure
Ondeo IS Corporate BrochureOndeo IS Corporate Brochure
Ondeo IS Corporate Brochure
 
Healthcare brochure
Healthcare brochureHealthcare brochure
Healthcare brochure
 
Abx conference of boston paola 26oct2014_definitive
Abx conference of boston paola 26oct2014_definitiveAbx conference of boston paola 26oct2014_definitive
Abx conference of boston paola 26oct2014_definitive
 
Paris climate protection plan a comprehensive strategy…
Paris climate protection plana comprehensive strategy…Paris climate protection plana comprehensive strategy…
Paris climate protection plan a comprehensive strategy…
 
NUEVA COLECCION QQBEAR SEPTIEMBRE 2011
NUEVA COLECCION QQBEAR SEPTIEMBRE 2011NUEVA COLECCION QQBEAR SEPTIEMBRE 2011
NUEVA COLECCION QQBEAR SEPTIEMBRE 2011
 
Hooked on Phonics
Hooked on PhonicsHooked on Phonics
Hooked on Phonics
 
Degremont Innovaties 2012
Degremont Innovaties 2012Degremont Innovaties 2012
Degremont Innovaties 2012
 
2014 updated editable hipaa hitech policy and procedures
2014 updated editable hipaa hitech policy and procedures2014 updated editable hipaa hitech policy and procedures
2014 updated editable hipaa hitech policy and procedures
 
Generation We Study, Slingshot 2011 Interns
Generation We Study, Slingshot 2011 InternsGeneration We Study, Slingshot 2011 Interns
Generation We Study, Slingshot 2011 Interns
 
TuckerHEDPSummer2016Presentation
TuckerHEDPSummer2016PresentationTuckerHEDPSummer2016Presentation
TuckerHEDPSummer2016Presentation
 
Intro cat
Intro catIntro cat
Intro cat
 
11 12-13 wie niet verbonden is, is gezien
11 12-13 wie niet verbonden is, is gezien11 12-13 wie niet verbonden is, is gezien
11 12-13 wie niet verbonden is, is gezien
 
Krygier Wealth Management Performance Update Nov 2013
Krygier Wealth Management Performance Update Nov 2013Krygier Wealth Management Performance Update Nov 2013
Krygier Wealth Management Performance Update Nov 2013
 
Srikar_Resume-SIN
Srikar_Resume-SINSrikar_Resume-SIN
Srikar_Resume-SIN
 

Similar a MBM's InterGuard Security Suite

AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
Işınsu Akçetin
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
sathiyamaha
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
Andris Soroka
 
Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011
chaucheckpoint
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidis
zakmackraken
 
NGSoft General Overview
NGSoft General OverviewNGSoft General Overview
NGSoft General Overview
Michael Starr
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
stefriche0199
 

Similar a MBM's InterGuard Security Suite (20)

AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
S series presentation
S series presentationS series presentation
S series presentation
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation process
 
Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidis
 
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
 
K Two Asset Tracking Solutions Impre 090225
K Two Asset Tracking Solutions Impre 090225K Two Asset Tracking Solutions Impre 090225
K Two Asset Tracking Solutions Impre 090225
 
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
 
NGSoft General Overview
NGSoft General OverviewNGSoft General Overview
NGSoft General Overview
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 

Más de Charles McNeil

Nist tech beat for january 7, 2015
Nist tech beat for january 7, 2015Nist tech beat for january 7, 2015
Nist tech beat for january 7, 2015
Charles McNeil
 
Kensington i pad air chassis story
Kensington i pad air chassis storyKensington i pad air chassis story
Kensington i pad air chassis story
Charles McNeil
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
Charles McNeil
 

Más de Charles McNeil (10)

Case Study: Internet Televison vs Satellite TV Cost Comparison
Case Study: Internet Televison vs Satellite TV Cost ComparisonCase Study: Internet Televison vs Satellite TV Cost Comparison
Case Study: Internet Televison vs Satellite TV Cost Comparison
 
Nist tech beat for january 7, 2015
Nist tech beat for january 7, 2015Nist tech beat for january 7, 2015
Nist tech beat for january 7, 2015
 
MBM Managed Security Services
MBM Managed Security ServicesMBM Managed Security Services
MBM Managed Security Services
 
Premier announces new supplier agreements
Premier announces new supplier agreementsPremier announces new supplier agreements
Premier announces new supplier agreements
 
Premier contracted supplier
Premier contracted supplierPremier contracted supplier
Premier contracted supplier
 
