cloud security for the new mobile workforce reality

Post on 17-Jan-2015

129 Views

Category:

Internet

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Bring-your-own-device (BYOD) policies and an increasingly mobile workforce are no longer just trends, they’re the new SMB and Enterprise reality. What’s also a reality is the opportunity in the market for web security-as-a-service. This is an in depth look at the fastest growing market segment in the security industry and how to take advantage of it.

TRANSCRIPT

The channel community’s trusted authority for growth and innovation for more than three decades.

Enabling Technology Partnerships

The Channel Company & CYREN

Cloud Security for the New Mobile Workforce Reality

Speaking Today

Jonas TichenorDirector of ContentThe Channel Company @JonasTichenor

Speaking Today

Avi Turiel Director of Threat Research, CYREN

 ©2014 CYREN Confidential and Proprietary

4 ©2014 CYREN Confidential and

Proprietary

4

WHO WE ARE

 ©2014 CYREN Confidential and Proprietary

5

LEADING PROVIDER OF INTERNET SECURITY TECHNOLOGY AND CLOUD-BASED SERVICES

NASDAQ: CYRN

 ©2014 CYREN Confidential and Proprietary

6

WHO WE WORK WITH

 ©2014 CYREN Confidential and Proprietary

7

GLOBAL REACH

OFFICESDATA CENTERS

 ©2014 CYREN Confidential and Proprietary

 ©2014 CYREN Confidential and Proprietary

8

OUR PRODUCTS

WEBThe industry’s broadest and

most actionable security intelligence combined with a

robust web filtering platform secures all your devices, anywhere you go

EMAILNot just scanning emails with open source signatures; we

track and leverage the global distribution patterns and our

global real-time insight to stop the bad guys subverting

email

ANTIMALWAREOur market leading

solutions secure your platform from threats

without impacting performance

 ©2014 CYREN Confidential and Proprietary

9

WHAT MAKES US DIFFERENT

+

SPEED \\ ACCURACY \\ REAL-TIME INSIGHT

We see more than anyone else.

RECURRENT PATTERN DETECTION

Our patented detection technology

GLOBALVIEW™ CLOUD

The most robust transaction base in the industry

 ©2014 CYREN Confidential and Proprietary

10

We focus on our core competencies so you can focus on yours. Products designed for partners Won’t compete for your business

