SlideShare a Scribd company logo
1 of 24
1 MIEL Endpoint Diagnostic Service (MEDS™)
2 MIEL Overview ,[object Object]
Established in 1999, managed by people with > 200 man-years of  management experience
HQ in Mumbai, with offices across India, and presence in several countries
Services provided:
Own intellectual properties:
PRISM- 1 Year post-graduate Program in Information Security
Helios ESDS – End-point  Security Diagnostic System
ISTI Courses – Short-term Information Security Courses
Sentinel  - Risk Management Tool
200+ full time professionals
ISO 27001 certified ; CERT-IN empanelled
Academic Partnerships: DNV, (ISC)2, SANS, CA, BCI, ITPreneurs , EC Council, Exin, PMI etc.
Vendor Partnerships: ArcSight, EMC, Fortinet, McAfee, NetApp, RSA, Symantec, VMWare, Websense
36 Business Partners spread over  19 countries
Trained  12,000+ professionals ;1,000+organizationsConsulting | Technical | Security / Storage Architecture & Solutions | Education | Managed services
3 Offerings / IPs
Forces Impacting Today's Endpoint Environment 4 New ThreatLandscape Compliance The  Endpoint  Consumerization  of IT
5 The New Threat Landscape
6 UNAUTHORISED FILE SHARING DATA THEFT THROUGH USB / CD DRIVES MALICIOUS SOFTWARE INSTALLATIONS WEAK PASSWORD POLICIES SOFTWARE PIRACY WORMS SPREADING THROUGH THE NETWORK INSUFFICIENT DATA ENCRYPTION WAS ALL THIS DATA ENCRYPTED? CD’s USED TO STEAL DATA MALWARE STOLE PASSWORDS INSECURE PASSWORDS CAUSED THEFT USB DRIVE HAD CUSTOMER DATA Endpoint security has never been a more pressing issue…
7 Data Breach Costs Continue to Grow Total Economic Impact From Data Loss & Security Breaches Is Estimated at Over$1 Trillion a Year The cost of recovering from a single data breach now averages$6.6M 20% of customerswill discontinue the relationship immediately and 40% are likely to leave within 6 months Ponemon Institute 2009, U.S. Costs of a Data Breach November 2008, Unsecured Economies Report 2009
8 Growing Compliance Burden
9 Mounting External Compliance Regulations 75% of organizations must comply with two or more regulations and corresponding audits 43% of organizations comply with 3 or more regulations PII Security Standards Sarbanes-Oxley, Section 404 PCI Data Security Standards (DSS) PCI Data Security Standards (DSS) Organizations spend 30-50% more on compliance than they should Basel II Basel II SB1386 (CA Privacy Act) SB1386 (CA Privacy Act) SB1386 (CA Privacy Act) USA Patriot Act USA Patriot Act USA Patriot Act USA Patriot Act Gramm Leach Bliley (GLBA) Gramm Leach Bliley (GLBA) Gramm Leach Bliley (GLBA) Gramm Leach Bliley (GLBA) Gramm Leach Bliley (GLBA) 21CFR11 21CFR11 21CFR11 21CFR11 21CFR11 21CFR11 HIPAA HIPAA HIPAA HIPAA HIPAA HIPAA HIPAA EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive *The Struggle to Manage Security Compliance for Multiple Regulations”. IT Policy Group Time
10 Consumerization of IT

More Related Content

What's hot

Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is RealePlus
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationNetworkCollaborators
 
Embracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud ComputingEmbracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud ComputingPECB
 
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnCisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnNetworkCollaborators
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid finalDevOps.com
 
Ic Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhIc Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhBrian Honan
 
SOMETHING INTANGIBLE, BUT REAL ABOUT CYBERSECURITY
SOMETHING INTANGIBLE, BUT REAL ABOUT CYBERSECURITYSOMETHING INTANGIBLE, BUT REAL ABOUT CYBERSECURITY
SOMETHING INTANGIBLE, BUT REAL ABOUT CYBERSECURITYDialogueScience
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofRUDDER
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?PECB
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy Nur Shiqim Chok
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrZYMR, INC.
 
Adapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint SecurityAdapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint SecurityTripwire
 

What's hot (20)

Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Limitless xdr meetup
Limitless xdr meetupLimitless xdr meetup
Limitless xdr meetup
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is Real
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
 
Embracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud ComputingEmbracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud Computing
 
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnCisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vn
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
Ic Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhIc Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp Bh
 
SOMETHING INTANGIBLE, BUT REAL ABOUT CYBERSECURITY
SOMETHING INTANGIBLE, BUT REAL ABOUT CYBERSECURITYSOMETHING INTANGIBLE, BUT REAL ABOUT CYBERSECURITY
SOMETHING INTANGIBLE, BUT REAL ABOUT CYBERSECURITY
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
Security policies
Security policiesSecurity policies
Security policies
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proof
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 
CyberObserver
CyberObserverCyberObserver
CyberObserver
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
Adapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint SecurityAdapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint Security
 

Viewers also liked

המלצות הרפואה הסינית לתזונה בקיץ
המלצות הרפואה הסינית לתזונה בקיץהמלצות הרפואה הסינית לתזונה בקיץ
המלצות הרפואה הסינית לתזונה בקיץשרון איל
 
Audience Profile
Audience ProfileAudience Profile
Audience ProfileJosephAloud
 
Film Making Part 1
Film Making   Part 1Film Making   Part 1
Film Making Part 1nairm
 
מורה מקוון אמצעי הוראה רונית נחמיה
מורה מקוון אמצעי הוראה רונית נחמיהמורה מקוון אמצעי הוראה רונית נחמיה
מורה מקוון אמצעי הוראה רונית נחמיהronit2107
 
Calendario vacunacioninfantil c
Calendario vacunacioninfantil cCalendario vacunacioninfantil c
Calendario vacunacioninfantil cFATIMAMI
 
Brasil (kulturartekotasuna)
Brasil (kulturartekotasuna)Brasil (kulturartekotasuna)
Brasil (kulturartekotasuna)Junegileor
 

Viewers also liked (8)

המלצות הרפואה הסינית לתזונה בקיץ
המלצות הרפואה הסינית לתזונה בקיץהמלצות הרפואה הסינית לתזונה בקיץ
המלצות הרפואה הסינית לתזונה בקיץ
 
Recce shot
Recce shotRecce shot
Recce shot
 
Audience Profile
Audience ProfileAudience Profile
Audience Profile
 
Film Making Part 1
Film Making   Part 1Film Making   Part 1
Film Making Part 1
 
Cas1
Cas1Cas1
Cas1
 
מורה מקוון אמצעי הוראה רונית נחמיה
מורה מקוון אמצעי הוראה רונית נחמיהמורה מקוון אמצעי הוראה רונית נחמיה
מורה מקוון אמצעי הוראה רונית נחמיה
 
Calendario vacunacioninfantil c
Calendario vacunacioninfantil cCalendario vacunacioninfantil c
Calendario vacunacioninfantil c
 
Brasil (kulturartekotasuna)
Brasil (kulturartekotasuna)Brasil (kulturartekotasuna)
Brasil (kulturartekotasuna)
 

Similar to MEDS

Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsOmar Khawaja
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdfControlCase
 
INTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITORINTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITORInfosec Train
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowPECB
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management ActMichelle Singh
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunk
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsAdrian Sanabria
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security TutorialNeil Matatall
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
 

Similar to MEDS (20)

Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
 
INTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITORINTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITOR
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 

