1
24 March 2015 © 2014 CYREN Confidential and Proprietary
CYBERSECURITY OF THINGS
A PRACTICAL LOOK AT THE INTERNET OF THINGS AND CYBERSECURITY
Christian Milde
Sales Director – DACH
© 2014 CYREN Confidential and Proprietary
2
FRISK with
 Frisk founded 1989 (Iceland)
 2012 Acquired by Commtouch (CYREN)
 First engine which used heuristic
technologies
 The only company which not had to buy
other engines
ABOUT CYREN = FOUNDATION OF 3 COMPANIES
 1991 Founded
 2010 Acquisition of Command AV
 2012 Acquisition of FRISK
 2012 Acquisition of Eleven
 2014 CYREN renaming
 Founded 2001
 eXpurgate email security, used by
over 45,000 companies
 dominating email security in
Germany with 60% market share
 Processing more than 1 billion
emails per day in Germany
3
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN POWERS THE WORLD’S SECURITY
Our Cyber Intelligence is the security foundation of many of the world’s
largest and most influential information technology and Internet brands.
4
© 2015 CYREN Confidential and Proprietary
4
IOT MARKET
5
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
THE INTERNET OF THINGS IN 2020 - ACCORDING TO GARTNER
 Over 25 BILLION IoT devices
 Less than 5% of IoT connections will go
through SIM-based, M2M cellular services
 Over a quarter billion connected cars with
automated driving capabilities
 900 Exhibitors at CES 2015 were
manufacturers of IoT devices
 Today‘s hype will be mature within 5 years
6
Q&A FROM OUR CUSTOMERS
7
STATISTICS
 Cybersecurity is the fastest growing risk for any business
 While 73% of businesses don‘t have a plan for upcoming threats
 Our analytics show Germany is the prime market for botnet origin
email harvester with 73% followed by China with only 9%!
Source: Allianz
8
© 2015 CYREN Confidential and Proprietary
8
CYBERSECURITY
OF THINGS
9
IOT CYBERCECURITY BASICS
 Device manufacturer must use:
 Secure boot
 Code hardening
 Access control
 Device authentication
 Secure provisioning
 Despite this, devices will still be hacked…
 Poor Password Protection
 Firmware Exploit— hack in Firmware
 Bugs and Vulnerabilities at the access or
programming code
10
APPLIED CYBER INTELLIGENCE IS THE WAY FORWARD
APPLICATION
Policy, Enforcement, Logging,
Alerting, Reporting
ANALYSIS
RPD, Heuristics, Signature, Human, etc.
DATA
17 BILLION transactions per day
SENSORS
500 THOUSAND points of presence,
protecting 600 MILLION users
UserValue
SECURITY
Applied
Cyber Intelligence
INSIGHT
Cyber Intelligence
Pre-Compromise Compromise Post-Compromise
Reconnaissance Weaponization Delivery Exploitation Installation Command
& Control
Actions
on Target
Stop the Cyber Kill Chain
11
CYREN BY NUMBERS
Inspection
Detection
Collection
SPEED, ACCURACY, AND REAL-TIME INSIGHT
12
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Data Collection
Data Analysis
Solutions
Consumption
Cyber Feeds Software Development Kit Software as a Service
Products
- Advanced Malware dataset
- Advanced Phishing dataset
- Zero-hour threats
- IP Reputation dataset
- URL Categorization DB
- IP Reputation
- Antispam SDK
- Antivirus SDK
- URL Categorization SDK
- Web Security
- Email Security
Predictive / reputational data
Zero Hour Threat Detection
Local and global threat patterns
HTTP / IP Categorization
0% 20% 40% 60% 80% 100%
HTTP
SMTP
IP
DNS
CYREN’S INTELLIGENCE
13
FLEXIBLE DEPLOYMENT OPTIONS
 99% queries answered via local cache
 Compatible with most Operating Systems
 For devices which regularly contact outside
networks
 100% of queries are directed to the cloud
from device
 For devices which rarely contact outside
networks and with low resources
Cyber Threat Protection
WebSecurity
OUTBOUND  Botnet C&C Traffic, Malicious URL / IP, Spam
Virus, Adware, Spyware, Malicious Scripts, Emails  INBOUND
14
PLACING CYBERSECURTY OF THINGS
1. Device Communication Analysis
2. Real time inspection in
GlobalView Cloud
3. Detect communication to
malicious IP, URL, etc.
4. Notify device / manufacturer for
reset or remediation
3
2
41
15
JOIN AND WIN WITH US
Improved End-User
Satisfaction
Increased
Revenue
Product
Differentiation
Sales,MarketingandTechnical
Support
CYREN helps you satisfy your
customers’ needs, ensuring
their users are protected on any
device, from any location.
