screenshots i7 peregrine7 - agentless byod security tool

Post on 30-Nov-2014

365 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

This shows detailed screenshots of i7's peregrine7 - an AGENTLESS BYOD security too. Peregrine7 discovers, detailed fingerprints and even checks the security/threat status of the device (compromised, vulnerable, malicious, intrusive etc) and then based on the threat status allow/deny the device connecting to corporate network. We also detect apps on the wire. We support irrespective of how the device enters the corporate network - via Corporate Wi-Fi or via public Wi-Fi or 3G/4G/LTE (VPN). All done 100% agentless and non-intrusive what we call ZERO-TOUCH and our deployment is completely out-of-band and hence we don't introduce any latency and we connect to the SPAM or Mirror port and we call it ZERO-LATENCY. We also detect whether any anti-virus software is installed on the device what we call the posture assessment. Our value proposition is that “We protect your network from malicious/infected BYODs” “We Protect the Enterprise Network” by Detect & Fingerprint1 all personal devices Prevent the malicious devices from connecting 100% Agentless (Zero-touch) Zero-Latency Deployment Provide detailed Compliance Reports “To Know & To Protect” 1 Secure detection & fingerprinting (US patent pending) The Questions we answer are: What devices are getting into the network? Who do they belong to? Are they infected? Are they compromised or malicious? How vulnerable are they? What are they accessing? What apps* are they running? Can I control the access? Can I get Compliance audit reports?

TRANSCRIPT

Peregrine7 Screenshots

Peregrine7 helps protect Enterprise network from malicious/infected BYODs

Copyright i7 Networks, i7nw.com

Manjunath M GowdaCEO, i7 NetworksBangalore, India

manju_s7in/manjunathgowda/

Copyright i7 Networks, i7nw.com

COMPLETE BYOD INVENTORY SCREENSHOT

Copyright i7 Networks, i7nw.com

Copyright i7 Networks, i7nw.com

This alerts are the BYOD specific from added,

modified and curated SNORT specific to BYODs and very

specific to Internal originated threats

Copyright i7 Networks, i7nw.com

DEEP DIVE OF A DEVICE DETAILS

Copyright i7 Networks, i7nw.com

Copyright i7 Networks, i7nw.com

COMPLETE VULNERABILITIES LIST

Copyright i7 Networks, i7nw.com

Copyright i7 Networks, i7nw.co

COMPLETE DEVICE DETAILS

Copyright i7 Networks, i7nw.com

Copyright i7 Networks, i7nw.com

BANDWIDTH USAGE OF ALL BYODS, INCLUDING INTERNAL SERVER USAGE & LOGS

Copyright i7 Networks, i7nw.com

Copyright i7 Networks, i7nw.com

Copyright i7 Networks, i7nw.com

BYOD SPECIFIC POLICY – DRAG & DROP; ACTS LIKE INTERNAL BYOD FIREWALL AND GATEWAY

Copyright i7 Networks, i7nw.com

Copyright i7 Networks, i7nw.com

www.i7nw.com

Copyright i7 Networks, i7nw.com

info@i7nw.commanju_s7

top related