Censornet. CensorNet Unified Security Service (USS) FREEDOM. VISIBILITY. PROTECTION. Lars Gotlieb Regional Manager DACH

Similar documents
Cloud Security, Mobility and Current Threats. Tristan Watkins, Head of Research and Innovation

CloudSOC and Security.cloud for Microsoft Office 365

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Crash course in Azure Active Directory

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Cloud sicherung durch Adaptive Multi-factor Authentication

Securing Your Most Sensitive Data

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Vorstellung von MFA CASb

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

Enterprise Security Solutions by Quick Heal. Seqrite.

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Integrated Access Management Solutions. Access Televentures

Securing the SMB Cloud Generation

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Go mobile. Stay in control.

Enterprise Security Solutions by Quick Heal. Seqrite.

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

PrecisionAccess Trusted Access Control

What is a mobile protection product?

Mobile Device Management: A Real Need for the Mobile World

WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.

Ralf Schuhmayer Channel Manager. Echtzeit Authentifizierung für flexibles Arbeiten und Schutz Ihrer Infrastruktur

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

AT&T Endpoint Security

TREND MICRO SMART PROTECTION SUITES

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

WHITEPAPER. How to secure your Post-perimeter world

PCI DSS Addressing Cyber-Security Threats. ETCAA June Gabriel Leperlier

Sophos. Allan Widell Channel Account Executive. 24. August 2017

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

CHECK POINT CLOUDGUARD SAAS SUPERIOR THREAT PREVENTION FOR SAAS APPLICATIONS

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Office 365 Buyers Guide: Best Practices for Securing Office 365

Cisco s Appliance-based Content Security: IronPort and Web Security

Defense in Depth Security in the Enterprise

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

2017 Annual Meeting of Members and Board of Directors Meeting

with Advanced Protection

Securing Office 365 with SecureCloud

IT Needs More Control

Quick Heal Mobile Device Management. Available on

Secure Access for Microsoft Office 365 & SaaS Applications

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

Business Strategy Theatre

Yubico with Centrify for Mac - Deployment Guide

PEOPLE CENTRIC SECURITY THE NEW

Measuring cloud-based anti-malware protection for Office 365 user accounts

AKAMAI CLOUD SECURITY SOLUTIONS

Best Practices in Securing a Multicloud World

Cisco Firepower NGFW. Anticipate, block, and respond to threats

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

TREND MICRO SMART PROTECTION SUITES

Automated Threat Management - in Real Time. Vectra Networks

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Symantec Endpoint Protection Family Feature Comparison

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Real-time, Unified Endpoint Protection

Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

PLATFORM CONVERGENCE JOURNEY

Microsoft Security Management

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Part 2: How to Detect Insider Threats

ANATOMY OF A SPEAR PHISHING ATTACK. A Menlo Security Research Report

RANSOMWARE PROTECTION. A Best Practices Approach to Securing Your Enterprise

10 FOCUS AREAS FOR BREACH PREVENTION

Identiteettien hallinta ja sovellusturvallisuus. Timo Lohenoja, CISPP Systems Engineer, F5 Networks

TABLE OF CONTENTS Introduction: IS A TOP THREAT VECTOR... 3 THE PROBLEM: ATTACKS ARE EVOLVING FASTER THAN DEFENSES...

Using Biometric Authentication to Elevate Enterprise Security

News and Updates June 1, 2017

Network Security. Multi-Layer Approach to Security. Protection, Detection, and Remediation. Clay Ostlund Business Development Manager

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

Secure & Unified Identity

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy

Mastering The Endpoint

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response

Passit4Sure (50Q) Cisco Advanced Security Architecture for System Engineers

Copyright 2011 Trend Micro Inc.

Kaspersky Security for Small and Medium Business

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

DIGITAL TRUST Making digital work by making digital secure

Cisco Ransomware Defense The Ransomware Threat Is Real

trend micro smart Protection suites

Office 365: Modern Workplace

Transcription:

Censornet CensorNet Unified Security Service (USS) FREEDOM. VISIBILITY. PROTECTION. Lars Gotlieb Regional Manager DACH

Censornet???? Former SMS passcode. One of the leading vendors in Multi factor authentifaction! Some of our swiss customers *Source: Verizon Data Breach Investigations Report (DBIR)

Today s New Reality: Work is an Activity, Not a Place Employees work from everywhere Head Office Login Using all sorts of devices and apps Email Apps Web Home On the Office Road Meet user expectations (Public Wi-Fi) instant access, always on Apps Increase productivity Apps Monitor for threats Maintain compliance Login Apps Risks Nearly all data breaches in the world involved one or more of the following vectors*: Email Web / Cloud apps Weak/Stolen credentials Challenges *Source: Verizon Data Breach Investigations Report (DBIR)

