SlideShare una empresa de Scribd logo
1 de 13
Network security
scanner and
patch management
What’s new with
GFI LanGuard® 2014 R2
2
Overview
New features of GFI LanGuard 2014 R2
GFI LanGuard 2014 features
How does GFI LanGuard work?
What is GFI LanGuard?
What’s new with GFI LanGuard 2014 R2
Reference materials
Summary
New features demonstration
3
What is
GFI LanGuard?
4
What is GFI LanGuard?
Acts as a virtual security consultant providing three vital security services:
»Patch management
»Vulnerability assessment
»Network/software auditing
Scans, detects, assesses and rectifies security vulnerabilities on the network
Scans for missing security patches, service packs, open shares, open ports,
unused user accounts and more
Uses powerful reporting to identify issues and verify security status
Provides a complete network security overview with minimal administrative effort
5
How does
GFI LanGuard work?
6
How does GFI LanGuard work?
Scan
Analyze
Remediate
Install
Takes only a few
minutes to be up
and running
Agent-less or
agent-based
Identify assets
(including mobile
devices), find
vulnerabilities, missing
patches, open ports,
services, hardware
and software, etc.
Vulnerability
level assigned to
each computer
Reports, results
filtering, network
changes history
Check external
references
Deploy missing updates,
uninstall applications,
deploy custom scripts,
open remote desktop
connections, etc.
Definitions for vulnerabilities
and patches are
continuously updated from
GFI®
servers to report and
remediate latest threats
Deploy agents
(agent-less)
Powerful
interactive
dashboard
7
GFI LanGuard 2014 features
Patch automation
Vulnerability
assessment
Integration
Powerful
» Microsoft®, Mac OS® and major Linux operating systems
» Microsoft and other popular third-party applications
» Security and non-security updates
» More than 4000 critical security applications
» Interactive dashboard
» Workstations, laptops, servers, mobile devices and a wide range of
network devices such as printers, switches and routers
» Now checking for up to 50,000 vulnerabilities
Dedicated reports » For PCI DSS, HIPAA, PSN CoCo and other regulations
Improved scan
and remediation
performance
» Through usage of agents and relay agents
8
New features of
GFI LanGuard 2014 R2
9
Fedora Linux®
patch management
support
Enhanced mobile
device scanning
What’s new with
GFI LanGuard 2014 R2?
Extended
support for network
devices vulnerability
assessment
FCC CIPA
compliance reports.
10
What’s new with GFI LanGuard 2014 R2?
GFI LanGuard 2014 R2 adds support for vulnerability assessment of the devices from the
following vendors:
» 3Com,
» Dell
» SonicWALL
» Juniper
» NETGEAR
» Nortel
» Alcatel
» IBM
» Linksys
Extended support for network devices vulnerability assessment
Over 2,600 network devices are now supported and the number increases on
a continuous basis.
List of supported devices is available here: www.gfi.com/languard-supported-devices
11
What’s new with GFI LanGuard 2014 R2?
Mobile device scanning enhancement
Added support for the following mobile device management sources:
»Office 365
»Google Apps
»Apple Profiles Manager
Customers that don’t have a Microsoft Exchange server on premise, but rely on the cloud
based platforms above can now use GFI LanGuard to do a vulnerability assessment of the
devices that connect to these services.
12
What’s new with GFI LanGuard 2014 R2?
Agent-less detection of smartphones and tablets that connect to the company’s Microsoft Exchange
servers
Patch management for Fedora
With this version GFI LanGuard will start supporting automated patch management for
Fedora, along with the existing support for Red Hat® Enterprise Linux, Ubuntu®, SUSE®,
openSUSE®, CentOS® and Debian®. Click here for a full list of supported operating
systems.
This feature strengths GFI LanGuard ability to patch all Windows, Linux and OS X machines
in the network from a single central console.
Agent-less detection of smartphones and tablets that connect to the company’s Microsoft Exchange
servers
FCC CIPA compliance reports
Dedicated reports for a new regulation: Children's Internet Protection Act. Support for CIPA
ensures for GFI LanGuard easier access to schools and libraries in US.
Chinese localisation
GFI LanGuard 2014 R2 is now available in Chinese Traditional and Simplified.
13
Thank you for taking the time to join us today.
Please review our reference materials at
www.gfi.com and http://partners.gfi.com/resources
Contact your GFI channel account manager
for help in your sales efforts.

