i7 pregerine7 - agentless byod security for enterprises

30
Copyright i7 Networks, i7nw.com

Upload: i7networks

Post on 23-Jan-2015

356 views

Category:

Technology


1 download

DESCRIPTION

BYOD Security - 100% agentless (Zero-touch) and Zero-latency; Only tool that works at network layer (as opposed to on the device) discovering fingerprinting health-check for all personal devices and protecting corporate network from infected/malicious/compromised personal devices. We also the only tool that complements MDM.

TRANSCRIPT

Page 1: i7 pregerine7 - Agentless byod security for Enterprises

Copyright i7 Networks, i7nw.com

Page 2: i7 pregerine7 - Agentless byod security for Enterprises

Welcome to “Me” Enterprise

How BYOD has changed the security map & how “Peregrine7tm” helps tackle it?

Copyright i7 Networks, i7nw.com

Manjunath M GowdaCEO, i7 Networks

i7nw.com

Page 3: i7 pregerine7 - Agentless byod security for Enterprises

WHY BYOD* MATTERS?

Copyright i7 Networks, i7nw.comBYOD = Bring.Your.Own.Device to Work

Page 4: i7 pregerine7 - Agentless byod security for Enterprises

• 90% of enterprises will use personal devices in Enterprise by 2014 - Gartner

• 20% Savings: CISCO claimed. “We don’t pay for it, and our users are happier.”

• GARTNER: Enterprises that don't support BYOD

are at competitive disadvantage

Copyright i7 Networks, i7nw.com

Page 5: i7 pregerine7 - Agentless byod security for Enterprises

SO WHAT IS STOPPING THEM?

Copyright i7 Networks, i7nw.com

Page 6: i7 pregerine7 - Agentless byod security for Enterprises

75% CIOS SAID COMPLIANCE & SECURITY BIGGEST CHALLENGE IN ALLOWING BYOD

Copyright i7 Networks, i7nw.com

Page 7: i7 pregerine7 - Agentless byod security for Enterprises

TOP 2 SECURITY HEADACHES?

Copyright i7 Networks, i7nw.com

Page 8: i7 pregerine7 - Agentless byod security for Enterprises

DARK READING – July 2013

Copyright i7 Networks, i7nw.com

Page 9: i7 pregerine7 - Agentless byod security for Enterprises

BUSINESS IMPACT

Copyright i7 Networks, i7nw.com

Page 10: i7 pregerine7 - Agentless byod security for Enterprises

79% business had a mobile incident last year alone – Checkpoint

600%+ growth in mobile malware in last 2 years

20 Mn+ devices jailbroken in just two months (Jan 2013)

18 Mn infected Android devices by end of 2013

71% mobile devices have OS / application vulnerabilities

$500K+ cost per such incident

$1.5Mn cost per such settlementCopyright i7 Networks, i7nw.com

Page 11: i7 pregerine7 - Agentless byod security for Enterprises

14 different OS types & growing; Add all versions and models (phones,

tablets)5

45% enterprises have more than 5 times as many personal mobile

devices as they had 2 Years ago3

< 10% enterprises aware of all mobile devices accessing their network &

servers3

27% of devices are ‘approved’ by the company6

Copyright i7 Networks, i7nw.com

Page 12: i7 pregerine7 - Agentless byod security for Enterprises

WHY TRADITIONAL TOOLS CAN’T HELP HERE?

Copyright i7 Networks, i7nw.com

Page 13: i7 pregerine7 - Agentless byod security for Enterprises

• Perimeter security & not internal

• Used to IT-owned devices and not personal devices

• Used to take care of outside2inside threats; not for inside-out & inside-inside

Copyright i7 Networks, i7nw.com

Page 14: i7 pregerine7 - Agentless byod security for Enterprises

SO WHAT TOOLS DO EXIST TO SOLVE IT?

