it-sa
The IT Security Expo and Congress

08th – 10th October 2019 | Nürnberg

FCS booth 503 | Hall 11.0

  

Hello again!

This year again we are represented with a booth at it-sa, Europe’s biggest IT security congress!
Would you like to get to know our products or familiarize yourself with the new highlights of our solutions? Or are you just curious?

Then stop by, you are cordially invited! 

We present to you:

Interface monitoring with Security.Desk

Security Desk automatically detects when a flash memory, smartphone or digital camera is connected to a PC via USB or FireWire or when a CD or SD memory card is inserted. You specify what to do: Is the data transfer completely blocked? Is the logged-in user allowed to use the contained data, view only or access only certain file types? In addition, you have the option, for example, to only allow encrypted writing on the data carriers. Keep an eye on your interfaces and manage them centrally in one system.

  • Sharing and blocking certain storage media and file types
    You define mobile memory releases or prohibitions on the PC based on OUs, groups, users or computers. Certain device types, series or individual devices can always be excluded from the prohibition of use. Release for a time interval or up to a certain point in time is also possible. Security.Desk captivates by its granularity: Thus you have e.g. also the possibility of preventing reading and writing on the stick only for completely certain file types like .exe or doc. Or you can allow only the execution of a specific file on the mobile memory. The use of unwanted programs (e.g. burning software, games, etc.) can also be prevented on the target devices.
  • Shadowing / logging of data and file transfers
    Security.Desk logs all data and file transfers. You can thus always track whether files have been copied, fetched, deleted or renamed on the removable storage devices.
  • Rights management at all levels
    For All Users: The Corporate Policy. Exceptions?
    Then rights are assigned as required at the device, user, group or organizational unit (OU) level. Security.Desk offers a convenient connection to the Active Directory for this purpose.
  • Temporary release
    All policies persist when a device is disconnected from the network. Mobile users on notebooks can also be granted temporary user rights for the interfaces via code activation, even if the notebooks are disconnected from the network.
  • Protection from bad USB
    Security.Desk offers optimal protection against memory sticks with manipulated firmware (Bad-USB). These secretly log on to the computer as mouse, keyboard or network card and then allow remote control or external use of the infected systems. Such an attack can be prevented by controlling such connections.
  • An Interactive Dashboard
    Graphically display the current status of the Endpoint Security in your network. Which of your clients are protected? Have suspicious actions been performed? If so, where and by whom?
  • Detailed reporting
    Log all accesses to the hardware interfaces and use detailed reports to track who, when and what actions have been taken. Which mobile memories are used by whom and how? The detailed reporting provides information.

Asset.Desk – The all-rounder for scanning, inventory, IT asset-, license-, contract- and lifecycle management

Asset.Desk combines technical, organizational and security-relevant commercial information on all company values in one system. Asset.Desk can be individually adapted to the needs of any company by means of numerous additional modules.

The basis for an organized asset management is the inventory of all hardware and software data available in the company, whether physical, virtual or in the cloud, as well as all other assets. Accompany your assets throughout the entire lifecycle, map licenses and contracts in Asset.Desk and add information such as “risk class, protection status or GDPR relevance”.

  • Lifecycle Management and Physical Inventory
    The management of your IT resources or other assets is made much easier with Asset.Desk. They map the entire lifecycle of the assets contained in the database – from acquisition to possible relocation to disposal. This gives you full control over the required, existing and used assets as well as costs and compliance. Inventory is also accelerated with Asset.Desk. Assets can be provided with barcode or RFID labels and thus quickly inventoried. This makes manual inventory faster and more efficient. Hardware and software of the IT resources with different operating systems can be scanned remotely or via scan agent simply at the push of a button from a central console.
  • License management
    Asset.Desk is a KPMG-certified SAM tool and ensures that your software is cataloged and a consistent software and license inventory is achieved. Asset.Desk detects over- and underlicensing, to which you can react immediately in order to achieve the necessary compliance with your software suppliers. License management also includes software subscriptions in the cloud, such as Office 365, Adobe Creative Cloud, and G Suite. You can always see how many licenses are in use or available and which user is currently using them. In addition, security aspects of personal and other security-related data can be included for the respective software products. If your systems contain sensitive data, it can, for example, be identified by a risk classification, sorted and clearly displayed.
  • Conformance with GDPR and BSI standards
    All FCS products comply with the GDPR, which came into force in May 2018. Asset.Desk only records address data, but not any
    other personal data, such as gender, health data, energy data. The data used (e.g. IP addresses) can be displayed and exported by the administrator if required. In Asset.Desk, you can also specify the duration after which documents (including personal data) are to be automatically deleted from the system. For each asset, security-relevant data can be maintained, such as whether GDPR-relevant data is stored on a client or server. In IT asset management, Asset.Desk offers standards for data management that comply with the BSI Basic Protection Ordinance. These standards ensure that all business processes are compliant and that all data is processed correctly.

