Complete Cloud Security Anyone, anywhere, any app, any device
“Corporate confidentiality and communications policies have been ripped to shreds by the social networking phenomenon.” FT Report, Oct 2015 “Many enterprises lack a complete understanding of the cloud services they consume and the risks they represent, which makes compliance and protection difficult” Gartner How to Evaluate and Operate a Cloud Access Security Broker | Published: 8 Dec 2015 | Analyst(s): Neil MacDonald, Craig Lawson “40% of enterprises will have from 25% to 49% of their workloads in public clouds in five years. Over the next three years, the majority of enterprise senior executives forecast between 21 to 30% of applications will be SaaS-based.” Forbes/Tech, May 2015
Increasingly mobile workforce Lack of visibility and control Rise of Cloud Applications “By 2016, 25% of enterprises will secure access to cloud-based services using a CASB platform, up from less than 1% in 2012, reducing the cost of securing access by 30%” - Gartner The World has Changed …
The need for evolution and education Hacking 32% of attacks were Aimed at companies with fewer than 250 employees Targeted Attacks From 2012 – 2014 $ Ransomware The British insurance company Lloyd’s estimates that cyber attacks cost businesses as much as $400 billion a year, which includes direct damage plus post-attack disruption to the normal course of business. Forbes, Nov 2015 Hacking is the fastest growing crime type Targeted attacks grew 62% 24,000 victims per day in 2014
Cloud Applications provide flexibility & scalability But do you know which applications your employees are using? And what they are doing? The flexibility, scalability and usability of the plethora of cloud applications, enables employees to become more productive and businesses to grow Do you know which applications your people are using? Where your confidential data is stored? What data is being shared on unsecure applications?
Top 5 Business Concerns ”Unauthorised or unrestricted use of cloud application can lead to data security and compliance breaches” “The world has gone mobile but security has not changed” ”Compliance is not optional. Use cloud application but retain visibility and control” ”Users are working in-office or on the move and security has to follow the user regardless of the device used” “Company and personally owned devices can increase productivity but access to corporate data and the network have to be protected at all times” Shadow IT Security Compliance BYOD Productivity
Current Security Vendors only solve part of the problem … Web Security Security Cloud Application Control
Censornet Provides Complete Cloud Security Follow the person across devices, networks and applications Apply the same policy, permissions and control on web, and cloud applications consistently Track data as it is moved between web applications and shared via , file sharing or social media Spot use of unauthorised or risky cloud applications and prevent sensitive data from being shared Monitor sensitive data from one consul and track security events that involve more than one application or medium Benefit from the scalability and flexibility of cloud application adoption and BYOD without risking security
Cloud Activity Governance Anomaly and Threat Detection and Protection Visibility into Cloud App Usage Enables business to benefit from the scalability and flexibility of the cloud without the risks
Location, Devise, Public or Private network A Person In a Context Accesses an Application To perform a function With Data Censornet The only way to completely protect your data
Location, Devise, Public or Private network Censornet The only way to completely protect your data A Person In a Secure Context
Location, Devise, Public or Private network A Person Accesses an Application they are authorised to use Censornet The only way to completely protect your data In a Secure Context
Location, Devise, Public or Private network A Person Censornet The only way to completely protect your data Accesses an Application they are authorised to use In a Secure Context To perform a Permitted function
Location, Devise, Public or Private network A Person With Data they are allowed to use Censornet The only way to completely protect your data Accesses an Application they are authorised to use In a Secure Context To perform a Permitted function
Public Network A Person Or trying to access an Application they are not authorised to use Or to perform a function not allowed from that application or context Or with Data they don’t have permission to use Censornet The only way to completely protect your data In an Unsecure Context
Or with Data they don’t have permission to use Location, Devise, Public or Private network A Person Censornet The only way to completely protect your data Or to perform a function not allowed from that application or context Or trying to access an Application they are not authorised to use In a Secure Context
A Person Censornet The only way to completely protect your data Or with Data they don’t have permission to use To perform a function not allowed from that application or context Accesses an Application they are authorised to use In a Secure Context
Or with Data they don’t have permission to use To perform a function allowed from that application or context Accesses an Application they are authorised to use In a Secure Context A Person Censornet The only way to completely protect your data
