Censornet CensorNet Unified Security Service (USS) FREEDOM. VISIBILITY. PROTECTION. Lars Gotlieb Regional Manager DACH
Censornet???? Former SMS passcode. One of the leading vendors in Multi factor authentifaction! Some of our swiss customers *Source: Verizon Data Breach Investigations Report (DBIR)
Today s New Reality: Work is an Activity, Not a Place Employees work from everywhere Head Office Login Using all sorts of devices and apps Email Apps Web Home On the Office Road Meet user expectations (Public Wi-Fi) instant access, always on Apps Increase productivity Apps Monitor for threats Maintain compliance Login Apps Risks Nearly all data breaches in the world involved one or more of the following vectors*: Email Web / Cloud apps Weak/Stolen credentials Challenges *Source: Verizon Data Breach Investigations Report (DBIR)
Cloud Security Goals: Navigate Risks and Unlock Benefits Freedom Visibility Protection Employees work from anywhere, on any device. Enterprises implement policies that mitigate greatest business risk, in the most flexible way Satisfy user expectations - always on, always connected, choose my device Increase productivity Enable adoption of cloud apps for everyone, including IT Enterprises need to see what employees are doing, verify identity and manage access across devices and networks Monitor and quickly identify risks across: Email Web/Cloud Apps User Accounts Email, web or weak/stolen credentials are cited in every data breach included in Verizon s DBIR*. Enterprises need to protect data as it is accessed across networks via apps and devices of all types (for compliance and security) Email Security stop phishing, malware, ransomware, etc. Web / Cloud App Security malware, ransomware, credential harvesting MFA stolen credentials were used in more than 3/4s of the data breaches in 2016*. *Source: Verizon Data Breach Investigations Report (DBIR)
Today s Biggest Risks & Their Channels Data Breaches Cloud Access and Mobility Insider Threats Credential Theft Blended Threats / APT Shadow IT Ransomware Online Threats Social Engineering Phishing Email Infected Web Sites Spear Phishing Email
Today s Biggest Risks & Their Channels Data Breaches Cloud Access and Mobility Insider Threats Credential Theft Cloud App Security Email Web MFA Unified Security Service (USS) Shadow IT Ransomware Online Threats Social Engineering Phishing Email Infected Web Sites Spear Phishing Email
Today s Biggest Risks & Their Channels Cloud Access and Mobility Cloud App Security Email Web MFA Unified Security Service (USS) When it comes to solutions that address these risks across web, email, and authentication it s a crowded space.
The Need for Consolidation URL Filtering Email Security Password Reset USS Platform CASB Email Continuity Authentication
CensorNet s USS Platform Freedom For employees any device, any app For enterprises enable adoption Visibility Across users, apps, devices, and networks Demonstrate compliance and reduce risk Protection Against the biggest risks phishing, ransomware, account compromise and more MFA Cloud App Security Email Security Web Security 9
USS Mini Product Tour
What websites have been visited? Which categories of websites are used most? Which cloud apps are being used? Where is your data?
Control which users can access which apps Control what actions users can perform within apps Control which users can access which apps
Easily customize and brand MSP portal MSP Partners track business via portal
USS Implementation Sample use cases
Flexible Implementation Cloud Platform Optional on-premise security Cloud Gateway Agent Endpoint Protection Roaming User/Standalone Device Or VPN to Corporate Network LAN Head/Branch Office
Implementation Use Case Optional on-premise security Cloud Gateway Cloud Platform Securing a Call Center Goal: Monitor, control and secure employee access during operational hours on fixed desktops LAN Head/Branch Office Implementation Details: CensorNet Cloud Gateway Essential capabilities: Web, Email, Cloud App Security
Implementation Use Case Securing Roaming / Remote Users Goal: Monitor and secure employee access to corporate data via mobile devices (personal and corporate-owned) Cloud Platform Agent Endpoint Protection Roaming User/Standalone Device Implementation Details: Lightweight agent is installed on mobile device Essential capabilities: Web, Email, Cloud App Security, MFA
Implementation Use Case Protect Users Everywhere Goal: Monitor and secure all employee access Implementation Details: Lightweight agents CensorNet Cloud Gateway Employees free to roam whilst remaining protected Cloud Platform Optional on-premise security Cloud Gateway Agent Endpoint Protection Roaming User/Standalone Device Or VPN to Corporate Network LAN Head/Branch Office
Implementation Use Case Optional on-premise security Cloud Gateway Service Provider - SOC Monitoring Goal: Monitor and manage MSP customers through unified email security, web/cloud app security and MFA Implementation Details: Lightweight agents (optional) CensorNet Cloud Gateway Cloud Platform LAN Customer Office Agent Endpoint Protection Roaming User/Standalone Device Or VPN to Corporate Network LAN Customer Office Optional on-premise security Cloud Gateway LAN Customer Office Optional on-premise security Cloud Gateway Agent Endpoint Protection Roaming User/Standalone Device Or VPN to Corporate Network
Summary
CensorNet: Granular monitoring and threat protection Across channels On all devices And inside apps Apps Email Web Login Web Apps Apps Email Login Logins Apps Apps Apps Control export of data Block posts to social media See all user activity good and bad
CensorNet USS Platform: Key Features and Benefits Granular Cloud Application Security Universal Coverage - Cloud, Web, & Email Multi-Factor Authentication Features Gain In-Depth Visibility and Control (beyond Block/Allow) See and Control Users, Activities, and Devices. All the time. Protect apps and data against the weakest link. User credentials. USS Platform Benefits Cost Reduction & Consolidation Gain Back Visibility and Control. Quick to Deploy, Simple to Manage Up and running in hours. Simple to manage over time. Adaptive Defense, Simplified Security Security doesn t have to be complicated. In fact, simplicity is key.
Thank You! Any Questions?
Ransomware RANSOMWARE CryptoLocker, Locky, Crysis, zcrypt, CryptoWall EMAIL WITH MALICIOUS FILE 1 ATTACHMENT Cloud PHISHING Access OR 2 and SPEAR-PHISHING Mobility EMAIL WITH MALICIOUS LINK 3 DRIVE-BY DOWNLOAD & MALVERTISING Email Security LinkScan re-writes all links File attachment analysis: Signature based AV Heuristics and behaviour based AV for improved protection from zero-day threats TARGET Web Security Point-of-click URL reputation checking Real-time content analysis Static analysis Mobile-specific detection 200+ third party feeds