Presentation is loading. Please wait.

Presentation is loading. Please wait.

Complete Cloud Security

Similar presentations


Presentation on theme: "Complete Cloud Security"— Presentation transcript:

1 Complete Cloud Security
Anyone, anywhere, any app, any device

2 Web Security Evolution
Web-borne malware protection Product development static New vector in threat landscape: Cloud Applications Malware protection is still valid - BUT Understanding activity within cloud applications is imperative! Now we need to classify cloud applications as we did with websites Company Presentation

3 The World has Changed….. Increasingly mobile workforce
Lack of visibility and control Rise of Cloud Applications By 2016, 25% of enterprises will secure access to cloud-based services using a CASB platform, up from less than 1% in 2012, reducing the cost of securing access by 30% - Gartner Company Presentation

4 Organisations are Challenged
Shadow IT Do you know which applications your employees are using? Sanctioned or unsanctioned without visibility businesses are unable to assess the risk and/or take action. Company Presentation

5 Top 5 Business Concerns Security Compliance Shadow IT
“The world has gone mobile but security has not changed” Compliance ”Compliance is not optional. Use cloud application but retain visibility and control” Shadow IT ”Unauthorised or unrestricted use of cloud application can lead to data security and compliance breaches” BYOD ”Users are working in-office or on the move and security has to follow the user regardless of the device used” Productivity ” “Company and personally owned devices can increase productivity but access to corporate data and the network have to be protected at all times” Company Presentation

6 Current Cloud Security Solutions do not meet challenges
Struggle to scale up for BYOD growth Solely focus on protection against web-borne malware and proxies Don’t address the rise of cloud applications Do not integrate secure web gateway with cloud application control Cannot see SSL websites Unable to claim fast & knowledgeable support Company Presentation

7 We are CensorNet Complete cloud security – Anyone, anywhere, any app, any device UK Company 8 years experience CEO – Industry Veteran Backed by Investors Experts in Cloud Security Unparalleled Support Company Presentation

8 Product Portfolio Overview

9 CensorNet Product Portfolio
Secure Web Gateway Hybrid Web Security Features include: Anti-malware & URL reputation . Cloud application discovery . Granular policy setting BYOD ready . Ideal for Enterprise & Education Deployment: on-premise . virtual machine Features include: Roaming users & BYOD . Granular policy setting . No proxy architecture . White-label ready . Ideal for Enterprise & MSPs Deployment: hybrid cloud; endpoint agent . virtual machine Security Desktop Monitoring Features include: Hosted security & filtering . Backup, Secur and Emergency Inbox . White-label ready . Ideal for Enterprises & Education & MSPs Deployment: cloud service via MX records Features include: Record activity as video . Low storage footprint Generic user identification . Privileged user monitoring . Ideal for organisations working with highly sensitive data & Education Deployment: Windows & Linux client/server agent Product Portfolio Overview

10 Hybrid Web Security

11 The Hybrid Web Security platform offers the best of both worlds: the security and control of an on-premise solution combined with the flexibility and mobility of a centralised cloud service DirectBrowse Technology No proxying to our cloud Centralised admin Manage multiple networks and roaming users MSP ready Reseller portal for provisioning and support White-label capability add web security to your brand quickly and easily Security Real-time anti-malware, URL reputation and granular policies Product Portfolio Overview

12 Traditional Proxy CensorNet way Product Portfolio Overview Protocol
User requests web resource Proxy delivers web resource Proxy requests web resource Proxy receives web resource CensorNet way Protocol Method URL Query String Post Parameters Headers Web Classification App Classification User accesses web resource directly User requests web resource Product Portfolio Overview

13 Cloud Link Endpoint Protection
Hybrid Web Security Architecture Cloud Infrastructure Distributor MSP Reseller Customer Mobile Gateway Optional On-premise security Cloud Gateway Mobile Devices LAN Head/Branch Office Cloud Link Endpoint Protection Roaming User/Standalone Device Product Portfolio Overview

14 Hybrid Web Security - Benefits
Provides a way to deliver a cloud based Web Security Service Multi-tenancy Rebranding Integration via API and open standards Endpoint, network, BYOD and roaming user protection Product Portfolio Overview

15 Secure Web Gateway

16 Next generation Secure Web Gateway with built-in Cloud Application Control and the power to extend web access policies to Bring-Your-Own-Device Enterprise class security Real-time anti-malware, URL reputation, Image Scanning and more Cloud Application Discovery Shine the light on Shadow IT BYOD ready Extend web access policies to devices via the Captive Portal On-premise Manage the entire system on your network Simplicity Easy to use, easy to administer Product Portfolio Overview

