“Peregrine Guard”  Enterprise Mobile Security BYOD Auto Discovery • Access Control
BYOD – Bring Your Own Device/Disaster!• By 2016….   o 900 million tablets in market   o 982 million smart phones shipping ...
BYOD: Threats and Risks
Harnessing the BYOD         phenomenon• BYOD Concerns  o   Network Security  o   User and Device Visibility  o   Network m...
Current Solutions        Devices             Locations        Applications                      Users                     ...
Peregrine Guardi7 Networks enables enterprises to “say YES” to BYOD byproviding an agentless paradigm for discovery and ac...
PG: Granular Access          Controlo Deviceo Usero Applicationo Location (HQ/branch/ODC group)o Timeo Intrusion Detection...
PG: Policy Control• Admin can create policies like:  o Allow access to Patient Records Server, if;     •   User is Authent...
PG: Policy Control                           Corp UserHigh Trust                           Registered DeviceMedium        ...
PG: Reporting
Team• Manjunath M. Gowda (20+) – CEO (S7)• Chandra Shekar M (20+) – Director (S7)• Sachin Shelar (10+) – Network Architect...
Angel Investors• Sharad Sharma – ex-CEO Yahoo R&D• Brian NeSmith – ex-CEO Bluecoat Systems• Rao Remala – ex-Senior Directo...
Thank You!http://www.i7nw.comhttp://youtu.be/aHGyAfIWUpsInformation info@i7nw.comSales       sales@i7nw.comEMEA Sales w.kr...
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Upcoming SlideShare
Loading in …5
×

Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

1,218 views

Published on

Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

Published in: Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,218
On SlideShare
0
From Embeds
0
Number of Embeds
287
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Gartner report: https://www.gartner.com/it/page.jsp?id=1849621 claiming 900+ million tablets in market.
  • Network Management complexity: http://www.i7nw.com/cambrian-explosion-era-of-smart-devices-cio/
  • MDMDevice controlsDevice monitoringDevice configurationTelecom expensesActivation/deactivationMAMApp StoreApplication level securityRole-based accessSync ServerApp Admin ConsoleOther solutions (combine features of MAM+MDM)VDIContainerizationOur Product covers most of the boxes, except these:Public PlacesWired network connections
  • PG is a user-focused, network-based access control. Basic building blocks are:Developing security policies. You need one place to see where Corporate Users, Guests, and Contractors are allowed to go. - Centralized Policy Management.Monitoring posturesWhat is the required security posture for each user/device that uses the network?Are anti-virus, anti-spam and firewall tools up-to-date? What about operating system patches? Are users running any prohibited programs?Comparing postures to policiesTaking action:Either on initial access (pre-admission) or while connected (post-admission)?Is the user routed to a quarantined network space, or denied access entirely? Reporting/Analytics:what types of devices are being used on your wireless network or wired network? Where are they connecting from? You’ll need to spot usage statistics and device details to know what network and policy decisions to make in the future. Sample Network Access PolicyUser must be authenticated with Identity Management SystemEndpoint must be healthy.AV configured and running.Recent scan shows no malware.Patches up-to-date.Behavior must be acceptable.No port scanning, sending spam, No P2P Filesharing.
  • Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks

    1. 1. “Peregrine Guard” Enterprise Mobile Security BYOD Auto Discovery • Access Control
    2. 2. BYOD – Bring Your Own Device/Disaster!• By 2016…. o 900 million tablets in market o 982 million smart phones shipping annually.• WebRoot Survey, June, 2012 o 83% of respondents believe that mobile devices create a high security risk within the corporate environment.• Gartner – Shifting from Enterprise-owned to BYOD o Warns business that there are three major hurdles that they have to consider in their BYOD policy. •The right of users to leverage the capabilities of their personal devices Impact 1 conflicts with enterprise mobile security policies and increases the risk of data leakage and the exploiting of vulnerabilities. •User freedom of choice of device and the proliferation of devices with Impact 2 inadequate security make it difficult to properly secure certain devices, as well as keep track of vulnerabilities and updates. •The users ownership of device and data raises privacy concerns and Impact 3 stands in the way of taking corrective action for compromised devices.
    3. 3. BYOD: Threats and Risks
    4. 4. Harnessing the BYOD phenomenon• BYOD Concerns o Network Security o User and Device Visibility o Network management complexity o Network performance o User experience• Challenges In Implementing BYOD o Employee Privacy o Mobile device market diversity o Finding the right approach to security
    5. 5. Current Solutions Devices Locations Applications Users Email, Sales ForceEmployee Corporate Corporate Contacts, Automation Owned Owned Location Calendar Privileged Employees or CRM Users Task & Managed by Office Guest Branch Projects Corporate Mgmt Applications Owned /MSP Offices Business and Contractors, B Regulatory usiness Consultants Partners Line ofDevices used Home Business Web Browsingfrom Home Offices Apps Offices Service Guests Personnel Instant Public Messaging Social Media Places MDM MAM / IAM
    6. 6. Peregrine Guardi7 Networks enables enterprises to “say YES” to BYOD byproviding an agentless paradigm for discovery and accesscontrol.Our premier offering in this space enables an intelligent, non-intrusive, clientless way of detecting all devices that are trying toconnect to the corporate network.By the use of proprietary algorithms and sophisticatedfingerprinting techniques, we extract highly granular informationlike device-type, device-class, OS, version, user of thedevice, etc;This information is used to provide device based differentialaccess to corporate assets and to make sure sensitive data isprovided right access to the right device type.
    7. 7. PG: Granular Access Controlo Deviceo Usero Applicationo Location (HQ/branch/ODC group)o Timeo Intrusion Detection (if malware is detected, then access could be disabled immediately)o Endpoint security (preventing jailbroken/rooted devices and below baseline)o Resource
    8. 8. PG: Policy Control• Admin can create policies like: o Allow access to Patient Records Server, if; • User is Authenticated • Role is Physician • Authentication is 802.1x (EAP-PEAP) • Device is iPad • Location is Hospital
    9. 9. PG: Policy Control Corp UserHigh Trust Registered DeviceMedium Known UserTrust Device Compliance passed Any DeviceLow Trust Any User Not Jailbroken Any DeviceNo Trust Any User
    10. 10. PG: Reporting
    11. 11. Team• Manjunath M. Gowda (20+) – CEO (S7)• Chandra Shekar M (20+) – Director (S7)• Sachin Shelar (10+) – Network Architect & Eng. Manager (S7)• Harish Ramachandra (10+)– Network Architect (S7)• Srinivas Guntupalli (10+)– Network Architect• Jagadeesh M. Rajanna (5+) – Sr. Network Engineer (S7)• Harsha Gunda (5+) – Senior Finance (S7)• Uma Ramesh (10+) – Senior Admin (S7)• Geeta Gouri (2+) – Digital Marketing
    12. 12. Angel Investors• Sharad Sharma – ex-CEO Yahoo R&D• Brian NeSmith – ex-CEO Bluecoat Systems• Rao Remala – ex-Senior Director MS & member Angel Network Seattle• Murali Rao – Senior Product Architect, MS
    13. 13. Thank You!http://www.i7nw.comhttp://youtu.be/aHGyAfIWUpsInformation info@i7nw.comSales sales@i7nw.comEMEA Sales w.kramer@i7nw.eu

    ×