Complete Cloud Security Anyone, anywhere, any app, any device www.censornet.com
Web Security Evolution Web-borne malware protection Product development static New vector in threat landscape: Cloud Applications Malware protection is still valid - BUT Understanding activity within cloud applications is imperative! Now we need to classify cloud applications as we did with websites Company Presentation
The World has Changed….. Increasingly mobile workforce Lack of visibility and control Rise of Cloud Applications By 2016, 25% of enterprises will secure access to cloud-based services using a CASB platform, up from less than 1% in 2012, reducing the cost of securing access by 30% - Gartner Company Presentation
Organisations are Challenged Shadow IT Do you know which applications your employees are using? Sanctioned or unsanctioned without visibility businesses are unable to assess the risk and/or take action. Company Presentation
Top 5 Business Concerns Security Compliance Shadow IT “The world has gone mobile but security has not changed” Compliance ”Compliance is not optional. Use cloud application but retain visibility and control” Shadow IT ”Unauthorised or unrestricted use of cloud application can lead to data security and compliance breaches” BYOD ”Users are working in-office or on the move and security has to follow the user regardless of the device used” Productivity ” “Company and personally owned devices can increase productivity but access to corporate data and the network have to be protected at all times” Company Presentation
Current Cloud Security Solutions do not meet challenges Struggle to scale up for BYOD growth Solely focus on protection against web-borne malware and proxies Don’t address the rise of cloud applications Do not integrate secure web gateway with cloud application control Cannot see SSL websites Unable to claim fast & knowledgeable support Company Presentation
We are CensorNet Complete cloud security – Anyone, anywhere, any app, any device UK Company 8 years experience CEO – Industry Veteran Backed by Investors Experts in Cloud Security Unparalleled Support Company Presentation
Product Portfolio Overview www.censornet.com
CensorNet Product Portfolio Secure Web Gateway Hybrid Web Security Features include: Anti-malware & URL reputation . Cloud application discovery . Granular policy setting BYOD ready . Ideal for Enterprise & Education Deployment: on-premise . virtual machine Features include: Roaming users & BYOD . Granular policy setting . No proxy architecture . White-label ready . Ideal for Enterprise & MSPs Deployment: hybrid cloud; endpoint agent . virtual machine Email Security Desktop Monitoring Features include: Hosted email security & filtering . Backup, SecureMail and Emergency Inbox . White-label ready . Ideal for Enterprises & Education & MSPs Deployment: cloud service via MX records Features include: Record activity as video . Low storage footprint Generic user identification . Privileged user monitoring . Ideal for organisations working with highly sensitive data & Education Deployment: Windows & Linux client/server agent Product Portfolio Overview
Hybrid Web Security www.censornet.com
The Hybrid Web Security platform offers the best of both worlds: the security and control of an on-premise solution combined with the flexibility and mobility of a centralised cloud service DirectBrowse Technology No proxying to our cloud Centralised admin Manage multiple networks and roaming users MSP ready Reseller portal for provisioning and support White-label capability add web security to your brand quickly and easily Security Real-time anti-malware, URL reputation and granular policies Product Portfolio Overview
Traditional Proxy CensorNet way Product Portfolio Overview Protocol User requests web resource Proxy delivers web resource Proxy requests web resource Proxy receives web resource CensorNet way Protocol Method URL Query String Post Parameters Headers Web Classification App Classification User accesses web resource directly User requests web resource Product Portfolio Overview
Cloud Link Endpoint Protection Hybrid Web Security Architecture Cloud Infrastructure Distributor MSP Reseller Customer Mobile Gateway Optional On-premise security Cloud Gateway Mobile Devices LAN Head/Branch Office Cloud Link Endpoint Protection Roaming User/Standalone Device Product Portfolio Overview
Hybrid Web Security - Benefits Provides a way to deliver a cloud based Web Security Service Multi-tenancy Rebranding Integration via API and open standards Endpoint, network, BYOD and roaming user protection Product Portfolio Overview
Secure Web Gateway www.censornet.com
Next generation Secure Web Gateway with built-in Cloud Application Control and the power to extend web access policies to Bring-Your-Own-Device Enterprise class security Real-time anti-malware, URL reputation, Image Scanning and more Cloud Application Discovery Shine the light on Shadow IT BYOD ready Extend web access policies to devices via the Captive Portal On-premise Manage the entire system on your network Simplicity Easy to use, easy to administer Product Portfolio Overview
