SlideShare a Scribd company logo
1 of 22
Download to read offline
Sierra vApp:
Browser Isolation
2
Addressing the Modern Workforce
Web-delivered
malware
Threats in encrypted web
traffic, web-based email
Sensitive corporate
apps
Lack of control or
security over web apps,
mobile apps
High risk
access
Banks spend $ buying credit
cards from dark web, IT &
SecOps researching threats
3
What’s Needed
Seamless browser
isolation for PC and
mobile devices
Scan, detonate file
downloads; inspect SSL-
pinned sites
Security controls for
web & mobile apps
Use multi-factor auth,
geolocation, watermark
Audit trail of all user
access
Reduce risk of data leakage
without needing to integrate
MDM, VPN, server logs
4
VDI Isn’t the Solution
Expensive
VDI Shortcomings
PC apps not suited for
touch input or mobile
screen sizes
VDI = $1000/user/year
Citrix + MS CAL
Not designed for
Edge, Expensive
Cloud Hosting
1 Microsoft Desktop OS $187 per user, Citrix $100 per user
High Compute
Resources
Designed for
Windows
5
vApp Browser
Isolation
There is a solution…
6
Provide remote access to:
• Android, Apple iOS and Windows
Phone with client apps
• Any HTML 5-enabled device
vApp services hosts Linux desktop apps & Browser on remote servers
Centralize app management to:
▪ Eliminate need to install End-Point
security and other expenses
Isolation and Secure Data Storage
7
Lower TCO, Cloud, Edge & In-house
High Performance & Light weight Docker based
solution
Security like Dual Factor Authentication, 4096 SSL,
Load Balancing require expensive 3rd party solution
Optimized for B/W & Latency sensitive apps
Lower TCO. <$15 Per-User
8
Isolation and Secure Data Storage
Sierra vApp Shield
4096-bit ECDHE
Encryption
Dual factor
authentication
Sierra vApp:
• Access any where from both Mobile and
Desktop
• Integrated Solution
• Secure File transfer
End user
9
Universal Isolation solution for Desktop and
Mobile
Security
Gateway
Clients
Authentication
Server
10
Browser Isolation: Cloud & Edge Ready
• Simplified Management
and Remote
administration
• Can be deployed in the
Cloud or Edge.
• Unified solution,
allowing user to migrate
to host with closest
geographical proximity
Firewall
Management
Server Farm
Power Users
IT Admin
Kiosk User
Scale To Cloud
REST APIs
Scale To Edge
11
Browser Isolation – Scaling with Docker
• Each Instance is fully isolated with
Docker
• No host dependency
• OpenGL, Display and Audio are all
rendered within a self-contained
Image/Container
• Can be deployed in Edge for lower
latency
• Transparent HTTP Proxy Mode
• Remote Desktop Mode
Sierra-X
Pulse Audio
User Input
Camera & GPS
12
Strong Authentication
Prevent unauthorized access with:
• Client certificates
• One-time password (sent via text message)
• Restricting access based on geographic location
• Brute force login protection
• Geofencing
• Telco Network Access Check & SIM check
Ensure only legitimate users access your data
MMR, Low
Latency
And Other
Highlights
14
Video Rendered as Display -vs-
MMR
Codec
Final
Composition via
GLES API
m.youtube.com
Display Data Stream from Cloud
m.youtube.com
Codec
m.youtube.c
om
Display Data + Encoded Video in Separate Channels
m.youtube.com
Without MMR
▪ Low Quality
▪ High
Bandwidth
▪ High Server
consumption
MMR
▪ High Quality
▪ Low Bandwidth
▪ No Server Load
▪ 4K@60fps
Video
15
DTLS with Error resiliency – Low Latency
Data
Ack
N/W
Latency
Time
TCP/SSL
▪ End to End data latency
will be 2-4x higher than
network latency
▪ Doesn’t handle burst
traffic
Data
DTLS
▪ Error resiliency is built in
VMI protocol itself
▪ No re-transmission
▪ Data is delivered as quick
as possible
16
Edge Optimized
Security, Performance, Scalability
17
Cloud, Edge, In-house
WIFI,MicroCell
On-siteDevices
On-prem Server
Edge Network
(<20msec latency)
RoamingUsers
Storage,
Managemen
t
Hyper Scale Cloud for non-latency
sensitive Apps like Browser, Email
18
Best In Class Solution
Performance Features Sierraware
Low Latency <90msec
Support HW GPU P
Lower Cost with Application Virtualization P
Adaptive Frame Refresh P
30/60fps
Native Font Rendering Apps, Webpages are
identical to native Device
19
Enhanced Security
Security Features Sierraware
Integrated Antivirus P
End-to-End Certificate Pinning for Man-in-
Middle Protection
P
Client App Tampering Check P
Encrypted Server Storage P
Native Two-Factor Authentication P
Passthrough Client Certificate P Push Client Cert to
Hosted Apps automatically
Watermark P
20
User Experience
Features Sierraware
Multimedia Re-direction 4K@60fps P
Wallpaper and User profile Sync P
Virtual Launcher & Hardware Button P
Background Notifications P
Pixel Style launcher and Native
Android User experience
P
Support for I/O All native I/Os like Camera, GPS,
Touch/Tilt, Audio are supported
Support apps like Skype, Kakao P
21
Easy Administration and Flexible
Features Sierraware
Lost Device Tracking P
Zero Configuration P
Active Directory Integration P
App based policy Each app can have separate
network, geofencing policies
User session recording P
REST API for scripting P
On Demand Scaling P
22
The End
www.sierraware.com