Más contenido relacionado

La actualidad más candente

160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architectureLan & Wan Solutions
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarAlgoSec
 
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copyZscaler
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Zscaler
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsIBM Security
 
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat Security Conference
 
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...Priyanka Aash
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpointe-Xpert Solutions SA
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinarAlgoSec
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Zscaler
 

La actualidad más candente (20)

160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
 
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow up
 
Evento 15 aprile
Evento 15 aprileEvento 15 aprile
Evento 15 aprile
 
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 

Destacado

Novell ZENworks Patch Management Best Practices
Novell ZENworks Patch Management Best PracticesNovell ZENworks Patch Management Best Practices
Novell ZENworks Patch Management Best PracticesNovell
 
Web vulnerability scanner getting start
Web vulnerability scanner getting startWeb vulnerability scanner getting start
Web vulnerability scanner getting start_U2_
 
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?SolarWinds
 
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...SolarWinds
 
SolarWinds Federal User Group 2016 - Optimizing SolarWinds Orion
SolarWinds Federal User Group 2016 - Optimizing SolarWinds OrionSolarWinds Federal User Group 2016 - Optimizing SolarWinds Orion
SolarWinds Federal User Group 2016 - Optimizing SolarWinds OrionSolarWinds
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF-Secure Corporation
 
SolarWinds Federal User Group 2016 - SolarWinds Product Strategy Update
SolarWinds Federal User Group 2016 - SolarWinds Product Strategy UpdateSolarWinds Federal User Group 2016 - SolarWinds Product Strategy Update
SolarWinds Federal User Group 2016 - SolarWinds Product Strategy UpdateSolarWinds
 
How to set up mobile market
How to set up mobile marketHow to set up mobile market
How to set up mobile marketFelix Ekpa
 
Весенняя школа ГУ ВШЭ - Распределенные команды
Весенняя школа ГУ ВШЭ - Распределенные командыВесенняя школа ГУ ВШЭ - Распределенные команды
Весенняя школа ГУ ВШЭ - Распределенные командыEmpatika
 
History of Social Media
History of Social MediaHistory of Social Media
History of Social MediaBob Crawshaw
 
Empatika Open - Введение в системную динамику
Empatika  Open - Введение в системную динамикуEmpatika  Open - Введение в системную динамику
Empatika Open - Введение в системную динамикуEmpatika
 
VACT Social Media Workshop 3 June 2011
VACT Social Media Workshop 3 June 2011VACT Social Media Workshop 3 June 2011
VACT Social Media Workshop 3 June 2011Bob Crawshaw
 
Empatika TV #9 - Междисциплинарность
Empatika TV #9 - МеждисциплинарностьEmpatika TV #9 - Междисциплинарность
Empatika TV #9 - МеждисциплинарностьEmpatika
 
10 уроков глобального стартапа
10 уроков глобального стартапа10 уроков глобального стартапа
10 уроков глобального стартапаEmpatika
 
How people use Twitter
How people use TwitterHow people use Twitter
How people use TwitterBob Crawshaw
 
Gfi corporate presentation_en_gen
Gfi corporate presentation_en_genGfi corporate presentation_en_gen
Gfi corporate presentation_en_genRicardo Resnik
 
Gold Quill Judging 2013
Gold Quill Judging 2013Gold Quill Judging 2013
Gold Quill Judging 2013Bob Crawshaw
 

Destacado (20)

2013 and gfi max
2013 and gfi max2013 and gfi max
2013 and gfi max
 
Novell ZENworks Patch Management Best Practices
Novell ZENworks Patch Management Best PracticesNovell ZENworks Patch Management Best Practices
Novell ZENworks Patch Management Best Practices
 