Product Portfolio Overview
Product Portfolio Overview
Product Portfolio Overview
Product Portfolio Overview
Secure Web Gateway - Benefits Shine the light on Shadow IT Safe cloud application adoption Extend web access control to BYOD Malware protection Policy based control Complete visibility Product Portfolio Overview
Email Security www.censornet.com
CensorNet Email Security is a cloud-based email security and backup service that scans both inbound and outbound email for viruses, phishing threats, content violations and spam Cloud based No hardware or software required Security Anti-malware, anti-spam and anti-phishing, content scanning SecureMail Deliver e-mail messages to recipients via a secure web login Backup & Inbox Unlimited backup and emergency inbox MSP ready Reseller portal for provisioning and support White-label capability Add e-mail security to your brand quickly and easily Product Portfolio Overview
Email Security - Deployment Product Portfolio Overview
Email Security - Benefits Multi-tenancy Rebranding Emergency Inbox E-mail Backup Prevent data loss via email Increase mail server resilience Product Portfolio Overview
Desktop Monitoring www.censornet.com
CensorNet Desktop Monitoring is a client-server solution for monitoring, recording and analysing user activity on the desktop, virtual desktop, terminal services and remote desktop sessions Visual audit trail Of all user activity on local, remote or terminal services Identify Generic user logins such as ‘administrator’ Monitor Privileged user activity Search Rapidly against stored video archive using meta data Deploy Easily via wizard to all machines on the network Alert On suspicious activity based on rules Product Portfolio Overview
Desktop Monitoring - Deployment Deployment On-premise server and agent for Windows & Linux Storage FirefoxDB (open source) or SQL Server Management Web-based user interface Video Full colour or greyscale recording Bandwidth Low network bandwidth; 6Kb/sec transfer e.g. 50 agents = 300Kb/sec Storage Optimised storage; 5Mb per hour e.g. 50 agents = 6GB/day maximum Product Portfolio Overview
Desktop Monitoring - Benefits Total visibility of endpoint activity Total visibility of Terminal Services activity Privileged user monitoring Prevent data loss Incident investigatione Product Portfolio Overview
Unified Security Service The Future www.censornet.com
The future Product portfolio Overview
Unified Security Service Vision The Stack AP I Web filtering Unified Security Service Cloud Application Control E-mail Security Desktop Monitoring Single Sign On Partners SIEM “An eco-system of security services” “Partners can cherry-pick the solutions they need” Product Portfolio Overview
Product Portfolio Overview …which leads him directly into the customer’s view of the system. The interface is completely interactive, allowing administrators on all levels and with all kinds of responsibilities to make themselves at home. As you can see the solution doesn’t just show statistics from one solution – although this view if pretty Cloud Application heavy – it shows statistics across all solutions, like Web usage, email flow, and Cloud Application usage. This “unification” of data doesn’t only happen on dashboard level. Transparent data analysis across all solutions is the concept of the whole interface, including reporting and logging… (next slide) Product Portfolio Overview
Product Portfolio Overview
Product Portfolio Overview If you open another filled-circle entity you can see that this “reseller” has direct customers, but he also created another “reseller” underneath him, which can have other customers and resellers and so on. In fact this hierarchy can be used not only for resellers, but also for larger customers to follow their own internal hierarchy – like “Clear Books” in this example – with multiple offices in different locations. The administrator can now log into any customer or reseller he is responsible for by just right clicking on an entity and click “log in”… (next slide) Product Portfolio Overview
Product Portfolio Overview …where you can follow incidents across all security solutions. As an example you could follow a file from it’s first contact with the system as a URL in an email that was sent to a user (Email Filtering), who then downloaded the file (Secure Web Gateway) and later shared it on Dropbox (Cloud Application Control). It’s a true “Single pane of glass” view across all solutions. After that just show the next couple of slides on Web rules, Cloud Application reports and email. Mention cross-selling opportunity by providing a “menu-style” solution where customers can decide to sign up for certain features and later trial and sign up to others. Product Portfolio Overview
Product Portfolio Overview
Product Portfolio Overview
Product Portfolio Overview
USS - Benefits One dashboard Web, E-mail, Endpoint covered Cloud Application Control Mobile / BYOD / LAN secured Shared analytics & incident reporting Cloud deployment model + “private cloud” Product Portfolio Overview
Complete Cloud Security Anyone, anywhere, any app, any device www.censornet.com