17 Product Portfolio Overview

18 Product Portfolio Overview

19 Product Portfolio Overview

20 Product Portfolio Overview

21 Secure Web Gateway - Benefits
Shine the light on Shadow IT Safe cloud application adoption Extend web access control to BYOD Malware protection Policy based control Complete visibility Product Portfolio Overview

22 Security

23 CensorNet Security is a cloud-based security and backup service that scans both inbound and outbound for viruses, phishing threats, content violations and spam Cloud based No hardware or software required Security Anti-malware, anti-spam and anti-phishing, content scanning Secur Deliver messages to recipients via a secure web login Backup & Inbox Unlimited backup and emergency inbox MSP ready Reseller portal for provisioning and support White-label capability Add security to your brand quickly and easily Product Portfolio Overview

24 Email Security - Deployment
Product Portfolio Overview

25 Email Security - Benefits
Multi-tenancy Rebranding Emergency Inbox Backup Prevent data loss via Increase mail server resilience Product Portfolio Overview

26 Desktop Monitoring

27 CensorNet Desktop Monitoring is a client-server solution for monitoring, recording and analysing user activity on the desktop, virtual desktop, terminal services and remote desktop sessions Visual audit trail Of all user activity on local, remote or terminal services Identify Generic user logins such as ‘administrator’ Monitor Privileged user activity Search Rapidly against stored video archive using meta data Deploy Easily via wizard to all machines on the network Alert On suspicious activity based on rules Product Portfolio Overview

28 Desktop Monitoring - Deployment
Deployment On-premise server and agent for Windows & Linux Storage FirefoxDB (open source) or SQL Server Management Web-based user interface Video Full colour or greyscale recording Bandwidth Low network bandwidth; 6Kb/sec transfer e.g. 50 agents = 300Kb/sec Storage Optimised storage; 5Mb per hour e.g. 50 agents = 6GB/day maximum Product Portfolio Overview

29 Desktop Monitoring - Benefits
Total visibility of endpoint activity Total visibility of Terminal Services activity Privileged user monitoring Prevent data loss Incident investigatione Product Portfolio Overview

30 Unified Security Service
The Future

31 The future Product portfolio Overview

32 Unified Security Service Vision
The Stack AP I Web filtering Unified Security Service Cloud Application Control Security Desktop Monitoring Single Sign On Partners SIEM “An eco-system of security services” “Partners can cherry-pick the solutions they need” Product Portfolio Overview

33 Product Portfolio Overview
…which leads him directly into the customer’s view of the system. The interface is completely interactive, allowing administrators on all levels and with all kinds of responsibilities to make themselves at home. As you can see the solution doesn’t just show statistics from one solution – although this view if pretty Cloud Application heavy – it shows statistics across all solutions, like Web usage, flow, and Cloud Application usage. This “unification” of data doesn’t only happen on dashboard level. Transparent data analysis across all solutions is the concept of the whole interface, including reporting and logging… (next slide) Product Portfolio Overview

34 Product Portfolio Overview

35 Product Portfolio Overview
If you open another filled-circle entity you can see that this “reseller” has direct customers, but he also created another “reseller” underneath him, which can have other customers and resellers and so on. In fact this hierarchy can be used not only for resellers, but also for larger customers to follow their own internal hierarchy – like “Clear Books” in this example – with multiple offices in different locations. The administrator can now log into any customer or reseller he is responsible for by just right clicking on an entity and click “log in”… (next slide) Product Portfolio Overview

36 Product Portfolio Overview
…where you can follow incidents across all security solutions. As an example you could follow a file from it’s first contact with the system as a URL in an that was sent to a user ( Filtering), who then downloaded the file (Secure Web Gateway) and later shared it on Dropbox (Cloud Application Control). It’s a true “Single pane of glass” view across all solutions. After that just show the next couple of slides on Web rules, Cloud Application reports and . Mention cross-selling opportunity by providing a “menu-style” solution where customers can decide to sign up for certain features and later trial and sign up to others. Product Portfolio Overview

37 Product Portfolio Overview

38 Product Portfolio Overview

39 Product Portfolio Overview

40 USS - Benefits One dashboard Web, E-mail, Endpoint covered
Cloud Application Control Mobile / BYOD / LAN secured Shared analytics & incident reporting Cloud deployment model + “private cloud” Product Portfolio Overview

41 Complete Cloud Security
Anyone, anywhere, any app, any device


Download ppt "Complete Cloud Security"

Similar presentations


Ads by Google