HEINZELMANN Service.Desk – Manage the ISIS 12 standard with your helpdesk system

The HEINZELMANN Service Desk is what you need from it – a trouble ticketing or helpdesk system that supports employees in documenting and organizing error messages, inquiries, problems or requirements within the company. It is also suitable for all types of tasks that have to be processed, decided and completed in a defined process.

Regardless of whether you are looking for trouble ticketing, an ITSM tool or even full service management, HEINZELMANN’s modular structure adapts individually to the needs and service processes of your company.

  • Workflow
    A new employee joins the company. Before his first working day, however, his colleagues have to work through various steps. For example, an employee ID card must be issued, business cards ordered, an e-mail box created, and a company car approved. If you define the workflow “New employee” once with HEINZELMANN, the process can always run automatically and the tasks reach the responsible employee at the right time. If, while processing a ticket, you determine that a recurring process defined in ITSM must be started, this is also possible at the push of a button if you have mapped the ITSM processes as workflows.
  • ITIL process mapping
    Depending on your service management approach, you can create incidents, feature or service requests, bugs, workshop tickets, etc. with your own masks and user-defined fields. You can use standard fields as well as your own fields. Furthermore, you can define, for example, for which user groups the created tickets are visible, who is allowed to create and edit them.
  • ISIS 12: Support of the standard among information security management systems
    HEINZELMANN covers all the requirements that the 12 points of the ISIS standard place on a service management tool. Identify critical applications, map them in the service catalog and derive corresponding Service Level Agreements. Time-controlled deletion of tickets is also possible by simply defining the period of time for which a ticket may be kept in the system. A service then cyclically deletes the tickets that have exceeded the time period.

Install.Desk – Software Distribution with Vulnerability Management

In every company, sensitive data is managed that is of enormous importance internally. If they were carried outside, the company’s reputation would be damaged and high penalties could be imposed. For example, vulnerabilities in software that can be used by hackers to access your systems pose a major security risk. To avoid this and to recognize these vulnerabilities early on, a suitable tool, such as the “vulnerability management” of the software distribution solution Install.Desk, is needed.

In order to keep your IT security up to date, we proceed according to the PDCA model for quality assurance:

  1. Plan: Extensive software scan
  2. Do: Decision: which vulnerabilities should be closed?
  3. Check: Follow system suggestion: Fix download
  4. Act: Fast elimination of vulnerabilities via distribution orders

Plan:
We collect the worldwide known software vulnerabilities (CVE – Common Vulnerabilities and Expossures) on a daily basis and make them available to our customers. Install.Desk Vulnerability Management performs a comprehensive software scan of all clients in the network. The installed software is automatically matched against the software affected by the known vulnerabilities (CVE). In this way, the vulnerable clients in your company can be automatically identified.

Do:
With the help of the dashboard, you can keep an eye on everything: The distribution of the relevant vulnerabilities and the affected clients by severity, the most vulnerable software in the system and the most vulnerable clients with the largest number of vulnerabilities are displayed graphically. The vulnerability management provides detailed information about the exact focal points via drill-down.

Check:
When you have decided which vulnerability needs to be closed most urgently, the system will suggest the appropriate fixes and strategies. These fixes can then be downloaded from the appropriate software vendor pages.

Act:
After the download, you connect the fixes to the affected clients using jobs or packages via distribution groups and then create the installation jobs to fix the vulnerabilities.

How you can make your IT security even more secure with a targeted product use, we will be happy to show you at it-sa 2019!

You have the possibility to register here and also optionally to get a free ticket. Simply click on the “Register” field below and fill in the registration form according to the information provided. 

Of course you can also make an appointment directly.
For this, please contact our sales department.

Per e-mail to vertrieb@fair-computer.de or by phone to 0911- 810881-80.

We are on site for you:

08. – 09. October 09:00 Uhr – 18:00 Uhr
10 October 09:00 Uhr – 17:00 Uhr

FCS booth 503 // Hall 11.0

it-sa - The IT Security Expo and Congress

Start typing and press Enter to search