![Page 1: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/1.jpg)
©2014 CYREN Confidential and Proprietary
1
September 2014 ©2014 CYREN Confidential and Proprietary
HOW TO LAUNCH A CLOUD-BASED WEB SECURITY SERVICE IN AN HOUR
Avi Turiel
![Page 2: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/2.jpg)
©2014 CYREN Confidential and Proprietary
2
POLL QUESTION #1
How many of your customers are SMBs? (20-500 users)
![Page 3: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/3.jpg)
©2014 CYREN Confidential and Proprietary
3 ©2014 CYREN Confidential and
Proprietary
3
MARKET DRIVERS
![Page 4: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/4.jpg)
©2014 CYREN Confidential and Proprietary
44 ©2014 CYREN Confidential and
Proprietary
BYOD AND INCREASED MOBILITY HAVE CHANGED
THE WAY EMPLOYEESACCESS THE INTERNET
THE SECURITY MARKET IS EVOLVING
![Page 5: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/5.jpg)
©2014 CYREN Confidential and Proprietary
5 ©2014 CYREN Confidential and
Proprietary
THE SECURITY MARKET IS EVOLVING
LEADING TO INCREASED COMPLEXITY IN
IMPLEMENTING, MANAGING AND DEPLOYING
SECURITY SOLUTIONS
![Page 6: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/6.jpg)
©2014 CYREN Confidential and Proprietary
6
Source: IDC, June 2013
THE SECURITY MARKET
SAAS IS BY FAR THE LARGEST GROWTH OPPORTUNITY
![Page 7: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/7.jpg)
©2014 CYREN Confidential and Proprietary
7
POLL QUESTION #2
What is your ‘Web Security in the cloud’ strategy?
![Page 8: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/8.jpg)
©2014 CYREN Confidential and Proprietary
8 ©2014 CYREN Confidential and
Proprietary8
CYREN WEBSECURITY
![Page 9: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/9.jpg)
©2014 CYREN Confidential and Proprietary
9
LAUNCH A BRANDED WEB SECURITY SERVICE WITH STRONG
DIFFERENTIATORS
INTRODUCING CYREN WEBSECURITY
©2014 CYREN Confidential and Proprietary
![Page 10: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/10.jpg)
©2014 CYREN Confidential and Proprietary
10
Android and iOS
White-labeled app for partner rebranding
Rule management for BYOD and corporate devices
A TOTAL SOLUTION FOR ROAMING USERS, SMARTPHONES AND TABLETS -
INCLUDING BYOD
MOBILITY
©2014 CYREN Confidential and Proprietary
![Page 11: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/11.jpg)
©2014 CYREN Confidential and Proprietary
11
Threat-sharing GlobalView network
Integrated antimalware scanning
APT Detection
PROVEN CYREN CLOUD-BASED WEB SECURITY
ADVANCED SECURITY
©2014 CYREN Confidential and Proprietary
![Page 12: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/12.jpg)
©2014 CYREN Confidential and Proprietary
12
SERVICE ARCHITECTURE
GlobalView™Cloud
GlobalView Database
Security Scanning and URL Filtering
Branded Web-based Provisioning, Management and Reporting
Internet
Mobile & Roaming
Desktops
Routers & Appliances
HeurisTechSecurity
1. Product is neutral/CYREN branded as standard
2. Partner private labels the service, or,
3. Partner co-brands the service
4. End customers are provisioned and start using the service
![Page 13: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/13.jpg)
©2014 CYREN Confidential and Proprietary
13
Easy customer provisioning
Online private labeling
Multi-tier management portal
TRULY INTUITIVE WEB INTERFACE FOR PARTNERS AND ALL LEVELS OF
ADMINISTRATORS
EASE OF USE
©2014 CYREN Confidential and Proprietary
![Page 14: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/14.jpg)
©2014 CYREN Confidential and Proprietary
14 ©2014 CYREN Confidential and
Proprietary14
DEMONSTRATION
![Page 15: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/15.jpg)
©2014 CYREN Confidential and Proprietary
15
\\
HeurisTechSecurity
Partner
Customer
Office Users Mobile users
Partner
Users
Partner
Customer
Office users
CYREN WEBSECURITY – PARTNER
McMillanENGINEERING
![Page 16: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/16.jpg)
©2014 CYREN Confidential and Proprietary
16
\\HEURISTECH ECO-SYSTEM OVERVIEW - DASHBOARD.
![Page 17: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/17.jpg)
©2014 CYREN Confidential and Proprietary
17
\\HEURISTECH CUSTOMIZES THE INTERFACE, DOMAIN, PLAY STORE, ETC.
