complete cloud security anyone, anywhere, any app, any device

41
Complete Cloud Security Anyone, anywhere, any app, any device www.censornet.co m

Upload: tamsin-horton

Post on 13-Dec-2015

227 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Complete Cloud Security Anyone, anywhere, any app, any device

Complete Cloud SecurityAnyone, anywhere, any app, any device

www.censornet.com

Page 2: Complete Cloud Security Anyone, anywhere, any app, any device

Company Presentation

Web Security Evolution

• Web-borne malware protection• Product development static• New vector in threat landscape: Cloud Applications• Malware protection is still valid - BUT• Understanding activity within cloud applications is imperative!• Now we need to classify cloud applications as we did with websites

Page 3: Complete Cloud Security Anyone, anywhere, any app, any device

Company Presentation

The World has Changed…..

Increasingly mobile workforce

Lack of visibility and control

Rise of Cloud Applications

By 2016, 25% of enterprises will secure access to cloud-based services using a CASB platform, up from less than 1% in 2012, reducing the cost of securing access by 30% - Gartner

Page 4: Complete Cloud Security Anyone, anywhere, any app, any device

Organisations are Challenged

Shadow IT

Do you know which applications your employees are using?

Sanctioned or unsanctioned without visibility businesses are unable to assess the risk and/or take action.

Company Presentation

Page 5: Complete Cloud Security Anyone, anywhere, any app, any device

Top 5 Business Concerns

Company Presentation

Security “The world has gone mobile but security has not changed”

Compliance ”Compliance is not optional. Use cloud application but retain

visibility and control”

Shadow IT ”Unauthorised or unrestricted use of cloud application can

lead to data security and compliance breaches”

BYOD ”Users are working in-office or on the move and security has

to follow the user regardless of the device used”

Productivity ”“Company and personally owned devices can increase

productivity but access to corporate data and the network have to be protected at all times”

Page 6: Complete Cloud Security Anyone, anywhere, any app, any device

Current Cloud Security Solutions do not meet challenges

Struggle to scale up for BYOD growth Solely focus on protection against web-borne malware

and proxies Don’t address the rise of cloud applications Do not integrate secure web gateway with cloud

application control Cannot see SSL websites Unable to claim fast & knowledgeable support

Company Presentation

Page 7: Complete Cloud Security Anyone, anywhere, any app, any device

We are CensorNetComplete cloud security – Anyone, anywhere, any app, any device

Company Presentation

UK Company8 years experience

CEO – Industry Veteran

Experts in Cloud Security

Backed by Investors

Unparalleled Support

Page 8: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio

www.censornet.com

Overview

Page 9: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Secure Web Gateway

Features include:

Anti-malware & URL reputation . Cloud

application discovery . Granular policy

setting BYOD ready . Ideal for Enterprise

& Education

Deployment:

on-premise . virtual machine

Email Security

Features include:

Hosted email security & filtering . Backup,

SecureMail and Emergency Inbox . White-

label ready . Ideal for Enterprises &

Education & MSPs

Deployment:

cloud service via MX records

Hybrid Web Security

Features include:

Roaming users & BYOD . Granular policy

setting . No proxy architecture . White-

label ready . Ideal for Enterprise & MSPs

Deployment:

hybrid cloud; endpoint agent . virtual

machine

Desktop Monitoring

Features include:

Record activity as video . Low storage

footprint Generic user identification .

Privileged user monitoring . Ideal for

organisations working with highly sensitive

data & Education

Deployment:

Windows & Linux client/server agent

CensorNet Product Portfolio

Page 10: Complete Cloud Security Anyone, anywhere, any app, any device

Hybrid Web Security

www.censornet.com

Page 11: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

The Hybrid Web Security platform offers the best of both worlds: the security and control of an on-premise solution combined with the flexibility and mobility of a centralised cloud service

• DirectBrowse TechnologyNo proxying to our cloud

• Centralised adminManage multiple networks and roaming users

• MSP readyReseller portal for provisioning and support

• White-label capabilityadd web security to your brand quickly and easily

• SecurityReal-time anti-malware, URL reputation and granular policies

Page 12: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

User requests web resource

Proxy delivers web resource

Proxy requests web resource

Proxy receives web resource

User requests web resource

Protocol Method URL Query String Post Parameters Headers Web

ClassificationApp

Classification

Traditional Proxy

CensorNet way

User accesses web resource directly

Page 13: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

• Distributor• MSP• Reseller• Customer

Mobile Devices

Roaming User/Standalone Device

Head/Branch Office

Cloud Gateway

Cloud Link Endpoint Protection

Mobile Gateway

Cloud Infrastructure

LAN

OptionalOn-premise security

Hybrid Web SecurityArchitecture

Page 14: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Provides a way to deliver a cloud based Web Security Service

