SlideShare una empresa de Scribd logo
1 de 21
Magix Security Overview ,[object Object]
Magix Security
Focussed “Insider Threat” Specialisation
Branches JHB & CT
Proven & Experienced Management Team
15 Staff
Level-3 BBBEE Status
8 Year Track Record of Success
Extensive Industry Expertise
Broad & Evolving Service Offerings
Commitment to Long-term Employee Development  
Leading Software Products
Local Skills & Services to Extract Benefits
High-profile Customers
Profitable & Sustainable,[object Object]
We can help you find the Rotten Apple Magix Information Security Specialises on the Insider Threat
SA loses R150bn to insider fraud  ,[object Object]
Vodacom: R8 million insider fraud, stolen passwords, diverted funds. August 2009.
Mpumalanga Education Department: R5.5 million stolen via insider password fraud. October 2009.
R769 million stolen: KwaZulu-Natal probes insider fraud. April 2010.

Más contenido relacionado

La actualidad más candente

Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Vendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementVendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementInfo-Tech Research Group
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Security Operations Center
Security Operations CenterSecurity Operations Center
Security Operations CenterMDS CS
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsOmar Khawaja
 
In data security
In data securityIn data security
In data securityadithdev
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
IT Network Security Services
IT Network Security ServicesIT Network Security Services
IT Network Security Servicesmartinvoelk
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveAlgoSec
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introductionyuliana_mar
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features rver21
 
Force 3 Software Practice Overview
Force 3 Software Practice OverviewForce 3 Software Practice Overview
Force 3 Software Practice OverviewForce 3
 

La actualidad más candente (20)

Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Data Security
Data SecurityData Security
Data Security
 
Vendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementVendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event Management
 
Data Security
Data SecurityData Security
Data Security
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Security Operations Center
Security Operations CenterSecurity Operations Center
Security Operations Center
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
In data security
In data securityIn data security
In data security
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
IT Network Security Services
IT Network Security ServicesIT Network Security Services
IT Network Security Services
 
IT security
IT securityIT security
IT security
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introduction
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features
 
Force 3 Software Practice Overview
Force 3 Software Practice OverviewForce 3 Software Practice Overview
Force 3 Software Practice Overview
 
Security Information and Event Management
Security Information and Event ManagementSecurity Information and Event Management
Security Information and Event Management
 

Similar a Magix Value Proposition Ar

Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSDavid J Rosenthal
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Company Profile
Company ProfileCompany Profile
Company Profile3SC World
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsSolarWinds
 
Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...EdiverLadino
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security ChecklistMobeen Khan
 
Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdfMehedi Hasan
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPowerSaturdayParis
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Software
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
Key Features of Managed IT Services - Intellect IT
Key Features of Managed IT Services - Intellect ITKey Features of Managed IT Services - Intellect IT
Key Features of Managed IT Services - Intellect ITintellectittechnology
 
Did You Know Managed IT Services Can Enhance Data Security?
Did You Know Managed IT Services Can Enhance Data Security?Did You Know Managed IT Services Can Enhance Data Security?
Did You Know Managed IT Services Can Enhance Data Security?Rion Technologies
 

Similar a Magix Value Proposition Ar (20)

Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
 
Sizzling good remote monitoring.pdf
Sizzling good  remote monitoring.pdfSizzling good  remote monitoring.pdf
Sizzling good remote monitoring.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Key Features of Managed IT Services - Intellect IT
Key Features of Managed IT Services - Intellect ITKey Features of Managed IT Services - Intellect IT
Key Features of Managed IT Services - Intellect IT
 
Did You Know Managed IT Services Can Enhance Data Security?
Did You Know Managed IT Services Can Enhance Data Security?Did You Know Managed IT Services Can Enhance Data Security?
Did You Know Managed IT Services Can Enhance Data Security?
 

