26
1 ©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. ©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. Is Your Web Security Broken? 10 Things You Need To Know

Webinar: Is your web security broken? - 10 things you need to know

Embed Size (px)

Citation preview

1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.

Is Your Web Security Broken?

10 Things You Need To Know

2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.

Poll #1:On a scale of 1 to 5,

how good is your web security?

(1 = horrible, 5 = fantastic)

3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Your data and applications are moving to the cloud:

62% of organizations will run 100% of their IT in the cloud by 2020.

4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Your employees are mobile and connected everywhere:

61% of workers report working outside the office at least part of the time

5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Data breaches are at an all-time high:

43% of companies had a data breach

in the past year.

6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Attacks are broader, deeper and more sophisticated than ever before

7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

You’re already infected and you don’t know it…

93% of organizations had infected computers communicating with hackers’ “Command and Control” servers

of malware coming in the network was unknown to antivirus vendors52%

79% of organizations were experiencing data exfiltration

8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.

Poll #2:What kind of web security solution

have you deployed?

1. Appliance-based web security2. Software-based web security3. Cloud/SaaS-based web security4. Managed Service web security5. No web security

9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

1. The security perimeter is disappearing

10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

2. Employees are your weakest link

11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

3. SSL is often a blind spot (and hackers know this…)

12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

4. Yes, You ARE A Target

13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 13

5. IoT presents a whole new set of risks

There will be 25 billion connected

“things” by 2020.

14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

6. Mobile devices are a huge area of

vulnerability

Employees managean average of 3 devices each.

15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

7. The rise of zero-day “outbreaks”

16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

8. Appliance tradeoffs – performance vs security

0%

20%

40%

60%

80%

100%

Thro

ugh

pu

t (M

BP

S)Secure Web Gateway Performance Curve

Proxy

+ SSL Inspection

+ URL Filtering

+ AV

+ Advanced Threat

+ Sandboxing

17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

9. How many security appliances do you need!?!

Proxy

Content Filtering

Anti-virus

Application Control

Adv Threat Protect

SSL Inspection

Sandboxing

Reporting & Analytics

Management

Proxy

Content Filtering

Anti-virus

Application Control

Adv Threat Protect

SSL Inspection

Sandboxing

Reporting & Analytics

Management

HighAvailability?

x2

18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

10. How much does this all cost?

Hardware/Software

Support

Network Backhaul

Ongoing IT Administration

Fixing Infected PCs

ApplianceTotal Cost

of Ownership

Security ApplianceTotal Cost of Ownership

19©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.

Is there a better way?

20©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

CYREN WebSecurity:Cloud-based protection for any user, anywhere, on any device

Block threats Enforce web use policies Protect mobile employees Inspect SSL traffic Protect guest networks

Internet

APTMalwareBot

Exploits

HQ Branch Offices

Roaming Employees

Mobile Devices

Stores Plants/ Warehouses

HomeOffice

Internet of Things

21©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Block malicious URLs

Block malware and viruses

Block phishing and botnet sites

Block zero-day attacks

Inspect SSL

Identify infected devices

Protect your users from cyber-threats

22©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Monitor and manage web usage

Monitor web usage by user, location and device

Enforce web use policies with easy-to-use URL filtering technology

Identify and control shadow IT

Enforce Safe Search

23©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Protect mobile employees and devices

Protects wherever, whenever

Laptops, tablets, and smartphones

Android and iOS

Separate policies for BYOD and corporate-owned devices

Up to 5 devices per user

24©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Dramatically reduce your Total Cost of Ownership

70-80%Savings

Opportunity

Appliance Hardware

License

Deployment

Backhaul

Admin & Maint

ApplianceWeb

SecurityTCO

Admin & Maint

Backhaul

License

SaaSWeb

SecurityTCO

TCO Scenario• New appliance deployment• 1000 users (200 mobile)• 1 data center• 10 spoke sites (backhauling)

25©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Protection from the cloud - for any user, anywhere, on any

device

Get the same security used by Google and Microsoft

Protection from advanced zero-hour threats

Improved employee productivity and regulatory compliance

Easy to deploy and manage

Huge cost reduction over security appliances

Why CYREN?

26©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

You can also find us here:

www.CYREN.com

twitter.com/cyreninc

linkedin.com/company/cyren

©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Questions

Dan Maier

CYREN Marketing

+1 408.836.7184

[email protected]

Check us out: CYREN WebSecurity Demo Web Security Diagnostic 30-day Money Back Guarantee Free Trial