Complete Cloud Security Anyone, anywhere, any app, any device.

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Advertisements

Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Lexmark Print Management
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Centrix Software Application discovery and management 8 November 2012 Richard Pegden Director of Product Marketing.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Company Presentation Redefining Security. Company | Market Challenges Market Challenges The workforce is mobile Cloud Application adoption is growing.
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
Tim Vander Kooi Systems
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
The Changing World of Endpoint Protection
Infrascale Company Overview. About Infrascale Los Angeles, CA Venture backed Managed Service Providers 12 global data centers Eversync Solutions.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
Complete Cloud Security
CensorNet Partner Program
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
Data-Centric Security and User Access Controls for Hadoop on Microsoft Azure MICROSOFT AZURE APP BUILDER PROFILE: BLUETALON BlueTalon provides data-centric.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Blue Coat Cloud Continuum
DATS Portfolio. PARTNERS & Solutions END TO END DATA CENTER SOLUTIONS Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Deployment Planning Services
Hybrid Cloud Web Filtering Platform
Cloud App Security vs. O365 Advanced Security Management
Barracuda Web Security Flex
Barracuda Web Filtering Service
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Hybrid Management and Security
Trial.iO Makes it Easy to Provision Software Trials, Demos and Training Environments in the Azure Cloud in One Click, Without Any IT Involvement MICROSOFT.
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Prevent Costly Data Leaks from Microsoft Office 365
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
Cloud Access Security Broker Lets Enterprises Enforce Security and Compliance in Office 365 Partner Logo “Skyhigh helps us securely enable high-impact.
Yellowfin: An Azure-Compatible Business Intelligence Platform That Connects People with Their Data for Better Decision Making MICROSOFT AZURE APP BUILDER.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Securing the Threats of Tomorrow, Today.
(With Hybrid Network Support)
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
STATEL an easy way to transfer data
Presentation transcript:

Complete Cloud Security Anyone, anywhere, any app, any device

“Corporate confidentiality and communications policies have been ripped to shreds by the social networking phenomenon.” FT Report, Oct 2015 “Many enterprises lack a complete understanding of the cloud services they consume and the risks they represent, which makes compliance and protection difficult” Gartner How to Evaluate and Operate a Cloud Access Security Broker | Published: 8 Dec 2015 | Analyst(s): Neil MacDonald, Craig Lawson “40% of enterprises will have from 25% to 49% of their workloads in public clouds in five years. Over the next three years, the majority of enterprise senior executives forecast between 21 to 30% of applications will be SaaS-based.” Forbes/Tech, May 2015

Increasingly mobile workforce Lack of visibility and control Rise of Cloud Applications “By 2016, 25% of enterprises will secure access to cloud-based services using a CASB platform, up from less than 1% in 2012, reducing the cost of securing access by 30%” - Gartner The World has Changed …

The need for evolution and education Hacking 32% of attacks were Aimed at companies with fewer than 250 employees Targeted Attacks From 2012 – 2014 $ Ransomware The British insurance company Lloyd’s estimates that cyber attacks cost businesses as much as $400 billion a year, which includes direct damage plus post-attack disruption to the normal course of business. Forbes, Nov 2015 Hacking is the fastest growing crime type Targeted attacks grew 62% 24,000 victims per day in 2014

Cloud Applications provide flexibility & scalability But do you know which applications your employees are using? And what they are doing? The flexibility, scalability and usability of the plethora of cloud applications, enables employees to become more productive and businesses to grow Do you know which applications your people are using? Where your confidential data is stored? What data is being shared on unsecure applications?

Top 5 Business Concerns ”Unauthorised or unrestricted use of cloud application can lead to data security and compliance breaches” “The world has gone mobile but security has not changed” ”Compliance is not optional. Use cloud application but retain visibility and control” ”Users are working in-office or on the move and security has to follow the user regardless of the device used” “Company and personally owned devices can increase productivity but access to corporate data and the network have to be protected at all times” Shadow IT Security Compliance BYOD Productivity

Current Security Vendors only solve part of the problem … Web Security Security Cloud Application Control

Censornet Provides Complete Cloud Security Follow the person across devices, networks and applications Apply the same policy, permissions and control on web, and cloud applications consistently Track data as it is moved between web applications and shared via , file sharing or social media Spot use of unauthorised or risky cloud applications and prevent sensitive data from being shared Monitor sensitive data from one consul and track security events that involve more than one application or medium Benefit from the scalability and flexibility of cloud application adoption and BYOD without risking security

Cloud Activity Governance Anomaly and Threat Detection and Protection Visibility into Cloud App Usage Enables business to benefit from the scalability and flexibility of the cloud without the risks

Location, Devise, Public or Private network A Person In a Context Accesses an Application To perform a function With Data Censornet The only way to completely protect your data

Location, Devise, Public or Private network Censornet The only way to completely protect your data A Person In a Secure Context

Location, Devise, Public or Private network A Person Accesses an Application they are authorised to use Censornet The only way to completely protect your data In a Secure Context

Location, Devise, Public or Private network A Person Censornet The only way to completely protect your data Accesses an Application they are authorised to use In a Secure Context To perform a Permitted function

