Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance...
If you can't read please download the document
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have
Market Trends Enterprise Web Applications Cloud Computing SaaS
Applications BYOD Data Compliance Regulations 30 Second Elevator
Pitch Web browsers have become the common interface for accessing
information that drives business activity. Yet concerns remain
about data breaches, compliance requirements and malware threats
for sensitive corporate web-based data, as the average cost of a
single data breach is $5.5 million. Web applications are the third
most common breach vector and account for over one-third of data
loss. Quarri Technologies enables organizations to protect their
most valuable data by delivering and enforcing secure web sessions
on demand. Our patented technology prevents malicious and careless
internal and external threats from replicating data in transport
and in use. Quarri Sales Guide Quarri Protect On Q Enable IT
administrators to enforce security policies that prevent
unauthorized use and replication of confidential data by malware or
end users, both careless and malicious. Quarri Protect On Q Mobile
for iOS Enable IT administrators to enforce security policies that
prevent unauthorized use and replication of confidential data on
iOS devices. Quarri Protect On Q Mobile for Android Enable IT
administrators to enforce security policies that prevent
unauthorized use and replication of confidential data on Android
devices. Prevent data replication such as copying, printing,
screen-capturing or saving information, including from
browser-launched processes like Acrobat, Microsoft Office and ZIP
Shield sensitive data from key loggers, session hijacking, cache
miners and other malware, while also blocking inbound attacks on
managed and unmanaged endpoints Disk-based session datacache,
cookies, password store and history encrypted and securely deleted
post-session Centrally log users' browser-related file operations
including copy, save, print, etc. for auditing requirements
Centralized, administrator-defined policies enforce use and
security controls Visually distinct, session-based browser No user
installation, system modification, software installation or
software left behind Prevent data replication such as copying and
saving information, including from browser-launched processes like
Acrobat, Microsoft Office and ZIP Centralized,
administrator-defined policies enforce use and security controls
Detects if iOS devices are jailbroken and if true, enables site
owner to block access to the protected web application from that
device Blocks hostile code injection attacks such as Man-in-
the-Browser as well as potentially hostile browser add-ons (i.e.,
plug-ins) from launching All disk-based session datacache, cookies,
password store and historyis securely deleted post-session Prevent
data replication such as copying and saving information, including
from browser-launched processes like Acrobat, Microsoft Office and
ZIP Centralized, administrator-defined policies enforce use and
security controls Detects if Android devices are rooted and if
true, enables site owner to block access to the protected web
application from that device Blocks hostile code injection attacks
such as Man-in-the- Browser as well as potentially hostile browser
add-ons (i.e., plug-ins) from launching All disk-based session
datacache, cookies, password store and historyis securely deleted
post-session Business Benefits Mitigate Risk and Maintain
Compliance Cost Effective No client software installation or
management Deploys off existing infrastructure Subscription pricing
by user, not application Increased Business Productivity Extend
data access while managing risk No change in user behavior 3.
Deliver site-specific hardened browser 4. Protected web sessions
(with token) 1. User connects to protected web app (no token)
Protect On Q Deployment Employees Business Partners Customers
Products Web Site Data Center Protect On Q 2. Enforcement check
(token valid?)
Slide 2
Qualifying Questions Do you have end users accessing enterprise
web, SaaS or cloud applications? Are you concerned about the
security of your data in the cloud? Do these applications operate
in an environment that requires regulatory compliance? Are you
concerned that sensitive data, such as intellectual property,
strategic plans, financial reports, customer data and sensitive
webmail /attachments, can be copied or saved by authorized users?
Do you have customers that are accessing data from your website?
Are you worried your users authentication credentials can be
stolen? Are you worried about malware hijacking your users sessions
or redirecting your users to a malicious web site? Are your
employees or customers accessing data with personal mobile devices?
Are you using Web Application Firewalls or Load Balancers in your
infrastructure? OWA/SharePoint/Private and public cloud/SaaS and
CRM Systems Telecommuting/Remote Users Account Credential Theft Web
Apps/Cloud Computing/ SaaS Online Banking/Insurance PCI Compliance
Call Center Online Transactions Windows, Android and iOS platforms
Managed and unmanaged endpoints Desktops, laptops, phones, tablets
BYOD Markets 2012 Quarri 7500 Rialto Blvd. Building 2, Suite 210
Austin, TX 78746 USA +1.512.590.7731 [email protected][email protected] Competitors Security Features
Trusteer, PrevX, Sandboxie, Trend Quarri POQ Single Session
SecurityNY On-the-flyNY Site-based policyNY Site enforcementNY
Anti-malware defenseYY Data leakage preventionNY Clients