i7 networks peregrine7 slide deck - april 2014 - 100% agentless enterprise mobility - visibility,...

Post on 24-Apr-2015

242 Views

Category:

Mobile

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

i7 Networks Peregrine7 Slide Deck - April 2014 - 100% Agentless Enterprise Mobility - Visibility, Security & Access Control. Peregrine7 provides complete visibility on what devices are entering the network, who it belongs to, what kind - authorized, managed, company given etc., from where is it entering, its OS, OS versions, Mac ID, IP Address, kind of device (iPhone versus iPad), what make (Samsung, HTC etc.), kind of apps (LinkedIn, Facebook, twitter, dropbox etc.), what protocols (svn, ssh, reverse ssh, ftp etc.), whether the device is compromised (Jailbroken/Rooted), when first seen, when last seen, access-log & history – complete visibility of everything and anything related to these devices and also amazing actionable reports showing the entire data. Peregrine7 also calculates the security & vulnerability status of the device and rate them using what we call DVI & DTI ratings (Device Vulnerability Index & Device Threat Index). It also determines whether the device is compromised or not (Jailbroken/Rooted). Peregrine7’s drag & drop policy engine allows one to control the access not only w.r.t any of the visibility attributes but also w.r.t security attributes mentioned above. It ensures that only authorized access from the approved devices/apps/protocols are allowed to access internal servers. Also it ensures that unauthorized, rogue, compromised and malicious devices are denied access into the corporate network ensuing that all Enterprise network access from smartphones, tablets, Apps & protocols are controlled, monitored, safe & secure. It provides complete accountability, traceability and audit trails. Peregrine7’s deployment is 100% Agentless and Non-Intrusive (Zero-Touch & Zero-Footprint) and with passive deployment of the appliance in the network providing zero disrupt of the existing network or introduce any latency whatsoever.

TRANSCRIPT

“i7 Networks”

Manjunath M GowdaCEO & co-founder, i7 Networks

“If you are an Enterprise allowing BYODs (with or without MDM) to connect to corporate network, then follow me…..”

Real story that happened in a US based publicly traded software

product company …..

“one SSH session from a mobile/tablet is all it takes to

breach your network”

….

Corporate Network

Firewall

SSH,FTP, ..

SSH, FTP…

Corporate Resources

Malicious APPs

Malicious Server

Reverse SSH Tunnel

SSH

Copyright i7 Networks, i7nw.com

There are 2 ways to protect your network from BYODs :

“Introducing i7’s Peregrine7”

Copyright i7 Networks, i7nw.com

We provide complete :

Visibility

Unique Fingerprinting of Device, App & Protocol

Security & Vulnerability Analysis

Multi-Tier Secure-Granular Access Controls

Copyright i7 Networks, i7nw.com

Copyright i7 Networks, i7nw.com, info@i7nw.com

Enterprise

MDM manage

d Devices

Unauthorized devices

Unmanaged devices

IoT devices

Unauthorized Apps

Apps from Alternate

Stores

Unsupported-OS devices Compromised

devices

Hot-spotted devices

Rogue/Insecure Devices

Vulnerable Devices

Authorized Apps

SSHSSH

FTP SVN

Copyright i7 Networks, i7nw.com, info@i7nw.com

Enterprise

MDM manage

d Devices

Unauthorized devices

Unmanaged devices

IoT devices

Unauthorized Apps

Apps from Alternate

Stores

Unsupported-OS devices Compromised

devices

Hot-spotted devices

Rogue/Insecure Devices

Vulnerable Devices

Authorized Apps

Peregrine7

SSH

FTP

“Our deployment is Super Simple….”

Copyright i7 Networks, i7nw.com

All done 100% Agentless & Non-Intrusive. No app or client to install on the device - Zero-touch/Zero Footprint”

“Appliance connected to span port - hence Zero Latency and hence Zero Risk for IT to try out too!!

Fits into any network

Zero Burden on the IT/Support staff.

Copyright i7 Networks, i7nw.com

Let’s see some of the screen shots of Peregrine7 ……

Copyright i7 Networks, i7nw.com, info@i7nw.com

Copyright i7 Networks, i7nw.com

BYOD inventory analysis

Copyright i7 Networks, i7nw.com

BYOD inventory analysis

Integrates with

• 100% Agentless and non-intrusive (Zero-Footprint)

• Access control while being Offline/out-of-band (Zero-Latency)

• Device Compromise Check (Jailbroken/Rooted)

• App Recognition on the Wire

• Visibility via Hot-spotting & Wi-Fi Sniffing

Different from Competition

Copyright i7 Networks, i7nw.com, info@i7nw.com

“What matters to IT…….”

Copyright i7 Networks, i7nw.com

Additional IT cost? Zero – just plugs as a independent appliance and that’s it!!

Support Cost? Minimal – no agent on the mobile makes it extremely easy to support.

Deployment Time & Cost? Few hours & deployment in the mirror port makes it extremely low cost.

Risk to existing network? Zero – as we deploy in the mirror/span port!!

How Scalable? Very High – again agentless approach makes it easily & highly scalable – device & OS agnostic!!

Copyright i7 Networks, i7nw.com

Copyright i7 Networks, i7nw.com

• Legacy & Traditional systems are cumbersome and painful to configure or use providing no value!!

• MDMs cannot do this – they are like gatekeepers for your Cineplex - ensure your ticket to enter but after that they have no idea which cinema hall you go to and what you do inside!!

Paying Customers

Indian Conglomerate with more than 75,000 employees and a $40-billion dollar company; Managing 1500 users for now

Indian services company with more than 1,000 employees and a multi-million dollar company;Managing 1000 users

Indian data center with more than 3,000 employees and a multi-million dollar company;Managing 1000 users

Plus Dozens of large POC customers

Awards & Accolades

Investors & Advisors

Manju, CEO & Co-FounderBE, MS (Computer Sc.)

Sachin, CTO & Co-FounderBE (Comp Sc.)

Srinivas, Chief Architect & Co-FounderMS (Comp. Sc.) from IIT-B

Jagadish, UI ArchitectBE (Comp. Sc.)

Geeta, Inside-SalesBachelors – Comp. Sc.

Brian Nesmith, ex-CEO of Bluecoat Systems, USA

Sharad Sharma, ex-CEO of Yahoo R&D, India

Core

Team

Same Team together for second time; 1st venture S7 ran successfully for 6 years S7 was acquired by Bluecoat Systems for

$8.4Mn Team SME with Patents in Network Security

Ofer Elzam, Dir. Network Security Sophos, USA

Questions?

Copyright i7 Networks, i7nw.com

info@i7nw.com@i7networks

top related