1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
Is Your Web Security Broken?
10 Things You Need To Know
2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
Poll #1:On a scale of 1 to 5,
how good is your web security?
(1 = horrible, 5 = fantastic)
3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Your data and applications are moving to the cloud:
62% of organizations will run 100% of their IT in the cloud by 2020.
4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Your employees are mobile and connected everywhere:
61% of workers report working outside the office at least part of the time
5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Data breaches are at an all-time high:
43% of companies had a data breach
in the past year.
6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Attacks are broader, deeper and more sophisticated than ever before
7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
You’re already infected and you don’t know it…
93% of organizations had infected computers communicating with hackers’ “Command and Control” servers
of malware coming in the network was unknown to antivirus vendors52%
79% of organizations were experiencing data exfiltration
8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
Poll #2:What kind of web security solution
have you deployed?
1. Appliance-based web security2. Software-based web security3. Cloud/SaaS-based web security4. Managed Service web security5. No web security
9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
1. The security perimeter is disappearing
10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
2. Employees are your weakest link
11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
3. SSL is often a blind spot (and hackers know this…)
12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
4. Yes, You ARE A Target
13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 13
5. IoT presents a whole new set of risks
There will be 25 billion connected
“things” by 2020.
14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
6. Mobile devices are a huge area of
vulnerability
Employees managean average of 3 devices each.
15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
7. The rise of zero-day “outbreaks”
16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
8. Appliance tradeoffs – performance vs security
0%
20%
40%
60%
80%
100%
Thro
ugh
pu
t (M
BP
S)Secure Web Gateway Performance Curve
Proxy
+ SSL Inspection
+ URL Filtering
+ AV
+ Advanced Threat
+ Sandboxing
17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
9. How many security appliances do you need!?!
Proxy
Content Filtering
Anti-virus
Application Control
Adv Threat Protect
SSL Inspection
Sandboxing
Reporting & Analytics
Management
Proxy
Content Filtering
Anti-virus
Application Control
Adv Threat Protect
SSL Inspection
Sandboxing
Reporting & Analytics
Management
HighAvailability?
x2
18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
10. How much does this all cost?
Hardware/Software
Support
Network Backhaul
Ongoing IT Administration
Fixing Infected PCs
ApplianceTotal Cost
of Ownership
Security ApplianceTotal Cost of Ownership
19©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
Is there a better way?
20©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN WebSecurity:Cloud-based protection for any user, anywhere, on any device
Block threats Enforce web use policies Protect mobile employees Inspect SSL traffic Protect guest networks
Internet
APTMalwareBot
Exploits
HQ Branch Offices
Roaming Employees
Mobile Devices
Stores Plants/ Warehouses
HomeOffice
Internet of Things
21©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Block malicious URLs
Block malware and viruses
Block phishing and botnet sites
Block zero-day attacks
Inspect SSL
Identify infected devices
Protect your users from cyber-threats
22©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Monitor and manage web usage
Monitor web usage by user, location and device
Enforce web use policies with easy-to-use URL filtering technology
Identify and control shadow IT
Enforce Safe Search
23©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Protect mobile employees and devices
Protects wherever, whenever
Laptops, tablets, and smartphones
Android and iOS
Separate policies for BYOD and corporate-owned devices
Up to 5 devices per user
24©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Dramatically reduce your Total Cost of Ownership
70-80%Savings
Opportunity
Appliance Hardware
License
Deployment
Backhaul
Admin & Maint
ApplianceWeb
SecurityTCO
Admin & Maint
Backhaul
License
SaaSWeb
SecurityTCO
TCO Scenario• New appliance deployment• 1000 users (200 mobile)• 1 data center• 10 spoke sites (backhauling)
25©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Protection from the cloud - for any user, anywhere, on any
device
Get the same security used by Google and Microsoft
Protection from advanced zero-hour threats
Improved employee productivity and regulatory compliance
Easy to deploy and manage
Huge cost reduction over security appliances
Why CYREN?
26©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
You can also find us here:
www.CYREN.com
twitter.com/cyreninc
linkedin.com/company/cyren
©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Questions
Dan Maier
CYREN Marketing
+1 408.836.7184
Check us out: CYREN WebSecurity Demo Web Security Diagnostic 30-day Money Back Guarantee Free Trial