SlideShare a Scribd company logo
1 
© 2014 CYREN Confidential and 
Proprietary 
HOW TO LAUNCH A CLOUD-BASED 
WEB SECURITY SERVICE IN AN HOUR 
Avi Turiel 
September 2014
2 
© 2014 CYREN Confidential and 
Proprietary 
POLL QUESTION #1 
How many of your customers are SMBs? (20-500 users)
3 
3 
© 2014 CYREN Confidential and 
Proprietary 
MARKET DRIVERS
44 
BYOD AND INCREASED 
MOBILITY HAVE CHANGED 
THE WAY EMPLOYEES 
ACCESS THE INTERNET 
© 2014 CYREN Confidential and 
Proprietary 
THE SECURITY MARKET IS EVOLVING
5 
© 2014 CYREN Confidential and 
Proprietary 
THE SECURITY MARKET IS EVOLVING 
LEADING TO INCREASED 
COMPLEXITY IN 
IMPLEMENTING, MANAGING 
AND DEPLOYING 
SECURITY SOLUTIONS
6 
Source: IDC, June 2013 
© 2014 CYREN Confidential and 
Proprietary 
THE SECURITY MARKET 
SAAS IS BY FAR 
THE LARGEST 
GROWTH 
OPPORTUNITY
7 
© 2014 CYREN Confidential and 
Proprietary 
POLL QUESTION #2 
What is your ‘Web Security in the cloud’ strategy?
8 
8 
© 2014 CYREN Confidential and 
Proprietary 
CYREN WEBSECURITY
9 
© 2014 CYREN Confidential and 
Proprietary 
INTRODUCING CYREN WEBSECURITY 
LAUNCH A BRANDED WEB 
SECURITY SERVICE WITH STRONG 
DIFFERENTIATORS
10 
MOBILITY 
A TOTAL SOLUTION FOR ROAMING 
USERS, SMARTPHONES AND TABLETS - 
© 2014 CYREN Confidential and 
Proprietary 
INCLUDING BYOD 
 Android and iOS 
 White-labeled app for partner 
rebranding 
 Rule management for BYOD and 
corporate devices
11 
ADVANCED SECURITY 
PROVEN CYREN CLOUD-BASED WEB 
© 2014 CYREN Confidential and 
Proprietary 
 Threat-sharing GlobalView network 
 Integrated antimalware scanning 
 APT Detection 
SECURITY
12 
© 2014 CYREN Confidential and 
Proprietary 
SERVICE ARCHITECTURE 
GlobalView™ 
Cloud 
GlobalView 
Database 
Security Scanning 
and URL Filtering 
Branded Web-based 
Provisioning, 
Management and 
Reporting 
Internet 
Mobile & 
Roaming 
Desktops 
Routers & 
Appliances 
HeurisTech 
Security 
1. Product is neutral/CYREN branded as standard 
2. Partner private labels the service, or, 
3. Partner co-brands the service 
4. End customers are provisioned and start using the service
13 
EASE OF USE 
TRULY INTUITIVE WEB INTERFACE FOR 
PARTNERS AND ALL LEVELS OF 
© 2014 CYREN Confidential and 
Proprietary 
ADMINISTRATORS 
 Easy customer 
provisioning 
 Online private labeling 
 Multi-tier management 
portal
14 
14 
© 2014 CYREN Confidential and 
Proprietary 
DEMONSTRATION
15 
© 2014 CYREN Confidential and 
Proprietary 
 
Partner 
HeurisTech 
Security 
Customer 
Office Users Mobile 
users 
Partner 
Users 
Partner 
Customer 
Office users 
CYREN WEBSECURITY – PARTNER 
McMillan 
ENGINEERING
16 
© 2014 CYREN Confidential and 
Proprietary 
 HEURISTECH ECO-SYSTEM OVERVIEW - DASHBOARD.
17 
© 2014 CYREN Confidential and 
Proprietary 
 HEURISTECH CUSTOMIZES THE INTERFACE, DOMAIN, PLAY STORE, ETC.
18 
© 2014 CYREN Confidential and 
Proprietary 
 HEURISTECH CUSTOMIZES THE LICENSING AND PACKAGE OPTIONS
19 
© 2014 CYREN Confidential and 
Proprietary 
 