Be the first to market
with best-of breed Internet
security technology.
CYREN ensures you have
everything you need to support
your sales model.
Our products are easily
integrated to ensure
cost-effectiveness, scalability,
and momentum.
16
© 2015 CYREN Confidential and Proprietary
16
BE SAFE, FEEL GOOD.
You can also find us here:
www.CYREN.com
twitter.com/cyreninc
linkedin.com/company/cyren
Christian Milde
Sales Director - DACH
+49 1520 1647 213
christian.milde@CYREN.com

Cyren cybersecurity of things

  • 1.
    1 24 March 2015© 2014 CYREN Confidential and Proprietary CYBERSECURITY OF THINGS A PRACTICAL LOOK AT THE INTERNET OF THINGS AND CYBERSECURITY Christian Milde Sales Director – DACH
  • 2.
    © 2014 CYREN Confidentialand Proprietary 2 FRISK with  Frisk founded 1989 (Iceland)  2012 Acquired by Commtouch (CYREN)  First engine which used heuristic technologies  The only company which not had to buy other engines ABOUT CYREN = FOUNDATION OF 3 COMPANIES  1991 Founded  2010 Acquisition of Command AV  2012 Acquisition of FRISK  2012 Acquisition of Eleven  2014 CYREN renaming  Founded 2001  eXpurgate email security, used by over 45,000 companies  dominating email security in Germany with 60% market share  Processing more than 1 billion emails per day in Germany
  • 3.
    3 ©2015. CYREN Ltd.All Rights Reserved. Proprietary and Confidential. CYREN POWERS THE WORLD’S SECURITY Our Cyber Intelligence is the security foundation of many of the world’s largest and most influential information technology and Internet brands.
  • 4.
    4 © 2015 CYREN Confidentialand Proprietary 4 IOT MARKET
  • 5.
    5 ©2015. CYREN Ltd.All Rights Reserved. Proprietary and Confidential. THE INTERNET OF THINGS IN 2020 - ACCORDING TO GARTNER  Over 25 BILLION IoT devices  Less than 5% of IoT connections will go through SIM-based, M2M cellular services  Over a quarter billion connected cars with automated driving capabilities  900 Exhibitors at CES 2015 were manufacturers of IoT devices  Today‘s hype will be mature within 5 years
  • 6.
    6 Q&A FROM OURCUSTOMERS
  • 7.
    7 STATISTICS  Cybersecurity isthe fastest growing risk for any business  While 73% of businesses don‘t have a plan for upcoming threats  Our analytics show Germany is the prime market for botnet origin email harvester with 73% followed by China with only 9%! Source: Allianz
  • 8.
    8 © 2015 CYREN Confidentialand Proprietary 8 CYBERSECURITY OF THINGS
  • 9.
    9 IOT CYBERCECURITY BASICS Device manufacturer must use:  Secure boot  Code hardening  Access control  Device authentication  Secure provisioning  Despite this, devices will still be hacked…  Poor Password Protection  Firmware Exploit— hack in Firmware  Bugs and Vulnerabilities at the access or programming code
  • 10.
    10 APPLIED CYBER INTELLIGENCEIS THE WAY FORWARD APPLICATION Policy, Enforcement, Logging, Alerting, Reporting ANALYSIS RPD, Heuristics, Signature, Human, etc. DATA 17 BILLION transactions per day SENSORS 500 THOUSAND points of presence, protecting 600 MILLION users UserValue SECURITY Applied Cyber Intelligence INSIGHT Cyber Intelligence Pre-Compromise Compromise Post-Compromise Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Actions on Target Stop the Cyber Kill Chain
  • 11.
  • 12.
    12 ©2015. CYREN Ltd.All Rights Reserved. Proprietary and Confidential. Data Collection Data Analysis Solutions Consumption Cyber Feeds Software Development Kit Software as a Service Products - Advanced Malware dataset - Advanced Phishing dataset - Zero-hour threats - IP Reputation dataset - URL Categorization DB - IP Reputation - Antispam SDK - Antivirus SDK - URL Categorization SDK - Web Security - Email Security Predictive / reputational data Zero Hour Threat Detection Local and global threat patterns HTTP / IP Categorization 0% 20% 40% 60% 80% 100% HTTP SMTP IP DNS CYREN’S INTELLIGENCE
  • 13.
