Complete Cloud Security

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Network Systems Sales LLC
1 Effective, secure and reliable hosted security and continuity solution.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Vodacom Hosted Exchange. What is Hosted Exchange? A Business-Class Messaging solution and collaboration service designed to help your business communicate.
Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.
Unified Logs and Reporting for Hybrid Centralized Management
MyCloudIT Removes the Complexity of Moving Cloud Customers’ Entire IT Infrastructures to Microsoft Azure – Including the Desktop MICROSOFT AZURE ISV: MYCLOUDIT.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Company Presentation Redefining Security. Company | Market Challenges Market Challenges The workforce is mobile Cloud Application adoption is growing.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Dell Connected Security Solutions Simplify & unify.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
With the Help of the Microsoft Azure Platform, Awingu’s Web-Based Workspace Aggregator Enables Concrete and Easy Mobility Scenarios MICROSOFT AZURE ISV.
Webroot Web Security SaaS A Better Approach to Web Security
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Jim Harrison Program Manager, Forefront TMG Microsoft Corporation SESSION CODE: SIA325.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
CensorNet Partner Program
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Corent’s SurPaaS Transforms Your Software into Scalable SaaS on Windows Azure – in Days! COMPANY PROFILE: CORENT TECHNOLOGY INC. Corent’s SurPaaS is a.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
BUSINESS USER MONITORING OBSERVEIT 5.8. Firewall IDS IAM SIEM Business Users IT Users USERS ARE GATEWAYS OF RISK Contractors Systems AppsData.
Microsoft and Symantec
CloudWay.ro Gives Clients Fast Invoicing, Stock Management, and Resource Planning via Microsoft Azure and Azure SQL Database MICROSOFT AZURE ISV PROFILE:
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
Data-Centric Security and User Access Controls for Hadoop on Microsoft Azure MICROSOFT AZURE APP BUILDER PROFILE: BLUETALON BlueTalon provides data-centric.
Saasabi’s Analytical Processing Engine in the Cloud Makes Business Intelligence Affordable for Everyone COMPANY PROFILE: Saasabi Saasabi is a BizSpark.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
Secure Services Shared Hosted MS Exchange 2010.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
KeepItSafe Solution Suite Securely control and manage all of your data backups with ease, from a single location. KeepItSafe Online Backup KeepItSafe.
Barracuda Essentials for Office 365 Barracuda Essentials combines three proven cloud-based solutions enhance Office 365 deployments, making it easy to.
Moving Small Business Server into the Future. STANDARD Workload Optimized DATACENTER Virtualization Optimized Virtualization SKUs ESSENTIALS Small Business,
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Complete Cloud Security Anyone, anywhere, any app, any device.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Blue Coat Cloud Continuum
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
OFFICE 365 APP BUILDER PROFILE: Druva
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Deployment Planning Services
Hybrid Cloud Web Filtering Platform
Barracuda Web Security Flex
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Hybrid Management and Security
Company Overview & Strategy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
(With Hybrid Network Support)
Microsoft Data Insights Summit
Presentation transcript:

Complete Cloud Security Anyone, anywhere, any app, any device www.censornet.com

Web Security Evolution Web-borne malware protection Product development static New vector in threat landscape: Cloud Applications Malware protection is still valid - BUT Understanding activity within cloud applications is imperative! Now we need to classify cloud applications as we did with websites Company Presentation

The World has Changed….. Increasingly mobile workforce Lack of visibility and control Rise of Cloud Applications By 2016, 25% of enterprises will secure access to cloud-based services using a CASB platform, up from less than 1% in 2012, reducing the cost of securing access by 30% - Gartner Company Presentation

Organisations are Challenged Shadow IT Do you know which applications your employees are using? Sanctioned or unsanctioned without visibility businesses are unable to assess the risk and/or take action. Company Presentation