Partner 
HeurisTech 
Security 
Customer 
Office Users Mobile 
users 
Partner 
Users 
Partner 
Customer 
Office users 
CYREN WEBSECURITY – PARTNER 
McMillan 
ENGINEERING
20 
© 2014 CYREN Confidential and 
Proprietary 
 CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING - DASHBOARD OF WEB ACTIVITY
21 
© 2014 CYREN Confidential and 
Proprietary 
 CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING DEFINES USERS – INCLUDING MOBILE/BYOD
22 
© 2014 CYREN Confidential and 
Proprietary 
 CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING DEFINES SECURITY POLICY
23 
 CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING APPLIES POLICY TO USERS – ALSO ROAMING/BYOD 
© 2014 CYREN Confidential and 
Proprietary
24 
© 2014 CYREN Confidential and 
Proprietary 
 CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING – DETAILED REPORTS
25 
© 2014 CYREN Confidential and 
Proprietary 
POLL QUESTION #3 
What feature is most important for Web Security SaaS?
26 
26 
© 2014 CYREN Confidential and 
Proprietary 
WHO WE ARE
27 
© 2014 CYREN Confidential and 
Proprietary 
LEADING PROVIDER OF INTERNET 
SECURITY TECHNOLOGY AND 
CLOUD-BASED SERVICES 
NASDAQ: CYRN
28 
© 2014 CYREN Confidential and 
Proprietary 
WHO WE WORK WITH
29 
© 2014 CYREN Confidential and 
Proprietary 
GLOBAL REACH 
DATA CENTERS OFFICES
30 
© 2014 CYREN Confidential and 
Proprietary 
OUR PRODUCTS 
WEB 
The industry’s broadest and 
most actionable security 
intelligence combined with 
a robust web filtering 
platform secures all your 
devices, anywhere you go 
EMAIL 
Not just scanning emails with 
open source signatures; we 
track and leverage the global 
distribution patterns and our 
global real-time insight to 
stop the bad guys subverting 
email 
ANTIMALWARE 
Our market leading 
solutions secure your 
platform from threats 
without impacting 
performance
31 
RECURRENT PATTERN DETECTION 
Our patented detection 
© 2014 CYREN Confidential and 
Proprietary 
WHAT MAKES US DIFFERENT 
We see more than anyone else. 
+ 
technology 
GLOBALVIEW™ CLOUD 
The most robust transaction base in 
the industry 
SPEED  ACCURACY  REAL-TIME INSIGHT
WHAT MAKES US DIFFERENT 
COMMITTED TO PARTNER SUCCESS 
32 
© 2014 CYREN Confidential and 
Proprietary 
 We focus on our core 
competencies so you can 
focus on yours. 
 Products designed for partners 
 Won’t compete for your business
33 
33 
© 2014 CYREN Confidential and 
Proprietary 
RECAP
34 
© 2014 CYREN Confidential and 
Proprietary 
WEB SECURITY OPPORTUNITY 
 Ease of management / ease of use 
 Easy provisioning and management for Mobile/BYOD 
 The best account and end user provisioning experience in the industry 
 Partner-ready and partner-friendly revenue 
opportunity 
 Turnkey Web Security recurring revenue 
 Business logic enables any go-to-market model or sales ecosystem 
 Cloud-based security analysis and detection quality 
 Detection you know – already powering solutions across the industry 
 Ongoing Innovation – existing and new services such as APT
35 
35 
© 2014 CYREN Confidential and 
Proprietary 
THANK YOU. 
ANY QUESTIONS? 
“We are excited to see the emergence of state-of-the-art cloud 
based protection for mobile and roaming users. CYREN 
WebSecurity will help MXSweep deliver the easy to consume and 
best of breed cloud based security that our customers expect.” 
Tom O’Brien 
CEO 
MXSweep

