SlideShare a Scribd company logo
1 of 16
CipherGraph Cloud Access Gateway
June 2013© CipherGraph Networks Inc. 2013
About CipherGraph Networks
OUR BOARD
Chamath Palihapitiya
Investor, Board Member
Dr. Parvez Anandam
Advisor, Board Member
Jitender Sharan
Founder, CEO
TEAM AND
EXPERIENCE
PARTNERSHIPS
& AWARDS
Two IT Revolutions: Cloud & BYOD
Cloud
• Global spending on public cloud services reached $110.3B in 2012;
expected to achieve a CAGR of 17.7% from 2011 through 2016. (Gartner)
• AWS will earn $3.8B in 2013, $6.2 B in 2014 (Macquarie Capital)
BYOD / Mobility
• 3.5 devices per mobile worker (iPass)
• 72% of enterprises support BYOD (Cisco)
• 36% of email now opened on mobile devices (Knotice)
Cloud and BYOD are changing security landscape
Applications and Services moving to Cloud
Employees migrating to mobile devices
Understanding the Cloud Security Challenge
• Take your data and apps to the cloud
• Isolate access from Internet threats
• Allow Secure Access to authorized
users only
• Full support from mobile devices
(BYOD)
• Simplified Governance and Control
Put the cloud in the center of your cloud strategy
The CipherGraph Way
Putting the Cloud at the center
Affordable
Stable and Reliable
Direct cloud access for all users
Excellent user experience for
mobile users
Cloud Apps
Without HW, cloud
initiatives can launch
immediately
Branch Office
Branch connects
straight to cloud – no
backhaul
On-Premise Apps
• No capital expenses
• Reduced operational expenses
• Connect to cloud and on-premise
Users with Lots of Devices
CipherGraph Cloud Access Gateway
• Cloud-based Access for all your cloud apps: public cloud, private
cloud, virtualized and legacy data centers
• Supports all your users’ devices
• Integrates with existing IT infrastructure
LDAP, Active Directory – the ID services you already have to control access to your apps
• No hardware; dramatically lower TCO
• OPEX / Subscription pricing
Deploying hardware strains your datacenter
and cripples your cloud strategy
Expensive
High Risk
Massive Data backhaul
Poor performance
Poor support for mobile
devices
Slow to deploy and manage
Cloud Applications
and Services
New IT Staff for Network HW
for Cloud Apps and Services
Dedicated HW takes
weeks or months to
deploy, slowing cloud
initiatives
Branch
Office
WAN
Backhaul
required for
all cloud
traffic to
branch.
Unreliable
Connection
Cumbersome
for Mobile
Users
On-Premise Apps
Users with Lots of Devices
Hardware Solution: Outdated, Costly and Limited
Deploying Hardware
• Expensive: TCO is typically $50K to $100K/year per device
• Overall costs can go up to $500K
• Inelastic: either overprovision or risk bottlenecks and sunk costs
• Slow to deploy: Purchase cycles, physical deployment, etc.
• Limited Mobility: Notoriously cumbersome and unreliable on
mobile devices
CipherGraph Benefits
• Reduces CapEx and OpEx for cloud access by 5X or more
• Deployable in minutes, not weeks
• All existing applications and services just work
• End user cloud access is:
• Secure
• Easy to use (no training required)
• Available across all their devices
All major public / private clouds supported
Full support for your virtualization / cloud vendor
…and more.
All platforms and devices supported
Windows, Apple Mac, iOS (iPhone, iPad), Android
iOS (iPhone / iPad / iPod)
Windows and Mac
Android
Full Suite of Applications
Automatic and instant support for applications and protocols
All Web Applications
• Sharepoint, Webmail, CRM etc.
All Native Applications
• Any native app liks Remote Desktop, Secure Shell (SSH), VoIP etc.
• Any custom or third party app
CipherGraph Premium Apps
• Remote Desktop within browser
• Secure Shell (SSH) within browser
Technical Details
• Software-defined Access Gateway
Role-based access controls for cloud services and users
• Available today for AWS, Azure and other cloud services
• Fully Integrated with LDAP and Active Directory
• Applies industry-leading security techniques
AES256 encryption
Two-factor authentication
• Supports Windows, Mac, iOS, and Android
Thank You
Jitender Sharan (CEO)
jsharan@ciphergraph.com
Sales
sales@ciphergraph.com | +1 415 287 0246
www.ciphergraph.com

More Related Content

What's hot

Measuring and Maximizing the Business Impact of Network Automation
Measuring and Maximizing the Business Impact of Network AutomationMeasuring and Maximizing the Business Impact of Network Automation
Measuring and Maximizing the Business Impact of Network AutomationItential
 
