Your SlideShare is downloading. ×
0
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Cloud Security for the New Mobile Workforce Reality
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cloud Security for the New Mobile Workforce Reality

212

Published on

Bring-your-own-device (BYOD) policies and an increasingly mobile workforce are no longer just trends, they’re the new SMB and Enterprise reality. What’s also a reality is the opportunity in the market …

Bring-your-own-device (BYOD) policies and an increasingly mobile workforce are no longer just trends, they’re the new SMB and Enterprise reality. What’s also a reality is the opportunity in the market for web security-as-a-service. This is an in depth look at the fastest growing market segment in the security industry and how to take advantage of it.

Published in: Internet
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
212
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

  • WELCOME TO THIS SPECIAL PRESENATION OF THE CHANNEL COMPANY…CLOUD SECURITY FOR THE NEW MOBILE WORKFORCE REALITY…


    IN CASE YOU’VE MISSED IT, BRING-YOUR-OWN-DEVICE (BYOD) POLICIES AND AN INCREASINGLY MOBILE WORKFORCE ARE NO LONGER JUST TRENDS, THEY’RE THE NEW SMB AND ENTERPRISE REALITY. WHAT’S ALSO A REALITY IS THE OPPORTUNITY IN THE MARKET FOR WEB SECURITY-AS-A-SERVICE. ANY SERVICE PROVIDER OR SECURITY RESELLER WHO UNDERSTANDS THIS IS CERTAINLY LOOKING TO ADD IT TO THEIR LINE CARD, BUT THE BIG QUESTION IS WHICH STRATEGIES OFFER THE BEST TECHNOLOGY, PARTNERSHIPS AND MARGIN FOR GROWTH?

    TODAYS CHANNEL CAST WILL TAKE AN IN DEPTH LOOK AT THE FASTEST GROWING MARKET SEGMENT IN THE SECURITY INDUSTRY AND HOW TO TAKE ADVANTAGE OF IT.

    TODAYS EVENT IS LIVE AND INTERACTIVE SO WE INVITE YOUR QUESITON COMMENTS AT ANY TIME USING THAT ASK A QUESTION BUTTON ON YOUR VIEWING CONSOLE. WE’RE ALSO GOING TO ASK THAT YOU DISABLE ANY POP UP BLOCKERS YOU MIGHT HAVE IN PLACE AS WE ARE GOING TO BE PUSHING OUT BRIEF SURVEY IN JUST A LITTLE BIT. AND ONE LUCKY VIEWER TODAY IS GOING TO BE RECEIVING A ONE HUNDRED DOLLAR AMAZON GIFT CARD!
  • HELLO EVERYONE MY NAME IS JONAS TICHENOR AND I AM DIRECTOR OF CONTENT HERE AT THE CHANNEL COMPANY AS WELL AS A CONTRIBUTING EDITOR WITH CRN.COM. Twitter handle @jonastichenor


  • JOINING ME TODAY A COUPLE OF VERY SPECIAL GUESTS … AVI TURIEL, DIRECTOR OF THREAT RESEARCH WITH CYREN…



  • 1) Tell us a bit about CYREN.
  • 2) How are businesses using Internet services differently today – and how is this affecting Internet security?
  • 3) How does CYREN help security resellers to respond to this changing market?
  • Easy provisioning and deployment
    Transparency
    Traffic optimization – compression, latency, geography
    Smooth authentication process
    Security enforcement
    No impact on battery life
  • 4) How does it work, and how can resellers sell it as their own service?

  • 5) How steep is the learning curve – for the resellers and also the small businesses they sell to?



  • 6) Can we see some of the reseller features and also some of the mobile security features?
  • 7) Summarize – what are the main highlights of WebSecurity that make it suitable for the new mobile workforce reality?
  • UNFORTUNATELY THAT IS ALL THE TIME WE HAVE FOR TODAY, IF YOU’VE MISSED ANY PORTION OF TODAYS CHANNEL CAST, IT WILL BE AVAILABLE IN ITS ENTIRETY ON-DEMAND.
    SPEAKING OF ON DEMAND, WE HAVE AN ENTIRE LIBRARY OF GREAT CHANNEL CONTENT, PAST, PRESENT AND FUTURE AND YOU CAN ACCESS IT BY LIKING US ON FACEBOOK/CHANNELCASTS, OR GO TO CRN.COM/CHANNEL-CAST/INDEX.HTM.

