peregrine guard - an enterprise mobile security product by i7 networks

14
“Peregrine Guard” Enterprise Mobile Security BYOD Auto Discovery • Access Control

Upload: productnationin

Post on 25-Apr-2015

1.296 views

Category:

Business


0 download

DESCRIPTION

Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

TRANSCRIPT

Page 1: Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

“Peregrine Guard”Enterprise Mobile Security

BYOD Auto Discovery • Access Control

Page 2: Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

BYOD – Bring Your Own Device/Disaster!

• By 2016….o 900 million tablets in marketo 982 million smart phones shipping annually.

• WebRoot Survey, June, 2012o 83% of respondents believe that mobile devices create a high security

risk within the corporate environment.

• Gartner – Shifting from Enterprise-owned to BYODo Warns business that there are three major hurdles that they have to

consider in their BYOD policy.

Impact 1

• The right of users to leverage the capabilities of their personal devices conflicts with enterprise mobile security policies and increases the risk of data leakage and the exploiting of vulnerabilities.

Impact 2

• User freedom of choice of device and the proliferation of devices with inadequate security make it difficult to properly secure certain devices, as well as keep track of vulnerabilities and updates.

Impact 3• The user's ownership of device and data raises privacy

concerns and stands in the way of taking corrective action for compromised devices.

Page 3: Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

BYOD: Threats and Risks

Page 4: Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

Harnessing the BYOD phenomenon

• BYOD Concernso Network Securityo User and Device Visibilityo Network management complexityo Network performanceo User experience

• Challenges In Implementing BYODo Employee Privacyo Mobile device market diversityo Finding the right approach to security

Page 5: Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

Current Solutions

DevicesLocation

sApplications Users

Employee Owned

Guest Owned

Devices used from

Home Offices

Corporate Owned

Managed by Corporate /

MSP

Corporate

Location

Branch Offices

Home Offices

Public Places

Email, Contacts, Calendar

Social Media

Office Applications

Task & Projects Mgmt

Line of Business

Apps

Sales Force Automation

or CRM

Instant Messaging

Web Browsing

Privileged Users

Employees

Business and

Regulatory Consultants

Contractors, Business Partners

GuestsService

Personnel

MDM

MAM / IAM

Page 6: Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

Peregrine Guardi7 Networks enables enterprises to “say YES” to BYOD by providing an agentless paradigm for discovery and access control.

Our premier offering in this space enables an intelligent, non-intrusive, clientless way of detecting all devices that are trying to connect to the corporate network.

By the use of proprietary algorithms and sophisticated fingerprinting techniques, we extract highly granular information like device-type, device-class, OS, version, user of the device, etc;

This information is used to provide device based differential access to corporate assets and to make sure sensitive data is provided right access to the right device type.

Page 7: Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Page 8: Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

PG: Granular Access Control

o Deviceo User o Applicationo Location (HQ/branch/ODC group)o Timeo Intrusion Detection (if malware is detected, then access

could be disabled immediately) o Endpoint security (preventing jailbroken/rooted devices

and below baseline)o Resource

Page 9: Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

PG: Policy Control

• Admin can create policies like:o Allow access to Patient Records Server, if;

• User is Authenticated• Role is Physician• Authentication is 802.1x (EAP-PEAP)• Device is iPad• Location is Hospital

Page 10: Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

PG: Policy Control

Employee

Contractor / Consultant

Guest

Captive

Portal

High Trust

Medium Trust

Low Trust

No Trust

Corp UserRegistered Device

Known UserDevice Compliance passed

Any DeviceAny UserNot Jailbroken

Any DeviceAny User

Page 11: Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

PG: Reporting

Page 12: Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

Team• Manjunath M. Gowda (20+) – CEO (S7)

• Chandra Shekar M (20+) – Director (S7)

• Sachin Shelar (10+) – Network Architect & Eng. Manager

(S7)

• Harish Ramachandra (10+)– Network Architect (S7)

• Srinivas Guntupalli (10+)– Network Architect

• Jagadeesh M. Rajanna (5+) – Sr. Network Engineer (S7)

• Harsha Gunda (5+) – Senior Finance (S7)

• Uma Ramesh (10+) – Senior Admin (S7)

• Geeta Gouri (2+) – Digital Marketing

Page 13: Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

Angel Investors• Sharad Sharma – ex-CEO Yahoo R&D• Brian NeSmith – ex-CEO Bluecoat Systems• Rao Remala – ex-Senior Director MS & member

Angel Network Seattle• Murali Rao – Senior Product Architect, MS