SlideShare a Scribd company logo
1 of 43
Copyright i7 Networks, i7nw.com
Welcome to “Me” Enterprise
How BYOD has changed the security map and how
“Peregrine 7” helps tackle it?
Copyright i7 Networks, i7nw.com
Manjunath M Gowda
CEO, i7 Networks
Bangalore, India
manju_s7
in/manjunathgowda/
WHY BYOD matters?
Copyright i7 Networks, i7nw.com
• 90%of enterprises will use personal devices in Enterprise by
2014 - Gartner
• 20% Savings: CISCO claimed due to BYOD &
declared: “We don’t pay for it, and our users are
happier.”
• Survey: Enterprises that don't support BYOD
are at competitive disadvantage
Copyright i7 Networks, i7nw.com
So what is stopping them?
Copyright i7 Networks, i7nw.com
75% CIOs said Compliance &
Security biggest challenge in allowing
BYOD
Copyright i7 Networks, i7nw.com
DARK READING – July 2013
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
62% - Loss of a device that has
Sensitive Data – (MDMs solve this)
61% - An infected personal
device connecting to the
Corporate Network
Business overview
Copyright i7 Networks, i7nw.com
79% business had a mobile incident last year alone – Checkpoint
600%+ growth in mobile malware in last 2 years
20 Mn+ devices jailbroken in just two months (Jan 2013)
18 Mn infected Android devices by end of 2013
71% mobile devices have OS / application vulnerabilities
Copyright i7 Networks, i7nw.com
$500K+ cost per such incident
$1.5Mn cost per such settlement
Copyright i7 Networks, i7nw.com
Why traditional tools
can’t help here?
Copyright i7 Networks, i7nw.com
• Perimeter security and not for inside-inside or
inside-out threats
• Used to IT-owned devices and not personal
devices (agented)
• Used to take care of outside2inside threats
Copyright i7 Networks, i7nw.com
So what tools do exist to
solve it?
Copyright i7 Networks, i7nw.com
15 Copyright i7 Networks, i7nw.com
MDMs, EPP
Airwatch, MobileIron, Zenprise
MAMs
Bitzer, IBM, SAP, Good
MDPs
AT&T toggle, Divide,
VMware
MNAC
i7Networks
Device level
n
e
t
w
o
r
k
Mobile Security Tools Quadrant
Server side
Our value proposition
Copyright i7 Networks, i7nw.com
“We protect your network
from malicious/infected
BYODs”
Copyright i7 Networks, i7nw.com
“We Protect the Enterprise Network” by
-Detect & Fingerprint1
all personal devices
-Prevent the malicious devices from connecting
-100% Agentless (Zero-touch)
-Zero-Latency Deployment
-Provide detailed Compliance Reports
“To Know & To Protect”
1 Secure detection & fingerprinting (US patent pending)
Copyright i7 Networks, i7nw.com
• Name
• Screen caps
• Demo
PeregrineGuardTM
i7 Networks; i7 Confidential
Not just phones,
we support all wireless devices.
Continuous
Monitoring
Complete VisibilityComplete Visibility
Endpoint AuthenticationEndpoint Authentication
Vulnerability and
malicious assessment
Vulnerability and
malicious assessment
Granular policy
enforcement
Granular policy
enforcement
Compliance ReportingCompliance Reporting
Entry Verification –
Corporate Wi-Fi or
VPN?
Entry Verification –
Corporate Wi-Fi or
VPN?
Allow
Deny
Compromised /Jailbroken/
Unauthorized/Unmanaged
check
Compromised /Jailbroken/
Unauthorized/Unmanaged
check
Deny
Deny
Personal
Devices
the questions we answer
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
• What devices are getting into the corporate
network?
• Who do they belong to?
• Are they infected?
• Are they compromised or malicious?
• How vulnerable are they?
• What are they accessing?
• What apps* are they running?
• Can I control the access?
• Can I get Compliance audit reports?
How do you deploy?
Copyright i7 Networks, i7nw.com
• 100% agentless and non-intrusive – Zero Touch
• Complete off-line deployment – Zero-Latency
• Just ONE probe* in the network
• Supports: Corporate Wi-Fi/ Public Wi-
Fi/3G/4G/LTE
Deployment
i7 Networks; i7 Confidential
- Microsoft AD, RADIUS and LDAP
- Microsoft Exchange
- Maas 360 MDM
- Microsoft System Center*
- IBM Tivoli*
- Cisco/Juniper and Fortinet VPN
- Snort IDS
- CVE database
Integrates with
Why “Agentless” is Sweet? 
Copyright i7 Networks, i7nw.com
14different OS types & growing; Add versions and models5
45% enterprises have more than 5 times as many BYOD as they had 2 years ago3
3.5– Average number of devices per Employee
42%- Average churn of devices per year among enterprise employees
< 10% enterprises aware of all mobile devices accessing their network & servers3
27% of devices are ‘approved’ by the company6Copyright i7 Networks, i7nw.com
So what’s unique?
Copyright i7 Networks, i7nw.com
4A (Attributes)
Discovery & Fingerprinting
Health Check
Discover Apps on the wire*,
Policy Enforcement
4A (Attributes)
Discovery & Fingerprinting
Health Check
Discover Apps on the wire*,
Policy Enforcement
4D (Deployments)
100% Agentless (Zero-touch),
ZERO-Latency
SINGLE Probe,
Wi-Fi/3G/4G/LTE
4D (Deployments)
100% Agentless (Zero-touch),
ZERO-Latency
SINGLE Probe,
Wi-Fi/3G/4G/LTE
4T (Threat-Protections)
Malicious & Intrusion Prevention
Zero-day Attack Prevention*,
Vulnerability Check
Check of anti-malware s/w
4T (Threat-Protections)
Malicious & Intrusion Prevention
Zero-day Attack Prevention*,
Vulnerability Check
Check of anti-malware s/w
4K (Keywords)
100% Agentless
Patent-Pending Algorithms
Detailed Fingerprinting
Zero-Latency
4K (Keywords)
100% Agentless
Patent-Pending Algorithms
Detailed Fingerprinting
Zero-Latency
Available as : Appliance / Virtual
Appliance
Available as : Appliance / Virtual
Appliance
What is that you do MDM cannot?
Copyright i7 Networks, i7nw.com
oCannot do Discovery and fingerprint of
all devices
 Authorized
 Unauthorized
 Unmanaged
 Non-mobile devices like e-Readers, Wi-Fi
watches, Gaming devices, Healthcare
devices etc.
Copyright i7 Networks, i7nw.com
oMalware detection via signature is only
28%; Cannot catch malicious traffic @
network layer (not even at device layer)
oCannot do Access control based on
device attributes
oCannot enforce different access rules for
different departments/ LoBs
Copyright i7 Networks, i7nw.com
oHot-spotting/Mac-spoofing cannot be
detected
oFails where you are not allowed to install a
client on the device due to privacy or
compliance
oNot dynamic (need to stop iOS6.1?)
Copyright i7 Networks, i7nw.com
How different are you from a
traditional nac?
Copyright i7 Networks, i7nw.com
 Support all: Wi-Fi & 3G/4G/LTE
 100% Zero Touch (agentless)
 Zero Latency (offline) (still we control)
 Just ONE probe
 Fits into any network infrastructure
 Support all: Wi-Fi & 3G/4G/LTE
 100% Zero Touch (agentless)
 Zero Latency (offline) (still we control)
 Just ONE probe
 Fits into any network infrastructure
 US Patent-pending fingerprinting algorithm
 Mac-spoofing/Hot spotting
 DVItm
(Device Vulnerability Index)
 Detecting apps on the wire (dropbox)
 US Patent-pending fingerprinting algorithm
 Mac-spoofing/Hot spotting
 DVItm
(Device Vulnerability Index)
 Detecting apps on the wire (dropbox)
 Completely focused on BYOD Security Completely focused on BYOD Security
Product Road Map?
Copyright i7 Networks, i7nw.com
• Recognition of all Apps on the Wire
• Detection of EPP (End Point Protection) tools
• Chaining of P7s
• Integrations into System Center and Tivoli
• Integrations into MDMs
• mNAC in the cloud to detect cloud access
Copyright i7 Networks, i7nw.com
The TEAM
Copyright i7 Networks, i7nw.com
Jeff
Hunter
Evangelist
Peter
Gilson
CTO
First
Last
CFO
Jack
Franklin
CMO
Heather
Adler
CEO
Investors & Advisors
1st
venture: $8.4M by Bluecoat (2010)
Team together for second time
Started June 12’
Product start Jan 13’
Questions?
Copyright i7 Networks, i7nw.com
manju.m@i7nw.com
manju_s7

