Download - CeBIT 2015 Presentation

Transcript
Page 1: CeBIT 2015 Presentation

124 March 2015 © 2014 CYREN Confidential and Proprietary

CYBERSECURITY OF THINGSA PRACTICAL LOOK AT THE INTERNET OF THINGS AND CYBERSECURITY

Christian MildeSales Director – DACH

Page 2: CeBIT 2015 Presentation

© 2014 CYREN Confidential and Proprietary

2

FRISK with

Frisk founded 1989 (Iceland)

2012 Acquired by Commtouch (CYREN)

First engine which used heuristic technologies

The only company which not had to buy other engines

ABOUT CYREN = FOUNDATION OF 3 COMPANIES

1991 Founded

2010 Acquisition of Command AV

2012 Acquisition of FRISK

2012 Acquisition of Eleven

2014 CYREN renaming

Founded 2001

eXpurgate email security, used by over 45,000 companies

dominating email security in Germany with 60% market share

Processing more than 1 billion emails per day in Germany

Page 3: CeBIT 2015 Presentation

3

©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

CYREN POWERS THE WORLD’S SECURITY

Our Cyber Intelligence is the security foundation of many of the world’s largest and most influential information technology and Internet brands.

Page 4: CeBIT 2015 Presentation

4© 2015 CYREN Confidential and Proprietary

4

IOT MARKET

Page 5: CeBIT 2015 Presentation

5

©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

THE INTERNET OF THINGS IN 2020 - ACCORDING TO GARTNER

Over 25 BILLION IoT devices

Less than 5% of IoT connections will go through SIM-based, M2M cellular services

Over a quarter billion connected cars with automated driving capabilities

900 Exhibitors at CES 2015 were manufacturers of IoT devices

Today‘s hype will be mature within 5 years

Page 6: CeBIT 2015 Presentation

6

Q&A FROM OUR CUSTOMERS

Page 7: CeBIT 2015 Presentation

7

STATISTICS

Cybersecurity is the fastest growing risk for any business

While 73% of businesses don‘t have a plan for upcoming threats

Our analytics show Germany is the prime market for botnet origin email harvester with 73% followed by China with only 9%!

Source: Allianz

Page 8: CeBIT 2015 Presentation

8© 2015 CYREN Confidential and Proprietary

8

CYBERSECURITYOF THINGS

Page 9: CeBIT 2015 Presentation

9

IOT CYBERCECURITY BASICS

Device manufacturer must use:

Secure boot

Code hardening

Access control

Device authentication

Secure provisioning

Despite this, devices will still be hacked…

Poor Password Protection

Firmware Exploit— hack in Firmware

Bugs and Vulnerabilities at the access or programming code

Page 10: CeBIT 2015 Presentation

10

APPLIED CYBER INTELLIGENCE IS THE WAY FORWARD

APPLICATIONPolicy, Enforcement, Logging, Alerting, Reporting

ANALYSISRPD, Heuristics, Signature, Human, etc.

DATA17 BILLION transactions per day

SENSORS500 THOUSAND points of presence, protecting 600 MILLION users

Use

r V

alu

e

SECURITYApplied

Cyber Intelligence

INSIGHTCyber Intelligence

Pre-Compromise Compromise Post-Compromise

Reconnaissance Weaponization Delivery Exploitation Installation Command & Control

Actions on Target

Stop the Cyber Kill Chain

Page 11: CeBIT 2015 Presentation

11

CYREN BY NUMBERS

Inspection

Detection

Collection

SPEED, ACCURACY, AND REAL-TIME INSIGHT

Page 12: CeBIT 2015 Presentation

13

FLEXIBLE DEPLOYMENT OPTIONS

99% queries answered via local cache Compatible with most Operating Systems For devices which regularly contact outside

networks

100% of queries are directed to the cloud from device

For devices which rarely contact outside networks and with low resources

Cyber Threat Protection

WebSecurity

OUTBOUND Botnet C&C Traffic, Malicious URL / IP, Spam

Virus, Adware, Spyware, Malicious Scripts, Emails INBOUND

Page 13: CeBIT 2015 Presentation

14

PLACING CYBERSECURTY OF THINGS

1. Device Communication Analysis

2. Real time inspection in GlobalView Cloud

3. Detect communication to malicious IP, URL, etc.

4. Notify device / manufacturer for reset or remediation

32

41

Page 14: CeBIT 2015 Presentation

15

JOIN AND WIN WITH US

Improved End-User Satisfaction

Increased Revenue

Product

Differentiation

Sales, Marketing and Technical Support

CYREN helps you satisfy your customers’ needs, ensuring their users are protected on any device, from any location.

Be the first to market with best-of breed Internet security technology.

CYREN ensures you have everything you need to support your sales model.

Our products are easily integrated to ensure cost-effectiveness, scalability, and momentum.

Page 15: CeBIT 2015 Presentation

16© 2015 CYREN Confidential and Proprietary

16

BE SAFE, FEEL GOOD.

You can also find us here:

www.CYREN.com

twitter.com/cyreninc

linkedin.com/company/cyren

Christian Milde

Sales Director - DACH

+49 1520 1647 213

[email protected]