SlideShare a Scribd company logo
1 of 43
Copyright i7 Networks, i7nw.com
Welcome to “Me” Enterprise
How BYOD has changed the security map and how
“Peregrine 7” helps tackle it?
Copyright i7 Networks, i7nw.com
Manjunath M Gowda
CEO, i7 Networks
Bangalore, India
manju_s7
in/manjunathgowda/
WHY BYOD matters?
Copyright i7 Networks, i7nw.com
• 90%of enterprises will use personal devices in Enterprise by
2014 - Gartner
• 20% Savings: CISCO claimed due to BYOD &
declared: “We don’t pay for it, and our users are
happier.”
• Survey: Enterprises that don't support BYOD
are at competitive disadvantage
Copyright i7 Networks, i7nw.com
So what is stopping them?
Copyright i7 Networks, i7nw.com
75% CIOs said Compliance &
Security biggest challenge in allowing
BYOD
Copyright i7 Networks, i7nw.com
DARK READING – July 2013
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
62% - Loss of a device that has
Sensitive Data – (MDMs solve this)
61% - An infected personal
device connecting to the
Corporate Network
Business overview
Copyright i7 Networks, i7nw.com
79% business had a mobile incident last year alone – Checkpoint
600%+ growth in mobile malware in last 2 years
20 Mn+ devices jailbroken in just two months (Jan 2013)
18 Mn infected Android devices by end of 2013
71% mobile devices have OS / application vulnerabilities
Copyright i7 Networks, i7nw.com
$500K+ cost per such incident
$1.5Mn cost per such settlement
Copyright i7 Networks, i7nw.com
Why traditional tools
can’t help here?
Copyright i7 Networks, i7nw.com
• Perimeter security and not for inside-inside or
inside-out threats
• Used to IT-owned devices and not personal
devices (agented)
• Used to take care of outside2inside threats
Copyright i7 Networks, i7nw.com
So what tools do exist to
solve it?
Copyright i7 Networks, i7nw.com
15 Copyright i7 Networks, i7nw.com
MDMs, EPP
Airwatch, MobileIron, Zenprise
MAMs
Bitzer, IBM, SAP, Good
MDPs
AT&T toggle, Divide,
VMware
MNAC
i7Networks
Device level
n
e
t
w
o
r
k
Mobile Security Tools Quadrant
Server side
Our value proposition
Copyright i7 Networks, i7nw.com
“We protect your network
from malicious/infected
BYODs”
Copyright i7 Networks, i7nw.com
“We Protect the Enterprise Network” by
-Detect & Fingerprint1
all personal devices
-Prevent the malicious devices from connecting
-100% Agentless (Zero-touch)
-Zero-Latency Deployment
-Provide detailed Compliance Reports
“To Know & To Protect”
1 Secure detection & fingerprinting (US patent pending)
Copyright i7 Networks, i7nw.com
• Name
• Screen caps
• Demo
PeregrineGuardTM
i7 Networks; i7 Confidential
Not just phones,
we support all wireless devices.
Continuous
Monitoring
Complete VisibilityComplete Visibility
Endpoint AuthenticationEndpoint Authentication
Vulnerability and
malicious assessment
Vulnerability and
malicious assessment
Granular policy
enforcement
Granular policy
enforcement
Compliance ReportingCompliance Reporting
Entry Verification –
Corporate Wi-Fi or
VPN?
Entry Verification –
Corporate Wi-Fi or
VPN?
Allow
Deny
Compromised /Jailbroken/
Unauthorized/Unmanaged
check
Compromised /Jailbroken/
Unauthorized/Unmanaged
check
Deny
Deny
Personal
Devices
the questions we answer
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
• What devices are getting into the corporate
network?
• Who do they belong to?
• Are they infected?
• Are they compromised or malicious?
• How vulnerable are they?
• What are they accessing?
• What apps* are they running?
• Can I control the access?
• Can I get Compliance audit reports?
How do you deploy?
Copyright i7 Networks, i7nw.com
• 100% agentless and non-intrusive – Zero Touch
• Complete off-line deployment – Zero-Latency
• Just ONE probe* in the network
• Supports: Corporate Wi-Fi/ Public Wi-
Fi/3G/4G/LTE
Deployment
i7 Networks; i7 Confidential
- Microsoft AD, RADIUS and LDAP
- Microsoft Exchange
- Maas 360 MDM
- Microsoft System Center*
- IBM Tivoli*
- Cisco/Juniper and Fortinet VPN
- Snort IDS
- CVE database
Integrates with
Why “Agentless” is Sweet? 
Copyright i7 Networks, i7nw.com
14different OS types & growing; Add versions and models5
45% enterprises have more than 5 times as many BYOD as they had 2 years ago3
3.5– Average number of devices per Employee
42%- Average churn of devices per year among enterprise employees
< 10% enterprises aware of all mobile devices accessing their network & servers3
27% of devices are ‘approved’ by the company6Copyright i7 Networks, i7nw.com
So what’s unique?
Copyright i7 Networks, i7nw.com
4A (Attributes)
Discovery & Fingerprinting
Health Check
Discover Apps on the wire*,
Policy Enforcement
4A (Attributes)
Discovery & Fingerprinting
Health Check
Discover Apps on the wire*,
Policy Enforcement
4D (Deployments)
100% Agentless (Zero-touch),
ZERO-Latency
SINGLE Probe,
Wi-Fi/3G/4G/LTE
4D (Deployments)
100% Agentless (Zero-touch),
ZERO-Latency
SINGLE Probe,
Wi-Fi/3G/4G/LTE
4T (Threat-Protections)
Malicious & Intrusion Prevention
Zero-day Attack Prevention*,
Vulnerability Check
Check of anti-malware s/w
4T (Threat-Protections)
Malicious & Intrusion Prevention
Zero-day Attack Prevention*,
Vulnerability Check
Check of anti-malware s/w
4K (Keywords)
100% Agentless
Patent-Pending Algorithms
Detailed Fingerprinting
Zero-Latency
4K (Keywords)
100% Agentless
Patent-Pending Algorithms
Detailed Fingerprinting
Zero-Latency
Available as : Appliance / Virtual
Appliance
Available as : Appliance / Virtual
Appliance
What is that you do MDM cannot?
Copyright i7 Networks, i7nw.com
oCannot do Discovery and fingerprint of
all devices
 Authorized
 Unauthorized
 Unmanaged
 Non-mobile devices like e-Readers, Wi-Fi
watches, Gaming devices, Healthcare
devices etc.
Copyright i7 Networks, i7nw.com
oMalware detection via signature is only
28%; Cannot catch malicious traffic @
network layer (not even at device layer)
oCannot do Access control based on
device attributes
oCannot enforce different access rules for
different departments/ LoBs
Copyright i7 Networks, i7nw.com
oHot-spotting/Mac-spoofing cannot be
detected
oFails where you are not allowed to install a
client on the device due to privacy or
compliance
oNot dynamic (need to stop iOS6.1?)
Copyright i7 Networks, i7nw.com
How different are you from a
traditional nac?
Copyright i7 Networks, i7nw.com
 Support all: Wi-Fi & 3G/4G/LTE
 100% Zero Touch (agentless)
 Zero Latency (offline) (still we control)
 Just ONE probe
 Fits into any network infrastructure
 Support all: Wi-Fi & 3G/4G/LTE
 100% Zero Touch (agentless)
 Zero Latency (offline) (still we control)
 Just ONE probe
 Fits into any network infrastructure
 US Patent-pending fingerprinting algorithm
 Mac-spoofing/Hot spotting
 DVItm
(Device Vulnerability Index)
 Detecting apps on the wire (dropbox)
 US Patent-pending fingerprinting algorithm
 Mac-spoofing/Hot spotting
 DVItm
(Device Vulnerability Index)
 Detecting apps on the wire (dropbox)
 Completely focused on BYOD Security Completely focused on BYOD Security
Product Road Map?
Copyright i7 Networks, i7nw.com
• Recognition of all Apps on the Wire
• Detection of EPP (End Point Protection) tools
• Chaining of P7s
• Integrations into System Center and Tivoli
• Integrations into MDMs
• mNAC in the cloud to detect cloud access
Copyright i7 Networks, i7nw.com
The TEAM
Copyright i7 Networks, i7nw.com
Jeff
Hunter
Evangelist
Peter
Gilson
CTO
First
Last
CFO
Jack
Franklin
CMO
Heather
Adler
CEO
Investors & Advisors
1st
venture: $8.4M by Bluecoat (2010)
Team together for second time
Started June 12’
Product start Jan 13’
Questions?
Copyright i7 Networks, i7nw.com
manju.m@i7nw.com
manju_s7