More Related Content

What's hot

The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereForescout Technologies Inc
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseAirTight Networks
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?Zscaler
 
Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Xylos
 
R1 - Slides
R1 - SlidesR1 - Slides
R1 - SlidesezSec
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013AirTight Networks
 
Secure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureSecure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureZscaler
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016David Glover
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTWSO2
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityOnward Security
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything Cisco Canada
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTIoT613
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網Amazon Web Services
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013AirTight Networks, Inc.
 
APAC Partner Update: SolarWinds Network Complexity
APAC Partner Update:  SolarWinds Network ComplexityAPAC Partner Update:  SolarWinds Network Complexity
APAC Partner Update: SolarWinds Network ComplexitySolarWinds
 
Ivanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti
 

What's hot (20)

The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...
 
R1 - Slides
R1 - SlidesR1 - Slides
R1 - Slides
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
Secure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureSecure access to applications on Microsoft Azure
Secure access to applications on Microsoft Azure
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013
 
APAC Partner Update: SolarWinds Network Complexity
APAC Partner Update:  SolarWinds Network ComplexityAPAC Partner Update:  SolarWinds Network Complexity
APAC Partner Update: SolarWinds Network Complexity
 
Ivanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti neurons - lunch and learn
Ivanti neurons - lunch and learn
 

Viewers also liked

Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...ProductNation/iSPIRT
 
iSPIRT: M&A activity report may 2013
iSPIRT: M&A activity report may 2013iSPIRT: M&A activity report may 2013
iSPIRT: M&A activity report may 2013ProductNation/iSPIRT
 
Building Billion Dollar Product Companies from India - Management report by J...
Building Billion Dollar Product Companies from India - Management report by J...Building Billion Dollar Product Companies from India - Management report by J...
Building Billion Dollar Product Companies from India - Management report by J...ProductNation/iSPIRT
 
#PNSummit bootcamp for product leaders what's in it for you
#PNSummit bootcamp for product leaders   what's in it for you#PNSummit bootcamp for product leaders   what's in it for you
#PNSummit bootcamp for product leaders what's in it for youProductNation/iSPIRT
 
#PNSummit - Two Day Gathering of Practicing Product Professionals
#PNSummit - Two Day Gathering of Practicing Product Professionals#PNSummit - Two Day Gathering of Practicing Product Professionals
#PNSummit - Two Day Gathering of Practicing Product ProfessionalsProductNation/iSPIRT
 
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksPeregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksProductNation/iSPIRT
 
Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...
Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...
Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...ProductNation/iSPIRT
 
A product exists to solve a problem - Presentation by Harinder from Paytm #PNM
A product exists to solve a problem - Presentation by Harinder from Paytm #PNMA product exists to solve a problem - Presentation by Harinder from Paytm #PNM
A product exists to solve a problem - Presentation by Harinder from Paytm #PNMProductNation/iSPIRT
 
How #PNCamp went through its own Customer Discovery process
How #PNCamp went through its own Customer Discovery processHow #PNCamp went through its own Customer Discovery process
How #PNCamp went through its own Customer Discovery processProductNation/iSPIRT
 
#PNSummit bootcamp for product leaders - What's in it for you?
#PNSummit bootcamp for product leaders - What's in it for you?#PNSummit bootcamp for product leaders - What's in it for you?
#PNSummit bootcamp for product leaders - What's in it for you?ProductNation/iSPIRT
 
NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...ProductNation/iSPIRT
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...ProductNation/iSPIRT
 
FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...
FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...
FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...ProductNation/iSPIRT
 
SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...ProductNation/iSPIRT
 
Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...
Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...
Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...ProductNation/iSPIRT
 
Fedena - Student Information System by Foradian Technologies
Fedena - Student Information System by Foradian TechnologiesFedena - Student Information System by Foradian Technologies
Fedena - Student Information System by Foradian TechnologiesProductNation/iSPIRT
 
