how to launch a web security service in an hour

Post on 18-Nov-2014

43 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Want to find out how to launch your very own web security service in less than an hour? We take a deep dive into the fastest growing security market, explore the limitations of existing solutions, and demonstrate how to take your Web security “to the cloud” today.

TRANSCRIPT

 ©2014 CYREN Confidential and Proprietary

1

September 2014  ©2014 CYREN Confidential and Proprietary

HOW TO LAUNCH A CLOUD-BASED WEB SECURITY SERVICE IN AN HOUR

Avi Turiel

 ©2014 CYREN Confidential and Proprietary

2

POLL QUESTION #1

How many of your customers are SMBs? (20-500 users)

 ©2014 CYREN Confidential and Proprietary

3 ©2014 CYREN Confidential and

Proprietary

3

MARKET DRIVERS

 ©2014 CYREN Confidential and Proprietary

44 ©2014 CYREN Confidential and

Proprietary

BYOD AND INCREASED MOBILITY HAVE CHANGED

THE WAY EMPLOYEESACCESS THE INTERNET

THE SECURITY MARKET IS EVOLVING

 ©2014 CYREN Confidential and Proprietary

5 ©2014 CYREN Confidential and

Proprietary

THE SECURITY MARKET IS EVOLVING

LEADING TO INCREASED COMPLEXITY IN

IMPLEMENTING, MANAGING AND DEPLOYING

SECURITY SOLUTIONS

 ©2014 CYREN Confidential and Proprietary

6

Source: IDC, June 2013

THE SECURITY MARKET

SAAS IS BY FAR THE LARGEST GROWTH OPPORTUNITY

 ©2014 CYREN Confidential and Proprietary

7

POLL QUESTION #2

What is your ‘Web Security in the cloud’ strategy?

 ©2014 CYREN Confidential and Proprietary

8 ©2014 CYREN Confidential and

Proprietary8

CYREN WEBSECURITY

 ©2014 CYREN Confidential and Proprietary

9

LAUNCH A BRANDED WEB SECURITY SERVICE WITH STRONG

DIFFERENTIATORS

INTRODUCING CYREN WEBSECURITY

 ©2014 CYREN Confidential and Proprietary

 ©2014 CYREN Confidential and Proprietary

10

Android and iOS

White-labeled app for partner rebranding

Rule management for BYOD and corporate devices

A TOTAL SOLUTION FOR ROAMING USERS, SMARTPHONES AND TABLETS -

INCLUDING BYOD

MOBILITY

 ©2014 CYREN Confidential and Proprietary

 ©2014 CYREN Confidential and Proprietary

11

Threat-sharing GlobalView network

Integrated antimalware scanning

APT Detection

PROVEN CYREN CLOUD-BASED WEB SECURITY

ADVANCED SECURITY

 ©2014 CYREN Confidential and Proprietary

 ©2014 CYREN Confidential and Proprietary

12

SERVICE ARCHITECTURE

GlobalView™Cloud

GlobalView Database

Security Scanning and URL Filtering

Branded Web-based Provisioning, Management and Reporting

Internet

Mobile & Roaming

Desktops

Routers & Appliances

HeurisTechSecurity

1. Product is neutral/CYREN branded as standard

2. Partner private labels the service, or,

3. Partner co-brands the service

4. End customers are provisioned and start using the service

 ©2014 CYREN Confidential and Proprietary

13

Easy customer provisioning

Online private labeling

Multi-tier management portal

TRULY INTUITIVE WEB INTERFACE FOR PARTNERS AND ALL LEVELS OF

ADMINISTRATORS

EASE OF USE

 ©2014 CYREN Confidential and Proprietary

 ©2014 CYREN Confidential and Proprietary

14 ©2014 CYREN Confidential and

Proprietary14

DEMONSTRATION

 ©2014 CYREN Confidential and Proprietary

15

\\

HeurisTechSecurity

Partner

Customer

Office Users Mobile users

Partner

Users

Partner

Customer

Office users

CYREN WEBSECURITY – PARTNER

McMillanENGINEERING

 ©2014 CYREN Confidential and Proprietary

16

\\HEURISTECH ECO-SYSTEM OVERVIEW - DASHBOARD.