More Related Content

What's hot

The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereForescout Technologies Inc
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseAirTight Networks
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?Zscaler
 
Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Xylos
 
R1 - Slides
R1 - SlidesR1 - Slides
R1 - SlidesezSec
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013AirTight Networks
 
Secure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureSecure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureZscaler
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016David Glover
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTWSO2
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityOnward Security
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything Cisco Canada
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTIoT613
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網Amazon Web Services
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013AirTight Networks, Inc.
 
APAC Partner Update: SolarWinds Network Complexity
APAC Partner Update:  SolarWinds Network ComplexityAPAC Partner Update:  SolarWinds Network Complexity
APAC Partner Update: SolarWinds Network ComplexitySolarWinds
 
Ivanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti
 

What's hot (20)

The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...
 
R1 - Slides
R1 - SlidesR1 - Slides
R1 - Slides
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
Secure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureSecure access to applications on Microsoft Azure
Secure access to applications on Microsoft Azure
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013
 
APAC Partner Update: SolarWinds Network Complexity
APAC Partner Update:  SolarWinds Network ComplexityAPAC Partner Update:  SolarWinds Network Complexity
APAC Partner Update: SolarWinds Network Complexity
 
Ivanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti neurons - lunch and learn
Ivanti neurons - lunch and learn
 

Viewers also liked

Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...ProductNation/iSPIRT
 
iSPIRT: M&A activity report may 2013
iSPIRT: M&A activity report may 2013iSPIRT: M&A activity report may 2013
iSPIRT: M&A activity report may 2013ProductNation/iSPIRT
 
Building Billion Dollar Product Companies from India - Management report by J...
Building Billion Dollar Product Companies from India - Management report by J...Building Billion Dollar Product Companies from India - Management report by J...
Building Billion Dollar Product Companies from India - Management report by J...ProductNation/iSPIRT
 
#PNSummit bootcamp for product leaders what's in it for you
#PNSummit bootcamp for product leaders   what's in it for you#PNSummit bootcamp for product leaders   what's in it for you
#PNSummit bootcamp for product leaders what's in it for youProductNation/iSPIRT
 
#PNSummit - Two Day Gathering of Practicing Product Professionals
#PNSummit - Two Day Gathering of Practicing Product Professionals#PNSummit - Two Day Gathering of Practicing Product Professionals
#PNSummit - Two Day Gathering of Practicing Product ProfessionalsProductNation/iSPIRT
 
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksPeregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksProductNation/iSPIRT
 
Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...
Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...
Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...ProductNation/iSPIRT
 
A product exists to solve a problem - Presentation by Harinder from Paytm #PNM
A product exists to solve a problem - Presentation by Harinder from Paytm #PNMA product exists to solve a problem - Presentation by Harinder from Paytm #PNM
A product exists to solve a problem - Presentation by Harinder from Paytm #PNMProductNation/iSPIRT
 
How #PNCamp went through its own Customer Discovery process
How #PNCamp went through its own Customer Discovery processHow #PNCamp went through its own Customer Discovery process
How #PNCamp went through its own Customer Discovery processProductNation/iSPIRT
 
#PNSummit bootcamp for product leaders - What's in it for you?
#PNSummit bootcamp for product leaders - What's in it for you?#PNSummit bootcamp for product leaders - What's in it for you?
#PNSummit bootcamp for product leaders - What's in it for you?ProductNation/iSPIRT
 
NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...ProductNation/iSPIRT
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...ProductNation/iSPIRT
 
FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...
FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...
FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...ProductNation/iSPIRT
 
SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...ProductNation/iSPIRT
 
Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...
Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...
Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...ProductNation/iSPIRT
 