Web vulnerability scanner getting start
Web vulnerability scanner getting startWeb vulnerability scanner getting start
Web vulnerability scanner getting start
 
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
 
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
 
SolarWinds Federal User Group 2016 - Optimizing SolarWinds Orion
SolarWinds Federal User Group 2016 - Optimizing SolarWinds OrionSolarWinds Federal User Group 2016 - Optimizing SolarWinds Orion
SolarWinds Federal User Group 2016 - Optimizing SolarWinds Orion
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
SolarWinds Federal User Group 2016 - SolarWinds Product Strategy Update
SolarWinds Federal User Group 2016 - SolarWinds Product Strategy UpdateSolarWinds Federal User Group 2016 - SolarWinds Product Strategy Update
SolarWinds Federal User Group 2016 - SolarWinds Product Strategy Update
 
How to set up mobile market
How to set up mobile marketHow to set up mobile market
How to set up mobile market
 
Dealing With Disagreements
Dealing With DisagreementsDealing With Disagreements
Dealing With Disagreements
 
Весенняя школа ГУ ВШЭ - Распределенные команды
Весенняя школа ГУ ВШЭ - Распределенные командыВесенняя школа ГУ ВШЭ - Распределенные команды
Весенняя школа ГУ ВШЭ - Распределенные команды
 
History of Social Media
History of Social MediaHistory of Social Media
History of Social Media
 
Empatika Open - Введение в системную динамику
Empatika  Open - Введение в системную динамикуEmpatika  Open - Введение в системную динамику
Empatika Open - Введение в системную динамику
 
VACT Social Media Workshop 3 June 2011
VACT Social Media Workshop 3 June 2011VACT Social Media Workshop 3 June 2011
VACT Social Media Workshop 3 June 2011
 
Empatika TV #9 - Междисциплинарность
Empatika TV #9 - МеждисциплинарностьEmpatika TV #9 - Междисциплинарность
Empatika TV #9 - Междисциплинарность
 
10 уроков глобального стартапа
10 уроков глобального стартапа10 уроков глобального стартапа
10 уроков глобального стартапа
 
How people use Twitter
How people use TwitterHow people use Twitter
How people use Twitter
 
Christmas Watch
Christmas WatchChristmas Watch
Christmas Watch
 
Gfi corporate presentation_en_gen
Gfi corporate presentation_en_genGfi corporate presentation_en_gen
Gfi corporate presentation_en_gen
 
Gold Quill Judging 2013
Gold Quill Judging 2013Gold Quill Judging 2013
Gold Quill Judging 2013
 

Similar a Whatsnew gfi languard2014partners_en_gen

GFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetGFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetAndre Muscat
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data CenterGroup of company MUK
 
Découvrez NGINX AppProtect
Découvrez NGINX AppProtectDécouvrez NGINX AppProtect
Découvrez NGINX AppProtectNGINX, Inc.
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPSecuring Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPOlivia LaMar
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37Felipe Prado
 
SFScon15 - Jürgen Vigna: " Application Performance Monitoring auf Open Source...
SFScon15 - Jürgen Vigna: " Application Performance Monitoring auf Open Source...SFScon15 - Jürgen Vigna: " Application Performance Monitoring auf Open Source...
SFScon15 - Jürgen Vigna: " Application Performance Monitoring auf Open Source...South Tyrol Free Software Conference
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability ManagementGFI Software
 
2 20613 qualys_top_10_reports_vm
2 20613 qualys_top_10_reports_vm2 20613 qualys_top_10_reports_vm
2 20613 qualys_top_10_reports_vmazfayel
 
SFScon19 - Marvin W - MicroG – what it is and where it’s going
SFScon19 - Marvin W - MicroG – what it is and where it’s goingSFScon19 - Marvin W - MicroG – what it is and where it’s going
SFScon19 - Marvin W - MicroG – what it is and where it’s goingSouth Tyrol Free Software Conference
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdfssusera76ea9
 