More Related Content

PDF
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
PPTX
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
PPT
È l'ora del Cloud Managed IT
PDF
Identiverse - Microservices Security
PDF
BASS Company profile
PDF
Introduction to Volansys Technologies
PDF
ELITE.BCS-Cloud-and-Mobile-Risk-Assessments
PPTX
9.35am robert humphrey
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
È l'ora del Cloud Managed IT
Identiverse - Microservices Security
BASS Company profile
Introduction to Volansys Technologies
ELITE.BCS-Cloud-and-Mobile-Risk-Assessments
9.35am robert humphrey

What's hot (19)

PDF
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
PDF
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
PPTX
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
PDF
Securing Corporate Applications and Data on Personal Devices
PPTX
Catalyst 2015: Patrick Harding
PDF
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
PDF
IDC AIC Future Proofing your Business Final
PPTX
Salesforce Security with Visibility, Control & Data Protection
PDF
NFC Tags: The Need for Frictionless Trust
PDF
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
PDF
Enhanced home security solutions kalay v2
PPT
You Can't Spell Enterprise Security without MFA
PPT
Verimatrix-Comvenient Acquisition 3-31-11
PDF
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
PDF
Cisco Live Cancun Collaboration Press
PPTX
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
PPTX
Developing Mobile Trust In Today's E-Privacy Landscape
PPTX
BECOME A SMARTER CLOUD CONSUMER - Ripping through the Rhetoric to Find Your C...
PPTX
IoT Architecture: Insights from Global Deployments
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Securing Corporate Applications and Data on Personal Devices
Catalyst 2015: Patrick Harding
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
IDC AIC Future Proofing your Business Final
Salesforce Security with Visibility, Control & Data Protection
NFC Tags: The Need for Frictionless Trust
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
Enhanced home security solutions kalay v2
You Can't Spell Enterprise Security without MFA
Verimatrix-Comvenient Acquisition 3-31-11
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
Cisco Live Cancun Collaboration Press
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Developing Mobile Trust In Today's E-Privacy Landscape
BECOME A SMARTER CLOUD CONSUMER - Ripping through the Rhetoric to Find Your C...
IoT Architecture: Insights from Global Deployments
Ad

Viewers also liked (19)

PPT
Web Service Security
PPT
Paypal-IPN
PDF
ITCamp 2012 - Mihai Nadas - Tackling the single sign-on challenge
PDF
Pyscho-Strategies for Social Engineering
PPTX
Cusomizing Burp Suite - Getting the Most out of Burp Extensions
PDF
Burp suite
PPTX
Windows Azure Versioning Strategies
PPTX
Wcf security session 1
PPTX
Burp plugin development for java n00bs (44 con)
PPT
Basics of WCF and its Security
PPTX
Pentesting With Web Services in 2012
PPTX
Burpsuite yara
PPTX
WCF Security, FSec
PDF
Pentesting RESTful webservices
PDF
PPT
Pentesting Using Burp Suite
PDF
Attacking XML Security
PPTX
Lunch Learn - WCF Security
PPTX
Web Service Security
Web Service Security
Paypal-IPN
ITCamp 2012 - Mihai Nadas - Tackling the single sign-on challenge
Pyscho-Strategies for Social Engineering
Cusomizing Burp Suite - Getting the Most out of Burp Extensions
Burp suite
Windows Azure Versioning Strategies
Wcf security session 1
Burp plugin development for java n00bs (44 con)
Basics of WCF and its Security
Pentesting With Web Services in 2012
Burpsuite yara
WCF Security, FSec
Pentesting RESTful webservices
Pentesting Using Burp Suite
Attacking XML Security
Lunch Learn - WCF Security
Web Service Security
Ad

Similar to How to Launch a Web Security Service in an Hour (20)