Copyright i7 Networks, i7nw.com

Page 15: i7 pregerine7 - Agentless byod security for Enterprises

15 Copyright i7 Networks, i7nw.com

MDMs, EPPAirwatch, MobileIron, Zenprise

MAMsBitzer, IBM, SAP, Good

MDPsAT&T toggle, Divide,

VMware

MNACi7Networks

Device level

network

Mobile Security Tools Quadrant

Server side

Page 16: i7 pregerine7 - Agentless byod security for Enterprises

OUR VALUE PROPOSITION

Copyright i7 Networks, i7nw.com

Page 17: i7 pregerine7 - Agentless byod security for Enterprises

“We Protect the Enterprise Network” by

- Detect & Fingerprint1 all personal devices

- Prevent the malicious devices from connecting

- 100% Agentless (Zero-touch)

- Zero-Latency Deployment

- Provide detailed Compliance Reports

1 Secure detection & fingerprinting (US patent pending) Copyright i7 Networks, i7nw.com

Page 18: i7 pregerine7 - Agentless byod security for Enterprises

Continuous Monitoring

Complete Visibility

Endpoint Authentication

Vulnerability and malicious assessment

Granular policy enforcement

Compliance Reporting

Entry Verification – Corporate Wi-Fi or

VPN?

Allow

Deny

Compromised /Jailbroken/ Unauthorized/Unmanaged

check

Deny

Deny

Personal Devices

Page 19: i7 pregerine7 - Agentless byod security for Enterprises

• Name

• Screen caps

• Demo

Peregrine7TM

Page 20: i7 pregerine7 - Agentless byod security for Enterprises

THE QUESTIONS WE ANSWER

Copyright i7 Networks, i7nw.com

Page 21: i7 pregerine7 - Agentless byod security for Enterprises

Copyright i7 Networks, i7nw.com

• What devices are getting into the network?• Who do they belong to?• Are they infected? • Are they compromised or malicious?• How vulnerable are they?• What are they accessing?• What apps* are they running?• Can I control the access?• Can I get Compliance Audit reports?

Page 22: i7 pregerine7 - Agentless byod security for Enterprises

i7 Networks; i7 Confidential

Not just phones/tablets,we support all wireless devices.

Page 23: i7 pregerine7 - Agentless byod security for Enterprises

HOW DO YOU DEPLOY?

Copyright i7 Networks, i7nw.com

Page 24: i7 pregerine7 - Agentless byod security for Enterprises

• 100% agentless and non-intrusive – Zero Touch

• Complete off-line deployment – Zero-Latency

• Just ONE probe* in the network

• Supports: Wi-Fi / 3G/4G/LTE (VPN)

Deployment

Page 25: i7 pregerine7 - Agentless byod security for Enterprises

Current Product Status

Available in two flavors:

Just the discovery & control (allow/deny) module – deployed passively (out-of-band or ZERO-Latency)

Both discovery and granular policy enforcement modules – deployed inline mode

Beta version: Released mid of April, 2013GA : 1.0 – end of July, 2013; 1.1 in Aug mid

Copyright i7 Networks, i7nw.com

Page 26: i7 pregerine7 - Agentless byod security for Enterprises

SO WHAT’S UNIQUE?

Copyright i7 Networks, i7nw.com

Page 27: i7 pregerine7 - Agentless byod security for Enterprises

4A (Attributes)

Discovery & Fingerprinting Health Check Discover Apps on the wire*, Policy Enforcement

4D (Deployments)

100% Agentless (Zero-touch),

ZERO-Latency SINGLE Probe, Wi-Fi/3G/4G/LTE

4T (Threat-Protections)

Malicious & Intrusion Prevention Zero-day Attack Prevention*, Vulnerability Check Check of anti-malware s/w

4K (Keywords)

100% Agentless Patent-Pending Algorithms Detailed Fingerprinting Zero-Latency

Page 28: i7 pregerine7 - Agentless byod security for Enterprises

THE TEAM

Copyright i7 Networks, i7nw.com

Page 29: i7 pregerine7 - Agentless byod security for Enterprises

JeffHunter

Evangelist

PeterGilsonCTO

FirstLastCFO

JackFranklin

CMO

HeatherAdlerCEO

Investors & Advisors

1st venture: acquired by Bluecoat (Jan 2010)Team together for second time

Page 30: i7 pregerine7 - Agentless byod security for Enterprises

Questions?

Copyright i7 Networks, i7nw.com

manju.m(at)i7nw(dot)commanju_s7i7nw.comin/manjunathgowda