Bluemix overview with Internet of Things
Bluemix overview with Internet of ThingsBluemix overview with Internet of Things
Bluemix overview with Internet of ThingsEric Cattoir
 
Top 5 Nagios Replacement Must Haves
Top 5 Nagios Replacement Must HavesTop 5 Nagios Replacement Must Haves
Top 5 Nagios Replacement Must HavesCopperEgg
 
AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewJermund Ottermo
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 

Similar a Whatsnew gfi languard2014partners_en_gen (20)

GFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetGFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business Datasheet
 
GFILanGuardBrochure
GFILanGuardBrochureGFILanGuardBrochure
GFILanGuardBrochure
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
Découvrez NGINX AppProtect
Découvrez NGINX AppProtectDécouvrez NGINX AppProtect
Découvrez NGINX AppProtect
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPSecuring Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
 
Ibm empresa movil
Ibm empresa movilIbm empresa movil
Ibm empresa movil
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
 
SFScon15 - Jürgen Vigna: " Application Performance Monitoring auf Open Source...
SFScon15 - Jürgen Vigna: " Application Performance Monitoring auf Open Source...SFScon15 - Jürgen Vigna: " Application Performance Monitoring auf Open Source...
SFScon15 - Jürgen Vigna: " Application Performance Monitoring auf Open Source...
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Windows and linux
Windows and linuxWindows and linux
Windows and linux
 
2 20613 qualys_top_10_reports_vm
2 20613 qualys_top_10_reports_vm2 20613 qualys_top_10_reports_vm
2 20613 qualys_top_10_reports_vm
 
SFScon19 - Marvin W - MicroG – what it is and where it’s going
SFScon19 - Marvin W - MicroG – what it is and where it’s goingSFScon19 - Marvin W - MicroG – what it is and where it’s going
SFScon19 - Marvin W - MicroG – what it is and where it’s going
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
Bluemix overview with Internet of Things
Bluemix overview with Internet of ThingsBluemix overview with Internet of Things
Bluemix overview with Internet of Things
 
Top 5 Nagios Replacement Must Haves
Top 5 Nagios Replacement Must HavesTop 5 Nagios Replacement Must Haves
Top 5 Nagios Replacement Must Haves
 
AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software review
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 

Más de Ricardo Resnik

Psb ec sales presentation
Psb ec sales presentation Psb ec sales presentation
Psb ec sales presentation Ricardo Resnik
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014Ricardo Resnik
 
Two factor Authentication
Two factor AuthenticationTwo factor Authentication
Two factor AuthenticationRicardo Resnik
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014Ricardo Resnik
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Ricardo Resnik
 
MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version Ricardo Resnik
 

Más de Ricardo Resnik (8)

Psb ec sales presentation
Psb ec sales presentation Psb ec sales presentation
Psb ec sales presentation
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
 
Two factor Authentication
Two factor AuthenticationTwo factor Authentication
Two factor Authentication
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version
 
Ironkey Windows to go
Ironkey Windows to goIronkey Windows to go
Ironkey Windows to go
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Whatsnew gfi languard2014partners_en_gen

