Lenovo SANA Primary Response SafeConnect - 10 Pack 30R6832 Data Sheet
Product codes
30R6832
DATASHEE
T
CONTROL VS. PRODUCTIVITY
The challenge of protecting business computers from malicious software attacks represents a top priority for most IT Security
organizations today. The impact can be far reaching from declining productivity levels, to increased Help Desk costs, reduced
network and desktop availability, compromised confidentiality and regulatory compliance violations.
organizations today. The impact can be far reaching from declining productivity levels, to increased Help Desk costs, reduced
network and desktop availability, compromised confidentiality and regulatory compliance violations.
Balancing the need for tighter enterprise threat protection with the flexibility demanded by today’s mobile workforce is a tall
order. On one hand, greater control is necessary to manage the security risk posed by mobile and remote users taking their
laptops outside the network perimeter. While on the other, enabling employees to work remotely from home or on the road is
vital to maintaining the high levels of productivity that are essential to business success.
order. On one hand, greater control is necessary to manage the security risk posed by mobile and remote users taking their
laptops outside the network perimeter. While on the other, enabling employees to work remotely from home or on the road is
vital to maintaining the high levels of productivity that are essential to business success.
While there’s no shortage of enterprise threat protection solutions available, most are geared towards the managed network,
assuming that IT administrators are on hand to ensure that desktops are regularly scanned and signature updates are kept
current.
assuming that IT administrators are on hand to ensure that desktops are regularly scanned and signature updates are kept
current.
Very few address the needs of the mobile user who is only occasionally connected, increasing the likelihood that signatures
are out-of-date and that scanning is performed on an infrequent, ad-hoc basis. Not only does this render the individual user
vulnerable, but it inadvertently exposes the entire network to a constant barrage of new attacks.
are out-of-date and that scanning is performed on an infrequent, ad-hoc basis. Not only does this render the individual user
vulnerable, but it inadvertently exposes the entire network to a constant barrage of new attacks.
Enterprises need a standalone solution that complements their managed security infrastructure, providing instant and
constant protection against malicious software, and requiring minimal user intervention to ensure that all business computers
are secure anytime, anywhere.
constant protection against malicious software, and requiring minimal user intervention to ensure that all business computers
are secure anytime, anywhere.
THE NEED FOR RADICALLY SIMPLIFIED SECURITY
With the volume and sophistication of malicious software attacks on the
rise, users are being forced to install a variety of security products in an
attempt to fight viruses, spyware, adware, and other classes of malware
attacks.
rise, users are being forced to install a variety of security products in an
attempt to fight viruses, spyware, adware, and other classes of malware
attacks.
The overwhelming choice of software security tools leaves most users
confused as to how best protect themselves, and frustrated that more
often than not the protection provided is inadequate. With the
technology approach adopted by most of these tools relying on
signatures and scanning, user dissatisfaction is on the increase.
confused as to how best protect themselves, and frustrated that more
often than not the protection provided is inadequate. With the
technology approach adopted by most of these tools relying on
signatures and scanning, user dissatisfaction is on the increase.
The dependency on frequent signature updates makes the user
responsible for retrieving downloads and staying current. A recent AOL
Survey revealed that 67% of users rarely, if ever, update signatures for
their systems, testament to user disenchantment with this approach.
responsible for retrieving downloads and staying current. A recent AOL
Survey revealed that 67% of users rarely, if ever, update signatures for
their systems, testament to user disenchantment with this approach.
Even if the signatures are up-to-date, systems still need to be regularly
scanned in order to detect and remove malicious software. With scan
times ranging from 15 to 60 minutes, users are deterred by the disruption
to their productivity, resulting in unprotected PCs.
scanned in order to detect and remove malicious software. With scan
times ranging from 15 to 60 minutes, users are deterred by the disruption
to their productivity, resulting in unprotected PCs.
LIMITATIONS OF CONVENTIONAL SECURITY SOLUTIONS
It is increasingly evident that the conventional approach to tackling malicious software through signatures and scanning falls
short. Not only is the user experience unappealing, the technology approach itself is powerless against the rate and
complexity with which new attacks are launched. Signature and scan-based security products do not meet users’ needs for
instant and constant protection, prevention of a wide range of attacks, and complete remediation of malicious software
infection.
short. Not only is the user experience unappealing, the technology approach itself is powerless against the rate and
complexity with which new attacks are launched. Signature and scan-based security products do not meet users’ needs for
instant and constant protection, prevention of a wide range of attacks, and complete remediation of malicious software
infection.
Scanning is only effective at the moment of the scan, leaving PCs vulnerable to new attacks between scans. Users are
subjected to a constant vulnerability gap due to the lag time required to discover new malware, develop and test a signature,
and distribute updates.
subjected to a constant vulnerability gap due to the lag time required to discover new malware, develop and test a signature,
and distribute updates.
Tools are also limited in the types of attacks class they protect against, focusing on either viruses, spyware or adware requiring
users to run more than one tool. Signatures have to be developed for each individual component of malicious software,
making it nearly impossible to protect against new attacks, variants of existing attacks or targeted attacks.
users to run more than one tool. Signatures have to be developed for each individual component of malicious software,
making it nearly impossible to protect against new attacks, variants of existing attacks or targeted attacks.
Removal scripts are based on signatures and are specific to one instance of malware, resulting in only partial removal.
Signatures are unable to handle complex malware programs which can hide, morph, re-install and more. Even if one
component is detected and removed, the other components will work actively to bring it back.
Signatures are unable to handle complex malware programs which can hide, morph, re-install and more. Even if one
component is detected and removed, the other components will work actively to bring it back.
PRIMARY RESPONSE SAFECONNECT
FEATURES
FEATURES
Instant detection and removal of malware
without scanning
without scanning
Constant threat protection is always up-
to-date without requiring signature
updates
to-date without requiring signature
updates
Comprehensive protection against many
attack classes replaces multiple security
products
attack classes replaces multiple security
products
Complete removal eliminates all traces of
malicious software and prevents
reinstallation
malicious software and prevents
reinstallation