Startup and software product landscape in india iSpirt 25 feb 2015
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative
-
Upload
productnationin -
Category
Business
-
view
8 -
download
1
description
Transcript of i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative
![Page 1: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/1.jpg)
Copyright i7 Networks, i7nw.com
![Page 2: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/2.jpg)
Welcome to “Me” Enterprise
How BYOD has changed the security map and how “Peregrine 7” helps tackle it?
Copyright i7 Networks, i7nw.com
Manjunath M GowdaCEO, i7 NetworksBangalore, India
manju_s7in/manjunathgowda/
![Page 3: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/3.jpg)
WHY BYOD matters?
Copyright i7 Networks, i7nw.com
![Page 4: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/4.jpg)
• 90% of enterprises will use personal devices in Enterprise by 2014 - Gartner
• 20% Savings: CISCO claimed due to BYOD & declared: “We don’t pay for it, and our users are happier.”
• Survey: Enterprises that don't support BYOD are at competitive disadvantage
Copyright i7 Networks, i7nw.com
![Page 5: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/5.jpg)
So what is stopping them?
Copyright i7 Networks, i7nw.com
![Page 6: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/6.jpg)
75% CIOs said Compliance & Security biggest challenge in allowing BYOD
Copyright i7 Networks, i7nw.com
![Page 7: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/7.jpg)
DARK READING – July 2013
Copyright i7 Networks, i7nw.com
![Page 8: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/8.jpg)
Copyright i7 Networks, i7nw.com
62% - Loss of a device that has Sensitive Data – (MDMs solve this)
61% - An infected personal device connecting to the Corporate Network
![Page 9: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/9.jpg)
Business overview
Copyright i7 Networks, i7nw.com
![Page 10: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/10.jpg)
79% business had a mobile incident last year alone – Checkpoint
600%+ growth in mobile malware in last 2 years
20 Mn+ devices jailbroken in just two months (Jan 2013)
18 Mn infected Android devices by end of 2013
71% mobile devices have OS / application vulnerabilities
Copyright i7 Networks, i7nw.com
![Page 11: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/11.jpg)
$500K+ cost per such incident
$1.5Mn cost per such settlement
Copyright i7 Networks, i7nw.com
![Page 12: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/12.jpg)
Why traditional tools can’t help here?
Copyright i7 Networks, i7nw.com
![Page 13: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/13.jpg)
• Perimeter security and not for inside-inside or inside-out threats
• Used to IT-owned devices and not personal devices (agented)
• Used to take care of outside2inside threats
Copyright i7 Networks, i7nw.com
![Page 14: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/14.jpg)
So what tools do exist to solve it?
Copyright i7 Networks, i7nw.com
![Page 15: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/15.jpg)
15 Copyright i7 Networks, i7nw.com
MDMs, EPPAirwatch, MobileIron, Zenprise
MAMsBitzer, IBM, SAP, Good
MDPsAT&T toggle, Divide,
VMware
MNACi7Networks
Device level
network
Mobile Security Tools Quadrant
Server side
![Page 16: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/16.jpg)
Our value proposition
Copyright i7 Networks, i7nw.com
![Page 17: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/17.jpg)
“We protect your network from malicious/infected BYODs”
Copyright i7 Networks, i7nw.com
![Page 18: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/18.jpg)
“We Protect the Enterprise Network” by
-Detect & Fingerprint1 all personal devices
-Prevent the malicious devices from connecting
-100% Agentless (Zero-touch)
-Zero-Latency Deployment
-Provide detailed Compliance Reports
“To Know & To Protect”
1 Secure detection & fingerprinting (US patent pending)
Copyright i7 Networks, i7nw.com
![Page 19: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/19.jpg)
• Name
• Screen caps
• Demo
PeregrineGuardTM
![Page 20: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/20.jpg)
i7 Networks; i7 Confidential
Not just phones,we support all wireless devices.
![Page 21: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/21.jpg)
Continuous Monitoring
Complete Visibility Complete Visibility
Endpoint Authentication Endpoint Authentication
Vulnerability and malicious assessment
Vulnerability and malicious assessment
Granular policy enforcement
Granular policy enforcement
Compliance ReportingCompliance Reporting
Entry Verification – Corporate Wi-Fi or
VPN?
Entry Verification – Corporate Wi-Fi or
VPN?
Allow
Deny
Compromised /Jailbroken/ Unauthorized/Unmanaged
check
Compromised /Jailbroken/ Unauthorized/Unmanaged
check
Deny
Deny
Personal Devices
![Page 22: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/22.jpg)
the questions we answer
Copyright i7 Networks, i7nw.com
![Page 23: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/23.jpg)
Copyright i7 Networks, i7nw.com
• What devices are getting into the corporate network?
• Who do they belong to?• Are they infected? • Are they compromised or malicious?• How vulnerable are they?• What are they accessing?• What apps* are they running?• Can I control the access?• Can I get Compliance audit reports?
![Page 24: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/24.jpg)
How do you deploy?