Fedena - Student Information System by Foradian Technologies
Fedena - Student Information System by Foradian TechnologiesFedena - Student Information System by Foradian Technologies
Fedena - Student Information System by Foradian TechnologiesProductNation/iSPIRT
 
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...ProductNation/iSPIRT
 
NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...
NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...
NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...ProductNation/iSPIRT
 
InMobi Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
InMobi Presentation for IT Minister @iSPIRT Event -  Conclave for India as Pr...InMobi Presentation for IT Minister @iSPIRT Event -  Conclave for India as Pr...
InMobi Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...ProductNation/iSPIRT
 

Viewers also liked (20)

Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
 
iSPIRT: M&A activity report may 2013
iSPIRT: M&A activity report may 2013iSPIRT: M&A activity report may 2013
iSPIRT: M&A activity report may 2013
 
Building Billion Dollar Product Companies from India - Management report by J...
Building Billion Dollar Product Companies from India - Management report by J...Building Billion Dollar Product Companies from India - Management report by J...
Building Billion Dollar Product Companies from India - Management report by J...
 
#PNSummit bootcamp for product leaders what's in it for you
#PNSummit bootcamp for product leaders   what's in it for you#PNSummit bootcamp for product leaders   what's in it for you
#PNSummit bootcamp for product leaders what's in it for you
 
#PNSummit - Two Day Gathering of Practicing Product Professionals
#PNSummit - Two Day Gathering of Practicing Product Professionals#PNSummit - Two Day Gathering of Practicing Product Professionals
#PNSummit - Two Day Gathering of Practicing Product Professionals
 
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksPeregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
 
Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...
Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...
Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...
 
A product exists to solve a problem - Presentation by Harinder from Paytm #PNM
A product exists to solve a problem - Presentation by Harinder from Paytm #PNMA product exists to solve a problem - Presentation by Harinder from Paytm #PNM
A product exists to solve a problem - Presentation by Harinder from Paytm #PNM
 
How #PNCamp went through its own Customer Discovery process
How #PNCamp went through its own Customer Discovery processHow #PNCamp went through its own Customer Discovery process
How #PNCamp went through its own Customer Discovery process
 
#PNSummit bootcamp for product leaders - What's in it for you?
#PNSummit bootcamp for product leaders - What's in it for you?#PNSummit bootcamp for product leaders - What's in it for you?
#PNSummit bootcamp for product leaders - What's in it for you?
 
iSPIRT Volunteer Model
iSPIRT Volunteer Model iSPIRT Volunteer Model
iSPIRT Volunteer Model
 
NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
 
FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...
FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...
FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...
 
SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
 
Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...
Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...
Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...
 
Fedena - Student Information System by Foradian Technologies
Fedena - Student Information System by Foradian TechnologiesFedena - Student Information System by Foradian Technologies
Fedena - Student Information System by Foradian Technologies
 
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
 
NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...
NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...
NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...
 
InMobi Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
InMobi Presentation for IT Minister @iSPIRT Event -  Conclave for India as Pr...InMobi Presentation for IT Minister @iSPIRT Event -  Conclave for India as Pr...
InMobi Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
 

Similar to BYOD Security Solution Protects Networks from Infected Personal Devices

Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Amazon Web Services
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsAdrian Sanabria
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Zoe Gilbert
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT PatternsWSO2
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server zOSCommserver
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns John Mathon
 
Re-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxRe-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxtmbainjr131
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company PresentationChaitanyaS
 

Similar to BYOD Security Solution Protects Networks from Infected Personal Devices (20)

Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Re-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxRe-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptx
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 

More from ProductNation/iSPIRT

PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...
PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...
PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...ProductNation/iSPIRT
 
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...ProductNation/iSPIRT
 
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...ProductNation/iSPIRT
 
A Concept of Operations for UAS in India
A Concept of Operations for UAS in IndiaA Concept of Operations for UAS in India
A Concept of Operations for UAS in IndiaProductNation/iSPIRT
 
iSPIRT’s Official Response to the Draft Drone Rules 2021
iSPIRT’s Official Response to the Draft Drone Rules 2021iSPIRT’s Official Response to the Draft Drone Rules 2021
iSPIRT’s Official Response to the Draft Drone Rules 2021ProductNation/iSPIRT
 
iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...
iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...
iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...ProductNation/iSPIRT
 
