i7 networks - presentation at zensar #techshowcase - an ispirt productnation initiative

43
Copyright i7 Networks, i7nw.com

Upload: productnationin

Post on 28-Oct-2014

8 views

Category:

Business


1 download

DESCRIPTION

i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative. Started in June 2012; they work on the space of BYOD security; Their sweet spot is 100% Agentless device discovery, fingerprinting and health-check and then denying infected/malicious devices from connecting to corporate network.

TRANSCRIPT

Page 1: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

Copyright i7 Networks, i7nw.com

Page 2: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

Welcome to “Me” Enterprise

How BYOD has changed the security map and how “Peregrine 7” helps tackle it?

Copyright i7 Networks, i7nw.com

Manjunath M GowdaCEO, i7 NetworksBangalore, India

manju_s7in/manjunathgowda/

Page 3: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

WHY BYOD matters?

Copyright i7 Networks, i7nw.com

Page 4: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

• 90% of enterprises will use personal devices in Enterprise by 2014 - Gartner

• 20% Savings: CISCO claimed due to BYOD & declared: “We don’t pay for it, and our users are happier.”

• Survey: Enterprises that don't support BYOD are at competitive disadvantage

Copyright i7 Networks, i7nw.com

Page 5: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

So what is stopping them?

Copyright i7 Networks, i7nw.com

Page 6: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

75% CIOs said Compliance & Security biggest challenge in allowing BYOD

Copyright i7 Networks, i7nw.com

Page 7: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

DARK READING – July 2013

Copyright i7 Networks, i7nw.com

Page 8: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

Copyright i7 Networks, i7nw.com

62% - Loss of a device that has Sensitive Data – (MDMs solve this)

61% - An infected personal device connecting to the Corporate Network

Page 9: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

Business overview

Copyright i7 Networks, i7nw.com

Page 10: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

79% business had a mobile incident last year alone – Checkpoint

600%+ growth in mobile malware in last 2 years

20 Mn+ devices jailbroken in just two months (Jan 2013)

18 Mn infected Android devices by end of 2013

71% mobile devices have OS / application vulnerabilities

Copyright i7 Networks, i7nw.com

Page 11: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

$500K+ cost per such incident

$1.5Mn cost per such settlement

Copyright i7 Networks, i7nw.com

Page 12: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

Why traditional tools can’t help here?

Copyright i7 Networks, i7nw.com

Page 13: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

• Perimeter security and not for inside-inside or inside-out threats

• Used to IT-owned devices and not personal devices (agented)

• Used to take care of outside2inside threats

Copyright i7 Networks, i7nw.com

Page 14: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

So what tools do exist to solve it?

Copyright i7 Networks, i7nw.com

Page 15: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

15 Copyright i7 Networks, i7nw.com

MDMs, EPPAirwatch, MobileIron, Zenprise

MAMsBitzer, IBM, SAP, Good

MDPsAT&T toggle, Divide,

VMware

MNACi7Networks

Device level

network

Mobile Security Tools Quadrant

Server side

Page 16: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

Our value proposition

Copyright i7 Networks, i7nw.com

Page 17: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

“We protect your network from malicious/infected BYODs”

Copyright i7 Networks, i7nw.com

Page 18: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

“We Protect the Enterprise Network” by

-Detect & Fingerprint1 all personal devices

-Prevent the malicious devices from connecting

-100% Agentless (Zero-touch)

-Zero-Latency Deployment

-Provide detailed Compliance Reports

“To Know & To Protect”

1 Secure detection & fingerprinting (US patent pending)

Copyright i7 Networks, i7nw.com

Page 19: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

• Name

• Screen caps

• Demo

PeregrineGuardTM

Page 20: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

i7 Networks; i7 Confidential

Not just phones,we support all wireless devices.

Page 21: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

Continuous Monitoring

Complete Visibility Complete Visibility

Endpoint Authentication Endpoint Authentication

Vulnerability and malicious assessment

Vulnerability and malicious assessment

Granular policy enforcement

Granular policy enforcement

Compliance ReportingCompliance Reporting

Entry Verification – Corporate Wi-Fi or

VPN?

Entry Verification – Corporate Wi-Fi or

VPN?

Allow

Deny

Compromised /Jailbroken/ Unauthorized/Unmanaged

check

Compromised /Jailbroken/ Unauthorized/Unmanaged

check

Deny

Deny

Personal Devices

Page 22: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

the questions we answer

Copyright i7 Networks, i7nw.com

Page 23: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

Copyright i7 Networks, i7nw.com

• What devices are getting into the corporate network?

• Who do they belong to?• Are they infected? • Are they compromised or malicious?• How vulnerable are they?• What are they accessing?• What apps* are they running?• Can I control the access?• Can I get Compliance audit reports?

Page 24: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

How do you deploy?