  • 1. Network security scanner and patch management What’s new with GFI LanGuard® 2014 R2
  • 2. 2 Overview New features of GFI LanGuard 2014 R2 GFI LanGuard 2014 features How does GFI LanGuard work? What is GFI LanGuard? What’s new with GFI LanGuard 2014 R2 Reference materials Summary New features demonstration
  • 4. 4 What is GFI LanGuard? Acts as a virtual security consultant providing three vital security services: »Patch management »Vulnerability assessment »Network/software auditing Scans, detects, assesses and rectifies security vulnerabilities on the network Scans for missing security patches, service packs, open shares, open ports, unused user accounts and more Uses powerful reporting to identify issues and verify security status Provides a complete network security overview with minimal administrative effort
  • 6. 6 How does GFI LanGuard work? Scan Analyze Remediate Install Takes only a few minutes to be up and running Agent-less or agent-based Identify assets (including mobile devices), find vulnerabilities, missing patches, open ports, services, hardware and software, etc. Vulnerability level assigned to each computer Reports, results filtering, network changes history Check external references Deploy missing updates, uninstall applications, deploy custom scripts, open remote desktop connections, etc. Definitions for vulnerabilities and patches are continuously updated from GFI® servers to report and remediate latest threats Deploy agents (agent-less) Powerful interactive dashboard
  • 7. 7 GFI LanGuard 2014 features Patch automation Vulnerability assessment Integration Powerful » Microsoft®, Mac OS® and major Linux operating systems » Microsoft and other popular third-party applications » Security and non-security updates » More than 4000 critical security applications » Interactive dashboard » Workstations, laptops, servers, mobile devices and a wide range of network devices such as printers, switches and routers » Now checking for up to 50,000 vulnerabilities Dedicated reports » For PCI DSS, HIPAA, PSN CoCo and other regulations Improved scan and remediation performance » Through usage of agents and relay agents
  • 8. 8 New features of GFI LanGuard 2014 R2
  • 9. 9 Fedora Linux® patch management support Enhanced mobile device scanning What’s new with GFI LanGuard 2014 R2? Extended support for network devices vulnerability assessment FCC CIPA compliance reports.
  • 10. 10 What’s new with GFI LanGuard 2014 R2? GFI LanGuard 2014 R2 adds support for vulnerability assessment of the devices from the following vendors: » 3Com, » Dell » SonicWALL » Juniper » NETGEAR » Nortel » Alcatel » IBM » Linksys Extended support for network devices vulnerability assessment Over 2,600 network devices are now supported and the number increases on a continuous basis. List of supported devices is available here: www.gfi.com/languard-supported-devices
  • 11. 11 What’s new with GFI LanGuard 2014 R2? Mobile device scanning enhancement Added support for the following mobile device management sources: »Office 365 »Google Apps »Apple Profiles Manager Customers that don’t have a Microsoft Exchange server on premise, but rely on the cloud based platforms above can now use GFI LanGuard to do a vulnerability assessment of the devices that connect to these services.
  • 12. 12 What’s new with GFI LanGuard 2014 R2? Agent-less detection of smartphones and tablets that connect to the company’s Microsoft Exchange servers Patch management for Fedora With this version GFI LanGuard will start supporting automated patch management for Fedora, along with the existing support for Red Hat® Enterprise Linux, Ubuntu®, SUSE®, openSUSE®, CentOS® and Debian®. Click here for a full list of supported operating systems. This feature strengths GFI LanGuard ability to patch all Windows, Linux and OS X machines in the network from a single central console. Agent-less detection of smartphones and tablets that connect to the company’s Microsoft Exchange servers FCC CIPA compliance reports Dedicated reports for a new regulation: Children's Internet Protection Act. Support for CIPA ensures for GFI LanGuard easier access to schools and libraries in US. Chinese localisation GFI LanGuard 2014 R2 is now available in Chinese Traditional and Simplified.
  • 13. 13 Thank you for taking the time to join us today. Please review our reference materials at www.gfi.com and http://partners.gfi.com/resources Contact your GFI channel account manager for help in your sales efforts.

Notas del editor

  1. Apple Mac OS X patching: Manage patch management from a single console for both Microsoft operating systems and Apple Mac OS X systems. Reporting improvements: Dedicated reports for additional compliance standards, such as: Sarbanes–Oxley Act (SOX), Gramm–Leach–Bliley Act (GLB/GLBA), Health Insurance Portability and Accountability Act (HIPAA), Government Connect Secure Extranet - Code of Connection (GCSx CoCo).
  2. Apple Mac OS X patching: Manage patch management from a single console for both Microsoft operating systems and Apple Mac OS X systems. Reporting improvements: Dedicated reports for additional compliance standards, such as: Sarbanes–Oxley Act (SOX), Gramm–Leach–Bliley Act (GLB/GLBA), Health Insurance Portability and Accountability Act (HIPAA), Government Connect Secure Extranet - Code of Connection (GCSx CoCo).