Integration & Federation: The Key to the Next Wave of Network Automation
Integration & Federation: The Key to the Next Wave of Network AutomationIntegration & Federation: The Key to the Next Wave of Network Automation
Integration & Federation: The Key to the Next Wave of Network AutomationItential
 
Democratizing Network Automation Through Low-Code
Democratizing Network Automation Through Low-CodeDemocratizing Network Automation Through Low-Code
Democratizing Network Automation Through Low-CodeItential
 
Itential Automation Platform 2020.2 Release
Itential Automation Platform 2020.2 ReleaseItential Automation Platform 2020.2 Release
Itential Automation Platform 2020.2 ReleaseItential
 
Modern Network Compliance: The Journey of a Customer
Modern Network Compliance: The Journey of a CustomerModern Network Compliance: The Journey of a Customer
Modern Network Compliance: The Journey of a CustomerItential
 
ThousandEyes Overview
ThousandEyes Overview ThousandEyes Overview
ThousandEyes Overview ThousandEyes
 
The Top Outages of 2021: Analysis and Takeaways
The Top Outages of 2021: Analysis and TakeawaysThe Top Outages of 2021: Analysis and Takeaways
The Top Outages of 2021: Analysis and TakeawaysThousandEyes
 
Facebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityFacebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityThousandEyes
 
Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...
Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...
Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...ThousandEyes
 
Visibility for a Global Network
Visibility for a Global NetworkVisibility for a Global Network
Visibility for a Global NetworkThousandEyes
 
Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyesThousandEyes
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overviewBAKOTECH
 
Outage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the InternetOutage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the InternetThousandEyes
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
ThousandEyes EMEA Webinar - Lifting the Lid on Service Provider Performance w...
ThousandEyes EMEA Webinar - Lifting the Lid on Service Provider Performance w...ThousandEyes EMEA Webinar - Lifting the Lid on Service Provider Performance w...
ThousandEyes EMEA Webinar - Lifting the Lid on Service Provider Performance w...ThousandEyes
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...AlgoSec
 
AlgoSec Application Migration Webinar
AlgoSec Application Migration WebinarAlgoSec Application Migration Webinar
AlgoSec Application Migration WebinarMaytal Levi
 
Ready, Set, SD-WAN: Best Practices for Assuring Branch Readiness
Ready, Set, SD-WAN: Best Practices for Assuring Branch ReadinessReady, Set, SD-WAN: Best Practices for Assuring Branch Readiness
Ready, Set, SD-WAN: Best Practices for Assuring Branch ReadinessThousandEyes
 
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PROIDEA
 
Hoe is 80% van uw datacenter beheer te automatiseren?
Hoe is 80% van uw datacenter beheer te automatiseren?Hoe is 80% van uw datacenter beheer te automatiseren?
Hoe is 80% van uw datacenter beheer te automatiseren?Proact Netherlands B.V.
 

What's hot (20)

Measuring and Maximizing the Business Impact of Network Automation
Measuring and Maximizing the Business Impact of Network AutomationMeasuring and Maximizing the Business Impact of Network Automation
Measuring and Maximizing the Business Impact of Network Automation
 
Integration & Federation: The Key to the Next Wave of Network Automation
Integration & Federation: The Key to the Next Wave of Network AutomationIntegration & Federation: The Key to the Next Wave of Network Automation
Integration & Federation: The Key to the Next Wave of Network Automation
 
Democratizing Network Automation Through Low-Code
Democratizing Network Automation Through Low-CodeDemocratizing Network Automation Through Low-Code
Democratizing Network Automation Through Low-Code
 
Itential Automation Platform 2020.2 Release
Itential Automation Platform 2020.2 ReleaseItential Automation Platform 2020.2 Release
Itential Automation Platform 2020.2 Release
 
Modern Network Compliance: The Journey of a Customer
Modern Network Compliance: The Journey of a CustomerModern Network Compliance: The Journey of a Customer
Modern Network Compliance: The Journey of a Customer
 
ThousandEyes Overview
ThousandEyes Overview ThousandEyes Overview
ThousandEyes Overview
 
The Top Outages of 2021: Analysis and Takeaways
The Top Outages of 2021: Analysis and TakeawaysThe Top Outages of 2021: Analysis and Takeaways
The Top Outages of 2021: Analysis and Takeaways
 
Facebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityFacebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify Availability
 
Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...
Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...
Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...
 
