This document discusses the challenges of bringing your own device (BYOD) policies to enterprises and how i7 Networks' Peregrine 7 solution helps address these challenges. Peregrine 7 is an agentless mobile network access control solution that can discover, fingerprint, and assess devices connecting to an enterprise network. It enforces granular security policies without requiring an agent on devices. This allows enterprises to safely support BYOD programs while maintaining network security and compliance.
2. Welcome to “Me” Enterprise
How BYOD has changed the security map and how
“Peregrine 7” helps tackle it?
Copyright i7 Networks, i7nw.com
Manjunath M Gowda
CEO, i7 Networks
Bangalore, India
manju_s7
in/manjunathgowda/
4. • 90%of enterprises will use personal devices in Enterprise by
2014 - Gartner
• 20% Savings: CISCO claimed due to BYOD &
declared: “We don’t pay for it, and our users are
happier.”
• Survey: Enterprises that don't support BYOD
are at competitive disadvantage
Copyright i7 Networks, i7nw.com
5. So what is stopping them?
Copyright i7 Networks, i7nw.com
6. 75% CIOs said Compliance &
Security biggest challenge in allowing
BYOD
Copyright i7 Networks, i7nw.com
8. Copyright i7 Networks, i7nw.com
62% - Loss of a device that has
Sensitive Data – (MDMs solve this)
61% - An infected personal
device connecting to the
Corporate Network
10. 79% business had a mobile incident last year alone – Checkpoint
600%+ growth in mobile malware in last 2 years
20 Mn+ devices jailbroken in just two months (Jan 2013)
18 Mn infected Android devices by end of 2013
71% mobile devices have OS / application vulnerabilities
Copyright i7 Networks, i7nw.com
11. $500K+ cost per such incident
$1.5Mn cost per such settlement
Copyright i7 Networks, i7nw.com
13. • Perimeter security and not for inside-inside or
inside-out threats
• Used to IT-owned devices and not personal
devices (agented)
• Used to take care of outside2inside threats
Copyright i7 Networks, i7nw.com
14. So what tools do exist to
solve it?
Copyright i7 Networks, i7nw.com
15. 15 Copyright i7 Networks, i7nw.com
MDMs, EPP
Airwatch, MobileIron, Zenprise
MAMs
Bitzer, IBM, SAP, Good
MDPs
AT&T toggle, Divide,
VMware
MNAC
i7Networks
Device level
n
e
t
w
o
r
k
Mobile Security Tools Quadrant
Server side
23. Copyright i7 Networks, i7nw.com
• What devices are getting into the corporate
network?
• Who do they belong to?
• Are they infected?
• Are they compromised or malicious?
• How vulnerable are they?
• What are they accessing?
• What apps* are they running?
• Can I control the access?
• Can I get Compliance audit reports?
24. How do you deploy?
Copyright i7 Networks, i7nw.com
25. • 100% agentless and non-intrusive – Zero Touch
• Complete off-line deployment – Zero-Latency
• Just ONE probe* in the network
• Supports: Corporate Wi-Fi/ Public Wi-
Fi/3G/4G/LTE
Deployment
27. - Microsoft AD, RADIUS and LDAP
- Microsoft Exchange
- Maas 360 MDM
- Microsoft System Center*
- IBM Tivoli*
- Cisco/Juniper and Fortinet VPN
- Snort IDS
- CVE database
Integrates with
29. 14different OS types & growing; Add versions and models5
45% enterprises have more than 5 times as many BYOD as they had 2 years ago3
3.5– Average number of devices per Employee
42%- Average churn of devices per year among enterprise employees
< 10% enterprises aware of all mobile devices accessing their network & servers3
27% of devices are ‘approved’ by the company6Copyright i7 Networks, i7nw.com
32. Available as : Appliance / Virtual
Appliance
Available as : Appliance / Virtual
Appliance
33. What is that you do MDM cannot?
Copyright i7 Networks, i7nw.com
34. oCannot do Discovery and fingerprint of
all devices
Authorized
Unauthorized
Unmanaged
Non-mobile devices like e-Readers, Wi-Fi
watches, Gaming devices, Healthcare
devices etc.
Copyright i7 Networks, i7nw.com
35. oMalware detection via signature is only
28%; Cannot catch malicious traffic @
network layer (not even at device layer)
oCannot do Access control based on
device attributes
oCannot enforce different access rules for
different departments/ LoBs
Copyright i7 Networks, i7nw.com
36. oHot-spotting/Mac-spoofing cannot be
detected
oFails where you are not allowed to install a
client on the device due to privacy or
compliance
oNot dynamic (need to stop iOS6.1?)
Copyright i7 Networks, i7nw.com
37. How different are you from a
traditional nac?
Copyright i7 Networks, i7nw.com
38. Support all: Wi-Fi & 3G/4G/LTE
100% Zero Touch (agentless)
Zero Latency (offline) (still we control)
Just ONE probe
Fits into any network infrastructure
Support all: Wi-Fi & 3G/4G/LTE
100% Zero Touch (agentless)
Zero Latency (offline) (still we control)
Just ONE probe
Fits into any network infrastructure
US Patent-pending fingerprinting algorithm
Mac-spoofing/Hot spotting
DVItm
(Device Vulnerability Index)
Detecting apps on the wire (dropbox)
US Patent-pending fingerprinting algorithm
Mac-spoofing/Hot spotting
DVItm
(Device Vulnerability Index)
Detecting apps on the wire (dropbox)
Completely focused on BYOD Security Completely focused on BYOD Security
40. • Recognition of all Apps on the Wire
• Detection of EPP (End Point Protection) tools
• Chaining of P7s
• Integrations into System Center and Tivoli
• Integrations into MDMs
• mNAC in the cloud to detect cloud access
Copyright i7 Networks, i7nw.com
To demo or not to demo! Depending on time, ask. Focus on what you product does and how it does it. Talk about the benefits people will get from the product. Feature---Benefit---Reason. Doing live demos can be fraught with anxiety and too many places to fail. So never do a live demo in the first meeting with an investor. Never! There are three ways to demo your product or service without being on-line. 1-Get your programmers to make everything run locally on your computer without needing an Internet connection at all. 2-Safer:Use SnagIt to capture Web pages that will play back in off-line mode, at least for navigation purposes. 3-BIG Secret: Use Camtasia to record a demo and edit out all of the extra movements and unnecessary screens. Turn off the voice and play back the video of the demo while you do a live voice over guiding your watcher every step of the way. Make the demo under 3 minutes or 2 minutes would be even better.
This one for CA-1
www.poynter.org
This one for CA-1
This one for CA-1
This one for CA-1
Note any gaps so you can engage the investor to help you find the missing person. Why these people will make this business happen. What have they done in the past that makes them appropriate for this new venture? Show Board Members and existing investors to add more credibility to your story.