Transcript
Page 1: Screenshots i7 peregrine7 - Agentless BYOD security tool

Peregrine7 Screenshots

Peregrine7 helps protect Enterprise network from malicious/infected BYODs

Copyright i7 Networks, i7nw.com

Manjunath M GowdaCEO, i7 NetworksBangalore, India

manju_s7in/manjunathgowda/

Page 2: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

COMPLETE BYOD INVENTORY SCREENSHOT

Page 3: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

Page 4: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

This alerts are the BYOD specific from added,

modified and curated SNORT specific to BYODs and very

specific to Internal originated threats

Page 5: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

Page 6: Screenshots i7 peregrine7 - Agentless BYOD security tool

DEEP DIVE OF A DEVICE DETAILS

Copyright i7 Networks, i7nw.com

Page 7: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

Page 8: Screenshots i7 peregrine7 - Agentless BYOD security tool

COMPLETE VULNERABILITIES LIST

Copyright i7 Networks, i7nw.com

Page 9: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.co

Page 10: Screenshots i7 peregrine7 - Agentless BYOD security tool

COMPLETE DEVICE DETAILS

Copyright i7 Networks, i7nw.com

Page 11: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

Page 12: Screenshots i7 peregrine7 - Agentless BYOD security tool

BANDWIDTH USAGE OF ALL BYODS, INCLUDING INTERNAL SERVER USAGE & LOGS

Copyright i7 Networks, i7nw.com

Page 13: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

Page 14: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

Page 15: Screenshots i7 peregrine7 - Agentless BYOD security tool
Page 16: Screenshots i7 peregrine7 - Agentless BYOD security tool

BYOD SPECIFIC POLICY – DRAG & DROP; ACTS LIKE INTERNAL BYOD FIREWALL AND GATEWAY

Copyright i7 Networks, i7nw.com

Page 17: Screenshots i7 peregrine7 - Agentless BYOD security tool

Copyright i7 Networks, i7nw.com

Page 18: Screenshots i7 peregrine7 - Agentless BYOD security tool

www.i7nw.com

Copyright i7 Networks, i7nw.com

[email protected]_s7


Top Related