SlideShare a Scribd company logo
1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
That’s the Way the Network Perimeter Crumbles:
Web Security for the New Technology Paradigm
Chris Taylor
2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
About CYREN
THE BEST KEPT SECRET IN INFORMATION SECURITY FOR MORE
THAN A DECADE
Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time
innovator of cyber intelligence solutions. CYREN provides web,
email, endpoint, and roaming cybersecurity solutions that are
relied upon by the world’s largest IT companies to protect them
and the billions of customers they serve from today’s advanced
threats.
2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN Powers the World’s Security
Our Cyber Intelligence is the security backbone of many of the world’s largest and
most influential information technology and Internet security brands.
4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 4©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Global Coverage from a Global Platform
OFFICESDATA CENTERS
Over 500,000 threat collection and cyber intelligence delivery points
distributed across the globe, supported by 19 datacenters
Protecting more than 550 Million people in 190 countries
13 Billion security transactions every day
5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 5
The Changing
Security Landscape
6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Today’s Security Landscape
IT Security Landscape
 Business process is Web connected and exposes
security vulnerabilities
 Use of cloud-based apps reduces IT visibility and
control of enterprise data
 Workers are remote/roaming using mobile/BYOD
technology, but devices are rarely controlled
 By 2018, 25% of all corporate data traffic will flow
direct from roaming devices to the cloud
 Corporate IoT increases security complexity because IT
may not be consulted
Source: Gartner The Growing Importance of Cloud Access
Security Brokers (May 2012)
7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
But Security is Stuck in the 20th Century
Load Balancer
Edge FirewallServer–Side SSL Tunnel
Aggregation firewall
Client - side
SSL tunnel
Sandbox SSLWeb Filter
Logfiles
Flow Management Content Inspection
PAC
File
SSL
SSL
This approach was defined for a 1990s computing model – centralized and static
8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Today’s Security Challenges
The cybercriminals are innovating faster than legacy solutions can keep up
9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
So Do We Put This Everywhere We Need Connectivity?
Load Balancer
Edge FirewallServer–Side SSL Tunnel
Aggregation firewall
Client - side
SSL tunnel
Sandbox SSL
Web Filter
Logfiles
Flow Management Content Inspection
PAC
File
SSL
SSL
NO. Security must evolve to reflect the changing model of business computing
10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
TCO
A Modern Solution to Today’s Threats
Security Roaming
11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Applied Cyber Intelligence is the Way Forward
APPLICATION
Policy, Enforcement, Logging,
Alerting, Reporting
ANALYSIS
RPD, Heuristics, Signature, Human, etc.
DATA
13 BILLION transactions per day
SENSORS
500 THOUSAND points of presence,
serving 550 MILLION users
SECURITY
Applied
Cyber Intelligence
INSIGHT
Cyber Intelligence
EnterpriseValue
Pre-Compromise Compromise Post-Compromise
Reconnaissance Weaponization Delivery Exploitation Installation Command
& Control
Actions
on Target
Helping Enterprises to Disrupt
the Cyber Kill Chain
12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
 Cloud economics and ease of use combine for the
lowest Total Cost of Ownership
 Applying the same Cyber Intelligence that protects
over 550 Million global users today
 Industrial-strength protection, from the brand the
security industry trusts
 Your security scales with you, no matter how big or
complex your infrastructure becomes
 A total security solution for office-based, remote,
roaming, and corporate IoT devices
 Protection is delivered wherever the user is
connected
CYREN WebSecurity Delivers Applied Cyber Intelligence
13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
 No capital expense for hardware or software
 Eliminates the cost and complexity associated with installing and
maintaining multiple appliances
 Up-to-the-moment applied cyber intelligence
 Simple to deploy, easy to administer, whether your operations are
centralized or distributed
 Scales with you - regardless of volume of users, devices, or locations
The Lowest Total Cost of Ownership (TCO)
Cloud-based Web Security as a Service drives down your cost
14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Phishing
Protecting you from
cybercriminal attempts to
obtain corporate data, using
impersonated trustworthy
communication via an email or
malicious URL
The Best Protection from Today’s Threats
Zero-hour protection, powered
by our unique Cyber
Intelligence, ensures you’re
always protected against the
latest threats
Compliance and
Productivity
Unprecedented visibility of
employee Web use, means you
can set and enforce your Internet
Use policies
Applied Cyber Intelligence Disrupts the Cyber Kill Chain and Boosts Productivity
Zero-day Malware
15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
 A ‘clean’ Internet connection protects users wherever they are
 Simple deployment options
 No requirement to backhaul remote workers’ traffic back to a
centralized security stack
 Policy enforcement and protection for up to 5 devices per user
 Protect notebooks, tablets and smartphones, across multiple
operating systems with flexible controls for BYOD/corporate
 No discernible impact on device performance
 Ensures clean, secure Internet connectivity for Corporate IoT
deployments
The Best Solution for Roaming, Remote, and IoT
Designed for 21st Century business computing
16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Business has transformed the way it uses technology, opening up a new threat
landscape
The traditional centralized, hardware-driven approach to Web security was
never designed for this landscape
21st Century threats require a 21st Century solution – Web security as a service
CYREN WebSecurity is that solution
Summary
17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
You can also find us here:
www.CYREN.com
twitter.com/cyreninc
linkedin.com/company/cyren
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Thank You. Any Questions or Thoughts?
Chris Taylor
CYREN Marketing
+1 703.760.3320
Christopher.taylor@CYREN.com