Multi-tenancy Rebranding Integration via API and open standards Endpoint, network, BYOD and roaming

user protection

Hybrid Web Security - Benefits

Page 15: Complete Cloud Security Anyone, anywhere, any app, any device

Secure Web Gateway

www.censornet.com

Page 16: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Next generation Secure Web Gateway with built-in Cloud Application Control and the power to extend web access policies to Bring-Your-Own-Device

• Enterprise class securityReal-time anti-malware, URL reputation, Image Scanning and more

• Cloud Application DiscoveryShine the light on Shadow IT

• BYOD readyExtend web access policies to devices via the Captive Portal

• On-premiseManage the entire system on your network

• SimplicityEasy to use, easy to administer

Page 17: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Page 18: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Page 19: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Page 20: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Page 21: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Secure Web Gateway - Benefits

Shine the light on Shadow IT Safe cloud application adoption Extend web access control to BYOD Malware protection Policy based control Complete visibility

Page 22: Complete Cloud Security Anyone, anywhere, any app, any device

Email Security

www.censornet.com

Page 23: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

CensorNet Email Security is a cloud-based email security and backup service that scans both inbound and outbound email for viruses, phishing threats, content violations and spam • Cloud based

No hardware or software required

• SecurityAnti-malware, anti-spam and anti-phishing, content scanning

• SecureMailDeliver e-mail messages to recipients via a secure web login

• Backup & InboxUnlimited backup and emergency inbox

• MSP readyReseller portal for provisioning and support

• White-label capabilityAdd e-mail security to your brand quickly and easily

Page 24: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Email Security - Deployment

Page 25: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Email Security - Benefits

Multi-tenancy Rebranding Emergency Inbox E-mail Backup Prevent data loss via email Increase mail server resilience

Page 26: Complete Cloud Security Anyone, anywhere, any app, any device

Desktop Monitoring

www.censornet.com

Page 27: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

CensorNet Desktop Monitoring is a client-server solution for monitoring, recording and analysing user activity on the desktop, virtual desktop, terminal services and remote desktop sessions

• Visual audit trailOf all user activity on local, remote or terminal services

• IdentifyGeneric user logins such as ‘administrator’

• MonitorPrivileged user activity

• SearchRapidly against stored video archive using meta data

• DeployEasily via wizard to all machines on the network

• AlertOn suspicious activity based on rules

Page 28: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Desktop Monitoring - Deployment

• DeploymentOn-premise server and agent for Windows & Linux

• StorageFirefoxDB (open source) or SQL Server

• ManagementWeb-based user interface

• VideoFull colour or greyscale recording

• BandwidthLow network bandwidth; 6Kb/sec transfer e.g. 50 agents = 300Kb/sec

• StorageOptimised storage; 5Mb per hour e.g. 50 agents = 6GB/day maximum

Page 29: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Desktop Monitoring - Benefits

Total visibility of endpoint activity Total visibility of Terminal Services

activity Privileged user monitoring Prevent data loss Incident investigatione

Page 30: Complete Cloud Security Anyone, anywhere, any app, any device

Unified Security Service

www.censornet.com

The Future

Page 31: Complete Cloud Security Anyone, anywhere, any app, any device

Product portfolio Overview

The future

Page 32: Complete Cloud Security Anyone, anywhere, any app, any device

Unified Security Service Vision

Unified Security Service

E-mail Security

Web filtering

Cloud Application Control

Single Sign On

Desktop Monitoring

SIEM

The

Stac

k API

Partners

“An eco-system of security services”

“Partners can cherry-pick the solutions they need”

Product Portfolio Overview

Page 33: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Page 34: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Page 35: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Page 36: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Page 37: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Page 38: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Page 39: Complete Cloud Security Anyone, anywhere, any app, any device

Product Portfolio Overview

Page 40: Complete Cloud Security Anyone, anywhere, any app, any device

USS - Benefits

One dashboard Web, E-mail, Endpoint covered Cloud Application Control Mobile / BYOD / LAN secured Shared analytics & incident

reporting Cloud deployment model + “private

cloud”

Product Portfolio Overview

Page 41: Complete Cloud Security Anyone, anywhere, any app, any device

Complete Cloud SecurityAnyone, anywhere, any app, any device

www.censornet.com