screenshots i7 peregrine7 - agentless byod security tool

18
Peregrine7 Screenshots Peregrine7 helps protect Enterprise network from malicious/infected BYODs Copyright i7 Networks, i7nw.com Manjunath M Gowda CEO, i7 Networks Bangalore, India manju_s7 in/manjunathgowda/

Upload: i7networks

Post on 30-Nov-2014

365 views

Category:

Technology


1 download

DESCRIPTION

This shows detailed screenshots of i7's peregrine7 - an AGENTLESS BYOD security too. Peregrine7 discovers, detailed fingerprints and even checks the security/threat status of the device (compromised, vulnerable, malicious, intrusive etc) and then based on the threat status allow/deny the device connecting to corporate network. We also detect apps on the wire. We support irrespective of how the device enters the corporate network - via Corporate Wi-Fi or via public Wi-Fi or 3G/4G/LTE (VPN). All done 100% agentless and non-intrusive what we call ZERO-TOUCH and our deployment is completely out-of-band and hence we don't introduce any latency and we connect to the SPAM or Mirror port and we call it ZERO-LATENCY. We also detect whether any anti-virus software is installed on the device what we call the posture assessment. Our value proposition is that “We protect your network from malicious/infected BYODs” “We Protect the Enterprise Network” by Detect & Fingerprint1 all personal devices Prevent the malicious devices from connecting 100% Agentless (Zero-touch) Zero-Latency Deployment Provide detailed Compliance Reports “To Know & To Protect” 1 Secure detection & fingerprinting (US patent pending) The Questions we answer are: What devices are getting into the network? Who do they belong to? Are they infected? Are they compromised or malicious? How vulnerable are they? What are they accessing? What apps* are they running? Can I control the access? Can I get Compliance audit reports?

TRANSCRIPT

Page 1: Screenshots i7 peregrine7 - Agentless BYOD security tool

Peregrine7 Screenshots

Peregrine7 helps protect Enterprise network from malicious/infected BYODs

Copyright i7 Networks, i7nw.com

Manjunath M GowdaCEO, i7 NetworksBangalore, India

manju_s7in/manjunathgowda/

Page 2: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

COMPLETE BYOD INVENTORY SCREENSHOT

Page 3: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

Page 4: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

This alerts are the BYOD specific from added,

modified and curated SNORT specific to BYODs and very

specific to Internal originated threats

Page 5: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

Page 6: Screenshots i7 peregrine7 - Agentless BYOD security tool

DEEP DIVE OF A DEVICE DETAILS

Copyright i7 Networks, i7nw.com

Page 7: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

Page 8: Screenshots i7 peregrine7 - Agentless BYOD security tool

COMPLETE VULNERABILITIES LIST

Copyright i7 Networks, i7nw.com

Page 9: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.co

Page 10: Screenshots i7 peregrine7 - Agentless BYOD security tool

COMPLETE DEVICE DETAILS

Copyright i7 Networks, i7nw.com

Page 11: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

Page 12: Screenshots i7 peregrine7 - Agentless BYOD security tool

BANDWIDTH USAGE OF ALL BYODS, INCLUDING INTERNAL SERVER USAGE & LOGS

Copyright i7 Networks, i7nw.com

Page 13: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

Page 14: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

Page 15: Screenshots i7 peregrine7 - Agentless BYOD security tool
Page 16: Screenshots i7 peregrine7 - Agentless BYOD security tool

BYOD SPECIFIC POLICY – DRAG & DROP; ACTS LIKE INTERNAL BYOD FIREWALL AND GATEWAY

Copyright i7 Networks, i7nw.com

Page 17: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

Page 18: Screenshots i7 peregrine7 - Agentless BYOD security tool

www.i7nw.com

Copyright i7 Networks, i7nw.com

[email protected]_s7