webinar: that's the way the network perimeter crumbles - cybersecurity for the new technology...
TRANSCRIPT
1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
That’s the Way the Network Perimeter Crumbles:Web Security for the New Technology Paradigm
Chris Taylor
2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
About CYREN
THE BEST KEPT SECRET IN INFORMATION SECURITY FOR MORE THAN A DECADE
Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time innovator of cyber intelligence solutions. CYREN provides web, email, endpoint, and roaming cybersecurity solutions that are relied upon by the world’s largest IT companies to protect them and the billions of customers they serve from today’s advanced threats.
2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN Powers the World’s Security
Our Cyber Intelligence is the security backbone of many of the world’s largest and most influential information technology and Internet security brands.
4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 4©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Global Coverage from a Global Platform
OFFICESDATA CENTERS
Over 500,000 threat collection and cyber intelligence delivery points distributed across the globe, supported by 19 datacenters
Protecting more than 550 Million people in 190 countries
13 Billion security transactions every day
5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 5
The Changing Security Landscape
6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Today’s Security Landscape
IT Security Landscape
Business process is Web connected and exposes security vulnerabilities
Use of cloud-based apps reduces IT visibility and control of enterprise data
Workers are remote/roaming using mobile/BYOD technology, but devices are rarely controlled
By 2018, 25% of all corporate data traffic will flow direct from roaming devices to the cloud
Corporate IoT increases security complexity because IT may not be consulted
Source: Gartner The Growing Importance of Cloud Access Security Brokers (May 2012)
7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
But Security is Stuck in the 20th Century
Load Balancer
Edge FirewallServer–Side SSL Tunnel
Aggregation firewall
Client - side SSL tunnel
Sandbox SSLWeb Filter
Logfiles
Flow Management Content Inspection
PAC File
SSL
SSL
This approach was defined for a 1990s computing model – centralized and static
8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Today’s Security Challenges
The cybercriminals are innovating faster than legacy solutions can keep up
9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
So Do We Put This Everywhere We Need Connectivity?
Load Balancer
Edge FirewallServer–Side SSL Tunnel
Aggregation firewall
Client - side SSL tunnel
Sandbox SSLWeb Filter
Logfiles
Flow Management Content Inspection
PAC File
SSL
SSL
NO. Security must evolve to reflect the changing model of business computing
10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
TCO
A Modern Solution to Today’s Threats
Security Roaming
11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Applied Cyber Intelligence is the Way Forward
APPLICATIONPolicy, Enforcement, Logging, Alerting, Reporting
ANALYSISRPD, Heuristics, Signature, Human, etc.
DATA13 BILLION transactions per day
SENSORS500 THOUSAND points of presence, serving 550 MILLION users
SECURITYApplied
Cyber Intelligence
INSIGHTCyber Intelligence
Ente
rpri
se V
alu
e
Pre-Compromise Compromise Post-Compromise
Reconnaissance Weaponization Delivery Exploitation Installation Command & Control
Actions on Target
Helping Enterprises to Disruptthe Cyber Kill Chain
12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Cloud economics and ease of use combine for the lowest Total Cost of Ownership
Applying the same Cyber Intelligence that protects over 550 Million global users today
Industrial-strength protection, from the brand the security industry trusts
Your security scales with you, no matter how big or complex your infrastructure becomes
A total security solution for office-based, remote, roaming, and corporate IoT devices
Protection is delivered wherever the user is connected
CYREN WebSecurity Delivers Applied Cyber Intelligence
13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
No capital expense for hardware or software
Eliminates the cost and complexity associated with installing and maintaining multiple appliances
Up-to-the-moment applied cyber intelligence
Simple to deploy, easy to administer, whether your operations are centralized or distributed
Scales with you - regardless of volume of users, devices, or locations
The Lowest Total Cost of Ownership (TCO)
Cloud-based Web Security as a Service drives down your cost
14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Phishing
Protecting you from cybercriminal attempts to obtain corporate data, using impersonated trustworthy communication via an email or malicious URL
The Best Protection from Today’s Threats
Zero-hour protection, powered by our unique Cyber Intelligence, ensures you’re always protected against the latest threats
Compliance and Productivity
Unprecedented visibility of employee Web use, means you can set and enforce your Internet Use policies
Applied Cyber Intelligence Disrupts the Cyber Kill Chain and Boosts Productivity
Zero-day Malware
15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
A ‘clean’ Internet connection protects users wherever they are
Simple deployment options
No requirement to backhaul remote workers’ traffic back to a centralized security stack
Policy enforcement and protection for up to 5 devices per user
Protect notebooks, tablets and smartphones, across multiple operating systems with flexible controls for BYOD/corporate
No discernible impact on device performance
Ensures clean, secure Internet connectivity for Corporate IoTdeployments
The Best Solution for Roaming, Remote, and IoT
Designed for 21st Century business computing
16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Business has transformed the way it uses technology, opening up a new threat landscape
The traditional centralized, hardware-driven approach to Web security was never designed for this landscape
21st Century threats require a 21st Century solution – Web security as a service
CYREN WebSecurity is that solution
Summary
17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
You can also find us here:
www.CYREN.com
twitter.com/cyreninc
linkedin.com/company/cyren
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Thank You. Any Questions or Thoughts?
Chris Taylor
CYREN Marketing
+1 703.760.3320