BYOD Security - 100% agentless (Zero-touch) and Zero-latency; Only tool that works at network layer (as opposed to on the device) discovering fingerprinting health-check for all personal devices and protecting corporate network from infected/malicious/compromised personal devices.
We also the only tool that complements MDM.
2. Welcome to “Me” Enterprise
How BYOD has changed the security map & how
“Peregrine7tm” helps tackle it?
Copyright i7 Networks, i7nw.com
Manjunath M Gowda
CEO, i7 Networks
i7nw.com
4. • 90%of enterprises will use personal devices in Enterprise by
2014 - Gartner
• 20%Savings: CISCO claimed. “We don‟t pay for it, and
our users are happier.”
• GARTNER: Enterprises that don't support BYOD are at
competitive disadvantage
Copyright i7 Networks, i7nw.com
5. SO WHAT IS STOPPING THEM?
Copyright i7 Networks, i7nw.com
6. 75% CIOS SAID COMPLIANCE & SECURITY
BIGGEST CHALLENGE IN ALLOWING BYOD
Copyright i7 Networks, i7nw.com
7. TOP 2 SECURITY HEADACHES?
Copyright i7 Networks, i7nw.com
10. 79% business had a mobile incident last year alone – Checkpoint
600%+ growth in mobile malware in last 2 years
20 Mn+ devices jailbroken in just two months (Jan 2013)
18 Mn infected Android devices by end of 2013
71% mobile devices have OS / application vulnerabilities
$500K+ cost per such incident
$1.5Mn cost per such settlement
Copyright i7 Networks, i7nw.com
11. 14different OS types & growing; Add all versions and models (phones,
tablets)5
45% enterprises have more than 5 times as many personal mobile devices as
they had 2 Years ago3
< 10% enterprises aware of all mobile devices accessing their network & servers3
27% of devices are „approved‟ by the company6
Copyright i7 Networks, i7nw.com
13. • Perimeter security & not internal
• Used to IT-owned devices and not personal
devices
• Used to take care of outside2inside threats;
not for inside-out & inside-inside
Copyright i7 Networks, i7nw.com
14. SO WHAT TOOLS DO EXIST
TO SOLVE IT?
Copyright i7 Networks, i7nw.com
15. 15 Copyright i7 Networks, i7nw.com
MDMs, EPP
Airwatch, MobileIron, Zenprise
MAMs
Bitzer, IBM, SAP, Good
MDPs
AT&T
toggle, Divide, VMware
MNAC
i7Networks
Device level
n
e
t
w
o
r
k
Mobile Security Tools Quadrant
Server side
21. Copyright i7 Networks, i7nw.com
• What devices are getting into the network?
• Who do they belong to?
• Are they infected?
• Are they compromised or malicious?
• How vulnerable are they?
• What are they accessing?
• What apps* are they running?
• Can I control the access?
• Can I get Compliance Audit reports?
22. i7 Networks; i7 Confidential
Not just phones/tablets,
we support all wireless devices.
23. HOW DO YOU DEPLOY?
Copyright i7 Networks, i7nw.com
24. • 100% agentless and non-intrusive – Zero Touch
• Complete off-line deployment – Zero-Latency
• Just ONE probe* in the network
• Supports: Wi-Fi / 3G/4G/LTE (VPN)
Deployment
25. Current Product Status
Available in two flavors:
Just the discovery & control (allow/deny) module –
deployed passively (out-of-band or ZERO-Latency)
Both discovery and granular policy enforcement
modules – deployed inline mode
Beta version: Released mid of April, 2013
GA : 1.0 – end of July, 2013; 1.1 in Aug mid
Copyright i7 Networks, i7nw.com