Cloud Security Goals: Navigate Risks and Unlock Benefits Freedom Visibility Protection Employees work from anywhere, on any device. Enterprises implement policies that mitigate greatest business risk, in the most flexible way Satisfy user expectations - always on, always connected, choose my device Increase productivity Enable adoption of cloud apps for everyone, including IT Enterprises need to see what employees are doing, verify identity and manage access across devices and networks Monitor and quickly identify risks across: Email Web/Cloud Apps User Accounts Email, web or weak/stolen credentials are cited in every data breach included in Verizon s DBIR*. Enterprises need to protect data as it is accessed across networks via apps and devices of all types (for compliance and security) Email Security stop phishing, malware, ransomware, etc. Web / Cloud App Security malware, ransomware, credential harvesting MFA stolen credentials were used in more than 3/4s of the data breaches in 2016*. *Source: Verizon Data Breach Investigations Report (DBIR)

Today s Biggest Risks & Their Channels Data Breaches Cloud Access and Mobility Insider Threats Credential Theft Blended Threats / APT Shadow IT Ransomware Online Threats Social Engineering Phishing Email Infected Web Sites Spear Phishing Email

Today s Biggest Risks & Their Channels Data Breaches Cloud Access and Mobility Insider Threats Credential Theft Cloud App Security Email Web MFA Unified Security Service (USS) Shadow IT Ransomware Online Threats Social Engineering Phishing Email Infected Web Sites Spear Phishing Email

Today s Biggest Risks & Their Channels Cloud Access and Mobility Cloud App Security Email Web MFA Unified Security Service (USS) When it comes to solutions that address these risks across web, email, and authentication it s a crowded space.

The Need for Consolidation URL Filtering Email Security Password Reset USS Platform CASB Email Continuity Authentication

CensorNet s USS Platform Freedom For employees any device, any app For enterprises enable adoption Visibility Across users, apps, devices, and networks Demonstrate compliance and reduce risk Protection Against the biggest risks phishing, ransomware, account compromise and more MFA Cloud App Security Email Security Web Security 9

USS Mini Product Tour

What websites have been visited? Which categories of websites are used most? Which cloud apps are being used? Where is your data?

Control which users can access which apps Control what actions users can perform within apps Control which users can access which apps

Easily customize and brand MSP portal MSP Partners track business via portal

USS Implementation Sample use cases

Flexible Implementation Cloud Platform Optional on-premise security Cloud Gateway Agent Endpoint Protection Roaming User/Standalone Device Or VPN to Corporate Network LAN Head/Branch Office

Implementation Use Case Optional on-premise security Cloud Gateway Cloud Platform Securing a Call Center Goal: Monitor, control and secure employee access during operational hours on fixed desktops LAN Head/Branch Office Implementation Details: CensorNet Cloud Gateway Essential capabilities: Web, Email, Cloud App Security

Implementation Use Case Securing Roaming / Remote Users Goal: Monitor and secure employee access to corporate data via mobile devices (personal and corporate-owned) Cloud Platform Agent Endpoint Protection Roaming User/Standalone Device Implementation Details: Lightweight agent is installed on mobile device Essential capabilities: Web, Email, Cloud App Security, MFA

Implementation Use Case Protect Users Everywhere Goal: Monitor and secure all employee access Implementation Details: Lightweight agents CensorNet Cloud Gateway Employees free to roam whilst remaining protected Cloud Platform Optional on-premise security Cloud Gateway Agent Endpoint Protection Roaming User/Standalone Device Or VPN to Corporate Network LAN Head/Branch Office

Implementation Use Case Optional on-premise security Cloud Gateway Service Provider - SOC Monitoring Goal: Monitor and manage MSP customers through unified email security, web/cloud app security and MFA Implementation Details: Lightweight agents (optional) CensorNet Cloud Gateway Cloud Platform LAN Customer Office Agent Endpoint Protection Roaming User/Standalone Device Or VPN to Corporate Network LAN Customer Office Optional on-premise security Cloud Gateway LAN Customer Office Optional on-premise security Cloud Gateway Agent Endpoint Protection Roaming User/Standalone Device Or VPN to Corporate Network

Summary

CensorNet: Granular monitoring and threat protection Across channels On all devices And inside apps Apps Email Web Login Web Apps Apps Email Login Logins Apps Apps Apps Control export of data Block posts to social media See all user activity good and bad

CensorNet USS Platform: Key Features and Benefits Granular Cloud Application Security Universal Coverage - Cloud, Web, & Email Multi-Factor Authentication Features Gain In-Depth Visibility and Control (beyond Block/Allow) See and Control Users, Activities, and Devices. All the time. Protect apps and data against the weakest link. User credentials. USS Platform Benefits Cost Reduction & Consolidation Gain Back Visibility and Control. Quick to Deploy, Simple to Manage Up and running in hours. Simple to manage over time. Adaptive Defense, Simplified Security Security doesn t have to be complicated. In fact, simplicity is key.

Thank You! Any Questions?

Ransomware RANSOMWARE CryptoLocker, Locky, Crysis, zcrypt, CryptoWall EMAIL WITH MALICIOUS FILE 1 ATTACHMENT Cloud PHISHING Access OR 2 and SPEAR-PHISHING Mobility EMAIL WITH MALICIOUS LINK 3 DRIVE-BY DOWNLOAD & MALVERTISING Email Security LinkScan re-writes all links File attachment analysis: Signature based AV Heuristics and behaviour based AV for improved protection from zero-day threats TARGET Web Security Point-of-click URL reputation checking Real-time content analysis Static analysis Mobile-specific detection 200+ third party feeds