Webinar: CYREN WebSecurity for Enterprise

22
1 ©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. Exploring Internet Security for Today’s Threat Landscape Chris Taylor, CYREN Marketing

Transcript of Webinar: CYREN WebSecurity for Enterprise

Page 1: Webinar: CYREN WebSecurity for Enterprise

1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.

Exploring Internet Security for Today’s Threat Landscape

Chris Taylor, CYREN Marketing

Page 2: Webinar: CYREN WebSecurity for Enterprise

2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

About CYREN

THE BEST KEPT SECRET IN INFORMATION SECURITY FOR MORE THAN A DECADE

Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time innovator of cyber intelligence solutions. CYREN provides web, email, endpoint, and roaming cybersecurity solutions that are relied upon by the world’s largest IT companies to protect them and the billions of customers they serve from today’s advanced threats.

2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Page 3: Webinar: CYREN WebSecurity for Enterprise

3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

CYREN Powers the World’s Security

Our Cyber Intelligence forms the security foundation of many of the world’s largest and most influential information technology and Internet security brands.

Page 4: Webinar: CYREN WebSecurity for Enterprise

4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

CYREN by the Numbers

The Best Data Delivers the Best Protection

Page 5: Webinar: CYREN WebSecurity for Enterprise

5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 5

The Changing Security Landscape

Page 6: Webinar: CYREN WebSecurity for Enterprise

6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Today’s Security Landscape

Business process is Web connected and exposes security vulnerabilities

Use of cloud-based apps reduces IT visibility and control of enterprise data

Workers are remote/roaming using mobile/BYOD technology, but devices are rarely controlled

Connecting to Public WiFi networks creates risk Corporate IoT increases security complexity because

IT may not be consulted

Source: Gartner The Growing Importance of Cloud Access Security Brokers (May 2012)

Page 7: Webinar: CYREN WebSecurity for Enterprise

7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Today’s Security Challenges

The cybercriminals are innovating faster than legacy solutions can keep up

Page 8: Webinar: CYREN WebSecurity for Enterprise

8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

2014 Malware Year in Review

Malware Emails Malware URLs Zero-hourMalwaredetection

Page 9: Webinar: CYREN WebSecurity for Enterprise

9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Phishing Continues to Grow as a Threat Vector

Source: CYREN Cyber Threat Q1 Report, April 2015

Page 10: Webinar: CYREN WebSecurity for Enterprise

10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

2015 Android Threats

Source: CYREN Cyber Threat Q1 Report, April 2015

Page 11: Webinar: CYREN WebSecurity for Enterprise

11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

40 to 50 million emails distributed in short bursts lasting only three- to five-minutes each

2014 Mapping Attacks

Page 12: Webinar: CYREN WebSecurity for Enterprise

12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Web Security is Trapped in a Legacy Approach

Load Balancer

Edge FirewallServer–Side SSL Tunnel

Aggregation firewall

Client - side SSL tunnel

Sandbox SSLWeb Filter

Logfiles

Flow Management Content Inspection

SSLSSL

SSL

PAC File

SSL

SSL

This approach was defined for a 1990s computing model – centralized and static

Page 13: Webinar: CYREN WebSecurity for Enterprise

13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Do We Put This Everywhere We Need Connectivity?

Load Balancer

Edge FirewallServer–Side SSL Tunnel

Aggregation firewall

Client - side SSL tunnel

Sandbox SSLWeb Filter

Logfiles

Flow Management Content Inspection

SSLSSL

SSL

PAC File

SSL

SSL

NO. Security must evolve to reflect the changing model of business computing

Page 14: Webinar: CYREN WebSecurity for Enterprise

14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

TCO

A Modern Solution to Today’s Threats

Security Roaming

Page 15: Webinar: CYREN WebSecurity for Enterprise

15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

APPLICATIONPolicy, Enforcement, Logging, Alerting, Reporting

ANALYSISRPD, Heuristics, Signature, Sand box, Human, etc.

THREAT DATA17 BILLION transactions per day

ENDPOINTS500 THOUSAND points of presence, protecting 600 MILLION users

SECURITYApplied

Cyber Intelligence

INSIGHTCyber Intelligence

Pre-Compromise Compromise Post-Compromise

Reconnaissance Weaponization Delivery Exploitation Installation Command & Control

Actions on Target

Helping Enterprises Disruptthe Cyber Kill Chain

Applied Cyber Intelligence is the Answer

Page 16: Webinar: CYREN WebSecurity for Enterprise

16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

The fastest, best protection, from the brand the security industry trusts

The Cyber Intelligence that protects 600+ Million global users today

Cloud economics and ease of use combine for the lowest Total Cost of Ownership

Your security scales with you, no matter how big or complex your infrastructure becomes

A total security solution for office-based, remote, roaming, and corporate IoT devices

Protection for users and for Public/Guest WiFi networks

CYREN WebSecurity Is Applied Cyber Intelligence

Page 17: Webinar: CYREN WebSecurity for Enterprise

17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. © 2014 CYREN Confidential and Proprietary 17

Mobile App

Consumer Cloud

Private Cloud

Blocking Threats Enforcing Business Policy

Cloud AppPublic Cloud

Analyzing Web Traffic Applying Cyber Intelligence

BotExploits APT

Malware

Roaming HomeProduction Industrial Internet of

Things

Branch MobileHQ Remote Office

Security for Every Business or Technology Model

Page 18: Webinar: CYREN WebSecurity for Enterprise

18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Zero-Hour Phishing

Faster Detection Means Better Protection

Compliance / ProductivityZero-Hour Malware

“CYREN consistently demonstrates the best performance; detecting new phishing attacks faster than others, and providing unique detection of many attacks.” Greg Ogorek, Sr. Director, Cyber Security Operations, Cyveillance

Applied Cyber Intelligence Disrupts the Cyber Kill Chain and Boosts Productivity

Page 19: Webinar: CYREN WebSecurity for Enterprise

19©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

No capital expense for hardware or software Eliminates the cost and complexity associated with installing and

maintaining multiple appliances Up-to-the-moment applied cyber intelligence Simple to deploy, easy to administer, whether your operations are

centralized or distributed Scales with you - regardless of volume of users, devices, or locations

The Lowest Total Cost of Ownership (TCO)Cloud-based Web Security as a Service drives down your cost

Page 20: Webinar: CYREN WebSecurity for Enterprise

20©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

A ‘clean’ Internet connection protects users wherever they are Simple deployment options No requirement to backhaul remote workers’ traffic back to a

centralized security stack Policy enforcement and protection for up to 5 devices per user Protect notebooks, tablets and smartphones, across multiple

operating systems with flexible controls for BYOD/corporate No discernible impact on device performance Ensure clean, secure Internet connectivity for Corporate IoT An effective option for Public/Guest WiFi networks

The Best Solution for Roaming and RemoteDesigned for modern business computing

Page 21: Webinar: CYREN WebSecurity for Enterprise

21©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Business technology use has transformed, creating gaps in security

Cyber criminals are systematically targeting these gaps

The legacy, hardware-driven approach to Web security is inadequate to close them

21st Century threats require a 21st Century solution with fast, accurate protection

CYREN WebSecurity is that solution

Summary

Page 22: Webinar: CYREN WebSecurity for Enterprise

22©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

You can also find us here:

www.CYREN.com

twitter.com/cyreninc

linkedin.com/company/cyren

©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Thank You. Any Questions or Thoughts?

Chris TaylorCYREN Marketing+1 [email protected]