webinar: dispelling the myths about cloud security

22
1 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. Dispelling the Myths about Cloud Security Chris Taylor, CYREN Marketing

Upload: cyren-inc

Post on 12-Apr-2017

376 views

Category:

Technology


1 download

TRANSCRIPT

1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.

Dispelling the Myths about Cloud Security

Chris Taylor, CYREN Marketing

2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Agenda

Can I trust the Cloud?

Common misconceptions about cloud security

CYREN WebSecurity – Cloud Security-as-a-Service

Q&A

3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 3

Can I Trust the Cloud?

4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Can I Trust the Cloud?

https://www.cloudpassage.com/assets/img/resources/cso-cloud-security-concerns-and-the-perceived-effectiveness-of-traditional-security-solutions-in-a-cloud-environment.pdf

5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Can I Trust the Cloud?

https://www.cloudpassage.com/assets/img/resources/cso-cloud-security-concerns-and-the-perceived-effectiveness-of-traditional-security-solutions-in-a-cloud-environment.pdf

Also, 80% agree to some extent that conventional network (perimeter) security solutions don’t work well in cloud environments, and 76% agree their organizations lack visibility into attacks when applying traditional security in cloud infrastructure environments.

6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Can I Trust the Cloud?

https://www.cloudpassage.com/assets/img/resources/cso-cloud-security-concerns-and-the-perceived-effectiveness-of-traditional-security-solutions-in-a-cloud-environment.pdf

7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

What the Analysts Say…

"Cloud computing, by its very nature, is uniquely vulnerable to the risks of myths. It is all aboutcapabilities delivered as a service, with a clear boundary between the provider of the service and theconsumer. From a consumer perspective, 'in the cloud' means where the magic happens, where theimplementation details are supposed to be hidden. So it should be no surprise that such an environmentis rife with myths and misunderstandings."

David Mitchell Smith, Gartner

"The cloud is more secure than you are. If you're Coke and in the cloud, Pepsi can be right next door."James Staten, Forrester

"Cloud computing is perceived as less secure. This is more of a trust issue than based on any reasonableanalysis of actual security capabilities. To date, there have been very few security breaches in the publiccloud—most breaches continue to involve on-premises data center environments“

David Mitchell Smith, Gartner

8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 8©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Some Common Misconceptions About Cloud Security

8

9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

#1: The Cloud? We Don’t Use It

Yet enterprise apps have moved to the cloud (Office365)

The consumerization of IT brings personal cloud apps

into the enterprise

Saying ‘no’ is not an option any more

And “Shadow IT” is here to stay…

There is no control without first gaining visibility

“I’ve had discussions with CIOs who were indenial they were even in the cloud; it turns outthey were using a wide variety of Software asa Service apps.”

Jim Reavis, Cloud Security Alliance

10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

#2: I Have No Control Over My Data

Determine controls needed, then select accordingly

Storage supports Corporate and regulatory compliance

Vendors adhere to certifications and standards

Ensure the application is multi-tenant and data is

encrypted and only accessible from the ‘home’ region

11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

#3: Cloud is Less Secure than On-Premise

Yet the majority of breaches involve data from local systems

Most enterprise local apps are now Internet-connected

Cloud vendors have massive economies of scale/skill

Failure to keep security up to date = immediate customer loss

“Companies who store their own data, rather than using a cloud-based storage medium, must make asignificant and continuous investment in tools, training, and personnel charged with guarding the business'most significant assets: its knowledge. The defense, like the adversary, must be continuous, growing, andtireless; anything less will not suffice.“

Google study by Leviathan Security Group

12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

#4: Cloud Security is Difficult to Manage

Data consolidation is done for you – one view of the world

No patches to apply, no service windows to manage

Capabilities enabled by license, not ‘forklift upgrade’

Vendors provide SLAs on all key elements

Your focus can be managing security, not the platform

13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

#5: Appliances Give Me More Flexibility (Control)

Capacity planning is always a challenge with hardware

Appliances tie users/data/process to fixed locations –

this has nothing to do with how you do business!

The Cloud offers virtually limitless scale

Business growth (organic or by M&A) is easily supported

New technologies are seamlessly supported

14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 14©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

About CYREN

14©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

CYREN leverages superior Detection Engines,Big Data and Intelligent Analytics to deliver cloud-based Cybersecurity

15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

CYREN Powers the World’s Security

200+ OEM customers

500K Points of presence

600M End users

17BDaily Transactions

16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

TCO

Modern Threats Demand A Modern Solution

Security Roaming

17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. © 2014 CYREN Confidential and Proprietary 17

Mobile App

Consumer Cloud

Private Cloud

Blocking Threats Enforcing Compliance

Cloud AppPublic Cloud

Analyzing Web Traffic Applying Cyber Intelligence

BotExploits APT

Malware

Roaming HomeOn Call Wearables/IoTPCP MobileHospital Clinic

A Comprehensive Internet Security Platform

18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Malware Trends and Detection Speed

Malware Emails Malware URLs Zero-hourMalwaredetection

19©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Zero-Hour Phishing

The Fastest Detection Means Better Security

Compliance / ProductivityZero-Hour Malware

“CYREN consistently demonstrates the best performance; detecting new phishing attacks faster than others, and providing unique detection of many attacks.” Greg Ogorek, Sr. Director, Cyber Security Operations, Cyveillance

20©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Unified policy definition, enforcement and reporting

Each license covers a user for up to 5 different devices

No capital expense for hardware or software

Eliminates the cost and complexity of multiple appliances

Up-to-the-moment applied cyber intelligence

Simple to deploy, easy to administer - centralized or distributed

Scales and moves with you

The Lowest Total Cost of Ownership (TCO)

21©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Protect networks, notebooks, tablets and smartphones

Flexible controls for BYOD and corporate devices

No discernible impact compliant browsing experience

Secure Internet connectivity for IoT/wearables

Security and compliance public/guest WiFi networks

The Best Solution for Roaming and RemoteDesigned for modern business computing

22©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

You can also find us here:

www.CYREN.com

twitter.com/cyreninc

linkedin.com/company/cyren

©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Questions, Next Steps

Chris Taylor

CYREN Marketing

+1 703.760.3320

[email protected]

To Learn More or Request a Demo:

http://www.cyren.com/websecurity-direct.html