Full Spectrum Thinking by Bob Johansen
Full Spectrum Thinking by Bob JohansenFull Spectrum Thinking by Bob Johansen
Full Spectrum Thinking by Bob JohansenProductNation/iSPIRT
 
Open House on iSPIRT Balloon Volunteering
Open House on iSPIRT Balloon VolunteeringOpen House on iSPIRT Balloon Volunteering
Open House on iSPIRT Balloon VolunteeringProductNation/iSPIRT
 
Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5ProductNation/iSPIRT
 
Nandan Nilekani: Identity, Payments, Data empowerment 2019
Nandan Nilekani: Identity, Payments, Data empowerment 2019Nandan Nilekani: Identity, Payments, Data empowerment 2019
Nandan Nilekani: Identity, Payments, Data empowerment 2019ProductNation/iSPIRT
 
Towards A Holistic Healthcare Ecosystem
Towards A Holistic Healthcare EcosystemTowards A Holistic Healthcare Ecosystem
Towards A Holistic Healthcare EcosystemProductNation/iSPIRT
 
Angel Tax Presentation To DIPP [Section 56(2)(viib)]
Angel Tax Presentation To DIPP [Section 56(2)(viib)] Angel Tax Presentation To DIPP [Section 56(2)(viib)]
Angel Tax Presentation To DIPP [Section 56(2)(viib)] ProductNation/iSPIRT
 
White paper on the analysis of High share premium amongst Startups in India
White paper on the analysis of High share premium amongst Startups in IndiaWhite paper on the analysis of High share premium amongst Startups in India
White paper on the analysis of High share premium amongst Startups in IndiaProductNation/iSPIRT
 
[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68
[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68
[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68ProductNation/iSPIRT
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)ProductNation/iSPIRT
 
India SaaS Survey Results 2017 in partnership with DCS Advisory
India SaaS Survey Results 2017 in partnership with DCS Advisory India SaaS Survey Results 2017 in partnership with DCS Advisory
India SaaS Survey Results 2017 in partnership with DCS Advisory ProductNation/iSPIRT
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaProductNation/iSPIRT
 
BBPS Workshop in partnership with NPCI | Product, Business & Technology Overview
BBPS Workshop in partnership with NPCI | Product, Business & Technology OverviewBBPS Workshop in partnership with NPCI | Product, Business & Technology Overview
BBPS Workshop in partnership with NPCI | Product, Business & Technology OverviewProductNation/iSPIRT
 
India's Platforms Leapfrog by Dr Pramod Varma
India's Platforms Leapfrog by Dr Pramod VarmaIndia's Platforms Leapfrog by Dr Pramod Varma
India's Platforms Leapfrog by Dr Pramod VarmaProductNation/iSPIRT
 

More from ProductNation/iSPIRT (20)

PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...
PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...
PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...
 
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
 
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
 
A Concept of Operations for UAS in India
A Concept of Operations for UAS in IndiaA Concept of Operations for UAS in India
A Concept of Operations for UAS in India
 
iSPIRT’s Official Response to the Draft Drone Rules 2021
iSPIRT’s Official Response to the Draft Drone Rules 2021iSPIRT’s Official Response to the Draft Drone Rules 2021
iSPIRT’s Official Response to the Draft Drone Rules 2021
 
iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...
iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...
iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...
 
Full Spectrum Thinking by Bob Johansen
Full Spectrum Thinking by Bob JohansenFull Spectrum Thinking by Bob Johansen
Full Spectrum Thinking by Bob Johansen
 
Open House on iSPIRT Balloon Volunteering
Open House on iSPIRT Balloon VolunteeringOpen House on iSPIRT Balloon Volunteering
Open House on iSPIRT Balloon Volunteering
 
Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5
 
Nandan Nilekani: Identity, Payments, Data empowerment 2019
Nandan Nilekani: Identity, Payments, Data empowerment 2019Nandan Nilekani: Identity, Payments, Data empowerment 2019
Nandan Nilekani: Identity, Payments, Data empowerment 2019
 