PPTX
Webinar: CYREN WebSecurity for Enterprise
PDF
Webinar: Dispelling the Myths about Cloud Security
PDF
Webinar: Cloud-Based Web Security as First/Last Line of Defense
PDF
Enable and Secure Business Growth in the New Application Economy
PDF
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
PPTX
Managing Identity without Boundaries
PDF
PPTX
Don't Risk the Blacklist - Stop Outbound Spam
PPTX
Sholove cyren web security presentation2
PDF
Dual Detection Engines - Using Layered Security to Battle Cybercrime
PPTX
CipherCloud for Salesforce - Solution Overview
PDF
"Zero-Touch" Authentication: Consumer Trends That will Transform the Enterprise
PPTX
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
PPTX
Becomming a cloud governance ninja linthicum interop fall 2013
PDF
Calgary security road show master deck final
PPTX
Leveraging Technology for Government Service Delivery
PDF
VMworld Europe 2014: Preview the Latest Release from AirWatch
PPTX
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
PDF
Monetization Strategies For The Internet Of Things
PDF
Unified Access from Application Chaos to Application Fluency
Webinar: CYREN WebSecurity for Enterprise
Webinar: Dispelling the Myths about Cloud Security
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Enable and Secure Business Growth in the New Application Economy
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Managing Identity without Boundaries
Don't Risk the Blacklist - Stop Outbound Spam
Sholove cyren web security presentation2
Dual Detection Engines - Using Layered Security to Battle Cybercrime
CipherCloud for Salesforce - Solution Overview
"Zero-Touch" Authentication: Consumer Trends That will Transform the Enterprise
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
Becomming a cloud governance ninja linthicum interop fall 2013
Calgary security road show master deck final
Leveraging Technology for Government Service Delivery
VMworld Europe 2014: Preview the Latest Release from AirWatch
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Monetization Strategies For The Internet Of Things
Unified Access from Application Chaos to Application Fluency

More from Cyren, Inc (20)

PDF
Webinar: Is your web security broken? - 10 things you need to know
PDF
Webinar: Insights from Cyren's 2016 cyberthreat report
PDF
Webinar: A deep dive on ransomware
PDF
Webinar: Stopping evasive malware - how a cloud sandbox array works
PDF
Webinar: Why evasive zero day attacks are killing traditional sandboxing
PDF
Webinar: IT security at SMBs: 2016 benchmarking survey
PDF
Webinar: A deep dive on phishing, today's #1 business threat
PDF
Webinar: Botnets - The clone army of cybercrime
PDF
Webinar: How hackers are making your security obsolete
PDF
Webinar: 10 steps you can take to protect your business from phishing attacks
PDF
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
PDF
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
PPTX
Webinar: CYREN WebSecurity for Healthcare
PDF
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
PPTX
CeBIT 2015 Presentation
PDF
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
PDF
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
PPTX
CYREN Investor Presentation - January, 2015
PPTX
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
PPTX
Webinar: Insights from CYREN's Q3 trend report
Webinar: Is your web security broken? - 10 things you need to know
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: A deep dive on ransomware
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: Botnets - The clone army of cybercrime
Webinar: How hackers are making your security obsolete
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: CYREN WebSecurity for Healthcare
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
CeBIT 2015 Presentation
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
CYREN Investor Presentation - January, 2015
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Insights from CYREN's Q3 trend report

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
A Presentation on Artificial Intelligence
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Modernizing your data center with Dell and AMD
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Approach and Philosophy of On baking technology
cuic standard and advanced reporting.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
A Presentation on Artificial Intelligence
Building Integrated photovoltaic BIPV_UPV.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The AUB Centre for AI in Media Proposal.docx
Unlocking AI with Model Context Protocol (MCP)
Modernizing your data center with Dell and AMD
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Approach and Philosophy of On baking technology