Location, Devise, Public or Private network A Person With Data they are allowed to use Censornet The only way to completely protect your data Accesses an Application they are authorised to use In a Secure Context To perform a Permitted function

Public Network A Person Or trying to access an Application they are not authorised to use Or to perform a function not allowed from that application or context Or with Data they don’t have permission to use Censornet The only way to completely protect your data In an Unsecure Context

Or with Data they don’t have permission to use Location, Devise, Public or Private network A Person Censornet The only way to completely protect your data Or to perform a function not allowed from that application or context Or trying to access an Application they are not authorised to use In a Secure Context

A Person Censornet The only way to completely protect your data Or with Data they don’t have permission to use To perform a function not allowed from that application or context Accesses an Application they are authorised to use In a Secure Context

Or with Data they don’t have permission to use To perform a function allowed from that application or context Accesses an Application they are authorised to use In a Secure Context A Person Censornet The only way to completely protect your data

A Person Censornet The only way to completely protect your data In an Unsecure Context Or trying to access an Application they are not authorised to use Or to perform a function not allowed from that application or context Or with Data they don’t have permission to use

The clear merits One dashboard covering web, and Cloud Application Control Mobile / BYOD / LAN secured Shared analytics & incident reporting across web, and applications Cloud deployment model + “private cloud”

Product Portfolio Overview Secure Web Gateway Security Hybrid Web Security Cloud Application Control Product Portfolio Unified Security Solution Desktop Monitoring

Features include: Roaming users & BYOD Granular policy setting. No proxy architecture Deployment: hybrid cloud; endpoint agent. virtual machine Features include: Hosted security & filtering. Backup Secur and Emergency Inbox Deployment: cloud service via MX records Features include: Shadow IT discovery Cloud Application Analysis. Forensic Analysis Deployment: Cloud service Security Hybrid Web Security Cloud Application Control Unified Security Solution

Unified Security Service Product Overview

One view of the cloud - , web and applications Easily apply consistent policies Visibility and control of who is doing what on your network Ability to track data as it is moved between s, web applications, social media and file sharing Spot use of unsecure or risky cloud application Security Hybrid Web Security Cloud Application Control Unified Security Solution

Product Portfolio Overview

Web usage, flow and cloud application control all managed from one place

Product Portfolio Overview

Data can be tracked across , web, social media and cloud applications, all in one view. Alerts are produced as File customer_data2015 is exported from Salesforce.com and then downloaded, then sent as an and uploaded to Dropbox

Product Portfolio Overview

Policies can be set up depending on roles, devices and location.

Product Portfolio Overview

It is easy to see Which specific cloud applications are being used Who is using them Which types of applications are most useful Where your data is being stored

Product Portfolio Overview

Track specific actions in cloud applications. Set the risk levels to suit your organisation and create alerts to warn you of risky activity

Product Portfolio Overview

is not only protected from malware, but also archived so that users can access their inbox and continue to send and receive s even if your server is not available.

Product Portfolio Overview

Transparent data analytics across . web and cloud applications Easily apply consistent policies Visibility and control of who is doing what on your network Ability to track data as it is moved between s, web applications, social media and file sharing Spot use of unsecure or risky cloud application

The clear merits One dashboard covering web, and Cloud Application Control Mobile / BYOD / LAN secured Shared analytics & incident reporting across web, and applications Cloud deployment model + “private cloud”

Unified Security Service Architecture

USS The component technology Control Portal Web Security Cloud Application Control Security

Configurable Control Portal

Cloud based, access from anywhere and any device Configurable dashboard, to suit each business and role Policies can be set by person, role, function, location or device One view of web, and cloud applications Configurable Control Portal

Product Portfolio Overview User requests web resource Proxy delivers web resource Proxy requests web resource Proxy receives web resource User requests web resource Protocol Method URL Query String Post Parameters Headers Web Classification App Classification Unique Architecture CensorNet way User accesses web resource directly Traditional Proxy: The whole web request is downloaded twice, once for the cloud proxy to decide if it is safe and once for the end user Only the information required to decide if the web request is safe is sent to the proxy. If the request is allowed the user goes directly to the website.

Product Portfolio Overview User requests web resource Proxy delivers web resource Proxy requests web resource Proxy receives web resource User requests web resource Protocol Method URL Query String Post Parameters Headers Web Classification App Classification Unique Architecture CensorNet way User accesses web resource directly Traditional Proxy: The whole web request is downloaded twice, once for the cloud proxy to decide if it is safe, and once for the end user Only the information required to decide if the web request is safe is sent to the proxy. If the request is allowed the user goes directly to the website. Reduced latency, the users have the same web experience as they would without the security Cloud applications remain location aware for mobile users and don’t take the location of the datacentre Tablets/mobile devises with GPS don’t give false results of identity theft/spoofing

Product Portfolio Overview USS Benefits Emergency Inbox Backup Prevent data loss via Increase mail server resilience Cloud based Web Security Service Integration via API Endpoint, network, BYOD and roaming user protection Shadow IT Discovery Cloud Application Analysis Forensic Risk Analysis Prevent data loss via apps