byod network security - 100% agentless way - us patent pending
DESCRIPTION
BYOD Network Security - 100% Agentless way - US Patent Pending. To Detect and Block Jailbroken & Malicious devices and hence protecting & securing the network. All done without user installing any app or software or reconfiguring their device in any way - 100% Agentless and Non-intrusive. As they say security is done best, when you don't even know it exists!!TRANSCRIPT
i7Networks
Manju M GowdaCEO & Co-founder, i7 Networks
“Enterprise Network Security from BYODs”
Copyright i7 Networks, i7nw.com, [email protected]
BIGGEST RISK of BYOD entering Corporate network?
Internal network attacks,
compromises & snoops from rogue
device & apps
Copyright i7 Networks, i7nw.com, [email protected]
Companies more than 5,000 employees, 50% reported mobile security incidents, Cost exceeded
$500,000 last year!!
How big is it?
Copyright i7 Networks, i7nw.com, [email protected]
What are the companies doing now??
“No Policies at
all”
“Policies on the
Paper””
Legacy tools
tweaked!!
Copyright i7 Networks, i7nw.com, [email protected]
What issues?
All attacks are via
Jailbroken devices
Major source: Rooted devices
Huge % of network snooping malware
Apps
i7’s Peregrine7:
Copyright i7 Networks, i7nw.com
“the Agentless BYOD Security Tool”
Copyright i7 Networks, i7nw.com
COMPREHENSIVE PICTURE of all the mobiles in the network
INTELLIGENCE to identify Jailbroken, Rooted & Malicious devices
& BLOCK themCopyright i7 Networks, i7nw.com
Automatically & non-intrusively Enforce BYOD Policies!!
Copyright i7 Networks, i7nw.com
“How do we do this?”
Copyright i7 Networks, i7nw.com
Traffic Patterns, & Network Behavior of the mobile devices;
Patent-pending Technology & Intelligence
Copyright i7 Networks, i7nw.com
“How do we Deploy?”
Copyright i7 Networks, i7nw.com
The USER need NOT INSTALL any APP or SOFTWARE or CONFIGURE their device
100% Agentless & Non-Intrusive
Copyright i7 Networks, i7nw.com
Security Is Done Best
When You Don’t Even Know It Exists….
Copyright i7 Networks, i7nw.com
Deployment involves NO DISRUPTION to the NETWORK!!
Appliance or virtual appliance connected to SPAN
Copyright i7 Networks, i7nw.com
“INSTALLATION & RESULTS” in less than an HOUR
Copyright i7 Networks, i7nw.com
“What’s Unique?”
Copyright i7 Networks, i7nw.com
Based on Network Behavior Analysis with no agent on device(US Patent Pending)
We are the FIRST & the ONLY solution to:
Detect Apps on the Wire (Dropbox,
Facebook?)
Fool-proof device
fingerprinting
Catch Jailbroken &
Malicious devices
Copyright i7 Networks, i7nw.com
“What is the Competition?”
Copyright i7 Networks, i7nw.com, [email protected]
Complex Deploymen
t
Expensive
Jammers fool the Security
APP
Security APP
All devices NOT
supported
Enterprise Paying Customers
Plus Dozens of POC customers
THANK YOU!!
Copyright i7 Networks, i7nw.com
Brian Nesmith, ex-CEO of Bluecoat
Ofer Elzam, Network Security Sophos
Sharad Sharma, ex-CEO, Yahoo India
40+ years of Experience in Security domain with few Patents
Our earlier company (S7) got acquired by Bluecoat Systems for $8.4M (Jan 2010)
Advisors
The Team
Copyright i7 Networks, i7nw.com, [email protected]
Concluding……You Choose
+ ORCost of Breach$500K
Prevention$25K for
Tool*
* Assuming a 5000-employee company