Visibility for a Global Network
Visibility for a Global NetworkVisibility for a Global Network
Visibility for a Global Network
 
Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyes
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overview
 
Outage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the InternetOutage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the Internet
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
ThousandEyes EMEA Webinar - Lifting the Lid on Service Provider Performance w...
ThousandEyes EMEA Webinar - Lifting the Lid on Service Provider Performance w...ThousandEyes EMEA Webinar - Lifting the Lid on Service Provider Performance w...
ThousandEyes EMEA Webinar - Lifting the Lid on Service Provider Performance w...
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...
 
AlgoSec Application Migration Webinar
AlgoSec Application Migration WebinarAlgoSec Application Migration Webinar
AlgoSec Application Migration Webinar
 
Ready, Set, SD-WAN: Best Practices for Assuring Branch Readiness
Ready, Set, SD-WAN: Best Practices for Assuring Branch ReadinessReady, Set, SD-WAN: Best Practices for Assuring Branch Readiness
Ready, Set, SD-WAN: Best Practices for Assuring Branch Readiness
 
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
 
Hoe is 80% van uw datacenter beheer te automatiseren?
Hoe is 80% van uw datacenter beheer te automatiseren?Hoe is 80% van uw datacenter beheer te automatiseren?
Hoe is 80% van uw datacenter beheer te automatiseren?
 

Viewers also liked

흥분제판매 KAVA899。C0M 비아그라 효과,비아그라 구입사이트
흥분제판매 KAVA899。C0M 비아그라 효과,비아그라 구입사이트 흥분제판매 KAVA899。C0M 비아그라 효과,비아그라 구입사이트
흥분제판매 KAVA899。C0M 비아그라 효과,비아그라 구입사이트 dksan13
 
'Noche de miedo' Por Simón Cano Le Tiec
'Noche de miedo' Por Simón Cano Le Tiec'Noche de miedo' Por Simón Cano Le Tiec
'Noche de miedo' Por Simón Cano Le TiecSimon43
 
칙칙이 판매 KAVA899。C0M 시알리스 구매방법,시알리스 인터넷 구입
칙칙이 판매 KAVA899。C0M 시알리스 구매방법,시알리스 인터넷 구입 칙칙이 판매 KAVA899。C0M 시알리스 구매방법,시알리스 인터넷 구입
칙칙이 판매 KAVA899。C0M 시알리스 구매방법,시알리스 인터넷 구입 dksan13
 
First Class Need For Loyola
First Class Need For LoyolaFirst Class Need For Loyola
First Class Need For LoyolaShane Hennessey
 
2009 seminar - tim m - vs 2010 developer edition
2009   seminar - tim m - vs 2010 developer edition2009   seminar - tim m - vs 2010 developer edition
2009 seminar - tim m - vs 2010 developer editionTim Mahy
 
First Class Need For Loyola
First Class Need For LoyolaFirst Class Need For Loyola
First Class Need For LoyolaShane Hennessey
 
Roadmapping product service combinations
Roadmapping product service combinationsRoadmapping product service combinations
Roadmapping product service combinationsJurjen Helmus
 
Match sheet
Match sheetMatch sheet
Match sheetflash4fi
 
PROMOCION ELECTRODOMESTICOS
PROMOCION ELECTRODOMESTICOSPROMOCION ELECTRODOMESTICOS
PROMOCION ELECTRODOMESTICOS260770
 

Viewers also liked (20)

MN
MNMN
MN
 
흥분제판매 KAVA899。C0M 비아그라 효과,비아그라 구입사이트
흥분제판매 KAVA899。C0M 비아그라 효과,비아그라 구입사이트 흥분제판매 KAVA899。C0M 비아그라 효과,비아그라 구입사이트
흥분제판매 KAVA899。C0M 비아그라 효과,비아그라 구입사이트
 
'Noche de miedo' Por Simón Cano Le Tiec
'Noche de miedo' Por Simón Cano Le Tiec'Noche de miedo' Por Simón Cano Le Tiec
'Noche de miedo' Por Simón Cano Le Tiec
 
Buscadores-Navegadores
Buscadores-NavegadoresBuscadores-Navegadores
Buscadores-Navegadores
 
HSL CfHF & CfLR 1
HSL CfHF & CfLR 1HSL CfHF & CfLR 1
HSL CfHF & CfLR 1
 
칙칙이 판매 KAVA899。C0M 시알리스 구매방법,시알리스 인터넷 구입
칙칙이 판매 KAVA899。C0M 시알리스 구매방법,시알리스 인터넷 구입 칙칙이 판매 KAVA899。C0M 시알리스 구매방법,시알리스 인터넷 구입
칙칙이 판매 KAVA899。C0M 시알리스 구매방법,시알리스 인터넷 구입
 