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...ProductNation/iSPIRT
 
NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...
NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...
NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...ProductNation/iSPIRT
 
InMobi Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
InMobi Presentation for IT Minister @iSPIRT Event -  Conclave for India as Pr...InMobi Presentation for IT Minister @iSPIRT Event -  Conclave for India as Pr...
InMobi Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...ProductNation/iSPIRT
 

Viewers also liked (20)

Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
 
iSPIRT: M&A activity report may 2013
iSPIRT: M&A activity report may 2013iSPIRT: M&A activity report may 2013
iSPIRT: M&A activity report may 2013
 
Building Billion Dollar Product Companies from India - Management report by J...
Building Billion Dollar Product Companies from India - Management report by J...Building Billion Dollar Product Companies from India - Management report by J...
Building Billion Dollar Product Companies from India - Management report by J...
 
#PNSummit bootcamp for product leaders what's in it for you
#PNSummit bootcamp for product leaders   what's in it for you#PNSummit bootcamp for product leaders   what's in it for you
#PNSummit bootcamp for product leaders what's in it for you
 
#PNSummit - Two Day Gathering of Practicing Product Professionals
#PNSummit - Two Day Gathering of Practicing Product Professionals#PNSummit - Two Day Gathering of Practicing Product Professionals
#PNSummit - Two Day Gathering of Practicing Product Professionals
 
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksPeregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
 
Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...
Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...
Presentation by Meshlabs at Zensar #TechShowcase - An iSPIRT ProductNation in...
 
A product exists to solve a problem - Presentation by Harinder from Paytm #PNM
A product exists to solve a problem - Presentation by Harinder from Paytm #PNMA product exists to solve a problem - Presentation by Harinder from Paytm #PNM
A product exists to solve a problem - Presentation by Harinder from Paytm #PNM
 
How #PNCamp went through its own Customer Discovery process
How #PNCamp went through its own Customer Discovery processHow #PNCamp went through its own Customer Discovery process
How #PNCamp went through its own Customer Discovery process
 
#PNSummit bootcamp for product leaders - What's in it for you?
#PNSummit bootcamp for product leaders - What's in it for you?#PNSummit bootcamp for product leaders - What's in it for you?
#PNSummit bootcamp for product leaders - What's in it for you?
 
iSPIRT Volunteer Model
iSPIRT Volunteer Model iSPIRT Volunteer Model
iSPIRT Volunteer Model
 
NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
NovoPay Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
 
FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...
FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...
FusionCharts Presentation for IT Minister @iSPIRT Event - Conclave for India ...
 
SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
SignEasy Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
 
Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...
Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...
Forus Presentation for IT Minister @iSPIRT Event - Conclave for India as Prod...
 
Fedena - Student Information System by Foradian Technologies
Fedena - Student Information System by Foradian TechnologiesFedena - Student Information System by Foradian Technologies
Fedena - Student Information System by Foradian Technologies
 
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
NewsHunt Presentation for IT Minister @iSPIRT Event - Conclave for India as P...
 
NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...
NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...
NowFloats Presentation for IT Minister @iSPIRT Event - Conclave for India as ...
 
InMobi Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
InMobi Presentation for IT Minister @iSPIRT Event -  Conclave for India as Pr...InMobi Presentation for IT Minister @iSPIRT Event -  Conclave for India as Pr...
InMobi Presentation for IT Minister @iSPIRT Event - Conclave for India as Pr...
 

Similar to BYOD Security Solution Protects Networks from Infected Personal Devices

Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Amazon Web Services
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsAdrian Sanabria
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Zoe Gilbert
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT PatternsWSO2
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server zOSCommserver
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns John Mathon
 
Re-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxRe-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxtmbainjr131
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company PresentationChaitanyaS
 

Similar to BYOD Security Solution Protects Networks from Infected Personal Devices (20)

Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Re-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxRe-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptx
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 

More from ProductNation/iSPIRT

PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...
PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...
PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...ProductNation/iSPIRT
 