Kensington i pad air chassis story
Kensington i pad air chassis storyKensington i pad air chassis story
Kensington i pad air chassis story
 
Healthcare solutions
Healthcare solutionsHealthcare solutions
Healthcare solutions
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH RequirementsHow MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
 
MBM's Revenue Cycle Analyzer Tool
MBM's Revenue Cycle Analyzer ToolMBM's Revenue Cycle Analyzer Tool
MBM's Revenue Cycle Analyzer Tool
 

Último

Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan 087776558899
 
❤️Amritsar Escorts Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amri...
❤️Amritsar Escorts Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amri...❤️Amritsar Escorts Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amri...
❤️Amritsar Escorts Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amri...
Sheetaleventcompany
 
Premium Call Girls Nagpur {9xx000xx09} ❤️VVIP POOJA Call Girls in Nagpur Maha...
Premium Call Girls Nagpur {9xx000xx09} ❤️VVIP POOJA Call Girls in Nagpur Maha...Premium Call Girls Nagpur {9xx000xx09} ❤️VVIP POOJA Call Girls in Nagpur Maha...
Premium Call Girls Nagpur {9xx000xx09} ❤️VVIP POOJA Call Girls in Nagpur Maha...
Sheetaleventcompany
 
💚Chandigarh Call Girls Service 💯Piya 📲🔝8868886958🔝Call Girls In Chandigarh No...
💚Chandigarh Call Girls Service 💯Piya 📲🔝8868886958🔝Call Girls In Chandigarh No...💚Chandigarh Call Girls Service 💯Piya 📲🔝8868886958🔝Call Girls In Chandigarh No...
💚Chandigarh Call Girls Service 💯Piya 📲🔝8868886958🔝Call Girls In Chandigarh No...
Sheetaleventcompany
 
Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...
Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...
Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...
Sheetaleventcompany
 
Pune Call Girl Service 📞9xx000xx09📞Just Call Divya📲 Call Girl In Pune No💰Adva...
Pune Call Girl Service 📞9xx000xx09📞Just Call Divya📲 Call Girl In Pune No💰Adva...Pune Call Girl Service 📞9xx000xx09📞Just Call Divya📲 Call Girl In Pune No💰Adva...
Pune Call Girl Service 📞9xx000xx09📞Just Call Divya📲 Call Girl In Pune No💰Adva...
Sheetaleventcompany
 

Último (20)

Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
 
Independent Bangalore Call Girls (Adult Only) 💯Call Us 🔝 7304373326 🔝 💃 Escor...
Independent Bangalore Call Girls (Adult Only) 💯Call Us 🔝 7304373326 🔝 💃 Escor...Independent Bangalore Call Girls (Adult Only) 💯Call Us 🔝 7304373326 🔝 💃 Escor...
Independent Bangalore Call Girls (Adult Only) 💯Call Us 🔝 7304373326 🔝 💃 Escor...
 
Call Girls Kathua Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Kathua Just Call 8250077686 Top Class Call Girl Service AvailableCall Girls Kathua Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Kathua Just Call 8250077686 Top Class Call Girl Service Available
 
Cardiac Output, Venous Return, and Their Regulation
Cardiac Output, Venous Return, and Their RegulationCardiac Output, Venous Return, and Their Regulation
Cardiac Output, Venous Return, and Their Regulation
 
Chennai ❣️ Call Girl 6378878445 Call Girls in Chennai Escort service book now
Chennai ❣️ Call Girl 6378878445 Call Girls in Chennai Escort service book nowChennai ❣️ Call Girl 6378878445 Call Girls in Chennai Escort service book now
Chennai ❣️ Call Girl 6378878445 Call Girls in Chennai Escort service book now
 
ANATOMY AND PHYSIOLOGY OF RESPIRATORY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF RESPIRATORY SYSTEM.pptxANATOMY AND PHYSIOLOGY OF RESPIRATORY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF RESPIRATORY SYSTEM.pptx
 
Call Girls Bangalore - 450+ Call Girl Cash Payment 💯Call Us 🔝 6378878445 🔝 💃 ...
Call Girls Bangalore - 450+ Call Girl Cash Payment 💯Call Us 🔝 6378878445 🔝 💃 ...Call Girls Bangalore - 450+ Call Girl Cash Payment 💯Call Us 🔝 6378878445 🔝 💃 ...
Call Girls Bangalore - 450+ Call Girl Cash Payment 💯Call Us 🔝 6378878445 🔝 💃 ...
 