A Person Censornet The only way to completely protect your data In an Unsecure Context Or trying to access an Application they are not authorised to use Or to perform a function not allowed from that application or context Or with Data they don’t have permission to use
The clear merits One dashboard covering web, and Cloud Application Control Mobile / BYOD / LAN secured Shared analytics & incident reporting across web, and applications Cloud deployment model + “private cloud”
Product Portfolio Overview Secure Web Gateway Security Hybrid Web Security Cloud Application Control Product Portfolio Unified Security Solution Desktop Monitoring
Features include: Roaming users & BYOD Granular policy setting. No proxy architecture Deployment: hybrid cloud; endpoint agent. virtual machine Features include: Hosted security & filtering. Backup Secur and Emergency Inbox Deployment: cloud service via MX records Features include: Shadow IT discovery Cloud Application Analysis. Forensic Analysis Deployment: Cloud service Security Hybrid Web Security Cloud Application Control Unified Security Solution
Unified Security Service Product Overview
One view of the cloud - , web and applications Easily apply consistent policies Visibility and control of who is doing what on your network Ability to track data as it is moved between s, web applications, social media and file sharing Spot use of unsecure or risky cloud application Security Hybrid Web Security Cloud Application Control Unified Security Solution
Product Portfolio Overview
Web usage, flow and cloud application control all managed from one place
Product Portfolio Overview
Data can be tracked across , web, social media and cloud applications, all in one view. Alerts are produced as File customer_data2015 is exported from Salesforce.com and then downloaded, then sent as an and uploaded to Dropbox
Product Portfolio Overview
Policies can be set up depending on roles, devices and location.
Product Portfolio Overview
It is easy to see Which specific cloud applications are being used Who is using them Which types of applications are most useful Where your data is being stored
Product Portfolio Overview
Track specific actions in cloud applications. Set the risk levels to suit your organisation and create alerts to warn you of risky activity
Product Portfolio Overview
is not only protected from malware, but also archived so that users can access their inbox and continue to send and receive s even if your server is not available.
Product Portfolio Overview
Transparent data analytics across . web and cloud applications Easily apply consistent policies Visibility and control of who is doing what on your network Ability to track data as it is moved between s, web applications, social media and file sharing Spot use of unsecure or risky cloud application
The clear merits One dashboard covering web, and Cloud Application Control Mobile / BYOD / LAN secured Shared analytics & incident reporting across web, and applications Cloud deployment model + “private cloud”
Unified Security Service Architecture
USS The component technology Control Portal Web Security Cloud Application Control Security
Configurable Control Portal
Cloud based, access from anywhere and any device Configurable dashboard, to suit each business and role Policies can be set by person, role, function, location or device One view of web, and cloud applications Configurable Control Portal
Product Portfolio Overview User requests web resource Proxy delivers web resource Proxy requests web resource Proxy receives web resource User requests web resource Protocol Method URL Query String Post Parameters Headers Web Classification App Classification Unique Architecture CensorNet way User accesses web resource directly Traditional Proxy: The whole web request is downloaded twice, once for the cloud proxy to decide if it is safe and once for the end user Only the information required to decide if the web request is safe is sent to the proxy. If the request is allowed the user goes directly to the website.
Product Portfolio Overview User requests web resource Proxy delivers web resource Proxy requests web resource Proxy receives web resource User requests web resource Protocol Method URL Query String Post Parameters Headers Web Classification App Classification Unique Architecture CensorNet way User accesses web resource directly Traditional Proxy: The whole web request is downloaded twice, once for the cloud proxy to decide if it is safe, and once for the end user Only the information required to decide if the web request is safe is sent to the proxy. If the request is allowed the user goes directly to the website. Reduced latency, the users have the same web experience as they would without the security Cloud applications remain location aware for mobile users and don’t take the location of the datacentre Tablets/mobile devises with GPS don’t give false results of identity theft/spoofing
Product Portfolio Overview USS Benefits Emergency Inbox Backup Prevent data loss via Increase mail server resilience Cloud based Web Security Service Integration via API Endpoint, network, BYOD and roaming user protection Shadow IT Discovery Cloud Application Analysis Forensic Risk Analysis Prevent data loss via apps