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...ProductNation/iSPIRT
 
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...ProductNation/iSPIRT
 
A Concept of Operations for UAS in India
A Concept of Operations for UAS in IndiaA Concept of Operations for UAS in India
A Concept of Operations for UAS in IndiaProductNation/iSPIRT
 
iSPIRT’s Official Response to the Draft Drone Rules 2021
iSPIRT’s Official Response to the Draft Drone Rules 2021iSPIRT’s Official Response to the Draft Drone Rules 2021
iSPIRT’s Official Response to the Draft Drone Rules 2021ProductNation/iSPIRT
 
iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...
iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...
iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...ProductNation/iSPIRT
 
Full Spectrum Thinking by Bob Johansen
Full Spectrum Thinking by Bob JohansenFull Spectrum Thinking by Bob Johansen
Full Spectrum Thinking by Bob JohansenProductNation/iSPIRT
 
Open House on iSPIRT Balloon Volunteering
Open House on iSPIRT Balloon VolunteeringOpen House on iSPIRT Balloon Volunteering
Open House on iSPIRT Balloon VolunteeringProductNation/iSPIRT
 
Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5ProductNation/iSPIRT
 
Nandan Nilekani: Identity, Payments, Data empowerment 2019
Nandan Nilekani: Identity, Payments, Data empowerment 2019Nandan Nilekani: Identity, Payments, Data empowerment 2019
Nandan Nilekani: Identity, Payments, Data empowerment 2019ProductNation/iSPIRT
 
Towards A Holistic Healthcare Ecosystem
Towards A Holistic Healthcare EcosystemTowards A Holistic Healthcare Ecosystem
Towards A Holistic Healthcare EcosystemProductNation/iSPIRT
 
Angel Tax Presentation To DIPP [Section 56(2)(viib)]
Angel Tax Presentation To DIPP [Section 56(2)(viib)] Angel Tax Presentation To DIPP [Section 56(2)(viib)]
Angel Tax Presentation To DIPP [Section 56(2)(viib)] ProductNation/iSPIRT
 
White paper on the analysis of High share premium amongst Startups in India
White paper on the analysis of High share premium amongst Startups in IndiaWhite paper on the analysis of High share premium amongst Startups in India
White paper on the analysis of High share premium amongst Startups in IndiaProductNation/iSPIRT
 
[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68
[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68
[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68ProductNation/iSPIRT
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)ProductNation/iSPIRT
 
India SaaS Survey Results 2017 in partnership with DCS Advisory
India SaaS Survey Results 2017 in partnership with DCS Advisory India SaaS Survey Results 2017 in partnership with DCS Advisory
India SaaS Survey Results 2017 in partnership with DCS Advisory ProductNation/iSPIRT
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaProductNation/iSPIRT
 
BBPS Workshop in partnership with NPCI | Product, Business & Technology Overview
BBPS Workshop in partnership with NPCI | Product, Business & Technology OverviewBBPS Workshop in partnership with NPCI | Product, Business & Technology Overview
BBPS Workshop in partnership with NPCI | Product, Business & Technology OverviewProductNation/iSPIRT
 
India's Platforms Leapfrog by Dr Pramod Varma
India's Platforms Leapfrog by Dr Pramod VarmaIndia's Platforms Leapfrog by Dr Pramod Varma
India's Platforms Leapfrog by Dr Pramod VarmaProductNation/iSPIRT
 

More from ProductNation/iSPIRT (20)

PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...
PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...
PM WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth ...
 
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
 
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
WANI 3.0: Unleashing Business Innovation and Open Wireless Network Growth for...
 
A Concept of Operations for UAS in India
A Concept of Operations for UAS in IndiaA Concept of Operations for UAS in India
A Concept of Operations for UAS in India
 
iSPIRT’s Official Response to the Draft Drone Rules 2021
iSPIRT’s Official Response to the Draft Drone Rules 2021iSPIRT’s Official Response to the Draft Drone Rules 2021
iSPIRT’s Official Response to the Draft Drone Rules 2021
 
iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...
iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...
iSPIRT Balloon Volunteering Open House Session #4 - Opportunities in Technolo...
 