  • I WANT TO ONCE AGAIN THANK MY GUEST AVI TURIEL FOR BEING PART OF TODAYS EVENT, AND WANT TO THANK ALL OF YOU FOR JOINING US TODAY,
    AND FOR ALL OF US AT THE CHANNEL COMPANY, MY NAME IS JONAS TICHENOR, HAVE A GREAT DAY AND WE’LL SEE YOU NEXT TIME!
  • Transcript

    1. The channel community’s trusted authority for growth and innovation for more than three decades. Enabling Technology Partnerships The Channel Company & CYREN Cloud Security for the New Mobile Workforce Reality
    2. Speaking Today Jonas Tichenor Director of Content The Channel Company @JonasTichenor
    3. Speaking Today Avi Turiel Director of Threat Research, CYREN
    4. © 2014 CYREN Confidential and Proprietary 4 © 2014 CYREN Confidential and Proprietary 4 WHO WE ARE
    5. © 2014 CYREN Confidential and Proprietary 5 LEADING PROVIDER OF INTERNET SECURITY TECHNOLOGY AND CLOUD-BASED SERVICES NASDAQ: CYRN
    6. © 2014 CYREN Confidential and Proprietary 6 WHO WE WORK WITH
    7. © 2014 CYREN Confidential and Proprietary 7 GLOBAL REACH OFFICESDATA CENTERS © 2014 CYREN Confidential and Proprietary
    8. © 2014 CYREN Confidential and Proprietary 8 OUR PRODUCTS WEB The industry’s broadest and most actionable security intelligence combined with a robust web filtering platform secures all your devices, anywhere you go EMAIL Not just scanning emails with open source signatures; we track and leverage the global distribution patterns and our global real-time insight to stop the bad guys subverting email ANTIMALWARE Our market leading solutions secure your platform from threats without impacting performance
    9. © 2014 CYREN Confidential and Proprietary 9 WHAT MAKES US DIFFERENT + SPEED ACCURACY REAL-TIME INSIGHT We see more than anyone else. RECURRENT PATTERN DETECTION Our patented detection technology GLOBALVIEW™ CLOUD The most robust transaction base in the industry
    10. © 2014 CYREN Confidential and Proprietary 10  We focus on our core competencies so you can focus on yours.  Products designed for partners  Won’t compete for your business COMMITTED TO PARTNER SUCCESS WHAT MAKES US DIFFERENT © 2014 CYREN Confidential and Proprietary
    11. © 2014 CYREN Confidential and Proprietary 11 © 2014 CYREN Confidential and Proprietary 11 MARKET DRIVERS
    12. © 2014 CYREN Confidential and Proprietary 12 12© 2014 CYREN Confidential and Proprietary BYOD AND INCREASED MOBILITY HAVE CHANGED THE WAY EMPLOYEES ACCESS THE INTERNET THE SECURITY MARKET IS EVOLVING
    13. © 2014 CYREN Confidential and Proprietary 13 © 2014 CYREN Confidential and Proprietary THE SECURITY MARKET IS EVOLVING LEADING TO INCREASED COMPLEXITY IN IMPLEMENTING, MANAGING AND DEPLOYING SECURITY SOLUTIONS
    14. © 2014 CYREN Confidential and Proprietary 14 Source: IDC, June 2013 THE SECURITY MARKET SAAS IS BY FAR THE LARGEST GROWTH OPPORTUNITY
    15. © 2014 CYREN Confidential and Proprietary 15 © 2014 CYREN Confidential and Proprietary 15 CYREN WEBSECURITY
    16. © 2014 CYREN Confidential and Proprietary 16 LAUNCH A BRANDED WEB SECURITY SERVICE WITH STRONG DIFFERENTIATORS INTRODUCING CYREN WEBSECURITY © 2014 CYREN Confidential and Proprietary
    17. © 2014 CYREN Confidential and Proprietary 17  Android and iOS  White-labeled app for partner rebranding  Rule management for BYOD and corporate devices A TOTAL SOLUTION FOR ROAMING USERS, SMARTPHONES AND TABLETS - INCLUDING BYOD MOBILITY © 2014 CYREN Confidential and Proprietary
    18. © 2014 CYREN Confidential and Proprietary 18  Threat-sharing GlobalView network  Integrated antimalware scanning  APT Detection PROVEN CYREN CLOUD-BASED WEB SECURITY ADVANCED SECURITY © 2014 CYREN Confidential and Proprietary