Top 5 Business Concerns Security Compliance Shadow IT “The world has gone mobile but security has not changed” Compliance ”Compliance is not optional. Use cloud application but retain visibility and control” Shadow IT ”Unauthorised or unrestricted use of cloud application can lead to data security and compliance breaches” BYOD ”Users are working in-office or on the move and security has to follow the user regardless of the device used” Productivity ” “Company and personally owned devices can increase productivity but access to corporate data and the network have to be protected at all times” Company Presentation

Current Cloud Security Solutions do not meet challenges Struggle to scale up for BYOD growth Solely focus on protection against web-borne malware and proxies Don’t address the rise of cloud applications Do not integrate secure web gateway with cloud application control Cannot see SSL websites Unable to claim fast & knowledgeable support Company Presentation

We are CensorNet Complete cloud security – Anyone, anywhere, any app, any device UK Company 8 years experience CEO – Industry Veteran Backed by Investors Experts in Cloud Security Unparalleled Support Company Presentation

Product Portfolio Overview www.censornet.com

CensorNet Product Portfolio Secure Web Gateway Hybrid Web Security Features include: Anti-malware & URL reputation . Cloud application discovery . Granular policy setting BYOD ready . Ideal for Enterprise & Education Deployment: on-premise . virtual machine Features include: Roaming users & BYOD . Granular policy setting . No proxy architecture . White-label ready . Ideal for Enterprise & MSPs Deployment: hybrid cloud; endpoint agent . virtual machine Email Security Desktop Monitoring Features include: Hosted email security & filtering . Backup, SecureMail and Emergency Inbox . White-label ready . Ideal for Enterprises & Education & MSPs Deployment: cloud service via MX records Features include: Record activity as video . Low storage footprint Generic user identification . Privileged user monitoring . Ideal for organisations working with highly sensitive data & Education Deployment: Windows & Linux client/server agent Product Portfolio Overview

Hybrid Web Security www.censornet.com

The Hybrid Web Security platform offers the best of both worlds: the security and control of an on-premise solution combined with the flexibility and mobility of a centralised cloud service DirectBrowse Technology No proxying to our cloud Centralised admin Manage multiple networks and roaming users MSP ready Reseller portal for provisioning and support White-label capability add web security to your brand quickly and easily Security Real-time anti-malware, URL reputation and granular policies Product Portfolio Overview

Traditional Proxy CensorNet way Product Portfolio Overview Protocol User requests web resource Proxy delivers web resource Proxy requests web resource Proxy receives web resource CensorNet way Protocol Method URL Query String Post Parameters Headers Web Classification App Classification User accesses web resource directly User requests web resource Product Portfolio Overview

Cloud Link Endpoint Protection Hybrid Web Security Architecture Cloud Infrastructure Distributor MSP Reseller Customer Mobile Gateway Optional On-premise security Cloud Gateway Mobile Devices LAN Head/Branch Office Cloud Link Endpoint Protection Roaming User/Standalone Device Product Portfolio Overview

Hybrid Web Security - Benefits Provides a way to deliver a cloud based Web Security Service Multi-tenancy Rebranding Integration via API and open standards Endpoint, network, BYOD and roaming user protection Product Portfolio Overview

Secure Web Gateway www.censornet.com

Next generation Secure Web Gateway with built-in Cloud Application Control and the power to extend web access policies to Bring-Your-Own-Device Enterprise class security Real-time anti-malware, URL reputation, Image Scanning and more Cloud Application Discovery Shine the light on Shadow IT BYOD ready Extend web access policies to devices via the Captive Portal On-premise Manage the entire system on your network Simplicity Easy to use, easy to administer Product Portfolio Overview

Product Portfolio Overview

Product Portfolio Overview

Product Portfolio Overview

Product Portfolio Overview

Secure Web Gateway - Benefits Shine the light on Shadow IT Safe cloud application adoption Extend web access control to BYOD Malware protection Policy based control Complete visibility Product Portfolio Overview