Full Spectrum Thinking by Bob Johansen
Full Spectrum Thinking by Bob JohansenFull Spectrum Thinking by Bob Johansen
Full Spectrum Thinking by Bob Johansen
 
Open House on iSPIRT Balloon Volunteering
Open House on iSPIRT Balloon VolunteeringOpen House on iSPIRT Balloon Volunteering
Open House on iSPIRT Balloon Volunteering
 
Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5
 
Nandan Nilekani: Identity, Payments, Data empowerment 2019
Nandan Nilekani: Identity, Payments, Data empowerment 2019Nandan Nilekani: Identity, Payments, Data empowerment 2019
Nandan Nilekani: Identity, Payments, Data empowerment 2019
 
Towards A Holistic Healthcare Ecosystem
Towards A Holistic Healthcare EcosystemTowards A Holistic Healthcare Ecosystem
Towards A Holistic Healthcare Ecosystem
 
Angel Tax Presentation To DIPP [Section 56(2)(viib)]
Angel Tax Presentation To DIPP [Section 56(2)(viib)] Angel Tax Presentation To DIPP [Section 56(2)(viib)]
Angel Tax Presentation To DIPP [Section 56(2)(viib)]
 
White paper on the analysis of High share premium amongst Startups in India
White paper on the analysis of High share premium amongst Startups in IndiaWhite paper on the analysis of High share premium amongst Startups in India
White paper on the analysis of High share premium amongst Startups in India
 
[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68
[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68
[Angel Tax] White Paper On Section 56 (2)(viib) And Section 68
 
Building For A Billion
Building For A BillionBuilding For A Billion
Building For A Billion
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
India SaaS Survey Results 2017 in partnership with DCS Advisory
India SaaS Survey Results 2017 in partnership with DCS Advisory India SaaS Survey Results 2017 in partnership with DCS Advisory
India SaaS Survey Results 2017 in partnership with DCS Advisory
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
 
BBPS Workshop in partnership with NPCI | Product, Business & Technology Overview
BBPS Workshop in partnership with NPCI | Product, Business & Technology OverviewBBPS Workshop in partnership with NPCI | Product, Business & Technology Overview
BBPS Workshop in partnership with NPCI | Product, Business & Technology Overview
 
India's Platforms Leapfrog by Dr Pramod Varma
India's Platforms Leapfrog by Dr Pramod VarmaIndia's Platforms Leapfrog by Dr Pramod Varma
India's Platforms Leapfrog by Dr Pramod Varma
 

Recently uploaded

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 

Recently uploaded (20)