Copyright i7 Networks, i7nw.com
![Page 25: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/25.jpg)
• 100% agentless and non-intrusive – Zero Touch
• Complete off-line deployment – Zero-Latency
• Just ONE probe* in the network
• Supports: Corporate Wi-Fi/ Public Wi-Fi/3G/4G/LTE
Deployment
![Page 26: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/26.jpg)
i7 Networks; i7 Confidential
![Page 27: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/27.jpg)
- Microsoft AD, RADIUS and LDAP
- Microsoft Exchange
- Maas 360 MDM
- Microsoft System Center*
- IBM Tivoli*
- Cisco/Juniper and Fortinet VPN
- Snort IDS
- CVE database
Integrates with
![Page 28: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/28.jpg)
Why “Agentless” is Sweet?
Copyright i7 Networks, i7nw.com
![Page 29: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/29.jpg)
14 different OS types & growing; Add versions and models5
45% enterprises have more than 5 times as many BYOD as they had 2 years ago3
3.5 – Average number of devices per Employee
42% - Average churn of devices per year among enterprise employees
< 10% enterprises aware of all mobile devices accessing their network & servers3
27% of devices are ‘approved’ by the company6
Copyright i7 Networks, i7nw.com
![Page 30: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/30.jpg)
So what’s unique?
Copyright i7 Networks, i7nw.com
![Page 31: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/31.jpg)
4A (Attributes)
Discovery & FingerprintingHealth CheckDiscover Apps on the wire*,Policy Enforcement
4A (Attributes)
Discovery & FingerprintingHealth CheckDiscover Apps on the wire*,Policy Enforcement
4D (Deployments)
100% Agentless (Zero-touch), ZERO-Latency SINGLE Probe,Wi-Fi/3G/4G/LTE
4D (Deployments)
100% Agentless (Zero-touch), ZERO-Latency SINGLE Probe,Wi-Fi/3G/4G/LTE
4T (Threat-Protections)
Malicious & Intrusion PreventionZero-day Attack Prevention*,Vulnerability CheckCheck of anti-malware s/w
4T (Threat-Protections)
Malicious & Intrusion PreventionZero-day Attack Prevention*,Vulnerability CheckCheck of anti-malware s/w
4K (Keywords)
100% AgentlessPatent-Pending AlgorithmsDetailed FingerprintingZero-Latency
4K (Keywords)
100% AgentlessPatent-Pending AlgorithmsDetailed FingerprintingZero-Latency
![Page 32: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/32.jpg)
Available as : Appliance / Virtual Appliance
Available as : Appliance / Virtual Appliance
![Page 33: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/33.jpg)
What is that you do MDM cannot?
Copyright i7 Networks, i7nw.com
![Page 34: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/34.jpg)
oCannot do Discovery and fingerprint of all devices Authorized
Unauthorized
Unmanaged
Non-mobile devices like e-Readers, Wi-Fi watches, Gaming devices, Healthcare devices etc.
Copyright i7 Networks, i7nw.com
![Page 35: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/35.jpg)
oMalware detection via signature is only 28%; Cannot catch malicious traffic @ network layer (not even at device layer)
oCannot do Access control based on device attributes
oCannot enforce different access rules for different departments/ LoBsCopyright i7 Networks, i7nw.com
![Page 36: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/36.jpg)
oHot-spotting/Mac-spoofing cannot be detected
oFails where you are not allowed to install a client on the device due to privacy or compliance
oNot dynamic (need to stop iOS6.1?)
Copyright i7 Networks, i7nw.com
![Page 37: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/37.jpg)
How different are you from a traditional nac?
Copyright i7 Networks, i7nw.com
![Page 38: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/38.jpg)
Support all: Wi-Fi & 3G/4G/LTE 100% Zero Touch (agentless) Zero Latency (offline) (still we control) Just ONE probe Fits into any network infrastructure
Support all: Wi-Fi & 3G/4G/LTE 100% Zero Touch (agentless) Zero Latency (offline) (still we control) Just ONE probe Fits into any network infrastructure
US Patent-pending fingerprinting algorithm
Mac-spoofing/Hot spotting DVItm (Device Vulnerability Index) Detecting apps on the wire (dropbox)
US Patent-pending fingerprinting algorithm
Mac-spoofing/Hot spotting DVItm (Device Vulnerability Index) Detecting apps on the wire (dropbox)
Completely focused on BYOD Security
Completely focused on BYOD Security
![Page 39: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/39.jpg)
Product Road Map?
Copyright i7 Networks, i7nw.com
![Page 40: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/40.jpg)
• Recognition of all Apps on the Wire• Detection of EPP (End Point Protection)
tools• Chaining of P7s• Integrations into System Center and Tivoli• Integrations into MDMs• mNAC in the cloud to detect cloud access
Copyright i7 Networks, i7nw.com
![Page 41: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/41.jpg)
The TEAM
Copyright i7 Networks, i7nw.com
![Page 42: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative](https://reader034.fdocuments.net/reader034/viewer/2022051411/544f5b66af7959c4068b96b0/html5/thumbnails/42.jpg)
JeffHunter
Evangelist
PeterGilsonCTO
FirstLastCFO
JackFranklin
CMO
HeatherAdlerCEO
Investors & Advisors
1st venture: $8.4M by Bluecoat (2010)Team together for second timeStarted June 12’ Product start Jan 13’