Copyright i7 Networks, i7nw.com

Page 25: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

• 100% agentless and non-intrusive – Zero Touch

• Complete off-line deployment – Zero-Latency

• Just ONE probe* in the network

• Supports: Corporate Wi-Fi/ Public Wi-Fi/3G/4G/LTE

Deployment

Page 26: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

i7 Networks; i7 Confidential

Page 27: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

- Microsoft AD, RADIUS and LDAP

- Microsoft Exchange

- Maas 360 MDM

- Microsoft System Center*

- IBM Tivoli*

- Cisco/Juniper and Fortinet VPN

- Snort IDS

- CVE database

Integrates with

Page 28: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

Why “Agentless” is Sweet?

Copyright i7 Networks, i7nw.com

Page 29: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

14 different OS types & growing; Add versions and models5

45% enterprises have more than 5 times as many BYOD as they had 2 years ago3

3.5 – Average number of devices per Employee

42% - Average churn of devices per year among enterprise employees

< 10% enterprises aware of all mobile devices accessing their network & servers3

27% of devices are ‘approved’ by the company6

Copyright i7 Networks, i7nw.com

Page 30: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

So what’s unique?

Copyright i7 Networks, i7nw.com

Page 31: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

4A (Attributes)

Discovery & FingerprintingHealth CheckDiscover Apps on the wire*,Policy Enforcement

4A (Attributes)

Discovery & FingerprintingHealth CheckDiscover Apps on the wire*,Policy Enforcement

4D (Deployments)

100% Agentless (Zero-touch), ZERO-Latency SINGLE Probe,Wi-Fi/3G/4G/LTE

4D (Deployments)

100% Agentless (Zero-touch), ZERO-Latency SINGLE Probe,Wi-Fi/3G/4G/LTE

4T (Threat-Protections)

Malicious & Intrusion PreventionZero-day Attack Prevention*,Vulnerability CheckCheck of anti-malware s/w

4T (Threat-Protections)

Malicious & Intrusion PreventionZero-day Attack Prevention*,Vulnerability CheckCheck of anti-malware s/w

4K (Keywords)

100% AgentlessPatent-Pending AlgorithmsDetailed FingerprintingZero-Latency

4K (Keywords)

100% AgentlessPatent-Pending AlgorithmsDetailed FingerprintingZero-Latency

Page 32: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

Available as : Appliance / Virtual Appliance

Available as : Appliance / Virtual Appliance

Page 33: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

What is that you do MDM cannot?

Copyright i7 Networks, i7nw.com

Page 34: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

oCannot do Discovery and fingerprint of all devices Authorized

Unauthorized

Unmanaged

Non-mobile devices like e-Readers, Wi-Fi watches, Gaming devices, Healthcare devices etc.

Copyright i7 Networks, i7nw.com

Page 35: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

oMalware detection via signature is only 28%; Cannot catch malicious traffic @ network layer (not even at device layer)

oCannot do Access control based on device attributes

oCannot enforce different access rules for different departments/ LoBsCopyright i7 Networks, i7nw.com

Page 36: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

oHot-spotting/Mac-spoofing cannot be detected

oFails where you are not allowed to install a client on the device due to privacy or compliance

oNot dynamic (need to stop iOS6.1?)

Copyright i7 Networks, i7nw.com

Page 37: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

How different are you from a traditional nac?

Copyright i7 Networks, i7nw.com

Page 38: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

Support all: Wi-Fi & 3G/4G/LTE 100% Zero Touch (agentless) Zero Latency (offline) (still we control) Just ONE probe Fits into any network infrastructure

Support all: Wi-Fi & 3G/4G/LTE 100% Zero Touch (agentless) Zero Latency (offline) (still we control) Just ONE probe Fits into any network infrastructure

US Patent-pending fingerprinting algorithm

Mac-spoofing/Hot spotting DVItm (Device Vulnerability Index) Detecting apps on the wire (dropbox)

US Patent-pending fingerprinting algorithm

Mac-spoofing/Hot spotting DVItm (Device Vulnerability Index) Detecting apps on the wire (dropbox)

Completely focused on BYOD Security

Completely focused on BYOD Security

Page 39: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

Product Road Map?

Copyright i7 Networks, i7nw.com

Page 40: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

• Recognition of all Apps on the Wire• Detection of EPP (End Point Protection)

tools• Chaining of P7s• Integrations into System Center and Tivoli• Integrations into MDMs• mNAC in the cloud to detect cloud access

Copyright i7 Networks, i7nw.com

Page 41: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

The TEAM

Copyright i7 Networks, i7nw.com

Page 42: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

JeffHunter

Evangelist

PeterGilsonCTO

FirstLastCFO

JackFranklin

CMO

HeatherAdlerCEO

Investors & Advisors

1st venture: $8.4M by Bluecoat (2010)Team together for second timeStarted June 12’ Product start Jan 13’

Page 43: i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

Questions?

Copyright i7 Networks, i7nw.com

[email protected]_s7