More Related Content

PPTX
Webinar: CYREN WebSecurity for Enterprise
PPTX
Webinar: CYREN WebSecurity for Healthcare
PDF
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
PDF
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
PDF
Iot Security and Privacy at Scale
PPTX
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
PPTX
Understanding Global Data Protection Laws: Webinar
PPTX
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Healthcare
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
Iot Security and Privacy at Scale
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Understanding Global Data Protection Laws: Webinar
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT

What's hot (19)

PDF
Building the Internet of Everything
PPTX
Open source IoT
PPTX
Cloud Visibility & Cloud Data Loss Prevention Approaches
PDF
WP-Privacy-IoT-Era - PRODUCTION
PDF
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
PDF
Advantages of privacy by design in IoE
PPTX
Internet of everything #IoE
PPTX
1. How will the IoT help your business - cisco
PPTX
Security transformation: Helping you manage digital risk
PPTX
CipherCloud Webinar - Cloud Encryption & Tokenization 101
PPTX
Living In a World of Data Exploitation - CPDP 2017
PDF
AASTMT Case Study
PDF
Cloud security lessons learned and audit
PPTX
Smart + Sustainable Cities Canada-India Carleton U.
PPTX
Toronto Real Estate Board, Realtor Quest 2016
PPTX
Vertu's Digital Transformation
PDF
Understanding IoT
PDF
Integra Customer Presentation
PPTX
Urban Mobility -- w/ UP Express and Partners
Building the Internet of Everything
Open source IoT
Cloud Visibility & Cloud Data Loss Prevention Approaches
WP-Privacy-IoT-Era - PRODUCTION
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Advantages of privacy by design in IoE
Internet of everything #IoE
1. How will the IoT help your business - cisco
Security transformation: Helping you manage digital risk
CipherCloud Webinar - Cloud Encryption & Tokenization 101
Living In a World of Data Exploitation - CPDP 2017
AASTMT Case Study
Cloud security lessons learned and audit
Smart + Sustainable Cities Canada-India Carleton U.
Toronto Real Estate Board, Realtor Quest 2016
Vertu's Digital Transformation
Understanding IoT
Integra Customer Presentation
Urban Mobility -- w/ UP Express and Partners
Ad

Viewers also liked (20)

PDF
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
PDF
Webinar: Botnets - The clone army of cybercrime
PPTX
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
PDF
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
PPTX
Webinar: Insights from CYREN's Q3 trend report
PDF
Webinar: Why evasive zero day attacks are killing traditional sandboxing
PPTX
CeBIT 2015 Presentation
PDF
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
PDF
Webinar: How hackers are making your security obsolete
PDF
Webinar: Stopping evasive malware - how a cloud sandbox array works
PDF
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
PDF
Webinar: IT security at SMBs: 2016 benchmarking survey
PPTX
Insights from CYREN's Q2 2014 Internet Threats Trend Report
PDF
Webinar: Dispelling the Myths about Cloud Security
PDF
Webinar: Cloud-Based Web Security as First/Last Line of Defense
PPTX
CYREN Investor Presentation - January, 2015
PDF
Webinar: Is your web security broken? - 10 things you need to know
PDF
Webinar: 10 steps you can take to protect your business from phishing attacks
PDF
Webinar: A deep dive on phishing, today's #1 business threat
PDF
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Botnets - The clone army of cybercrime
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's Q3 trend report
Webinar: Why evasive zero day attacks are killing traditional sandboxing
CeBIT 2015 Presentation
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: How hackers are making your security obsolete
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: IT security at SMBs: 2016 benchmarking survey
Insights from CYREN's Q2 2014 Internet Threats Trend Report
Webinar: Dispelling the Myths about Cloud Security
Webinar: Cloud-Based Web Security as First/Last Line of Defense
CYREN Investor Presentation - January, 2015
Webinar: Is your web security broken? - 10 things you need to know
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: Insights from Cyren's 2016 cyberthreat report
Ad

Similar to Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm (20)