Email Security www.censornet.com

CensorNet Email Security is a cloud-based email security and backup service that scans both inbound and outbound email for viruses, phishing threats, content violations and spam Cloud based No hardware or software required Security Anti-malware, anti-spam and anti-phishing, content scanning SecureMail Deliver e-mail messages to recipients via a secure web login Backup & Inbox Unlimited backup and emergency inbox MSP ready Reseller portal for provisioning and support White-label capability Add e-mail security to your brand quickly and easily Product Portfolio Overview

Email Security - Deployment Product Portfolio Overview

Email Security - Benefits Multi-tenancy Rebranding Emergency Inbox E-mail Backup Prevent data loss via email Increase mail server resilience Product Portfolio Overview

Desktop Monitoring www.censornet.com

CensorNet Desktop Monitoring is a client-server solution for monitoring, recording and analysing user activity on the desktop, virtual desktop, terminal services and remote desktop sessions Visual audit trail Of all user activity on local, remote or terminal services Identify Generic user logins such as ‘administrator’ Monitor Privileged user activity Search Rapidly against stored video archive using meta data Deploy Easily via wizard to all machines on the network Alert On suspicious activity based on rules Product Portfolio Overview

Desktop Monitoring - Deployment Deployment On-premise server and agent for Windows & Linux Storage FirefoxDB (open source) or SQL Server Management Web-based user interface Video Full colour or greyscale recording Bandwidth Low network bandwidth; 6Kb/sec transfer e.g. 50 agents = 300Kb/sec Storage Optimised storage; 5Mb per hour e.g. 50 agents = 6GB/day maximum Product Portfolio Overview

Desktop Monitoring - Benefits Total visibility of endpoint activity Total visibility of Terminal Services activity Privileged user monitoring Prevent data loss Incident investigatione Product Portfolio Overview

Unified Security Service The Future www.censornet.com

The future Product portfolio Overview

Unified Security Service Vision The Stack AP I Web filtering Unified Security Service Cloud Application Control E-mail Security Desktop Monitoring Single Sign On Partners SIEM “An eco-system of security services” “Partners can cherry-pick the solutions they need” Product Portfolio Overview

Product Portfolio Overview …which leads him directly into the customer’s view of the system. The interface is completely interactive, allowing administrators on all levels and with all kinds of responsibilities to make themselves at home. As you can see the solution doesn’t just show statistics from one solution – although this view if pretty Cloud Application heavy – it shows statistics across all solutions, like Web usage, email flow, and Cloud Application usage. This “unification” of data doesn’t only happen on dashboard level. Transparent data analysis across all solutions is the concept of the whole interface, including reporting and logging… (next slide) Product Portfolio Overview

Product Portfolio Overview

Product Portfolio Overview If you open another filled-circle entity you can see that this “reseller” has direct customers, but he also created another “reseller” underneath him, which can have other customers and resellers and so on. In fact this hierarchy can be used not only for resellers, but also for larger customers to follow their own internal hierarchy – like “Clear Books” in this example – with multiple offices in different locations. The administrator can now log into any customer or reseller he is responsible for by just right clicking on an entity and click “log in”… (next slide) Product Portfolio Overview

Product Portfolio Overview …where you can follow incidents across all security solutions. As an example you could follow a file from it’s first contact with the system as a URL in an email that was sent to a user (Email Filtering), who then downloaded the file (Secure Web Gateway) and later shared it on Dropbox (Cloud Application Control). It’s a true “Single pane of glass” view across all solutions. After that just show the next couple of slides on Web rules, Cloud Application reports and email. Mention cross-selling opportunity by providing a “menu-style” solution where customers can decide to sign up for certain features and later trial and sign up to others. Product Portfolio Overview

Product Portfolio Overview

Product Portfolio Overview

Product Portfolio Overview

USS - Benefits One dashboard Web, E-mail, Endpoint covered Cloud Application Control Mobile / BYOD / LAN secured Shared analytics & incident reporting Cloud deployment model + “private cloud” Product Portfolio Overview

Complete Cloud Security Anyone, anywhere, any app, any device www.censornet.com