Towards A Holistic Healthcare Ecosystem
Towards A Holistic Healthcare EcosystemTowards A Holistic Healthcare Ecosystem
Towards A Holistic Healthcare Ecosystem
 
Angel Tax Presentation To DIPP [Section 56(2)(viib)]
Angel Tax Presentation To DIPP [Section 56(2)(viib)] Angel Tax Presentation To DIPP [Section 56(2)(viib)]
Angel Tax Presentation To DIPP [Section 56(2)(viib)]
 
White paper on the analysis of High share premium amongst Startups in India
White paper on the analysis of High share premium amongst Startups in IndiaWhite paper on the analysis of High share premium amongst Startups in India
White paper on the analysis of High share premium amongst Startups in India
 
[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68
[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68
[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68
 
Building For A Billion
Building For A BillionBuilding For A Billion
Building For A Billion
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
India SaaS Survey Results 2017 in partnership with DCS Advisory
India SaaS Survey Results 2017 in partnership with DCS Advisory India SaaS Survey Results 2017 in partnership with DCS Advisory
India SaaS Survey Results 2017 in partnership with DCS Advisory
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
 
BBPS Workshop in partnership with NPCI | Product, Business & Technology Overview
BBPS Workshop in partnership with NPCI | Product, Business & Technology OverviewBBPS Workshop in partnership with NPCI | Product, Business & Technology Overview
BBPS Workshop in partnership with NPCI | Product, Business & Technology Overview
 
India's Platforms Leapfrog by Dr Pramod Varma
India's Platforms Leapfrog by Dr Pramod VarmaIndia's Platforms Leapfrog by Dr Pramod Varma
India's Platforms Leapfrog by Dr Pramod Varma
 

Recently uploaded

Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 

Recently uploaded (20)

Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 

BYOD Security Solution Protects Networks from Infected Personal Devices

  • 2. Welcome to “Me” Enterprise How BYOD has changed the security map and how “Peregrine 7” helps tackle it? Copyright i7 Networks, i7nw.com Manjunath M Gowda CEO, i7 Networks Bangalore, India manju_s7 in/manjunathgowda/
  • 3. WHY BYOD matters? Copyright i7 Networks, i7nw.com
  • 4. • 90%of enterprises will use personal devices in Enterprise by 2014 - Gartner • 20% Savings: CISCO claimed due to BYOD & declared: “We don’t pay for it, and our users are happier.” • Survey: Enterprises that don't support BYOD are at competitive disadvantage Copyright i7 Networks, i7nw.com
  • 5. So what is stopping them? Copyright i7 Networks, i7nw.com
  • 6. 75% CIOs said Compliance & Security biggest challenge in allowing BYOD Copyright i7 Networks, i7nw.com
  • 7. DARK READING – July 2013 Copyright i7 Networks, i7nw.com
  • 8. Copyright i7 Networks, i7nw.com 62% - Loss of a device that has Sensitive Data – (MDMs solve this) 61% - An infected personal device connecting to the Corporate Network
  • 9. Business overview Copyright i7 Networks, i7nw.com
  • 10. 79% business had a mobile incident last year alone – Checkpoint 600%+ growth in mobile malware in last 2 years 20 Mn+ devices jailbroken in just two months (Jan 2013) 18 Mn infected Android devices by end of 2013 71% mobile devices have OS / application vulnerabilities Copyright i7 Networks, i7nw.com
  • 11. $500K+ cost per such incident $1.5Mn cost per such settlement Copyright i7 Networks, i7nw.com
  • 12. Why traditional tools can’t help here? Copyright i7 Networks, i7nw.com
  • 13. • Perimeter security and not for inside-inside or inside-out threats • Used to IT-owned devices and not personal devices (agented) • Used to take care of outside2inside threats Copyright i7 Networks, i7nw.com
  • 14. So what tools do exist to solve it? Copyright i7 Networks, i7nw.com
  • 15. 15 Copyright i7 Networks, i7nw.com MDMs, EPP Airwatch, MobileIron, Zenprise MAMs Bitzer, IBM, SAP, Good MDPs AT&T toggle, Divide, VMware MNAC i7Networks Device level n e t w o r k Mobile Security Tools Quadrant Server side
  • 16. Our value proposition Copyright i7 Networks, i7nw.com
  • 17. “We protect your network from malicious/infected BYODs” Copyright i7 Networks, i7nw.com
  • 18. “We Protect the Enterprise Network” by -Detect & Fingerprint1 all personal devices -Prevent the malicious devices from connecting -100% Agentless (Zero-touch) -Zero-Latency Deployment -Provide detailed Compliance Reports “To Know & To Protect” 1 Secure detection & fingerprinting (US patent pending) Copyright i7 Networks, i7nw.com
  • 19. • Name • Screen caps • Demo PeregrineGuardTM
  • 20. i7 Networks; i7 Confidential Not just phones, we support all wireless devices.
  • 21. Continuous Monitoring Complete VisibilityComplete Visibility Endpoint AuthenticationEndpoint Authentication Vulnerability and malicious assessment Vulnerability and malicious assessment Granular policy enforcement Granular policy enforcement Compliance ReportingCompliance Reporting Entry Verification – Corporate Wi-Fi or VPN? Entry Verification – Corporate Wi-Fi or VPN? Allow Deny Compromised /Jailbroken/ Unauthorized/Unmanaged check Compromised /Jailbroken/ Unauthorized/Unmanaged check Deny Deny Personal Devices
  • 22. the questions we answer Copyright i7 Networks, i7nw.com
  • 23. Copyright i7 Networks, i7nw.com • What devices are getting into the corporate network? • Who do they belong to? • Are they infected? • Are they compromised or malicious? • How vulnerable are they? • What are they accessing? • What apps* are they running? • Can I control the access? • Can I get Compliance audit reports?
  • 24. How do you deploy? Copyright i7 Networks, i7nw.com
  • 25. • 100% agentless and non-intrusive – Zero Touch • Complete off-line deployment – Zero-Latency • Just ONE probe* in the network • Supports: Corporate Wi-Fi/ Public Wi- Fi/3G/4G/LTE Deployment