![Page 18: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/18.jpg)
©2014 CYREN Confidential and Proprietary
18
\\HEURISTECH CUSTOMIZES THE LICENSING AND PACKAGE OPTIONS
![Page 19: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/19.jpg)
©2014 CYREN Confidential and Proprietary
19
\\
HeurisTechSecurity
Partner
Customer
Office Users Mobile users
Partner
Users
Partner
Customer
Office users
CYREN WEBSECURITY – PARTNER
McMillanENGINEERING
![Page 20: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/20.jpg)
©2014 CYREN Confidential and Proprietary
20
\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING - DASHBOARD OF WEB ACTIVITY
![Page 21: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/21.jpg)
©2014 CYREN Confidential and Proprietary
21
\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING DEFINES USERS – INCLUDING MOBILE/BYOD
![Page 22: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/22.jpg)
©2014 CYREN Confidential and Proprietary
22
\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING DEFINES SECURITY POLICY
![Page 23: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/23.jpg)
©2014 CYREN Confidential and Proprietary
23
\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING APPLIES POLICY TO USERS – ALSO ROAMING/BYOD
![Page 24: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/24.jpg)
©2014 CYREN Confidential and Proprietary
24
\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING – DETAILED REPORTS
![Page 25: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/25.jpg)
©2014 CYREN Confidential and Proprietary
25
POLL QUESTION #3
What feature is most important for Web Security SaaS?
![Page 26: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/26.jpg)
©2014 CYREN Confidential and Proprietary
26 ©2014 CYREN Confidential and
Proprietary
26
WHO WE ARE
![Page 27: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/27.jpg)
©2014 CYREN Confidential and Proprietary
27
LEADING PROVIDER OF INTERNET SECURITY TECHNOLOGY AND CLOUD-BASED SERVICES
NASDAQ: CYRN
![Page 28: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/28.jpg)
©2014 CYREN Confidential and Proprietary
28
WHO WE WORK WITH
![Page 29: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/29.jpg)
©2014 CYREN Confidential and Proprietary
29
GLOBAL REACH
OFFICESDATA CENTERS
©2014 CYREN Confidential and Proprietary
![Page 30: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/30.jpg)
©2014 CYREN Confidential and Proprietary
30
OUR PRODUCTS
WEBThe industry’s broadest and
most actionable security intelligence combined with a
robust web filtering platform secures all your devices, anywhere you go
EMAILNot just scanning emails with open source signatures; we
track and leverage the global distribution patterns and our
global real-time insight to stop the bad guys subverting
ANTIMALWAREOur market leading
solutions secure your platform from threats
without impacting performance
![Page 31: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/31.jpg)
©2014 CYREN Confidential and Proprietary
31
WHAT MAKES US DIFFERENT
+
SPEED \\ ACCURACY \\ REAL-TIME INSIGHT
We see more than anyone else.
RECURRENT PATTERN DETECTION
Our patented detection technology
GLOBALVIEW™ CLOUD
The most robust transaction base in the industry
![Page 32: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/32.jpg)
©2014 CYREN Confidential and Proprietary
32
We focus on our core competencies so you can focus on yours. Products designed for partners Won’t compete for your business
COMMITTED TO PARTNER SUCCESS
WHAT MAKES US DIFFERENT
©2014 CYREN Confidential and Proprietary
![Page 33: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/33.jpg)
©2014 CYREN Confidential and Proprietary
33 ©2014 CYREN Confidential and
Proprietary
33
RECAP
![Page 34: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/34.jpg)
©2014 CYREN Confidential and Proprietary
34
WEB SECURITY OPPORTUNITY
Ease of management / ease of use Easy provisioning and management for Mobile/BYOD The best account and end user provisioning experience in the industry
Partner-ready and partner-friendly revenue opportunity Turnkey Web Security recurring revenue Business logic enables any go-to-market model or sales ecosystem
Cloud-based security analysis and detection quality Detection you know – already powering solutions across the industry Ongoing Innovation – existing and new services such as APT
![Page 35: How to Launch a Web Security Service in an Hour](https://reader036.vdocuments.us/reader036/viewer/2022081413/546c288caf795985298b4ee6/html5/thumbnails/35.jpg)
©2014 CYREN Confidential and Proprietary
35 ©2014 CYREN Confidential and
Proprietary
35
THANK YOU.ANY QUESTIONS?
“We are excited to see the emergence of state-of-the-art cloud based protection for mobile and roaming users. CYREN
WebSecurity will help MXSweep deliver the easy to consume and best of breed cloud based security that our customers expect.”
Tom O’BrienCEO
MXSweep