Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

1,014 views

Published on

i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative. Started in June 2012; they work on the space of BYOD security; Their sweet spot is 100% Agentless device discovery, fingerprinting and health-check and then denying infected/malicious devices from connecting to corporate network.

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

  1. 1. Copyright i7 Networks, i7nw.com
  2. 2. Welcome to “Me” Enterprise How BYOD has changed the security map and how “Peregrine 7” helps tackle it? Copyright i7 Networks, i7nw.com Manjunath M Gowda CEO, i7 Networks Bangalore, India manju_s7 in/manjunathgowda/
  3. 3. WHY BYOD matters? Copyright i7 Networks, i7nw.com
  4. 4. • 90%of enterprises will use personal devices in Enterprise by 2014 - Gartner • 20% Savings: CISCO claimed due to BYOD & declared: “We don’t pay for it, and our users are happier.” • Survey: Enterprises that don't support BYOD are at competitive disadvantage Copyright i7 Networks, i7nw.com
  5. 5. So what is stopping them? Copyright i7 Networks, i7nw.com
  6. 6. 75% CIOs said Compliance & Security biggest challenge in allowing BYOD Copyright i7 Networks, i7nw.com
  7. 7. DARK READING – July 2013 Copyright i7 Networks, i7nw.com
  8. 8. Copyright i7 Networks, i7nw.com 62% - Loss of a device that has Sensitive Data – (MDMs solve this) 61% - An infected personal device connecting to the Corporate Network
  9. 9. Business overview Copyright i7 Networks, i7nw.com
  10. 10. 79% business had a mobile incident last year alone – Checkpoint 600%+ growth in mobile malware in last 2 years 20 Mn+ devices jailbroken in just two months (Jan 2013) 18 Mn infected Android devices by end of 2013 71% mobile devices have OS / application vulnerabilities Copyright i7 Networks, i7nw.com
  11. 11. $500K+ cost per such incident $1.5Mn cost per such settlement Copyright i7 Networks, i7nw.com
  12. 12. Why traditional tools can’t help here? Copyright i7 Networks, i7nw.com
  13. 13. • Perimeter security and not for inside-inside or inside-out threats • Used to IT-owned devices and not personal devices (agented) • Used to take care of outside2inside threats Copyright i7 Networks, i7nw.com
  14. 14. So what tools do exist to solve it? Copyright i7 Networks, i7nw.com
  15. 15. 15 Copyright i7 Networks, i7nw.com MDMs, EPP Airwatch, MobileIron, Zenprise MAMs Bitzer, IBM, SAP, Good MDPs AT&T toggle, Divide, VMware MNAC i7Networks Device level n e t w o r k Mobile Security Tools Quadrant Server side
  16. 16. Our value proposition Copyright i7 Networks, i7nw.com
  17. 17. “We protect your network from malicious/infected BYODs” Copyright i7 Networks, i7nw.com
  18. 18. “We Protect the Enterprise Network” by -Detect & Fingerprint1 all personal devices -Prevent the malicious devices from connecting -100% Agentless (Zero-touch) -Zero-Latency Deployment -Provide detailed Compliance Reports “To Know & To Protect” 1 Secure detection & fingerprinting (US patent pending) Copyright i7 Networks, i7nw.com
  19. 19. • Name • Screen caps • Demo PeregrineGuardTM
  20. 20. i7 Networks; i7 Confidential Not just phones, we support all wireless devices.
  21. 21. Continuous Monitoring Complete VisibilityComplete Visibility Endpoint AuthenticationEndpoint Authentication Vulnerability and malicious assessment Vulnerability and malicious assessment Granular policy enforcement Granular policy enforcement Compliance ReportingCompliance Reporting Entry Verification – Corporate Wi-Fi or VPN? Entry Verification – Corporate Wi-Fi or VPN? Allow Deny Compromised /Jailbroken/ Unauthorized/Unmanaged check Compromised /Jailbroken/ Unauthorized/Unmanaged check Deny Deny Personal Devices
  22. 22. the questions we answer Copyright i7 Networks, i7nw.com
  23. 23. Copyright i7 Networks, i7nw.com • What devices are getting into the corporate network? • Who do they belong to? • Are they infected? • Are they compromised or malicious? • How vulnerable are they? • What are they accessing? • What apps* are they running? • Can I control the access? • Can I get Compliance audit reports?
  24. 24. How do you deploy? Copyright i7 Networks, i7nw.com
