SlideShare a Scribd company logo
1 of 16
1
24 March 2015 © 2014 CYREN Confidential and Proprietary
CYBERSECURITY OF THINGS
A PRACTICAL LOOK AT THE INTERNET OF THINGS AND CYBERSECURITY
Christian Milde
Sales Director – DACH
© 2014 CYREN Confidential and Proprietary
2
FRISK with
 Frisk founded 1989 (Iceland)
 2012 Acquired by Commtouch (CYREN)
 First engine which used heuristic
technologies
 The only company which not had to buy
other engines
ABOUT CYREN = FOUNDATION OF 3 COMPANIES
 1991 Founded
 2010 Acquisition of Command AV
 2012 Acquisition of FRISK
 2012 Acquisition of Eleven
 2014 CYREN renaming
 Founded 2001
 eXpurgate email security, used by
over 45,000 companies
 dominating email security in
Germany with 60% market share
 Processing more than 1 billion
emails per day in Germany
3
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN POWERS THE WORLD’S SECURITY
Our Cyber Intelligence is the security foundation of many of the world’s
largest and most influential information technology and Internet brands.
4
© 2015 CYREN Confidential and Proprietary
4
IOT MARKET
5
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
THE INTERNET OF THINGS IN 2020 - ACCORDING TO GARTNER
 Over 25 BILLION IoT devices
 Less than 5% of IoT connections will go
through SIM-based, M2M cellular services
 Over a quarter billion connected cars with
automated driving capabilities
 900 Exhibitors at CES 2015 were
manufacturers of IoT devices
 Today‘s hype will be mature within 5 years
6
Q&A FROM OUR CUSTOMERS
7
STATISTICS
 Cybersecurity is the fastest growing risk for any business
 While 73% of businesses don‘t have a plan for upcoming threats
 Our analytics show Germany is the prime market for botnet origin
email harvester with 73% followed by China with only 9%!
Source: Allianz
8
© 2015 CYREN Confidential and Proprietary
8
CYBERSECURITY
OF THINGS
9
IOT CYBERCECURITY BASICS
 Device manufacturer must use:
 Secure boot
 Code hardening
 Access control
 Device authentication
 Secure provisioning
 Despite this, devices will still be hacked…
 Poor Password Protection
 Firmware Exploit— hack in Firmware
 Bugs and Vulnerabilities at the access or
programming code
10
APPLIED CYBER INTELLIGENCE IS THE WAY FORWARD
APPLICATION
Policy, Enforcement, Logging,
Alerting, Reporting
ANALYSIS
RPD, Heuristics, Signature, Human, etc.
DATA
17 BILLION transactions per day
SENSORS
500 THOUSAND points of presence,
protecting 600 MILLION users
UserValue
SECURITY
Applied
Cyber Intelligence
INSIGHT
Cyber Intelligence
Pre-Compromise Compromise Post-Compromise
Reconnaissance Weaponization Delivery Exploitation Installation Command
& Control
Actions
on Target
Stop the Cyber Kill Chain
11
CYREN BY NUMBERS
Inspection
Detection
Collection
SPEED, ACCURACY, AND REAL-TIME INSIGHT
12
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Data Collection
Data Analysis
Solutions
Consumption
Cyber Feeds Software Development Kit Software as a Service
Products
- Advanced Malware dataset
- Advanced Phishing dataset
- Zero-hour threats
- IP Reputation dataset
- URL Categorization DB
- IP Reputation
- Antispam SDK
- Antivirus SDK
- URL Categorization SDK
- Web Security
- Email Security
Predictive / reputational data
Zero Hour Threat Detection
Local and global threat patterns
HTTP / IP Categorization
0% 20% 40% 60% 80% 100%
HTTP
SMTP
IP
DNS
CYREN’S INTELLIGENCE
13
FLEXIBLE DEPLOYMENT OPTIONS
 99% queries answered via local cache
 Compatible with most Operating Systems
 For devices which regularly contact outside
networks
 100% of queries are directed to the cloud
from device
 For devices which rarely contact outside
networks and with low resources
Cyber Threat Protection
WebSecurity
OUTBOUND  Botnet C&C Traffic, Malicious URL / IP, Spam
Virus, Adware, Spyware, Malicious Scripts, Emails  INBOUND
14
PLACING CYBERSECURTY OF THINGS
1. Device Communication Analysis
2. Real time inspection in
GlobalView Cloud
3. Detect communication to
malicious IP, URL, etc.
4. Notify device / manufacturer for
reset or remediation
3
2
41
15
JOIN AND WIN WITH US
Improved End-User
Satisfaction
Increased
Revenue
Product
Differentiation
Sales,MarketingandTechnical
Support
CYREN helps you satisfy your
customers’ needs, ensuring
their users are protected on any
device, from any location.
Be the first to market
with best-of breed Internet
security technology.
CYREN ensures you have
everything you need to support
your sales model.
Our products are easily
integrated to ensure
cost-effectiveness, scalability,
and momentum.
16
© 2015 CYREN Confidential and Proprietary
16
BE SAFE, FEEL GOOD.
You can also find us here:
www.CYREN.com
twitter.com/cyreninc
linkedin.com/company/cyren
Christian Milde
Sales Director - DACH
+49 1520 1647 213
christian.milde@CYREN.com

