Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Upcoming SlideShare
Loading in...5
×
 

Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

on

  • 1,203 views

Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

Statistics

Views

Total Views
1,203
Views on SlideShare
970
Embed Views
233

Actions

Likes
0
Downloads
5
Comments
0

2 Embeds 233

http://productnation.in 216
http://pn.ispirt.in 17

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Gartner report: https://www.gartner.com/it/page.jsp?id=1849621 claiming 900+ million tablets in market.
  • Network Management complexity: http://www.i7nw.com/cambrian-explosion-era-of-smart-devices-cio/
  • MDMDevice controlsDevice monitoringDevice configurationTelecom expensesActivation/deactivationMAMApp StoreApplication level securityRole-based accessSync ServerApp Admin ConsoleOther solutions (combine features of MAM+MDM)VDIContainerizationOur Product covers most of the boxes, except these:Public PlacesWired network connections
  • PG is a user-focused, network-based access control. Basic building blocks are:Developing security policies. You need one place to see where Corporate Users, Guests, and Contractors are allowed to go. - Centralized Policy Management.Monitoring posturesWhat is the required security posture for each user/device that uses the network?Are anti-virus, anti-spam and firewall tools up-to-date? What about operating system patches? Are users running any prohibited programs?Comparing postures to policiesTaking action:Either on initial access (pre-admission) or while connected (post-admission)?Is the user routed to a quarantined network space, or denied access entirely? Reporting/Analytics:what types of devices are being used on your wireless network or wired network? Where are they connecting from? You’ll need to spot usage statistics and device details to know what network and policy decisions to make in the future. Sample Network Access PolicyUser must be authenticated with Identity Management SystemEndpoint must be healthy.AV configured and running.Recent scan shows no malware.Patches up-to-date.Behavior must be acceptable.No port scanning, sending spam, No P2P Filesharing.

Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks Presentation Transcript

  • “Peregrine Guard” Enterprise Mobile Security BYOD Auto Discovery • Access Control
  • BYOD – Bring Your Own Device/Disaster!• By 2016…. o 900 million tablets in market o 982 million smart phones shipping annually.• WebRoot Survey, June, 2012 o 83% of respondents believe that mobile devices create a high security risk within the corporate environment.• Gartner – Shifting from Enterprise-owned to BYOD o Warns business that there are three major hurdles that they have to consider in their BYOD policy. •The right of users to leverage the capabilities of their personal devices Impact 1 conflicts with enterprise mobile security policies and increases the risk of data leakage and the exploiting of vulnerabilities. •User freedom of choice of device and the proliferation of devices with Impact 2 inadequate security make it difficult to properly secure certain devices, as well as keep track of vulnerabilities and updates. •The users ownership of device and data raises privacy concerns and Impact 3 stands in the way of taking corrective action for compromised devices.
  • BYOD: Threats and Risks
  • Harnessing the BYOD phenomenon• BYOD Concerns o Network Security o User and Device Visibility o Network management complexity o Network performance o User experience• Challenges In Implementing BYOD o Employee Privacy o Mobile device market diversity o Finding the right approach to security
  • Current Solutions Devices Locations Applications Users Email, Sales ForceEmployee Corporate Corporate Contacts, Automation Owned Owned Location Calendar Privileged Employees or CRM Users Task & Managed by Office Guest Branch Projects Corporate Mgmt Applications Owned /MSP Offices Business and Contractors, B Regulatory usiness Consultants Partners Line ofDevices used Home Business Web Browsingfrom Home Offices Apps Offices Service Guests Personnel Instant Public Messaging Social Media Places MDM MAM / IAM
  • Peregrine Guardi7 Networks enables enterprises to “say YES” to BYOD byproviding an agentless paradigm for discovery and accesscontrol.Our premier offering in this space enables an intelligent, non-intrusive, clientless way of detecting all devices that are trying toconnect to the corporate network.By the use of proprietary algorithms and sophisticatedfingerprinting techniques, we extract highly granular informationlike device-type, device-class, OS, version, user of thedevice, etc;This information is used to provide device based differentialaccess to corporate assets and to make sure sensitive data isprovided right access to the right device type.
  • PG: Granular Access Controlo Deviceo Usero Applicationo Location (HQ/branch/ODC group)o Timeo Intrusion Detection (if malware is detected, then access could be disabled immediately)o Endpoint security (preventing jailbroken/rooted devices and below baseline)o Resource
  • PG: Policy Control• Admin can create policies like: o Allow access to Patient Records Server, if; • User is Authenticated • Role is Physician • Authentication is 802.1x (EAP-PEAP) • Device is iPad • Location is Hospital
  • PG: Policy Control Corp UserHigh Trust Registered DeviceMedium Known UserTrust Device Compliance passed Any DeviceLow Trust Any User Not Jailbroken Any DeviceNo Trust Any User
  • PG: Reporting
  • Team• Manjunath M. Gowda (20+) – CEO (S7)• Chandra Shekar M (20+) – Director (S7)• Sachin Shelar (10+) – Network Architect & Eng. Manager (S7)• Harish Ramachandra (10+)– Network Architect (S7)• Srinivas Guntupalli (10+)– Network Architect• Jagadeesh M. Rajanna (5+) – Sr. Network Engineer (S7)• Harsha Gunda (5+) – Senior Finance (S7)• Uma Ramesh (10+) – Senior Admin (S7)• Geeta Gouri (2+) – Digital Marketing
  • Angel Investors• Sharad Sharma – ex-CEO Yahoo R&D• Brian NeSmith – ex-CEO Bluecoat Systems• Rao Remala – ex-Senior Director MS & member Angel Network Seattle• Murali Rao – Senior Product Architect, MS
  • Thank You!http://www.i7nw.comhttp://youtu.be/aHGyAfIWUpsInformation info@i7nw.comSales sales@i7nw.comEMEA Sales w.kramer@i7nw.eu