More Related Content

What's hot

Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sraMotty Ben Atia
 
KVM-Over-IP
KVM-Over-IPKVM-Over-IP
KVM-Over-IPCodero
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final Presentationshawn kelly
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentationdavebrosnan
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateAlex Kwan
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Zscaler
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Controlrkoscak
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Netpluz Asia Pte Ltd
 
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSKDefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSKPunky Duero
 
3DConsulting_Presentation
3DConsulting_Presentation3DConsulting_Presentation
3DConsulting_PresentationJoseph Baca
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéMarketingArrowECS_CZ
 

What's hot (20)

Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sra
 
KVM-Over-IP
KVM-Over-IPKVM-Over-IP
KVM-Over-IP
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final Presentation
 
EdgeWallFlyer2016
EdgeWallFlyer2016EdgeWallFlyer2016
EdgeWallFlyer2016
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone Update
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Control
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017
 
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSKDefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
 
Novinky F5
Novinky F5Novinky F5
Novinky F5
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
3DConsulting_Presentation
3DConsulting_Presentation3DConsulting_Presentation
3DConsulting_Presentation
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 

Similar to Sierra vApp: Browser Isolation Solution for Modern Workforce

Citrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureCitrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureEmirates Computers
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overviewdragnetNZ
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityDigicomp Academy AG
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Mersive Solstice SDS Management Software
Mersive Solstice SDS Management SoftwareMersive Solstice SDS Management Software
Mersive Solstice SDS Management SoftwarePaul Richards
 
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...Carsten Rhod Gregersen
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubiplotnikov
 
Hypori Performance Webinar
Hypori Performance WebinarHypori Performance Webinar
Hypori Performance WebinarGrafic.guru
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.sflynn073
 
How many way to sale f5 for enterprise
How many way to sale f5 for enterpriseHow many way to sale f5 for enterprise
How many way to sale f5 for enterpriseBach Phan
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustInformation Security Services SA
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustInformation Security Services SA
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?Digicomp Academy AG
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 

Similar to Sierra vApp: Browser Isolation Solution for Modern Workforce (20)

Citrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureCitrix Enterprise Access Infrastructure
Citrix Enterprise Access Infrastructure
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overview
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise Mobility
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
Mersive Solstice SDS Management Software
Mersive Solstice SDS Management SoftwareMersive Solstice SDS Management Software
Mersive Solstice SDS Management Software
 
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech club
 
Hypori Performance Webinar
Hypori Performance WebinarHypori Performance Webinar
Hypori Performance Webinar
 
Sunray Presentation
Sunray PresentationSunray Presentation
Sunray Presentation
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.
 
How many way to sale f5 for enterprise
How many way to sale f5 for enterpriseHow many way to sale f5 for enterprise
How many way to sale f5 for enterprise
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 

More from Sierraware

Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD SuccessSierraware
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and FinanceSierraware
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101Sierraware
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMISierraware
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware
 

More from Sierraware (9)

Cloud gaming
Cloud gamingCloud gaming
Cloud gaming
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD Success
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Sierra vApp: Browser Isolation Solution for Modern Workforce