    19. © 2014 CYREN Confidential and Proprietary 19 SERVICE ARCHITECTURE GlobalView™ Cloud GlobalView Database Security Scanning and URL Filtering Branded Web-based Provisioning, Management and Reporting Internet Mobile & Roaming Desktops Routers & Appliances HeurisTech Security HeurisTech Security 1. Product is neutral/CYREN branded as standard 2. Partner private labels the service, or, 3. Partner co-brands the service 4. End customers are provisioned and start using the service
    20. © 2014 CYREN Confidential and Proprietary 20  Easy customer provisioning  Online private labeling  Multi-tier management portal TRULY INTUITIVE WEB INTERFACE FOR PARTNERS AND ALL LEVELS OF ADMINISTRATORS EASE OF USE © 2014 CYREN Confidential and Proprietary
    21. © 2014 CYREN Confidential and Proprietary 21 © 2014 CYREN Confidential and Proprietary 21 DEMONSTRATION
    22. © 2014 CYREN Confidential and Proprietary 22 HeurisTech Security Partner Customer Office Users Mobile users Customer Partner Customer Office users CYREN WEBSECURITY – PARTNER McMillan ENGINEERING
    23. © 2014 CYREN Confidential and Proprietary 23 HEURISTECH ECO-SYSTEM OVERVIEW - DASHBOARD.
    24. © 2014 CYREN Confidential and Proprietary 24 HEURISTECH CUSTOMIZES THE INTERFACE, DOMAIN, PLAY STORE, ETC.
    25. © 2014 CYREN Confidential and Proprietary 25 HEURISTECH CUSTOMIZES THE LICENSING AND PACKAGE OPTIONS
    26. © 2014 CYREN Confidential and Proprietary 26 McMillan ENGINEERING Partner Customer Office Users Mobile users Customer Partner Customer Office users CYREN WEBSECURITY – CUSTOMERS HeurisTech Security
    27. © 2014 CYREN Confidential and Proprietary 27 CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING - DASHBOARD OF WEB ACTIVITY
    28. © 2014 CYREN Confidential and Proprietary 28 CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING DEFINES USERS – INCLUDING MOBILE/BYOD
    29. © 2014 CYREN Confidential and Proprietary 29 CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING DEFINES SECURITY POLICY
    30. © 2014 CYREN Confidential and Proprietary 30 CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING APPLIES POLICY TO USERS – ALSO ROAMING/BYOD
    31. © 2014 CYREN Confidential and Proprietary 31 CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING – DETAILED REPORTS
    32. © 2014 CYREN Confidential and Proprietary 32 © 2014 CYREN Confidential and Proprietary 32 RECAP
    33. © 2014 CYREN Confidential and Proprietary 33 WEB SECURITY OPPORTUNITY  Ease of management / ease of use  Easy provisioning and management for Mobile/BYOD  The best account and end user provisioning experience in the industry  Partner-ready and partner-friendly revenue opportunity  Turnkey Web Security recurring revenue  Business logic enables any go-to-market model or sales ecosystem  Cloud-based security analysis and detection quality  Detection you know – already powering solutions across the industry  Ongoing Innovation – existing and new services such as APT
    34. © 2014 CYREN Confidential and Proprietary 34 © 2014 CYREN Confidential and Proprietary 34 THANK YOU. ANY QUESTIONS? “We are excited to see the emergence of state-of-the-art cloud based protection for mobile and roaming users. CYREN WebSecurity will help MXSweep deliver the easy to consume and best of breed cloud based security that our customers expect.” Tom O’Brien CEO MXSweep
    35. Q&A: Submit Your Questions Now • Jonas Tichenor, Director of Content & CRN Contributing Editor • Avi Turiel, Director of Threat Research, CYREN
    36. Check Out Upcoming and On Demand ChannelCasts! www.facebook.com/channelcasts http://www.crn.com/channel- cast/index.htm
    37. The channel community’s trusted authority for growth and innovation for more than three decades. Leverage our proven and leading edge brands and platforms to deliver prescriptive sales and marketing solutions for the technology channel. Enabling Technology Partnerships Thank You

    ×