webinar: that's the way the network perimeter crumbles - cybersecurity for the new technology...

17
1 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. That’s the Way the Network Perimeter Crumbles: Web Security for the New Technology Paradigm Chris Taylor

Upload: cyren

Post on 16-Jul-2015

115 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.

That’s the Way the Network Perimeter Crumbles:Web Security for the New Technology Paradigm

Chris Taylor

Page 2: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

About CYREN

THE BEST KEPT SECRET IN INFORMATION SECURITY FOR MORE THAN A DECADE

Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time innovator of cyber intelligence solutions. CYREN provides web, email, endpoint, and roaming cybersecurity solutions that are relied upon by the world’s largest IT companies to protect them and the billions of customers they serve from today’s advanced threats.

2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Page 3: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

CYREN Powers the World’s Security

Our Cyber Intelligence is the security backbone of many of the world’s largest and most influential information technology and Internet security brands.

Page 4: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 4©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Global Coverage from a Global Platform

OFFICESDATA CENTERS

Over 500,000 threat collection and cyber intelligence delivery points distributed across the globe, supported by 19 datacenters

Protecting more than 550 Million people in 190 countries

13 Billion security transactions every day

Page 5: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 5

The Changing Security Landscape

Page 6: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Today’s Security Landscape

IT Security Landscape

Business process is Web connected and exposes security vulnerabilities

Use of cloud-based apps reduces IT visibility and control of enterprise data

Workers are remote/roaming using mobile/BYOD technology, but devices are rarely controlled

By 2018, 25% of all corporate data traffic will flow direct from roaming devices to the cloud

Corporate IoT increases security complexity because IT may not be consulted

Source: Gartner The Growing Importance of Cloud Access Security Brokers (May 2012)

Page 7: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

But Security is Stuck in the 20th Century

Load Balancer

Edge FirewallServer–Side SSL Tunnel

Aggregation firewall

Client - side SSL tunnel

Sandbox SSLWeb Filter

Logfiles

Flow Management Content Inspection

PAC File

SSL

SSL

This approach was defined for a 1990s computing model – centralized and static

Page 8: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Today’s Security Challenges

The cybercriminals are innovating faster than legacy solutions can keep up

Page 9: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

So Do We Put This Everywhere We Need Connectivity?

Load Balancer

Edge FirewallServer–Side SSL Tunnel

Aggregation firewall

Client - side SSL tunnel

Sandbox SSLWeb Filter

Logfiles

Flow Management Content Inspection

PAC File

SSL

SSL

NO. Security must evolve to reflect the changing model of business computing

Page 10: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

TCO

A Modern Solution to Today’s Threats

Security Roaming

Page 11: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Applied Cyber Intelligence is the Way Forward

APPLICATIONPolicy, Enforcement, Logging, Alerting, Reporting

ANALYSISRPD, Heuristics, Signature, Human, etc.

DATA13 BILLION transactions per day

SENSORS500 THOUSAND points of presence, serving 550 MILLION users

SECURITYApplied

Cyber Intelligence

INSIGHTCyber Intelligence

Ente

rpri

se V

alu

e

Pre-Compromise Compromise Post-Compromise

Reconnaissance Weaponization Delivery Exploitation Installation Command & Control

Actions on Target

Helping Enterprises to Disruptthe Cyber Kill Chain

Page 12: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Cloud economics and ease of use combine for the lowest Total Cost of Ownership

Applying the same Cyber Intelligence that protects over 550 Million global users today

Industrial-strength protection, from the brand the security industry trusts

Your security scales with you, no matter how big or complex your infrastructure becomes

A total security solution for office-based, remote, roaming, and corporate IoT devices

Protection is delivered wherever the user is connected

CYREN WebSecurity Delivers Applied Cyber Intelligence

Page 13: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

No capital expense for hardware or software

Eliminates the cost and complexity associated with installing and maintaining multiple appliances

Up-to-the-moment applied cyber intelligence

Simple to deploy, easy to administer, whether your operations are centralized or distributed

Scales with you - regardless of volume of users, devices, or locations

The Lowest Total Cost of Ownership (TCO)

Cloud-based Web Security as a Service drives down your cost

Page 14: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Phishing

Protecting you from cybercriminal attempts to obtain corporate data, using impersonated trustworthy communication via an email or malicious URL

The Best Protection from Today’s Threats

Zero-hour protection, powered by our unique Cyber Intelligence, ensures you’re always protected against the latest threats

Compliance and Productivity

Unprecedented visibility of employee Web use, means you can set and enforce your Internet Use policies

Applied Cyber Intelligence Disrupts the Cyber Kill Chain and Boosts Productivity

Zero-day Malware

Page 15: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

A ‘clean’ Internet connection protects users wherever they are

Simple deployment options

No requirement to backhaul remote workers’ traffic back to a centralized security stack

Policy enforcement and protection for up to 5 devices per user

Protect notebooks, tablets and smartphones, across multiple operating systems with flexible controls for BYOD/corporate

No discernible impact on device performance

Ensures clean, secure Internet connectivity for Corporate IoTdeployments

The Best Solution for Roaming, Remote, and IoT

Designed for 21st Century business computing

Page 16: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Business has transformed the way it uses technology, opening up a new threat landscape

The traditional centralized, hardware-driven approach to Web security was never designed for this landscape

21st Century threats require a 21st Century solution – Web security as a service

CYREN WebSecurity is that solution

Summary

Page 17: Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

You can also find us here:

www.CYREN.com

twitter.com/cyreninc

linkedin.com/company/cyren

©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Thank You. Any Questions or Thoughts?

Chris Taylor

CYREN Marketing

+1 703.760.3320

[email protected]