How to Launch a Web Security Service in an Hour

  • 1. 1 © 2014 CYREN Confidential and Proprietary HOW TO LAUNCH A CLOUD-BASED WEB SECURITY SERVICE IN AN HOUR Avi Turiel September 2014
  • 2. 2 © 2014 CYREN Confidential and Proprietary POLL QUESTION #1 How many of your customers are SMBs? (20-500 users)
  • 3. 3 3 © 2014 CYREN Confidential and Proprietary MARKET DRIVERS
  • 4. 44 BYOD AND INCREASED MOBILITY HAVE CHANGED THE WAY EMPLOYEES ACCESS THE INTERNET © 2014 CYREN Confidential and Proprietary THE SECURITY MARKET IS EVOLVING
  • 5. 5 © 2014 CYREN Confidential and Proprietary THE SECURITY MARKET IS EVOLVING LEADING TO INCREASED COMPLEXITY IN IMPLEMENTING, MANAGING AND DEPLOYING SECURITY SOLUTIONS
  • 6. 6 Source: IDC, June 2013 © 2014 CYREN Confidential and Proprietary THE SECURITY MARKET SAAS IS BY FAR THE LARGEST GROWTH OPPORTUNITY
  • 7. 7 © 2014 CYREN Confidential and Proprietary POLL QUESTION #2 What is your ‘Web Security in the cloud’ strategy?
  • 8. 8 8 © 2014 CYREN Confidential and Proprietary CYREN WEBSECURITY
  • 9. 9 © 2014 CYREN Confidential and Proprietary INTRODUCING CYREN WEBSECURITY LAUNCH A BRANDED WEB SECURITY SERVICE WITH STRONG DIFFERENTIATORS
  • 10. 10 MOBILITY A TOTAL SOLUTION FOR ROAMING USERS, SMARTPHONES AND TABLETS - © 2014 CYREN Confidential and Proprietary INCLUDING BYOD  Android and iOS  White-labeled app for partner rebranding  Rule management for BYOD and corporate devices
  • 11. 11 ADVANCED SECURITY PROVEN CYREN CLOUD-BASED WEB © 2014 CYREN Confidential and Proprietary  Threat-sharing GlobalView network  Integrated antimalware scanning  APT Detection SECURITY
  • 12. 12 © 2014 CYREN Confidential and Proprietary SERVICE ARCHITECTURE GlobalView™ Cloud GlobalView Database Security Scanning and URL Filtering Branded Web-based Provisioning, Management and Reporting Internet Mobile & Roaming Desktops Routers & Appliances HeurisTech Security 1. Product is neutral/CYREN branded as standard 2. Partner private labels the service, or, 3. Partner co-brands the service 4. End customers are provisioned and start using the service
  • 13. 13 EASE OF USE TRULY INTUITIVE WEB INTERFACE FOR PARTNERS AND ALL LEVELS OF © 2014 CYREN Confidential and Proprietary ADMINISTRATORS  Easy customer provisioning  Online private labeling  Multi-tier management portal
  • 14. 14 14 © 2014 CYREN Confidential and Proprietary DEMONSTRATION
  • 15. 15 © 2014 CYREN Confidential and Proprietary Partner HeurisTech Security Customer Office Users Mobile users Partner Users Partner Customer Office users CYREN WEBSECURITY – PARTNER McMillan ENGINEERING
  • 16. 16 © 2014 CYREN Confidential and Proprietary HEURISTECH ECO-SYSTEM OVERVIEW - DASHBOARD.
  • 17. 17 © 2014 CYREN Confidential and Proprietary HEURISTECH CUSTOMIZES THE INTERFACE, DOMAIN, PLAY STORE, ETC.
  • 18. 18 © 2014 CYREN Confidential and Proprietary HEURISTECH CUSTOMIZES THE LICENSING AND PACKAGE OPTIONS
  • 19. 19 © 2014 CYREN Confidential and Proprietary Partner HeurisTech Security Customer Office Users Mobile users Partner Users Partner Customer Office users CYREN WEBSECURITY – PARTNER McMillan ENGINEERING
  • 20. 20 © 2014 CYREN Confidential and Proprietary CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING - DASHBOARD OF WEB ACTIVITY
  • 21. 21 © 2014 CYREN Confidential and Proprietary CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING DEFINES USERS – INCLUDING MOBILE/BYOD
  • 22. 22 © 2014 CYREN Confidential and Proprietary CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING DEFINES SECURITY POLICY