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 

BYOD Security Solution Protects Networks from Infected Personal Devices

  • 2. Welcome to “Me” Enterprise How BYOD has changed the security map and how “Peregrine 7” helps tackle it? Copyright i7 Networks, i7nw.com Manjunath M Gowda CEO, i7 Networks Bangalore, India manju_s7 in/manjunathgowda/
  • 3. WHY BYOD matters? Copyright i7 Networks, i7nw.com
  • 4. • 90%of enterprises will use personal devices in Enterprise by 2014 - Gartner • 20% Savings: CISCO claimed due to BYOD & declared: “We don’t pay for it, and our users are happier.” • Survey: Enterprises that don't support BYOD are at competitive disadvantage Copyright i7 Networks, i7nw.com
  • 5. So what is stopping them? Copyright i7 Networks, i7nw.com
  • 6. 75% CIOs said Compliance & Security biggest challenge in allowing BYOD Copyright i7 Networks, i7nw.com
  • 7. DARK READING – July 2013 Copyright i7 Networks, i7nw.com
  • 8. Copyright i7 Networks, i7nw.com 62% - Loss of a device that has Sensitive Data – (MDMs solve this) 61% - An infected personal device connecting to the Corporate Network
  • 9. Business overview Copyright i7 Networks, i7nw.com
  • 10. 79% business had a mobile incident last year alone – Checkpoint 600%+ growth in mobile malware in last 2 years 20 Mn+ devices jailbroken in just two months (Jan 2013) 18 Mn infected Android devices by end of 2013 71% mobile devices have OS / application vulnerabilities Copyright i7 Networks, i7nw.com
  • 11. $500K+ cost per such incident $1.5Mn cost per such settlement Copyright i7 Networks, i7nw.com
  • 12. Why traditional tools can’t help here? Copyright i7 Networks, i7nw.com
  • 13. • Perimeter security and not for inside-inside or inside-out threats • Used to IT-owned devices and not personal devices (agented) • Used to take care of outside2inside threats Copyright i7 Networks, i7nw.com
  • 14. So what tools do exist to solve it? Copyright i7 Networks, i7nw.com
  • 15. 15 Copyright i7 Networks, i7nw.com MDMs, EPP Airwatch, MobileIron, Zenprise MAMs Bitzer, IBM, SAP, Good MDPs AT&T toggle, Divide, VMware MNAC i7Networks Device level n e t w o r k Mobile Security Tools Quadrant Server side
  • 16. Our value proposition Copyright i7 Networks, i7nw.com
  • 17. “We protect your network from malicious/infected BYODs” Copyright i7 Networks, i7nw.com
  • 18. “We Protect the Enterprise Network” by -Detect & Fingerprint1 all personal devices -Prevent the malicious devices from connecting -100% Agentless (Zero-touch) -Zero-Latency Deployment -Provide detailed Compliance Reports “To Know & To Protect” 1 Secure detection & fingerprinting (US patent pending) Copyright i7 Networks, i7nw.com
  • 19. • Name • Screen caps • Demo PeregrineGuardTM
  • 20. i7 Networks; i7 Confidential Not just phones, we support all wireless devices.
  • 21. Continuous Monitoring Complete VisibilityComplete Visibility Endpoint AuthenticationEndpoint Authentication Vulnerability and malicious assessment Vulnerability and malicious assessment Granular policy enforcement Granular policy enforcement Compliance ReportingCompliance Reporting Entry Verification – Corporate Wi-Fi or VPN? Entry Verification – Corporate Wi-Fi or VPN? Allow Deny Compromised /Jailbroken/ Unauthorized/Unmanaged check Compromised /Jailbroken/ Unauthorized/Unmanaged check Deny Deny Personal Devices
  • 22. the questions we answer Copyright i7 Networks, i7nw.com
  • 23. Copyright i7 Networks, i7nw.com • What devices are getting into the corporate network? • Who do they belong to? • Are they infected? • Are they compromised or malicious? • How vulnerable are they? • What are they accessing? • What apps* are they running? • Can I control the access? • Can I get Compliance audit reports?
  • 24. How do you deploy? Copyright i7 Networks, i7nw.com
  • 25. • 100% agentless and non-intrusive – Zero Touch • Complete off-line deployment – Zero-Latency • Just ONE probe* in the network • Supports: Corporate Wi-Fi/ Public Wi- Fi/3G/4G/LTE Deployment