  • 26. i7 Networks; i7 Confidential
  • 27. - Microsoft AD, RADIUS and LDAP - Microsoft Exchange - Maas 360 MDM - Microsoft System Center* - IBM Tivoli* - Cisco/Juniper and Fortinet VPN - Snort IDS - CVE database Integrates with
  • 28. Why “Agentless” is Sweet?  Copyright i7 Networks, i7nw.com
  • 29. 14different OS types & growing; Add versions and models5 45% enterprises have more than 5 times as many BYOD as they had 2 years ago3 3.5– Average number of devices per Employee 42%- Average churn of devices per year among enterprise employees < 10% enterprises aware of all mobile devices accessing their network & servers3 27% of devices are ‘approved’ by the company6Copyright i7 Networks, i7nw.com
  • 30. So what’s unique? Copyright i7 Networks, i7nw.com
  • 31. 4A (Attributes) Discovery & Fingerprinting Health Check Discover Apps on the wire*, Policy Enforcement 4A (Attributes) Discovery & Fingerprinting Health Check Discover Apps on the wire*, Policy Enforcement 4D (Deployments) 100% Agentless (Zero-touch), ZERO-Latency SINGLE Probe, Wi-Fi/3G/4G/LTE 4D (Deployments) 100% Agentless (Zero-touch), ZERO-Latency SINGLE Probe, Wi-Fi/3G/4G/LTE 4T (Threat-Protections) Malicious & Intrusion Prevention Zero-day Attack Prevention*, Vulnerability Check Check of anti-malware s/w 4T (Threat-Protections) Malicious & Intrusion Prevention Zero-day Attack Prevention*, Vulnerability Check Check of anti-malware s/w 4K (Keywords) 100% Agentless Patent-Pending Algorithms Detailed Fingerprinting Zero-Latency 4K (Keywords) 100% Agentless Patent-Pending Algorithms Detailed Fingerprinting Zero-Latency
  • 32. Available as : Appliance / Virtual Appliance Available as : Appliance / Virtual Appliance
  • 33. What is that you do MDM cannot? Copyright i7 Networks, i7nw.com
  • 34. oCannot do Discovery and fingerprint of all devices  Authorized  Unauthorized  Unmanaged  Non-mobile devices like e-Readers, Wi-Fi watches, Gaming devices, Healthcare devices etc. Copyright i7 Networks, i7nw.com
  • 35. oMalware detection via signature is only 28%; Cannot catch malicious traffic @ network layer (not even at device layer) oCannot do Access control based on device attributes oCannot enforce different access rules for different departments/ LoBs Copyright i7 Networks, i7nw.com
  • 36. oHot-spotting/Mac-spoofing cannot be detected oFails where you are not allowed to install a client on the device due to privacy or compliance oNot dynamic (need to stop iOS6.1?) Copyright i7 Networks, i7nw.com
  • 37. How different are you from a traditional nac? Copyright i7 Networks, i7nw.com
  • 38.  Support all: Wi-Fi & 3G/4G/LTE  100% Zero Touch (agentless)  Zero Latency (offline) (still we control)  Just ONE probe  Fits into any network infrastructure  Support all: Wi-Fi & 3G/4G/LTE  100% Zero Touch (agentless)  Zero Latency (offline) (still we control)  Just ONE probe  Fits into any network infrastructure  US Patent-pending fingerprinting algorithm  Mac-spoofing/Hot spotting  DVItm (Device Vulnerability Index)  Detecting apps on the wire (dropbox)  US Patent-pending fingerprinting algorithm  Mac-spoofing/Hot spotting  DVItm (Device Vulnerability Index)  Detecting apps on the wire (dropbox)  Completely focused on BYOD Security Completely focused on BYOD Security
  • 39. Product Road Map? Copyright i7 Networks, i7nw.com
  • 40. • Recognition of all Apps on the Wire • Detection of EPP (End Point Protection) tools • Chaining of P7s • Integrations into System Center and Tivoli • Integrations into MDMs • mNAC in the cloud to detect cloud access Copyright i7 Networks, i7nw.com
  • 41. The TEAM Copyright i7 Networks, i7nw.com
  • 42. Jeff Hunter Evangelist Peter Gilson CTO First Last CFO Jack Franklin CMO Heather Adler CEO Investors & Advisors 1st venture: $8.4M by Bluecoat (2010) Team together for second time Started June 12’ Product start Jan 13’
  • 43. Questions? Copyright i7 Networks, i7nw.com manju.m@i7nw.com manju_s7