    13 FLEXIBLE DEPLOYMENT OPTIONS 99% queries answered via local cache  Compatible with most Operating Systems  For devices which regularly contact outside networks  100% of queries are directed to the cloud from device  For devices which rarely contact outside networks and with low resources Cyber Threat Protection WebSecurity OUTBOUND  Botnet C&C Traffic, Malicious URL / IP, Spam Virus, Adware, Spyware, Malicious Scripts, Emails  INBOUND
  • 14.
    14 PLACING CYBERSECURTY OFTHINGS 1. Device Communication Analysis 2. Real time inspection in GlobalView Cloud 3. Detect communication to malicious IP, URL, etc. 4. Notify device / manufacturer for reset or remediation 3 2 41
  • 15.
    15 JOIN AND WINWITH US Improved End-User Satisfaction Increased Revenue Product Differentiation Sales,MarketingandTechnical Support CYREN helps you satisfy your customers’ needs, ensuring their users are protected on any device, from any location. Be the first to market with best-of breed Internet security technology. CYREN ensures you have everything you need to support your sales model. Our products are easily integrated to ensure cost-effectiveness, scalability, and momentum.
  • 16.
    16 © 2015 CYREN Confidentialand Proprietary 16 BE SAFE, FEEL GOOD. You can also find us here: www.CYREN.com twitter.com/cyreninc linkedin.com/company/cyren Christian Milde Sales Director - DACH +49 1520 1647 213 christian.milde@CYREN.com

Editor's Notes

  • #3 Zusammenschluss 3 Firmen, akquiriert in 2012 durch die damalige Commtouch
  • #4 Das wohl am besten gehütete Geheimnis im Security Markt – CYREN ist der Technologielieferant für 9 von 11 führenden Unternehmen im MQ von Gartner.
  • #6 IoT ist zur Zeit in aller Munde und wird sich über die kommenden 5 Jahre festigen. Bis dahin werden wir über 25 Milliarden mit dem Internet kommunizierende Geräte sehen. Allein auf der CES waren es dieses Jahr 900 Austeller mit IoT Geräten – den Trend sehen wir auch hier auf der Cebit!
  • #7 Wir haben unsere Kunden gefragt, welche IoT‘s für sie am gefährdetsten sind – es sind unsere Geräte im Office und für unser tägliches Business. Interessant, dass auch unsere Autos – des dt. liebstes Kind – gleich auf mit den Hausgeräten sind.
  • #8 Aus der Sicht der Geschäftswelt sind CYBER Kriminalität und Sicherheit ein top Thema – wie Allianz herausfand. Vor 2 Jahren noch nicht einmal in der Top Ten, hat IT Sicherheit das Zeug zur größten Gefahr für die deutsche Wirtschaft mit bereits 32% Relevanz in 2014. Scheinbar nicht nur ein Gefühl wie auf der vorigen Statistik sondern Realität: zu einer Zeit in der 73% der weltweiten Botnetzaktivitäten auf dt. Territorium fallen. Gefolgt von nur 9% in China. Völlig unverständlich, dass derzeit 73% der IT Verantwortlichen noch keinen Plan oder Budget haben diese Gefahren zu stoppen.
  • #10 In diesem Umfeld – arbeiten Gerätehersteller weiter daran die SW sicherer zu machen, mit: Sicheren Startsequenzen und Verschlüsselung Access Kontrolle Authentisierung Sicherer Inbetriebnahme Aber trotz alledem, sind die Geräte weiterhin CYBER Kriminellen ausgesetzt, wegen: Mangelndem Passwortschutz Firmware Hacks Fehler im Zugangs oder Programmier-Code
  • #11 Was können wir tun? Wir müssen die CYBER Kill Kette stoppen! Und das bereits bevor sich Bedrohungen und Angriffe auf Sie richten. Wie? CYBER Intelligenz, resultierend aus BigData Analytics unserer 0,5Mil Sensoren und 600Mil Nutzer mit 17 Milliarden Sicherheitstransaktionen jeden Tag.
  • #14 Für jedes Gerät gibt es spezifische Anforderungen. Auf diese Applikation und Anforderungen abgebildet liefern wir passgenaue Lösungen z.B. per direct to cloud mit integrierter APT oder ein SoftwareKit auf dem Gerät mit lokalem Cache werden Bedrohungen sofort erkannt und abgewehrt.
  • #15 Hier ein Bespiel für einen zu schützenden TV, der installierte Apps auf Malware prüft oder die Kommunikation unterbricht sollte diese nicht den Sicherheitsvorgaben entsprechen.
  • #16 So können wir die Nutzer und Kunden unserer Partner schützen und ich freue mich auf die gemeinsame Zeit im Zeitalter dem sicheren Internet der Dinge.