i7 pregerine7 - agentless byod security for enterprises
DESCRIPTION
BYOD Security - 100% agentless (Zero-touch) and Zero-latency; Only tool that works at network layer (as opposed to on the device) discovering fingerprinting health-check for all personal devices and protecting corporate network from infected/malicious/compromised personal devices. We also the only tool that complements MDM.TRANSCRIPT
Copyright i7 Networks, i7nw.com
Welcome to “Me” Enterprise
How BYOD has changed the security map & how “Peregrine7tm” helps tackle it?
Copyright i7 Networks, i7nw.com
Manjunath M GowdaCEO, i7 Networks
i7nw.com
WHY BYOD* MATTERS?
Copyright i7 Networks, i7nw.comBYOD = Bring.Your.Own.Device to Work
• 90% of enterprises will use personal devices in Enterprise by 2014 - Gartner
• 20% Savings: CISCO claimed. “We don’t pay for it, and our users are happier.”
• GARTNER: Enterprises that don't support BYOD
are at competitive disadvantage
Copyright i7 Networks, i7nw.com
SO WHAT IS STOPPING THEM?
Copyright i7 Networks, i7nw.com
75% CIOS SAID COMPLIANCE & SECURITY BIGGEST CHALLENGE IN ALLOWING BYOD
Copyright i7 Networks, i7nw.com
TOP 2 SECURITY HEADACHES?
Copyright i7 Networks, i7nw.com
DARK READING – July 2013
Copyright i7 Networks, i7nw.com
BUSINESS IMPACT
Copyright i7 Networks, i7nw.com
79% business had a mobile incident last year alone – Checkpoint
600%+ growth in mobile malware in last 2 years
20 Mn+ devices jailbroken in just two months (Jan 2013)
18 Mn infected Android devices by end of 2013
71% mobile devices have OS / application vulnerabilities
$500K+ cost per such incident
$1.5Mn cost per such settlementCopyright i7 Networks, i7nw.com
14 different OS types & growing; Add all versions and models (phones,
tablets)5
45% enterprises have more than 5 times as many personal mobile
devices as they had 2 Years ago3
< 10% enterprises aware of all mobile devices accessing their network &
servers3
27% of devices are ‘approved’ by the company6
Copyright i7 Networks, i7nw.com
WHY TRADITIONAL TOOLS CAN’T HELP HERE?
Copyright i7 Networks, i7nw.com
• Perimeter security & not internal
• Used to IT-owned devices and not personal devices
• Used to take care of outside2inside threats; not for inside-out & inside-inside
Copyright i7 Networks, i7nw.com
SO WHAT TOOLS DO EXIST TO SOLVE IT?
Copyright i7 Networks, i7nw.com
15 Copyright i7 Networks, i7nw.com
MDMs, EPPAirwatch, MobileIron, Zenprise
MAMsBitzer, IBM, SAP, Good
MDPsAT&T toggle, Divide,
VMware
MNACi7Networks
Device level
network
Mobile Security Tools Quadrant
Server side
OUR VALUE PROPOSITION
Copyright i7 Networks, i7nw.com
“We Protect the Enterprise Network” by
- Detect & Fingerprint1 all personal devices
- Prevent the malicious devices from connecting
- 100% Agentless (Zero-touch)
- Zero-Latency Deployment
- Provide detailed Compliance Reports
1 Secure detection & fingerprinting (US patent pending) Copyright i7 Networks, i7nw.com
Continuous Monitoring
Complete Visibility
Endpoint Authentication
Vulnerability and malicious assessment
Granular policy enforcement
Compliance Reporting
Entry Verification – Corporate Wi-Fi or
VPN?
Allow
Deny
Compromised /Jailbroken/ Unauthorized/Unmanaged
check
Deny
Deny
Personal Devices
• Name
• Screen caps
• Demo
Peregrine7TM
THE QUESTIONS WE ANSWER
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
• What devices are getting into the network?• Who do they belong to?• Are they infected? • Are they compromised or malicious?• How vulnerable are they?• What are they accessing?• What apps* are they running?• Can I control the access?• Can I get Compliance Audit reports?
i7 Networks; i7 Confidential
Not just phones/tablets,we support all wireless devices.
HOW DO YOU DEPLOY?
Copyright i7 Networks, i7nw.com
• 100% agentless and non-intrusive – Zero Touch
• Complete off-line deployment – Zero-Latency
• Just ONE probe* in the network
• Supports: Wi-Fi / 3G/4G/LTE (VPN)
Deployment
Current Product Status
Available in two flavors:
Just the discovery & control (allow/deny) module – deployed passively (out-of-band or ZERO-Latency)
Both discovery and granular policy enforcement modules – deployed inline mode
Beta version: Released mid of April, 2013GA : 1.0 – end of July, 2013; 1.1 in Aug mid
Copyright i7 Networks, i7nw.com
SO WHAT’S UNIQUE?
Copyright i7 Networks, i7nw.com
4A (Attributes)
Discovery & Fingerprinting Health Check Discover Apps on the wire*, Policy Enforcement
4D (Deployments)
100% Agentless (Zero-touch),
ZERO-Latency SINGLE Probe, Wi-Fi/3G/4G/LTE
4T (Threat-Protections)
Malicious & Intrusion Prevention Zero-day Attack Prevention*, Vulnerability Check Check of anti-malware s/w
4K (Keywords)
100% Agentless Patent-Pending Algorithms Detailed Fingerprinting Zero-Latency
THE TEAM
Copyright i7 Networks, i7nw.com
JeffHunter
Evangelist
PeterGilsonCTO
FirstLastCFO
JackFranklin
CMO
HeatherAdlerCEO
Investors & Advisors
1st venture: acquired by Bluecoat (Jan 2010)Team together for second time
Questions?
Copyright i7 Networks, i7nw.com
manju.m(at)i7nw(dot)commanju_s7i7nw.comin/manjunathgowda