Editor's Notes

  1. To present to potential Customers and POC sites
  2. www.poynter.org http://www.iphonehacks.com/2013/01/20-million-jailbroken-devices-cydia.html http://www.androidguys.com/2012/12/14/lookout-18-million-infected-android-devices-by-end-of-2013/
  3. www.poynter.org http://www.iphonehacks.com/2013/01/20-million-jailbroken-devices-cydia.html http://www.androidguys.com/2012/12/14/lookout-18-million-infected-android-devices-by-end-of-2013/
  4. www.poynter.org
  5. www.poynter.org
  6. To demo or not to demo! Depending on time, ask. Focus on what you product does and how it does it. Talk about the benefits people will get from the product. Feature---Benefit---Reason. Doing live demos can be fraught with anxiety and too many places to fail. So never do a live demo in the first meeting with an investor. Never! There are three ways to demo your product or service without being on-line. 1-Get your programmers to make everything run locally on your computer without needing an Internet connection at all. 2-Safer:Use SnagIt to capture Web pages that will play back in off-line mode, at least for navigation purposes. 3-BIG Secret: Use Camtasia to record a demo and edit out all of the extra movements and unnecessary screens. Turn off the voice and play back the video of the demo while you do a live voice over guiding your watcher every step of the way. Make the demo under 3 minutes or 2 minutes would be even better.
  7. This one for CA-1
  8. www.poynter.org
  9. This one for CA-1
  10. This one for CA-1
  11. This one for CA-1
  12. Note any gaps so you can engage the investor to help you find the missing person. Why these people will make this business happen. What have they done in the past that makes them appropriate for this new venture? Show Board Members and existing investors to add more credibility to your story.