ANATOMY AND PHYSIOLOGY OF REPRODUCTIVE SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF REPRODUCTIVE SYSTEM.pptxANATOMY AND PHYSIOLOGY OF REPRODUCTIVE SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF REPRODUCTIVE SYSTEM.pptx
 
Call girls Service Phullen / 9332606886 Genuine Call girls with real Photos a...
Call girls Service Phullen / 9332606886 Genuine Call girls with real Photos a...Call girls Service Phullen / 9332606886 Genuine Call girls with real Photos a...
Call girls Service Phullen / 9332606886 Genuine Call girls with real Photos a...
 
💰Call Girl In Bangalore☎️63788-78445💰 Call Girl service in Bangalore☎️Bangalo...
💰Call Girl In Bangalore☎️63788-78445💰 Call Girl service in Bangalore☎️Bangalo...💰Call Girl In Bangalore☎️63788-78445💰 Call Girl service in Bangalore☎️Bangalo...
💰Call Girl In Bangalore☎️63788-78445💰 Call Girl service in Bangalore☎️Bangalo...
 
❤️Amritsar Escorts Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amri...
❤️Amritsar Escorts Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amri...❤️Amritsar Escorts Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amri...
❤️Amritsar Escorts Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amri...
 
Premium Call Girls Nagpur {9xx000xx09} ❤️VVIP POOJA Call Girls in Nagpur Maha...
Premium Call Girls Nagpur {9xx000xx09} ❤️VVIP POOJA Call Girls in Nagpur Maha...Premium Call Girls Nagpur {9xx000xx09} ❤️VVIP POOJA Call Girls in Nagpur Maha...
Premium Call Girls Nagpur {9xx000xx09} ❤️VVIP POOJA Call Girls in Nagpur Maha...
 
💚Chandigarh Call Girls Service 💯Piya 📲🔝8868886958🔝Call Girls In Chandigarh No...
💚Chandigarh Call Girls Service 💯Piya 📲🔝8868886958🔝Call Girls In Chandigarh No...💚Chandigarh Call Girls Service 💯Piya 📲🔝8868886958🔝Call Girls In Chandigarh No...
💚Chandigarh Call Girls Service 💯Piya 📲🔝8868886958🔝Call Girls In Chandigarh No...
 
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service Available
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service AvailableCall Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service Available
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service Available
 
Exclusive Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangal...
Exclusive Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangal...Exclusive Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangal...
Exclusive Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangal...
 
Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...
Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...
Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...
 
Pune Call Girl Service 📞9xx000xx09📞Just Call Divya📲 Call Girl In Pune No💰Adva...
Pune Call Girl Service 📞9xx000xx09📞Just Call Divya📲 Call Girl In Pune No💰Adva...Pune Call Girl Service 📞9xx000xx09📞Just Call Divya📲 Call Girl In Pune No💰Adva...
Pune Call Girl Service 📞9xx000xx09📞Just Call Divya📲 Call Girl In Pune No💰Adva...
 
❤️Call Girl Service In Chandigarh☎️9814379184☎️ Call Girl in Chandigarh☎️ Cha...
❤️Call Girl Service In Chandigarh☎️9814379184☎️ Call Girl in Chandigarh☎️ Cha...❤️Call Girl Service In Chandigarh☎️9814379184☎️ Call Girl in Chandigarh☎️ Cha...
❤️Call Girl Service In Chandigarh☎️9814379184☎️ Call Girl in Chandigarh☎️ Cha...
 
7 steps How to prevent Thalassemia : Dr Sharda Jain & Vandana Gupta
7 steps How to prevent Thalassemia : Dr Sharda Jain & Vandana Gupta7 steps How to prevent Thalassemia : Dr Sharda Jain & Vandana Gupta
7 steps How to prevent Thalassemia : Dr Sharda Jain & Vandana Gupta
 
💰Call Girl In Bangalore☎️7304373326💰 Call Girl service in Bangalore☎️Bangalor...
💰Call Girl In Bangalore☎️7304373326💰 Call Girl service in Bangalore☎️Bangalor...💰Call Girl In Bangalore☎️7304373326💰 Call Girl service in Bangalore☎️Bangalor...
💰Call Girl In Bangalore☎️7304373326💰 Call Girl service in Bangalore☎️Bangalor...
 