  • 2. 2 Addressing the Modern Workforce Web-delivered malware Threats in encrypted web traffic, web-based email Sensitive corporate apps Lack of control or security over web apps, mobile apps High risk access Banks spend $ buying credit cards from dark web, IT & SecOps researching threats
  • 3. 3 What’s Needed Seamless browser isolation for PC and mobile devices Scan, detonate file downloads; inspect SSL- pinned sites Security controls for web & mobile apps Use multi-factor auth, geolocation, watermark Audit trail of all user access Reduce risk of data leakage without needing to integrate MDM, VPN, server logs
  • 4. 4 VDI Isn’t the Solution Expensive VDI Shortcomings PC apps not suited for touch input or mobile screen sizes VDI = $1000/user/year Citrix + MS CAL Not designed for Edge, Expensive Cloud Hosting 1 Microsoft Desktop OS $187 per user, Citrix $100 per user High Compute Resources Designed for Windows
  • 6. 6 Provide remote access to: • Android, Apple iOS and Windows Phone with client apps • Any HTML 5-enabled device vApp services hosts Linux desktop apps & Browser on remote servers Centralize app management to: ▪ Eliminate need to install End-Point security and other expenses Isolation and Secure Data Storage
  • 7. 7 Lower TCO, Cloud, Edge & In-house High Performance & Light weight Docker based solution Security like Dual Factor Authentication, 4096 SSL, Load Balancing require expensive 3rd party solution Optimized for B/W & Latency sensitive apps Lower TCO. <$15 Per-User
  • 8. 8 Isolation and Secure Data Storage Sierra vApp Shield 4096-bit ECDHE Encryption Dual factor authentication Sierra vApp: • Access any where from both Mobile and Desktop • Integrated Solution • Secure File transfer End user
  • 9. 9 Universal Isolation solution for Desktop and Mobile Security Gateway Clients Authentication Server
  • 10. 10 Browser Isolation: Cloud & Edge Ready • Simplified Management and Remote administration • Can be deployed in the Cloud or Edge. • Unified solution, allowing user to migrate to host with closest geographical proximity Firewall Management Server Farm Power Users IT Admin Kiosk User Scale To Cloud REST APIs Scale To Edge
  • 11. 11 Browser Isolation – Scaling with Docker • Each Instance is fully isolated with Docker • No host dependency • OpenGL, Display and Audio are all rendered within a self-contained Image/Container • Can be deployed in Edge for lower latency • Transparent HTTP Proxy Mode • Remote Desktop Mode Sierra-X Pulse Audio User Input Camera & GPS
  • 12. 12 Strong Authentication Prevent unauthorized access with: • Client certificates • One-time password (sent via text message) • Restricting access based on geographic location • Brute force login protection • Geofencing • Telco Network Access Check & SIM check Ensure only legitimate users access your data
  • 14. 14 Video Rendered as Display -vs- MMR Codec Final Composition via GLES API m.youtube.com Display Data Stream from Cloud m.youtube.com Codec m.youtube.c om Display Data + Encoded Video in Separate Channels m.youtube.com Without MMR ▪ Low Quality ▪ High Bandwidth ▪ High Server consumption MMR ▪ High Quality ▪ Low Bandwidth ▪ No Server Load ▪ 4K@60fps Video
  • 15. 15 DTLS with Error resiliency – Low Latency Data Ack N/W Latency Time TCP/SSL ▪ End to End data latency will be 2-4x higher than network latency ▪ Doesn’t handle burst traffic Data DTLS ▪ Error resiliency is built in VMI protocol itself ▪ No re-transmission ▪ Data is delivered as quick as possible
  • 17. 17 Cloud, Edge, In-house WIFI,MicroCell On-siteDevices On-prem Server Edge Network (<20msec latency) RoamingUsers Storage, Managemen t Hyper Scale Cloud for non-latency sensitive Apps like Browser, Email
  • 18. 18 Best In Class Solution Performance Features Sierraware Low Latency <90msec Support HW GPU P Lower Cost with Application Virtualization P Adaptive Frame Refresh P 30/60fps Native Font Rendering Apps, Webpages are identical to native Device
  • 19. 19 Enhanced Security Security Features Sierraware Integrated Antivirus P End-to-End Certificate Pinning for Man-in- Middle Protection P Client App Tampering Check P Encrypted Server Storage P Native Two-Factor Authentication P Passthrough Client Certificate P Push Client Cert to Hosted Apps automatically Watermark P
  • 20. 20 User Experience Features Sierraware Multimedia Re-direction 4K@60fps P Wallpaper and User profile Sync P Virtual Launcher & Hardware Button P Background Notifications P Pixel Style launcher and Native Android User experience P Support for I/O All native I/Os like Camera, GPS, Touch/Tilt, Audio are supported Support apps like Skype, Kakao P
  • 21. 21 Easy Administration and Flexible Features Sierraware Lost Device Tracking P Zero Configuration P Active Directory Integration P App based policy Each app can have separate network, geofencing policies User session recording P REST API for scripting P On Demand Scaling P