More Related Content

What's hot

Case Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicCase Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicIBM Security
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarCipherCloud
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseNowSecure
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessIBM Security
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection securityIBM Security
 
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceWebinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceCipherCloud
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Ping Identity
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7Networks
 
Digital Security
Digital SecurityDigital Security
Digital Securityaccenture
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Sam Norallah
 
"Azure is the new black”
"Azure is the new black” "Azure is the new black”
"Azure is the new black” Marketing Team
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanIndus Khaitan
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
AWS Summit Singapore - The Age of Security Automation for Modern Application ...
AWS Summit Singapore - The Age of Security Automation for Modern Application ...AWS Summit Singapore - The Age of Security Automation for Modern Application ...
AWS Summit Singapore - The Age of Security Automation for Modern Application ...Amazon Web Services
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present DangerPing Identity
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4IBM Security
 

What's hot (20)

Case Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicCase Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographic
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: Webinar
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection security
 
SYPHERSAFE
SYPHERSAFESYPHERSAFE
SYPHERSAFE
 
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceWebinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprises
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
"Azure is the new black”
"Azure is the new black” "Azure is the new black”
"Azure is the new black”
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
AWS Summit Singapore - The Age of Security Automation for Modern Application ...
AWS Summit Singapore - The Age of Security Automation for Modern Application ...AWS Summit Singapore - The Age of Security Automation for Modern Application ...
AWS Summit Singapore - The Age of Security Automation for Modern Application ...
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present Danger
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 

Similar to Cyren cybersecurity of things

CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Cyren, Inc
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomyCisco Russia
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security PresentationIdeba
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...Cloudflare
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014Sectricity
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14IBM Sverige
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterAnna Landolfi
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYForgeRock
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 

Similar to Cyren cybersecurity of things (20)

CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 

Recently uploaded

Point of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryPoint of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryoyebolasonuga14
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理uodye
 
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样ayoqf
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证wpkuukw
 
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Priya Reddy
 
Mass storage systems presentation operating systems
Mass storage systems presentation operating systemsMass storage systems presentation operating systems
Mass storage systems presentation operating systemsnight1ng4ale
 
🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...
🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...
🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...Call Girls Mumbai
 
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证wpkuukw
 
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...gajnagarg
 
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证wpkuukw
 
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理uodye
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...drmarathore
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证ehyxf
 
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call GirlVashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call GirlPriya Reddy
 
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证ehyxf
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证tufbav
 

Recently uploaded (20)

Point of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryPoint of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratory
 
Abortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get CytotecAbortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get Cytotec
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
 
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
 
Mass storage systems presentation operating systems
Mass storage systems presentation operating systemsMass storage systems presentation operating systems
Mass storage systems presentation operating systems
 
🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...
🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...
🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...
 