MBM's InterGuard Security Suite

  • 1. Total Visibility and Control InterGuard The only complete internal threat platform Data Loss Prevention Laptop Security Web Filtering Employee Monitoring “Technology Made Easy”
  • 2. Total Visibility and Control “Technology Made Easy” About Our Solution Partner • Based in Los Angeles, CA • Founded in 2002 • Patented SaaS technology (InterGuard) used by government and law enforcement agencies, financial service companies, banks, hospitals, schools, and more • Over 200,000 Total Users • Over 10,000 Corporate Customers
  • 4. Total Visibility and Control “Technology Made Easy” What is InterGuard? Competition 1. A complete internal threat prevention 1. Single Point platform – Laptop Solutions – Data Loss Prevention Recovery – Multiple Vendors – Web Filtering – Employee – Multiple User Monitoring Interfaces 2 Simple SaaS Solution 2. Complex Network Trials/Installs + – Fast download to try, easy to buy – No hardware require Hardware Required 3. Works only on 3 End-Point Architecture (next gen technology) network and can – Works everywhere (unmatched control) only capture – Sees everything (unmatched visibility) specified traffic
  • 5. Complete Internal Threat Platform “Technology Made Easy” Security 2000 - 2009 External Threats Viruses Hackers Company Network Spam Malware
  • 6. Complete Internal Threat Platform Security 2000 - 2009 “Technology Made Easy” Advent of UTM Hackers Viruses Company Network Spam Malware
  • 7. Complete Internal Threat Platform Security 2010 and Beyond “Technology Made Easy” Hackers Viruses Confidential Data Internal threats Company Network are for more damaging Laptop Employee Theft/Loss Productivity Employee Errors & Regulatory Failures Spam Malware
  • 8. Complete Internal Threat Platform Security 2010 and Beyond “Technology Made Easy” DLP Viruses Hackers Confidential InterGuard Data Company Network Single Point LAPTOP RECOVERY WEB FILTERING Laptop Employee Solutions Theft/Loss Productivity Employee Errors & Regulatory Failures Spam Malware EMPLOYEE MONITORING
  • 9. Complete Internal Threat Platform “Technology Made Easy” The Power of One Agent to Deploy User Interface Contract Bill Support Team
  • 10. For A Free 1 Month No obligation Trial Call Us at 800.236.2498 or e:mail info@mbmehs.com For a free, no obligation demo & test drive, click below to login; Online Demo Control Console https://www.mycontrolconsole.com Username: info@mbmehs.com Password: MBMdemo Check box to agree
  • 11.
  • 12. Simple, Complete SaaS Solution “Technology Made Easy” Simplicity Try, Buy, Install and Manage
  • 13. Simple, Complete SaaS Solution INTERNET “Technology Made Easy” Easily download and install agents on each workstation Remote ATI Data Center Employee Employee On the Road Organization
  • 14. Simple, Complete SaaS Solution INTERNET “Technology Made Easy” Remote ATI Data Center Reporting Employee Employee on the Road Organization
  • 15. Next Gen – Works Everywhere “Technology Made Easy” OLD WAY Remote Employee Employee on the Road NO COVERAGE NO COVERAGE
  • 16. Next Gen – Works Everywhere INTERGUARD WAY “Technology Made Easy” Remote Employee Employee on the Road ALL WORKSTATIONS ARE COVERED – ON AND OFF NETWORK
  • 17. Next Gen Technology – End-Point Architecture “Technology Made Easy” Vision Coverage Works Everywhere Sees Everything
  • 18. Next Gen – Sees Everything “Technology Made Easy” Standard Web Filtering Web Browsing Is Web Browsing the only unproductive use of a computer?
  • 19. Next Gen – Sees Everything “Technology Made Easy” Standard Web Filtering Web Browsing Web Browsing is just one piece of the pie
  • 20. Next Gen – Sees Everything “Technology Made Easy” Next Generation Web Filtering File Games Sharing Web Browsing IM/Chat Media Player Context is Personal Email Everything Microsoft Office Business Email
  • 21. Next Gen – Sees Everything “Technology Made Easy” Standard Web Filtering Records: List of URLs • Aim.com Does the list • Amazon.com • Careerbuilder.co of blocked m • Ebay.com URLs tell • Etrade.com • Gambling.com the whole • Google.com • Hotjobs.com story? • Espn.com • Facebook.com, etc.
  • 22. Next Gen – Sees Everything InterGuard Records: “Technology Made Easy” List of URLS Screenshots: • Aim.com Standard Web Filtering Records: • Amazon.com • Careerbuilder.co List of URLs m • Ebay.com • Aim.com • Amazon.com • Etrade.com, etc. ESPN.com • Careerbuilder.com List of Searches • Ebay.com • Best ways to sue your employer • Etrade.com • How to find a better • Gambling.com job • Google.com • Discount alcohol • Hotjobs.com • How to beat a drug • Espn.com test HotJobs.com • Facebook.com, • Best sick day etc. excuses
  • 23. Next Gen – Sees Everything “Technology Made Easy” Standard Data Loss Prevention Prevention is Prevent just a small piece of the pie…
