Lenovo SANA Primary Response SafeConnect - 10 Pack 30R6832 Data Sheet

Product codes
30R6832
Page of 2
 
DATASHEE
 
CONTROL VS. PRODUCTIVITY  
The challenge of protecting business computers from malicious software attacks represents a top priority for most IT Security 
organizations today.  The impact can be far reaching from declining productivity levels, to increased Help Desk costs, reduced 
network and desktop availability, compromised confidentiality and regulatory compliance violations. 
Balancing the need for tighter enterprise threat protection with the flexibility demanded by today’s mobile workforce is a tall 
order. On one hand, greater control is necessary to manage the security risk posed by mobile and remote users taking their 
laptops outside the network perimeter. While on the other, enabling employees to work remotely from home or on the road is 
vital to maintaining the high levels of productivity that are essential to business success. 
While there’s no shortage of enterprise threat protection solutions available, most are geared towards the managed network, 
assuming that IT administrators are on hand to ensure that desktops are regularly scanned and signature updates are kept 
current.  
Very few address the needs of the mobile user who is only occasionally connected, increasing the likelihood that signatures 
are out-of-date and that scanning is performed on an infrequent, ad-hoc basis. Not only does this render the individual user 
vulnerable, but it inadvertently exposes the entire network to a constant barrage of new attacks. 
Enterprises need a standalone solution that complements their managed security infrastructure, providing instant and 
constant protection against malicious software, and requiring minimal user intervention to ensure that all business computers 
are secure anytime, anywhere. 
THE NEED FOR RADICALLY SIMPLIFIED SECURITY 
With the volume and sophistication of malicious software attacks on the 
rise, users are being forced to install a variety of security products in an 
attempt to fight viruses, spyware, adware, and other classes of malware 
attacks. 
The overwhelming choice of software security tools leaves most users 
confused as to how best protect themselves, and frustrated that more 
often than not the protection provided is inadequate. With the 
technology approach adopted by most of these tools relying on 
signatures and scanning, user dissatisfaction is on the increase. 
The dependency on frequent signature updates makes the user 
responsible for retrieving downloads and staying current. A recent AOL 
Survey revealed that 67% of users rarely, if ever, update signatures for 
their systems, testament to user disenchantment with this approach. 
Even if the signatures are up-to-date, systems still need to be regularly 
scanned in order to detect and remove malicious software. With scan 
times ranging from 15 to 60 minutes, users are deterred by the disruption 
to their productivity, resulting in unprotected PCs. 
LIMITATIONS OF CONVENTIONAL SECURITY SOLUTIONS 
It is increasingly evident that the conventional approach to tackling malicious software through signatures and scanning falls 
short. Not only is the user experience unappealing, the technology approach itself is powerless against the rate and 
complexity with which new attacks are launched. Signature and scan-based security products do not meet users’ needs for 
instant and constant protection, prevention of a wide range of attacks, and complete remediation of malicious software 
infection. 
Scanning is only effective at the moment of the scan, leaving PCs vulnerable to new attacks between scans. Users are 
subjected to a constant vulnerability gap due to the lag time required to discover new malware, develop and test a signature, 
and distribute updates.  
Tools are also limited in the types of attacks class they protect against, focusing on either viruses, spyware or adware requiring 
users to run more than one tool. Signatures have to be developed for each individual component of malicious software, 
making it nearly impossible to protect against new attacks, variants of existing attacks or targeted attacks.  
Removal scripts are based on signatures and are specific to one instance of malware, resulting in only partial removal. 
Signatures are unable to handle complex malware programs which can hide, morph, re-install and more. Even if one 
component is detected and removed, the other components will work actively to bring it back. 
PRIMARY RESPONSE SAFECONNECT 
FEATURES 
ƒ
 
Instant detection and removal of malware 
without scanning  
ƒ
 
Constant threat protection is always up-
to-date without requiring signature 
updates  
ƒ
 
Comprehensive protection against many 
attack classes replaces multiple security 
products  
ƒ
 
Complete removal eliminates all traces of 
malicious software and prevents 
reinstallation