Evaluacion de sitio web
Evaluacion de sitio webEvaluacion de sitio web
Evaluacion de sitio web
 
First Class Need For Loyola
First Class Need For LoyolaFirst Class Need For Loyola
First Class Need For Loyola
 
2009 seminar - tim m - vs 2010 developer edition
2009   seminar - tim m - vs 2010 developer edition2009   seminar - tim m - vs 2010 developer edition
2009 seminar - tim m - vs 2010 developer edition
 
Ubunto presentacion
Ubunto presentacionUbunto presentacion
Ubunto presentacion
 
First Class Need For Loyola
First Class Need For LoyolaFirst Class Need For Loyola
First Class Need For Loyola
 
Dp8340
Dp8340Dp8340
Dp8340
 
Roadmapping product service combinations
Roadmapping product service combinationsRoadmapping product service combinations
Roadmapping product service combinations
 
Match sheet
Match sheetMatch sheet
Match sheet
 
Instrumenlist b1
Instrumenlist b1Instrumenlist b1
Instrumenlist b1
 
Morningstar
MorningstarMorningstar
Morningstar
 
Chomsky
ChomskyChomsky
Chomsky
 
PROMOCION ELECTRODOMESTICOS
PROMOCION ELECTRODOMESTICOSPROMOCION ELECTRODOMESTICOS
PROMOCION ELECTRODOMESTICOS
 
Im 453hu
Im 453huIm 453hu
Im 453hu
 
Verhogen van klantwaarde door facilitaire regievoering
Verhogen van klantwaarde door facilitaire regievoeringVerhogen van klantwaarde door facilitaire regievoering
Verhogen van klantwaarde door facilitaire regievoering
 

Similar to CipherGraph Networks: Cloud Access Gateway

Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...Amazon Web Services
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space미래웹기술연구소 (MIRAE WEB)
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT SpendingKokLeong Ong
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trustZscaler
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
CipherGraph Networks Cloud Access Gateway: Sales
CipherGraph Networks Cloud Access Gateway: SalesCipherGraph Networks Cloud Access Gateway: Sales
CipherGraph Networks Cloud Access Gateway: SalesCipherGraph Networks
 
Dell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel PartnersDell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel PartnersDell World
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Miriade Spa
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL
 
Making Money in the Cloud
Making Money in the CloudMaking Money in the Cloud
Making Money in the CloudGravitant, Inc.
 
Leverage your business with cloud architecture
Leverage your business with cloud architectureLeverage your business with cloud architecture
Leverage your business with cloud architectureCBC Solutions.biz
 
The Enterprise Adoption of Cloud Technology - Infographic by RapidValue
The Enterprise Adoption of Cloud Technology - Infographic by RapidValueThe Enterprise Adoption of Cloud Technology - Infographic by RapidValue
The Enterprise Adoption of Cloud Technology - Infographic by RapidValueRapidValue
 
FWD_LIVE: The Gen-i Pathway to Cloud
FWD_LIVE: The Gen-i Pathway to CloudFWD_LIVE: The Gen-i Pathway to Cloud
FWD_LIVE: The Gen-i Pathway to CloudGen-i
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaCodeOps Technologies LLP
 
The Advent of Serverless Technologies
The Advent of Serverless TechnologiesThe Advent of Serverless Technologies
The Advent of Serverless TechnologiesCloudflare
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startupsSekhar Mohanty
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankDonna Perlstein
 

Similar to CipherGraph Networks: Cloud Access Gateway (20)

Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT Spending
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
CipherGraph Networks Cloud Access Gateway: Sales
CipherGraph Networks Cloud Access Gateway: SalesCipherGraph Networks Cloud Access Gateway: Sales
CipherGraph Networks Cloud Access Gateway: Sales
 
Dell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel PartnersDell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel Partners
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
 
Making Money in the Cloud
Making Money in the CloudMaking Money in the Cloud
Making Money in the Cloud
 
Leverage your business with cloud architecture
Leverage your business with cloud architectureLeverage your business with cloud architecture
Leverage your business with cloud architecture
 
The Enterprise Adoption of Cloud Technology - Infographic by RapidValue
The Enterprise Adoption of Cloud Technology - Infographic by RapidValueThe Enterprise Adoption of Cloud Technology - Infographic by RapidValue
The Enterprise Adoption of Cloud Technology - Infographic by RapidValue
 