  • 24. Next Gen – Sees Everything “Technology Made Easy” Standard Data Loss Prevention Are your policies Prevent perfect? If not, how would you know?
  • 25. Next Gen – Sees Everything “Technology Made Easy” Standard Data Loss Prevention Prevent Do you know where your sensitive data is? Record
  • 26. Next Gen – Sees Everything “Technology Made Easy” Standard Data Loss Prevention Prevention If information leaked, could you delete it? Record Discover
  • 27. Next Gen – Sees Everything “Technology Made Easy” Standard Data Loss Prevention Can you retrieve Prevention the laptop if it is lost? Delete Record Discover
  • 28. Next Gen – Sees Everything “Technology Made Easy” Next Generation Data Protection Locate/Disable Prevent Delete Record Discover
  • 29. Total Visibility and Control “Technology Made Easy” Unique Technology with No Equal Next Steps 1. A complete internal threat prevention platform Data Loss Prevention – Data Loss Prevention – Laptop Recovery – Web Filtering – Employee Monitoring Web Filtering 2. Simple SaaS Solution – Fast download to try, easy to install; no hardware Employee Monitoring 3. End-Point Architecture (next gen technology) – Works everywhere (unmatched control) Laptop Security – Sees everything (unmatched visibility)
  • 30. Total Visibility and Control “Technology Made Easy” Data Loss Prevention • Screen all email (work and personal) and attachments for sensitive data and block if desired • Protect from misuse or misappropriation of trade secrets, Non-Public Personal Information Control or stop use of removable media • Block files, based on their content, from being copied to removable media • Protect and enforce policies governing each employee’s computer use, including those that never connect to a network (even laptops) • Easy, intuitive policy creation • Coach and educate employees to adopt protocol and best practices for protecting company data • Reports back to secure server over standard HTTPS protocols, instead of network • Identify, track, and control who accesses your data, what data they access, and what they can and cannot do with that data
  • 31. Total Visibility and Control “Technology Made Easy” Web Filtering • Monitors and filters Internet use on and off the network (even on laptops) • Blocks or limits applications like P2P, IM • Screenshots taken whenever an alert word is typed or read on a webpage • All Search Terms captured • Works on and off network
  • 32. Total Visibility and Control “Technology Made Easy” Employee Monitoring • Works invisibly and undetectably at each desktop, without impacting central network computer resources • Records all employee communications - Email (including. webmail) & Instant Messaging • Monitors and filters Internet use on and off the network (even on laptops) • Blocks or limits applications like P2P, IM • Records and analyzes all keystroke activity, regardless of the application used • Formats all data into easy-to-read reports, making it easy to find and evaluate critical security lapses • Screenshots taken whenever an alert word is typed or read on a webpage • Conclusive, actionable data hard-linked to a specific employee’s
  • 33. Total Visibility and Control “Technology Made Easy” Laptop Security • Remotely retrieve important files invisibly, using any internet connection • Remotely delete files or an entire hard drive • Secure and confirm deletion to the highest Pentagon standard of unrecoverability • Geo-locate the stolen laptop, in real-time over any internet connection, often with greater accuracy than GPS • Monitor and control everything a thief does – every keystroke they type and file they access will be visible • Lock down laptop after disappearance so files can’t be accessed
  • 34. “Technology Made Easy Total Visibility and Control Contact Information MBM eHealthCare Solutions Toll: 800-236-2498 Local: 678.648.1255 Fax: 678.264.2197 email: info@mbmehs.com www.mbmehs.com

Notas del editor

  1. Change logo to ATInterGuard is a complete internal threat prevention platform
  2. Have the two sides going back and forth – 1a, 1b, 2a, 2b
  3. Single Point Solution on the right; click again and all the dots connect as single point solution goes away; Interguard pops up in it’s place
  4. Simple and Easy7111433
  5. Collects all the data and ships out to the internet via a website – goes into database and DB organizes it into the Dashboard. BRAND WITH ATI FOR DATA CENTER – USE LOGO?
  6. Collects all the data and ships out to the internet via a website – goes into database and DB organizes it into the Dashboard.
  7. Add red border around Coverage
  8. Remo
  9. Next Generation Web Filtering – Complete Employee Productivity
  10. Next Generation DLP – Complete Data Protection
  11. Have the two sides going back and forth – 1a, 1b, 2a, 2b