MEDS

  • 1. 1 MIEL Endpoint Diagnostic Service (MEDS™)
  • 2.
  • 3. Established in 1999, managed by people with > 200 man-years of management experience
  • 4. HQ in Mumbai, with offices across India, and presence in several countries
  • 7. PRISM- 1 Year post-graduate Program in Information Security
  • 8. Helios ESDS – End-point Security Diagnostic System
  • 9. ISTI Courses – Short-term Information Security Courses
  • 10. Sentinel - Risk Management Tool
  • 11. 200+ full time professionals
  • 12. ISO 27001 certified ; CERT-IN empanelled
  • 13. Academic Partnerships: DNV, (ISC)2, SANS, CA, BCI, ITPreneurs , EC Council, Exin, PMI etc.
  • 14. Vendor Partnerships: ArcSight, EMC, Fortinet, McAfee, NetApp, RSA, Symantec, VMWare, Websense
  • 15. 36 Business Partners spread over 19 countries
  • 16. Trained 12,000+ professionals ;1,000+organizationsConsulting | Technical | Security / Storage Architecture & Solutions | Education | Managed services
  • 18. Forces Impacting Today's Endpoint Environment 4 New ThreatLandscape Compliance The Endpoint Consumerization of IT
  • 19. 5 The New Threat Landscape
  • 20. 6 UNAUTHORISED FILE SHARING DATA THEFT THROUGH USB / CD DRIVES MALICIOUS SOFTWARE INSTALLATIONS WEAK PASSWORD POLICIES SOFTWARE PIRACY WORMS SPREADING THROUGH THE NETWORK INSUFFICIENT DATA ENCRYPTION WAS ALL THIS DATA ENCRYPTED? CD’s USED TO STEAL DATA MALWARE STOLE PASSWORDS INSECURE PASSWORDS CAUSED THEFT USB DRIVE HAD CUSTOMER DATA Endpoint security has never been a more pressing issue…
  • 21. 7 Data Breach Costs Continue to Grow Total Economic Impact From Data Loss & Security Breaches Is Estimated at Over$1 Trillion a Year The cost of recovering from a single data breach now averages$6.6M 20% of customerswill discontinue the relationship immediately and 40% are likely to leave within 6 months Ponemon Institute 2009, U.S. Costs of a Data Breach November 2008, Unsecured Economies Report 2009
  • 23. 9 Mounting External Compliance Regulations 75% of organizations must comply with two or more regulations and corresponding audits 43% of organizations comply with 3 or more regulations PII Security Standards Sarbanes-Oxley, Section 404 PCI Data Security Standards (DSS) PCI Data Security Standards (DSS) Organizations spend 30-50% more on compliance than they should Basel II Basel II SB1386 (CA Privacy Act) SB1386 (CA Privacy Act) SB1386 (CA Privacy Act) USA Patriot Act USA Patriot Act USA Patriot Act USA Patriot Act Gramm Leach Bliley (GLBA) Gramm Leach Bliley (GLBA) Gramm Leach Bliley (GLBA) Gramm Leach Bliley (GLBA) Gramm Leach Bliley (GLBA) 21CFR11 21CFR11 21CFR11 21CFR11 21CFR11 21CFR11 HIPAA HIPAA HIPAA HIPAA HIPAA HIPAA HIPAA EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive *The Struggle to Manage Security Compliance for Multiple Regulations”. IT Policy Group Time
  • 25.
  • 26. It’s now IT’s job to say YES!Employee-provisioned laptop programs lead to greater user satisfaction and reduce total ownership costs up to 44%* * Gartner 2008
  • 27. 12 Consumerization of IT… The applications we use today for productivity Collaborative / Browser-based / Open Source Social Communities, Gadgets,Blogging and Widgets open up our endpoints to increasing risk everyday.
  • 28. People are “The New Perimeter” 13 Endpoints connect People
  • 29. 14 Is the firewall enabled? Is the antivirus updated? Are USB drives disabled? What software is installed? Are audit logs being saved? Is the user an administrator? Is the password policy strong? Are logon messages displayed? What are the installed services? Who are the users on the system? Is the registry remotely accessible? Are other desktop agents operating correctly? Does the screensaver lock the system? Are unauthorized files being shared? What programs are running? What patches are installed? Are guest accounts disabled? Is network data digitally signed? Who can shut-down the system? Are all drives using NTFS securely? What is the account lockout duration? Are passwords being saved in web-forms? What is the actual security state of your desktops & servers?
  • 30. 15 Multiple endpoints, geographically spread…securityinsight becomes hard. There are numerous such desktops and servers in your organization
  • 31. Do you know the gap between your prescribed policies & the ground reality? 16
  • 32. 17 MIEL Endpoint Diagnostic Service (MEDS™) The answer to your desktop security questions
  • 33. 18 MIEL Endpoint Diagnostic Service (MEDS™) AGENT-LESS ARCHITECTURE Nothing to install on the endpoints
  • 34. 19 MIEL Endpoint Diagnostic Service (MEDS™) HELPS MAKE IT MORE EFFICIENT Scans are fast, scalable and reliable
  • 35. 20 MIEL Endpoint Diagnostic Service (MEDS™) MANAGED SERVICE MODEL Hassle-free scanning with expert analysis
  • 36.
  • 48. User Rights assignment HOLISTIC CHECK DATABASE Covers 200 checks in different categories
  • 49. 22 MIEL Endpoint Diagnostic Service (MEDS™) COMPLIANCE SUMMARY COMPREHENSIVE REPORTING Executive summary, Detailed technical & Statistical reports
  • 50.
  • 51. For standards like ISO27001, PCI/DSS, SOX, HIPAA, GLB, NIST etc…
  • 52. Without installing any agent software…
  • 53. Or making network modifications…
  • 54. Regardless of the number of desktops & servers…
  • 56. With customized reporting, checks and trend-analysis…
  • 57. On demand, or on a regular schedule…
  • 58. At a compelling price.23
  • 59. 24 MIEL Endpoint Diagnostic Service (MEDS™) feelsecure@mielesecurity.com