  • 26. i7 Networks; i7 Confidential
  • 27. - Microsoft AD, RADIUS and LDAP - Microsoft Exchange - Maas 360 MDM - Microsoft System Center* - IBM Tivoli* - Cisco/Juniper and Fortinet VPN - Snort IDS - CVE database Integrates with
  • 28. Why “Agentless” is Sweet?  Copyright i7 Networks, i7nw.com
  • 29. 14different OS types & growing; Add versions and models5 45% enterprises have more than 5 times as many BYOD as they had 2 years ago3 3.5– Average number of devices per Employee 42%- Average churn of devices per year among enterprise employees < 10% enterprises aware of all mobile devices accessing their network & servers3 27% of devices are ‘approved’ by the company6Copyright i7 Networks, i7nw.com
  • 30. So what’s unique? Copyright i7 Networks, i7nw.com
  • 31. 4A (Attributes) Discovery & Fingerprinting Health Check Discover Apps on the wire*, Policy Enforcement 4A (Attributes) Discovery & Fingerprinting Health Check Discover Apps on the wire*, Policy Enforcement 4D (Deployments) 100% Agentless (Zero-touch), ZERO-Latency SINGLE Probe, Wi-Fi/3G/4G/LTE 4D (Deployments) 100% Agentless (Zero-touch), ZERO-Latency SINGLE Probe, Wi-Fi/3G/4G/LTE 4T (Threat-Protections) Malicious & Intrusion Prevention Zero-day Attack Prevention*, Vulnerability Check Check of anti-malware s/w 4T (Threat-Protections) Malicious & Intrusion Prevention Zero-day Attack Prevention*, Vulnerability Check Check of anti-malware s/w 4K (Keywords) 100% Agentless Patent-Pending Algorithms Detailed Fingerprinting Zero-Latency 4K (Keywords) 100% Agentless Patent-Pending Algorithms Detailed Fingerprinting Zero-Latency
  • 32. Available as : Appliance / Virtual Appliance Available as : Appliance / Virtual Appliance
  • 33. What is that you do MDM cannot? Copyright i7 Networks, i7nw.com
  • 34. oCannot do Discovery and fingerprint of all devices  Authorized  Unauthorized  Unmanaged  Non-mobile devices like e-Readers, Wi-Fi watches, Gaming devices, Healthcare devices etc. Copyright i7 Networks, i7nw.com
  • 35. oMalware detection via signature is only 28%; Cannot catch malicious traffic @ network layer (not even at device layer) oCannot do Access control based on device attributes oCannot enforce different access rules for different departments/ LoBs Copyright i7 Networks, i7nw.com
  • 36. oHot-spotting/Mac-spoofing cannot be detected oFails where you are not allowed to install a client on the device due to privacy or compliance oNot dynamic (need to stop iOS6.1?) Copyright i7 Networks, i7nw.com
  • 37. How different are you from a traditional nac? Copyright i7 Networks, i7nw.com
  • 38.  Support all: Wi-Fi & 3G/4G/LTE  100% Zero Touch (agentless)  Zero Latency (offline) (still we control)  Just ONE probe  Fits into any network infrastructure  Support all: Wi-Fi & 3G/4G/LTE  100% Zero Touch (agentless)  Zero Latency (offline) (still we control)  Just ONE probe  Fits into any network infrastructure  US Patent-pending fingerprinting algorithm  Mac-spoofing/Hot spotting  DVItm (Device Vulnerability Index)  Detecting apps on the wire (dropbox)  US Patent-pending fingerprinting algorithm  Mac-spoofing/Hot spotting  DVItm (Device Vulnerability Index)  Detecting apps on the wire (dropbox)  Completely focused on BYOD Security Completely focused on BYOD Security
  • 39. Product Road Map? Copyright i7 Networks, i7nw.com
  • 40. • Recognition of all Apps on the Wire • Detection of EPP (End Point Protection) tools • Chaining of P7s • Integrations into System Center and Tivoli • Integrations into MDMs • mNAC in the cloud to detect cloud access Copyright i7 Networks, i7nw.com
  • 41. The TEAM Copyright i7 Networks, i7nw.com
  • 42. Jeff Hunter Evangelist Peter Gilson CTO First Last CFO Jack Franklin CMO Heather Adler CEO Investors & Advisors 1st venture: $8.4M by Bluecoat (2010) Team together for second time Started June 12’ Product start Jan 13’
  • 43. Questions? Copyright i7 Networks, i7nw.com manju.m@i7nw.com manju_s7