  25. 25. • 100% agentless and non-intrusive – Zero Touch • Complete off-line deployment – Zero-Latency • Just ONE probe* in the network • Supports: Corporate Wi-Fi/ Public Wi- Fi/3G/4G/LTE Deployment
  26. 26. i7 Networks; i7 Confidential
  27. 27. - Microsoft AD, RADIUS and LDAP - Microsoft Exchange - Maas 360 MDM - Microsoft System Center* - IBM Tivoli* - Cisco/Juniper and Fortinet VPN - Snort IDS - CVE database Integrates with
  28. 28. Why “Agentless” is Sweet?  Copyright i7 Networks, i7nw.com
  29. 29. 14different OS types & growing; Add versions and models5 45% enterprises have more than 5 times as many BYOD as they had 2 years ago3 3.5– Average number of devices per Employee 42%- Average churn of devices per year among enterprise employees < 10% enterprises aware of all mobile devices accessing their network & servers3 27% of devices are ‘approved’ by the company6Copyright i7 Networks, i7nw.com
  30. 30. So what’s unique? Copyright i7 Networks, i7nw.com
  31. 31. 4A (Attributes) Discovery & Fingerprinting Health Check Discover Apps on the wire*, Policy Enforcement 4A (Attributes) Discovery & Fingerprinting Health Check Discover Apps on the wire*, Policy Enforcement 4D (Deployments) 100% Agentless (Zero-touch), ZERO-Latency SINGLE Probe, Wi-Fi/3G/4G/LTE 4D (Deployments) 100% Agentless (Zero-touch), ZERO-Latency SINGLE Probe, Wi-Fi/3G/4G/LTE 4T (Threat-Protections) Malicious & Intrusion Prevention Zero-day Attack Prevention*, Vulnerability Check Check of anti-malware s/w 4T (Threat-Protections) Malicious & Intrusion Prevention Zero-day Attack Prevention*, Vulnerability Check Check of anti-malware s/w 4K (Keywords) 100% Agentless Patent-Pending Algorithms Detailed Fingerprinting Zero-Latency 4K (Keywords) 100% Agentless Patent-Pending Algorithms Detailed Fingerprinting Zero-Latency
  32. 32. Available as : Appliance / Virtual Appliance Available as : Appliance / Virtual Appliance
  33. 33. What is that you do MDM cannot? Copyright i7 Networks, i7nw.com
  34. 34. oCannot do Discovery and fingerprint of all devices  Authorized  Unauthorized  Unmanaged  Non-mobile devices like e-Readers, Wi-Fi watches, Gaming devices, Healthcare devices etc. Copyright i7 Networks, i7nw.com
  35. 35. oMalware detection via signature is only 28%; Cannot catch malicious traffic @ network layer (not even at device layer) oCannot do Access control based on device attributes oCannot enforce different access rules for different departments/ LoBs Copyright i7 Networks, i7nw.com
  36. 36. oHot-spotting/Mac-spoofing cannot be detected oFails where you are not allowed to install a client on the device due to privacy or compliance oNot dynamic (need to stop iOS6.1?) Copyright i7 Networks, i7nw.com
  37. 37. How different are you from a traditional nac? Copyright i7 Networks, i7nw.com
  38. 38.  Support all: Wi-Fi & 3G/4G/LTE  100% Zero Touch (agentless)  Zero Latency (offline) (still we control)  Just ONE probe  Fits into any network infrastructure  Support all: Wi-Fi & 3G/4G/LTE  100% Zero Touch (agentless)  Zero Latency (offline) (still we control)  Just ONE probe  Fits into any network infrastructure  US Patent-pending fingerprinting algorithm  Mac-spoofing/Hot spotting  DVItm (Device Vulnerability Index)  Detecting apps on the wire (dropbox)  US Patent-pending fingerprinting algorithm  Mac-spoofing/Hot spotting  DVItm (Device Vulnerability Index)  Detecting apps on the wire (dropbox)  Completely focused on BYOD Security Completely focused on BYOD Security
  39. 39. Product Road Map? Copyright i7 Networks, i7nw.com
  40. 40. • Recognition of all Apps on the Wire • Detection of EPP (End Point Protection) tools • Chaining of P7s • Integrations into System Center and Tivoli • Integrations into MDMs • mNAC in the cloud to detect cloud access Copyright i7 Networks, i7nw.com
  41. 41. The TEAM Copyright i7 Networks, i7nw.com
  42. 42. Jeff Hunter Evangelist Peter Gilson CTO First Last CFO Jack Franklin CMO Heather Adler CEO Investors & Advisors 1st venture: $8.4M by Bluecoat (2010) Team together for second time Started June 12’ Product start Jan 13’
  43. 43. Questions? Copyright i7 Networks, i7nw.com manju.m@i7nw.com manju_s7

×