Magix Value Proposition Ar

  • 1.
  • 2.
  • 6. Proven & Experienced Management Team
  • 9. 8 Year Track Record of Success
  • 11. Broad & Evolving Service Offerings
  • 12. Commitment to Long-term Employee Development  
  • 14. Local Skills & Services to Extract Benefits
  • 16.
  • 17. We can help you find the Rotten Apple Magix Information Security Specialises on the Insider Threat
  • 18.
  • 19. Vodacom: R8 million insider fraud, stolen passwords, diverted funds. August 2009.
  • 20. Mpumalanga Education Department: R5.5 million stolen via insider password fraud. October 2009.
  • 21. R769 million stolen: KwaZulu-Natal probes insider fraud. April 2010.
  • 22. Teasers: insider diverted R162 000 to personal account. June 2010.
  • 23. Social Security Agency: insiders steal passwords and divert funds to personal accounts. March 2010.
  • 24. Department of Environmental Affairs: stolen funds diverted by insiders to private account. March 2010.
  • 25. Omnia Holdings: R23 million stolen by insider. May 2009.
  • 26. SA Institute of Electrical Engineers: R703 452 stolen by insider. March 2010.
  • 27. State pension fund: insider syndicate steals R1 million via modified banking details. July 2010.
  • 28. Mpumalanga Agriculture Department: R1.9 million stolen by insiders. July 2010. 17 September 2010
  • 29. User Monitoring Magix Value Infrastructure Monitoring Data Monitoring
  • 31. User Monitoring Identity theft Compromises honest users & exposes organisations to acts of fraud & sabotage Authorised users May commit fraudulent acts & steal data whilst performing normal duties Lack of Visibility of User Activities Opens opportunities for the misuse of privileged access, bypassing of controls & general disregard for policies Known Risks
  • 32. Magix User Monitoring Solutions User Behaviour Control Mechanisms Record all user interaction with applications & operating systems Targeted Monitoring Ensure proper management of user accounts & effective monitoring of user’s actions when using these accounts Magix Solutions
  • 33. Magix User Monitoring Solutions Magix Solutions Intellinx is a non-invasive, real-time application monitoring solution that enables the enterprise to record, review and react to all application based activity ObserveIT audits and records all user activities performed on your server platform. Every window session on your network – whether via remote access or console access, is recorded and indexed according to usage metadata. Helps IT executives secure access to IT resources, meet the control and auditing requirements of regulatory compliance mandates, and generate the real-time reports
  • 34. Magix Value Data Monitoring
  • 35.
  • 36. Due to poorly understood data practices
  • 37. From a lack of effective policy
  • 38. As a result of user errorKnown Risks
  • 39. Magix Data Monitoring Solutions Implementation of controls Create policies and controls for data at rest, in use, & in motion Targeted Monitoring Confirms policy compliance & escalate violations Magix Solutions
  • 40. Magix Data Monitoring Solutions Magix Solutions Endpoint data leakage prevention solutions that protect against corporate data loss via physical, wireless, and removable media ports Provides the ability to manage access entitlements, audit access to every file event, identify and involve data owners and find and classify sensitive and business critical data.  Enables businesses to easily deploy and manage enterprise application environments to PCs
  • 41. Magix Data Monitoring Solutions Magix Solutions FortiDB, the most comprehensive solution to secure databases and applications such as ERP, CRM, SCM and custom applications. FortiMail, proven, powerful messaging security for the most demanding messaging systems. FortiWeb, Integrated web application and XML firewalls protect web-based applications and internet-facing data from attack and data loss help you prevent identity theft, financial fraud and corporate espionage. Helps organizations automate, accelerate and secure the delivery of digital assets throughout internal and distributed IT environments. Secures data with always-on hardware encryption to meet compliance and data protection requirements
  • 43.
  • 44. Inevitably result in productivity losses
  • 45. Attackers constantly search for new, unprotected or incorrectly configured systemsKnown Risks
  • 46. Magix Infrastructure Solutions Implementation of software & hardware policies Introduce controls for software and hardware configurations Management of devices Ensures ongoing compliance with corporate standards & policies Targeted Monitoring Ensures vulnerabilities and attacks are identified & mitigated Magix Solutions
  • 47. Magix Infrastructure Solutions Magix Solutions Qualys offers a full range of on demand solutions to help security managers effectively strengthen the security of their networks, conduct automated security audits and ensure compliance with internal policies and external regulations. Provides a suite of solutions that unify real-time vulnerability, event and compliance monitoring into a single, role-based, interface for administrators, auditors and risk managers to evaluate, communicate and report needed information for effective decision making and systems management
  • 48.
  • 49. Reliable & Regular View of IT Risks
  • 50. Detailed Audit Trails of User & System Activity for Forensic Purposes
  • 51. Alerting Mechanisms to Enable Intervention to Mitigate Damage
  • 52.