 ©2014 CYREN Confidential and Proprietary

17

\\HEURISTECH CUSTOMIZES THE INTERFACE, DOMAIN, PLAY STORE, ETC.

 ©2014 CYREN Confidential and Proprietary

18

\\HEURISTECH CUSTOMIZES THE LICENSING AND PACKAGE OPTIONS

 ©2014 CYREN Confidential and Proprietary

19

\\

HeurisTechSecurity

Partner

Customer

Office Users Mobile users

Partner

Users

Partner

Customer

Office users

CYREN WEBSECURITY – PARTNER

McMillanENGINEERING

 ©2014 CYREN Confidential and Proprietary

20

\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING - DASHBOARD OF WEB ACTIVITY

 ©2014 CYREN Confidential and Proprietary

21

\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING DEFINES USERS – INCLUDING MOBILE/BYOD

 ©2014 CYREN Confidential and Proprietary

22

\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING DEFINES SECURITY POLICY

 ©2014 CYREN Confidential and Proprietary

23

\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING APPLIES POLICY TO USERS – ALSO ROAMING/BYOD

 ©2014 CYREN Confidential and Proprietary

24

\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING – DETAILED REPORTS

 ©2014 CYREN Confidential and Proprietary

25

POLL QUESTION #3

What feature is most important for Web Security SaaS?

 ©2014 CYREN Confidential and Proprietary

26 ©2014 CYREN Confidential and

Proprietary

26

WHO WE ARE

 ©2014 CYREN Confidential and Proprietary

27

LEADING PROVIDER OF INTERNET SECURITY TECHNOLOGY AND CLOUD-BASED SERVICES

NASDAQ: CYRN

 ©2014 CYREN Confidential and Proprietary

28

WHO WE WORK WITH

 ©2014 CYREN Confidential and Proprietary

29

GLOBAL REACH

OFFICESDATA CENTERS

 ©2014 CYREN Confidential and Proprietary

 ©2014 CYREN Confidential and Proprietary

30

OUR PRODUCTS

WEBThe industry’s broadest and

most actionable security intelligence combined with a

robust web filtering platform secures all your devices, anywhere you go

EMAILNot just scanning emails with open source signatures; we

track and leverage the global distribution patterns and our

global real-time insight to stop the bad guys subverting

email

ANTIMALWAREOur market leading

solutions secure your platform from threats

without impacting performance

 ©2014 CYREN Confidential and Proprietary

31

WHAT MAKES US DIFFERENT

+

SPEED \\ ACCURACY \\ REAL-TIME INSIGHT

We see more than anyone else.

RECURRENT PATTERN DETECTION

Our patented detection technology

GLOBALVIEW™ CLOUD

The most robust transaction base in the industry

 ©2014 CYREN Confidential and Proprietary

32

We focus on our core competencies so you can focus on yours. Products designed for partners Won’t compete for your business

COMMITTED TO PARTNER SUCCESS

WHAT MAKES US DIFFERENT

 ©2014 CYREN Confidential and Proprietary

 ©2014 CYREN Confidential and Proprietary

33 ©2014 CYREN Confidential and

Proprietary

33

RECAP

 ©2014 CYREN Confidential and Proprietary

34

WEB SECURITY OPPORTUNITY

Ease of management / ease of use Easy provisioning and management for Mobile/BYOD The best account and end user provisioning experience in the industry

Partner-ready and partner-friendly revenue opportunity Turnkey Web Security recurring revenue Business logic enables any go-to-market model or sales ecosystem

Cloud-based security analysis and detection quality Detection you know – already powering solutions across the industry Ongoing Innovation – existing and new services such as APT

 ©2014 CYREN Confidential and Proprietary

35 ©2014 CYREN Confidential and

Proprietary

35

THANK YOU.ANY QUESTIONS?

“We are excited to see the emergence of state-of-the-art cloud based protection for mobile and roaming users. CYREN

WebSecurity will help MXSweep deliver the easy to consume and best of breed cloud based security that our customers expect.”

Tom O’BrienCEO

MXSweep

top related