  • 23. 23 CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING APPLIES POLICY TO USERS – ALSO ROAMING/BYOD © 2014 CYREN Confidential and Proprietary
  • 24. 24 © 2014 CYREN Confidential and Proprietary CYREN WEBSECURITY – CUSTOMER MCMILLAN ENGINEERING – DETAILED REPORTS
  • 25. 25 © 2014 CYREN Confidential and Proprietary POLL QUESTION #3 What feature is most important for Web Security SaaS?
  • 26. 26 26 © 2014 CYREN Confidential and Proprietary WHO WE ARE
  • 27. 27 © 2014 CYREN Confidential and Proprietary LEADING PROVIDER OF INTERNET SECURITY TECHNOLOGY AND CLOUD-BASED SERVICES NASDAQ: CYRN
  • 28. 28 © 2014 CYREN Confidential and Proprietary WHO WE WORK WITH
  • 29. 29 © 2014 CYREN Confidential and Proprietary GLOBAL REACH DATA CENTERS OFFICES
  • 30. 30 © 2014 CYREN Confidential and Proprietary OUR PRODUCTS WEB The industry’s broadest and most actionable security intelligence combined with a robust web filtering platform secures all your devices, anywhere you go EMAIL Not just scanning emails with open source signatures; we track and leverage the global distribution patterns and our global real-time insight to stop the bad guys subverting email ANTIMALWARE Our market leading solutions secure your platform from threats without impacting performance
  • 31. 31 RECURRENT PATTERN DETECTION Our patented detection © 2014 CYREN Confidential and Proprietary WHAT MAKES US DIFFERENT We see more than anyone else. + technology GLOBALVIEW™ CLOUD The most robust transaction base in the industry SPEED ACCURACY REAL-TIME INSIGHT
  • 32. WHAT MAKES US DIFFERENT COMMITTED TO PARTNER SUCCESS 32 © 2014 CYREN Confidential and Proprietary  We focus on our core competencies so you can focus on yours.  Products designed for partners  Won’t compete for your business
  • 33. 33 33 © 2014 CYREN Confidential and Proprietary RECAP
  • 34. 34 © 2014 CYREN Confidential and Proprietary WEB SECURITY OPPORTUNITY  Ease of management / ease of use  Easy provisioning and management for Mobile/BYOD  The best account and end user provisioning experience in the industry  Partner-ready and partner-friendly revenue opportunity  Turnkey Web Security recurring revenue  Business logic enables any go-to-market model or sales ecosystem  Cloud-based security analysis and detection quality  Detection you know – already powering solutions across the industry  Ongoing Innovation – existing and new services such as APT
  • 35. 35 35 © 2014 CYREN Confidential and Proprietary THANK YOU. ANY QUESTIONS? “We are excited to see the emergence of state-of-the-art cloud based protection for mobile and roaming users. CYREN WebSecurity will help MXSweep deliver the easy to consume and best of breed cloud based security that our customers expect.” Tom O’Brien CEO MXSweep

Editor's Notes

  • #4: 2) How are businesses using Internet services differently today – and how is this affecting Internet security?
  • #9: 3) How does CYREN help security resellers to respond to this changing market?
  • #11: Easy provisioning and deployment Transparency Traffic optimization – compression, latency, geography Smooth authentication process Security enforcement No impact on battery life
  • #13: 4) How does it work, and how can resellers sell it as their own service?
  • #14: 5) How steep is the learning curve – for the resellers and also the small businesses they sell to?
  • #15: 6) Can we see some of the reseller features and also some of the mobile security features?
  • #27: 1) Tell us a bit about CYREN.
  • #34: 7) Summarize – what are the main highlights of WebSecurity that make it suitable for the new mobile workforce reality?