FWD_LIVE: The Gen-i Pathway to Cloud
FWD_LIVE: The Gen-i Pathway to CloudFWD_LIVE: The Gen-i Pathway to Cloud
FWD_LIVE: The Gen-i Pathway to Cloud
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
The Advent of Serverless Technologies
The Advent of Serverless TechnologiesThe Advent of Serverless Technologies
The Advent of Serverless Technologies
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

CipherGraph Networks: Cloud Access Gateway

  • 1. CipherGraph Cloud Access Gateway June 2013© CipherGraph Networks Inc. 2013
  • 2. About CipherGraph Networks OUR BOARD Chamath Palihapitiya Investor, Board Member Dr. Parvez Anandam Advisor, Board Member Jitender Sharan Founder, CEO TEAM AND EXPERIENCE PARTNERSHIPS & AWARDS
  • 3. Two IT Revolutions: Cloud & BYOD Cloud • Global spending on public cloud services reached $110.3B in 2012; expected to achieve a CAGR of 17.7% from 2011 through 2016. (Gartner) • AWS will earn $3.8B in 2013, $6.2 B in 2014 (Macquarie Capital) BYOD / Mobility • 3.5 devices per mobile worker (iPass) • 72% of enterprises support BYOD (Cisco) • 36% of email now opened on mobile devices (Knotice)
  • 4. Cloud and BYOD are changing security landscape Applications and Services moving to Cloud Employees migrating to mobile devices
  • 5. Understanding the Cloud Security Challenge • Take your data and apps to the cloud • Isolate access from Internet threats • Allow Secure Access to authorized users only • Full support from mobile devices (BYOD) • Simplified Governance and Control
  • 6. Put the cloud in the center of your cloud strategy
  • 7. The CipherGraph Way Putting the Cloud at the center Affordable Stable and Reliable Direct cloud access for all users Excellent user experience for mobile users Cloud Apps Without HW, cloud initiatives can launch immediately Branch Office Branch connects straight to cloud – no backhaul On-Premise Apps • No capital expenses • Reduced operational expenses • Connect to cloud and on-premise Users with Lots of Devices
  • 8. CipherGraph Cloud Access Gateway • Cloud-based Access for all your cloud apps: public cloud, private cloud, virtualized and legacy data centers • Supports all your users’ devices • Integrates with existing IT infrastructure LDAP, Active Directory – the ID services you already have to control access to your apps • No hardware; dramatically lower TCO • OPEX / Subscription pricing
  • 9. Deploying hardware strains your datacenter and cripples your cloud strategy Expensive High Risk Massive Data backhaul Poor performance Poor support for mobile devices Slow to deploy and manage Cloud Applications and Services New IT Staff for Network HW for Cloud Apps and Services Dedicated HW takes weeks or months to deploy, slowing cloud initiatives Branch Office WAN Backhaul required for all cloud traffic to branch. Unreliable Connection Cumbersome for Mobile Users On-Premise Apps Users with Lots of Devices
  • 10. Hardware Solution: Outdated, Costly and Limited Deploying Hardware • Expensive: TCO is typically $50K to $100K/year per device • Overall costs can go up to $500K • Inelastic: either overprovision or risk bottlenecks and sunk costs • Slow to deploy: Purchase cycles, physical deployment, etc. • Limited Mobility: Notoriously cumbersome and unreliable on mobile devices
  • 11. CipherGraph Benefits • Reduces CapEx and OpEx for cloud access by 5X or more • Deployable in minutes, not weeks • All existing applications and services just work • End user cloud access is: • Secure • Easy to use (no training required) • Available across all their devices
  • 12. All major public / private clouds supported Full support for your virtualization / cloud vendor …and more.
  • 13. All platforms and devices supported Windows, Apple Mac, iOS (iPhone, iPad), Android iOS (iPhone / iPad / iPod) Windows and Mac Android
  • 14. Full Suite of Applications Automatic and instant support for applications and protocols All Web Applications • Sharepoint, Webmail, CRM etc. All Native Applications • Any native app liks Remote Desktop, Secure Shell (SSH), VoIP etc. • Any custom or third party app CipherGraph Premium Apps • Remote Desktop within browser • Secure Shell (SSH) within browser
  • 15. Technical Details • Software-defined Access Gateway Role-based access controls for cloud services and users • Available today for AWS, Azure and other cloud services • Fully Integrated with LDAP and Active Directory • Applies industry-leading security techniques AES256 encryption Two-factor authentication • Supports Windows, Mac, iOS, and Android
  • 16. Thank You Jitender Sharan (CEO) jsharan@ciphergraph.com Sales sales@ciphergraph.com | +1 415 287 0246 www.ciphergraph.com