Editor's Notes

  1. To present to potential Customers and POC sites
  2. www.poynter.org http://www.iphonehacks.com/2013/01/20-million-jailbroken-devices-cydia.html http://www.androidguys.com/2012/12/14/lookout-18-million-infected-android-devices-by-end-of-2013/
  3. www.poynter.org http://www.iphonehacks.com/2013/01/20-million-jailbroken-devices-cydia.html http://www.androidguys.com/2012/12/14/lookout-18-million-infected-android-devices-by-end-of-2013/
  4. www.poynter.org
  5. www.poynter.org
  6. To demo or not to demo! Depending on time, ask. Focus on what you product does and how it does it. Talk about the benefits people will get from the product. Feature---Benefit---Reason. Doing live demos can be fraught with anxiety and too many places to fail. So never do a live demo in the first meeting with an investor. Never! There are three ways to demo your product or service without being on-line. 1-Get your programmers to make everything run locally on your computer without needing an Internet connection at all. 2-Safer:Use SnagIt to capture Web pages that will play back in off-line mode, at least for navigation purposes. 3-BIG Secret: Use Camtasia to record a demo and edit out all of the extra movements and unnecessary screens. Turn off the voice and play back the video of the demo while you do a live voice over guiding your watcher every step of the way. Make the demo under 3 minutes or 2 minutes would be even better.
  7. This one for CA-1
  8. www.poynter.org
  9. This one for CA-1
  10. This one for CA-1
  11. This one for CA-1
  12. Note any gaps so you can engage the investor to help you find the missing person. Why these people will make this business happen. What have they done in the past that makes them appropriate for this new venture? Show Board Members and existing investors to add more credibility to your story.