COMMITTED TO PARTNER SUCCESS

WHAT MAKES US DIFFERENT

 ©2014 CYREN Confidential and Proprietary

 ©2014 CYREN Confidential and Proprietary

11 ©2014 CYREN Confidential and

Proprietary

11

MARKET DRIVERS

 ©2014 CYREN Confidential and Proprietary

1212 ©2014 CYREN Confidential and

Proprietary

BYOD AND INCREASED MOBILITY HAVE CHANGED

THE WAY EMPLOYEESACCESS THE INTERNET

THE SECURITY MARKET IS EVOLVING

 ©2014 CYREN Confidential and Proprietary

13 ©2014 CYREN Confidential and

Proprietary

THE SECURITY MARKET IS EVOLVING

LEADING TO INCREASED COMPLEXITY IN

IMPLEMENTING, MANAGING AND DEPLOYING

SECURITY SOLUTIONS

 ©2014 CYREN Confidential and Proprietary

14

Source: IDC, June 2013

THE SECURITY MARKET

SAAS IS BY FAR THE LARGEST GROWTH OPPORTUNITY

 ©2014 CYREN Confidential and Proprietary

15 ©2014 CYREN Confidential and

Proprietary15

CYREN WEBSECURITY

 ©2014 CYREN Confidential and Proprietary

16

LAUNCH A BRANDED WEB SECURITY SERVICE WITH STRONG

DIFFERENTIATORS

INTRODUCING CYREN WEBSECURITY

 ©2014 CYREN Confidential and Proprietary

 ©2014 CYREN Confidential and Proprietary

17

Android and iOS

White-labeled app for partner rebranding

Rule management for BYOD and corporate devices

A TOTAL SOLUTION FOR ROAMING USERS, SMARTPHONES AND TABLETS -

INCLUDING BYOD

MOBILITY

 ©2014 CYREN Confidential and Proprietary

 ©2014 CYREN Confidential and Proprietary

18

Threat-sharing GlobalView network

Integrated antimalware scanning

APT Detection

PROVEN CYREN CLOUD-BASED WEB SECURITY

ADVANCED SECURITY

 ©2014 CYREN Confidential and Proprietary

 ©2014 CYREN Confidential and Proprietary

19

SERVICE ARCHITECTURE

GlobalView™Cloud

GlobalView Database

Security Scanning and URL Filtering

Branded Web-based Provisioning, Management and Reporting

Internet

Mobile & Roaming

Desktops

Routers & Appliances

HeurisTechSecurity

HeurisTechSecurity

1. Product is neutral/CYREN branded as standard

2. Partner private labels the service, or,

3. Partner co-brands the service

4. End customers are provisioned and start using the service

 ©2014 CYREN Confidential and Proprietary

20

Easy customer provisioning

Online private labeling

Multi-tier management portal

TRULY INTUITIVE WEB INTERFACE FOR PARTNERS AND ALL LEVELS OF

ADMINISTRATORS

EASE OF USE

 ©2014 CYREN Confidential and Proprietary

 ©2014 CYREN Confidential and Proprietary

21 ©2014 CYREN Confidential and

Proprietary21

DEMONSTRATION

 ©2014 CYREN Confidential and Proprietary

22

\\

HeurisTechSecurity

Partner

Customer

Office Users Mobile users

Customer

Partner

Customer

Office users

CYREN WEBSECURITY – PARTNER

McMillanENGINEERING

 ©2014 CYREN Confidential and Proprietary

23

\\HEURISTECH ECO-SYSTEM OVERVIEW - DASHBOARD.

 ©2014 CYREN Confidential and Proprietary

24

\\HEURISTECH CUSTOMIZES THE INTERFACE, DOMAIN, PLAY STORE, ETC.

 ©2014 CYREN Confidential and Proprietary

25

\\HEURISTECH CUSTOMIZES THE LICENSING AND PACKAGE OPTIONS

 ©2014 CYREN Confidential and Proprietary

26

\\

McMillanENGINEERING

Partner

Customer

Office Users Mobile users

Customer

Partner

Customer

Office users

CYREN WEBSECURITY – CUSTOMERS

HeurisTechSecurity

 ©2014 CYREN Confidential and Proprietary

27

\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING - DASHBOARD OF WEB ACTIVITY

 ©2014 CYREN Confidential and Proprietary

28

\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING DEFINES USERS – INCLUDING MOBILE/BYOD

 ©2014 CYREN Confidential and Proprietary

29

\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING DEFINES SECURITY POLICY

 ©2014 CYREN Confidential and Proprietary

30

\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING APPLIES POLICY TO USERS – ALSO ROAMING/BYOD

 ©2014 CYREN Confidential and Proprietary

31

\\CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING – DETAILED REPORTS

 ©2014 CYREN Confidential and Proprietary

32 ©2014 CYREN Confidential and

Proprietary

32

RECAP

 ©2014 CYREN Confidential and Proprietary

33

WEB SECURITY OPPORTUNITY

Ease of management / ease of use Easy provisioning and management for Mobile/BYOD The best account and end user provisioning experience in the industry

Partner-ready and partner-friendly revenue opportunity Turnkey Web Security recurring revenue Business logic enables any go-to-market model or sales ecosystem

Cloud-based security analysis and detection quality Detection you know – already powering solutions across the industry Ongoing Innovation – existing and new services such as APT

 ©2014 CYREN Confidential and Proprietary

34 ©2014 CYREN Confidential and

Proprietary

34

THANK YOU.ANY QUESTIONS?

“We are excited to see the emergence of state-of-the-art cloud based protection for mobile and roaming users. CYREN

WebSecurity will help MXSweep deliver the easy to consume and best of breed cloud based security that our customers expect.”

Tom O’BrienCEO

MXSweep

Q&A: Submit Your Questions Now

• Jonas Tichenor, Director of Content & CRN Contributing Editor

• Avi Turiel, Director of Threat Research, CYREN

Check Out Upcoming and On Demand ChannelCasts!

www.facebook.com/channelcasts

http://www.crn.com/channel-cast/index.htm

The channel community’s trusted authority for growth and innovation for more than three decades.

Leverage our proven and leading edge brands and platforms to deliver prescriptive sales and marketing solutions for the technology channel. 

Enabling Technology Partnerships

Thank You

top related