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
 
Critical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptxCritical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptx
 
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
 
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
 
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
 
Buy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Buy Abortion pills in Riyadh |+966572737505 | Get CytotecBuy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Buy Abortion pills in Riyadh |+966572737505 | Get Cytotec
 
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call GirlVashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
 
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pillsIn Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
 
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
 

Cyren cybersecurity of things

  • 1. 1 24 March 2015 © 2014 CYREN Confidential and Proprietary CYBERSECURITY OF THINGS A PRACTICAL LOOK AT THE INTERNET OF THINGS AND CYBERSECURITY Christian Milde Sales Director – DACH
  • 2. © 2014 CYREN Confidential and Proprietary 2 FRISK with  Frisk founded 1989 (Iceland)  2012 Acquired by Commtouch (CYREN)  First engine which used heuristic technologies  The only company which not had to buy other engines ABOUT CYREN = FOUNDATION OF 3 COMPANIES  1991 Founded  2010 Acquisition of Command AV  2012 Acquisition of FRISK  2012 Acquisition of Eleven  2014 CYREN renaming  Founded 2001  eXpurgate email security, used by over 45,000 companies  dominating email security in Germany with 60% market share  Processing more than 1 billion emails per day in Germany
  • 3. 3 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. CYREN POWERS THE WORLD’S SECURITY Our Cyber Intelligence is the security foundation of many of the world’s largest and most influential information technology and Internet brands.
  • 4. 4 © 2015 CYREN Confidential and Proprietary 4 IOT MARKET
  • 5. 5 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. THE INTERNET OF THINGS IN 2020 - ACCORDING TO GARTNER  Over 25 BILLION IoT devices  Less than 5% of IoT connections will go through SIM-based, M2M cellular services  Over a quarter billion connected cars with automated driving capabilities  900 Exhibitors at CES 2015 were manufacturers of IoT devices  Today‘s hype will be mature within 5 years
  • 6. 6 Q&A FROM OUR CUSTOMERS
  • 7. 7 STATISTICS  Cybersecurity is the fastest growing risk for any business  While 73% of businesses don‘t have a plan for upcoming threats  Our analytics show Germany is the prime market for botnet origin email harvester with 73% followed by China with only 9%! Source: Allianz
  • 8. 8 © 2015 CYREN Confidential and Proprietary 8 CYBERSECURITY OF THINGS
  • 9. 9 IOT CYBERCECURITY BASICS  Device manufacturer must use:  Secure boot  Code hardening  Access control  Device authentication  Secure provisioning  Despite this, devices will still be hacked…  Poor Password Protection  Firmware Exploit— hack in Firmware  Bugs and Vulnerabilities at the access or programming code
  • 10. 10 APPLIED CYBER INTELLIGENCE IS THE WAY FORWARD APPLICATION Policy, Enforcement, Logging, Alerting, Reporting ANALYSIS RPD, Heuristics, Signature, Human, etc. DATA 17 BILLION transactions per day SENSORS 500 THOUSAND points of presence, protecting 600 MILLION users UserValue SECURITY Applied Cyber Intelligence INSIGHT Cyber Intelligence Pre-Compromise Compromise Post-Compromise Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Actions on Target Stop the Cyber Kill Chain
  • 12. 12 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Data Collection Data Analysis Solutions Consumption Cyber Feeds Software Development Kit Software as a Service Products - Advanced Malware dataset - Advanced Phishing dataset - Zero-hour threats - IP Reputation dataset - URL Categorization DB - IP Reputation - Antispam SDK - Antivirus SDK - URL Categorization SDK - Web Security - Email Security Predictive / reputational data Zero Hour Threat Detection Local and global threat patterns HTTP / IP Categorization 0% 20% 40% 60% 80% 100% HTTP SMTP IP DNS CYREN’S INTELLIGENCE
  • 13. 13 FLEXIBLE DEPLOYMENT OPTIONS  99% queries answered via local cache  Compatible with most Operating Systems  For devices which regularly contact outside networks  100% of queries are directed to the cloud from device  For devices which rarely contact outside networks and with low resources Cyber Threat Protection WebSecurity OUTBOUND  Botnet C&C Traffic, Malicious URL / IP, Spam Virus, Adware, Spyware, Malicious Scripts, Emails  INBOUND
  • 14. 14 PLACING CYBERSECURTY OF THINGS 1. Device Communication Analysis 2. Real time inspection in GlobalView Cloud 3. Detect communication to malicious IP, URL, etc. 4. Notify device / manufacturer for reset or remediation 3 2 41
  • 15. 15 JOIN AND WIN WITH US Improved End-User Satisfaction Increased Revenue Product Differentiation Sales,MarketingandTechnical Support CYREN helps you satisfy your customers’ needs, ensuring their users are protected on any device, from any location. Be the first to market with best-of breed Internet security technology. CYREN ensures you have everything you need to support your sales model. Our products are easily integrated to ensure cost-effectiveness, scalability, and momentum.
  • 16. 16 © 2015 CYREN Confidential and Proprietary 16 BE SAFE, FEEL GOOD. You can also find us here: www.CYREN.com twitter.com/cyreninc linkedin.com/company/cyren Christian Milde Sales Director - DACH +49 1520 1647 213 christian.milde@CYREN.com

Editor's Notes

  1. Zusammenschluss 3 Firmen, akquiriert in 2012 durch die damalige Commtouch
  2. Das wohl am besten gehütete Geheimnis im Security Markt – CYREN ist der Technologielieferant für 9 von 11 führenden Unternehmen im MQ von Gartner.
  3. IoT ist zur Zeit in aller Munde und wird sich über die kommenden 5 Jahre festigen. Bis dahin werden wir über 25 Milliarden mit dem Internet kommunizierende Geräte sehen. Allein auf der CES waren es dieses Jahr 900 Austeller mit IoT Geräten – den Trend sehen wir auch hier auf der Cebit!
  4. Wir haben unsere Kunden gefragt, welche IoT‘s für sie am gefährdetsten sind – es sind unsere Geräte im Office und für unser tägliches Business. Interessant, dass auch unsere Autos – des dt. liebstes Kind – gleich auf mit den Hausgeräten sind.
  5. Aus der Sicht der Geschäftswelt sind CYBER Kriminalität und Sicherheit ein top Thema – wie Allianz herausfand. Vor 2 Jahren noch nicht einmal in der Top Ten, hat IT Sicherheit das Zeug zur größten Gefahr für die deutsche Wirtschaft mit bereits 32% Relevanz in 2014. Scheinbar nicht nur ein Gefühl wie auf der vorigen Statistik sondern Realität: zu einer Zeit in der 73% der weltweiten Botnetzaktivitäten auf dt. Territorium fallen. Gefolgt von nur 9% in China. Völlig unverständlich, dass derzeit 73% der IT Verantwortlichen noch keinen Plan oder Budget haben diese Gefahren zu stoppen.
  6. In diesem Umfeld – arbeiten Gerätehersteller weiter daran die SW sicherer zu machen, mit: Sicheren Startsequenzen und Verschlüsselung Access Kontrolle Authentisierung Sicherer Inbetriebnahme Aber trotz alledem, sind die Geräte weiterhin CYBER Kriminellen ausgesetzt, wegen: Mangelndem Passwortschutz Firmware Hacks Fehler im Zugangs oder Programmier-Code
  7. Was können wir tun? Wir müssen die CYBER Kill Kette stoppen! Und das bereits bevor sich Bedrohungen und Angriffe auf Sie richten. Wie? CYBER Intelligenz, resultierend aus BigData Analytics unserer 0,5Mil Sensoren und 600Mil Nutzer mit 17 Milliarden Sicherheitstransaktionen jeden Tag.
  8. Für jedes Gerät gibt es spezifische Anforderungen. Auf diese Applikation und Anforderungen abgebildet liefern wir passgenaue Lösungen z.B. per direct to cloud mit integrierter APT oder ein SoftwareKit auf dem Gerät mit lokalem Cache werden Bedrohungen sofort erkannt und abgewehrt.
  9. Hier ein Bespiel für einen zu schützenden TV, der installierte Apps auf Malware prüft oder die Kommunikation unterbricht sollte diese nicht den Sicherheitsvorgaben entsprechen.
  10. So können wir die Nutzer und Kunden unserer Partner schützen und ich freue mich auf die gemeinsame Zeit im Zeitalter dem sicheren Internet der Dinge.