PDF
CYRENWebSecurity
PDF
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
PPTX
Cyren cybersecurity of things
PPTX
How to Launch a Web Security Service in an Hour
PDF
CYREN_2015_CyberThreat_Yearbook
PDF
Dual Detection Engines - Using Layered Security to Battle Cybercrime
PDF
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
PDF
Security Everywhere: A Growth Engine for the Digital Economy
PDF
The 10 Fastest Growing Cyber Security Companies of 2017
PDF
Tomorrow Starts Here - Security Everywhere
PDF
Insights success the 10 best performing cyber security solution providers 4th...
PPTX
Level3-ATC comSpark.tech Presentation Snapshot
PDF
Cyber Security In The Digital Age - Infocenter
PDF
PPTX
CyberKnight capabilties
PDF
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
PDF
Cyber Security in Manufacturing
PPTX
Cyberoam Firewall Presentation
PPTX
Segurdad de red para la generacion de la nube symantec
PDF
Cisco Umbrella 2024 Cisco Umbrella 2024
CYRENWebSecurity
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
Cyren cybersecurity of things
How to Launch a Web Security Service in an Hour
CYREN_2015_CyberThreat_Yearbook
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Security Everywhere: A Growth Engine for the Digital Economy
The 10 Fastest Growing Cyber Security Companies of 2017
Tomorrow Starts Here - Security Everywhere
Insights success the 10 best performing cyber security solution providers 4th...
Level3-ATC comSpark.tech Presentation Snapshot
Cyber Security In The Digital Age - Infocenter
CyberKnight capabilties
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Cyber Security in Manufacturing
Cyberoam Firewall Presentation
Segurdad de red para la generacion de la nube symantec
Cisco Umbrella 2024 Cisco Umbrella 2024

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
Teaching material agriculture food technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Cloud computing and distributed systems.
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Reach Out and Touch Someone: Haptics and Empathic Computing
Teaching material agriculture food technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25 Week I
Review of recent advances in non-invasive hemoglobin estimation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
sap open course for s4hana steps from ECC to s4
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx
Cloud computing and distributed systems.
MYSQL Presentation for SQL database connectivity
Understanding_Digital_Forensics_Presentation.pptx
Spectral efficient network and resource selection model in 5G networks
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MIND Revenue Release Quarter 2 2025 Press Release
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Per capita expenditure prediction using model stacking based on satellite ima...

Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for the New Technology Paradigm

  • 1. 1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. That’s the Way the Network Perimeter Crumbles: Web Security for the New Technology Paradigm Chris Taylor
  • 2. 2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. About CYREN THE BEST KEPT SECRET IN INFORMATION SECURITY FOR MORE THAN A DECADE Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time innovator of cyber intelligence solutions. CYREN provides web, email, endpoint, and roaming cybersecurity solutions that are relied upon by the world’s largest IT companies to protect them and the billions of customers they serve from today’s advanced threats. 2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
  • 3. 3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. CYREN Powers the World’s Security Our Cyber Intelligence is the security backbone of many of the world’s largest and most influential information technology and Internet security brands.
  • 4. 4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 4©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Global Coverage from a Global Platform OFFICESDATA CENTERS Over 500,000 threat collection and cyber intelligence delivery points distributed across the globe, supported by 19 datacenters Protecting more than 550 Million people in 190 countries 13 Billion security transactions every day
  • 5. 5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 5 The Changing Security Landscape
  • 6. 6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Today’s Security Landscape IT Security Landscape  Business process is Web connected and exposes security vulnerabilities  Use of cloud-based apps reduces IT visibility and control of enterprise data  Workers are remote/roaming using mobile/BYOD technology, but devices are rarely controlled  By 2018, 25% of all corporate data traffic will flow direct from roaming devices to the cloud  Corporate IoT increases security complexity because IT may not be consulted Source: Gartner The Growing Importance of Cloud Access Security Brokers (May 2012)
  • 7. 7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. But Security is Stuck in the 20th Century Load Balancer Edge FirewallServer–Side SSL Tunnel Aggregation firewall Client - side SSL tunnel Sandbox SSLWeb Filter Logfiles Flow Management Content Inspection PAC File SSL SSL This approach was defined for a 1990s computing model – centralized and static
  • 8. 8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Today’s Security Challenges The cybercriminals are innovating faster than legacy solutions can keep up
  • 9. 9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. So Do We Put This Everywhere We Need Connectivity? Load Balancer Edge FirewallServer–Side SSL Tunnel Aggregation firewall Client - side SSL tunnel Sandbox SSL Web Filter Logfiles Flow Management Content Inspection PAC File SSL SSL NO. Security must evolve to reflect the changing model of business computing
  • 10. 10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. TCO A Modern Solution to Today’s Threats Security Roaming
  • 11. 11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Applied Cyber Intelligence is the Way Forward APPLICATION Policy, Enforcement, Logging, Alerting, Reporting ANALYSIS RPD, Heuristics, Signature, Human, etc. DATA 13 BILLION transactions per day SENSORS 500 THOUSAND points of presence, serving 550 MILLION users SECURITY Applied Cyber Intelligence INSIGHT Cyber Intelligence EnterpriseValue Pre-Compromise Compromise Post-Compromise Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Actions on Target Helping Enterprises to Disrupt the Cyber Kill Chain
  • 12. 12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.  Cloud economics and ease of use combine for the lowest Total Cost of Ownership  Applying the same Cyber Intelligence that protects over 550 Million global users today  Industrial-strength protection, from the brand the security industry trusts  Your security scales with you, no matter how big or complex your infrastructure becomes  A total security solution for office-based, remote, roaming, and corporate IoT devices  Protection is delivered wherever the user is connected CYREN WebSecurity Delivers Applied Cyber Intelligence
  • 13. 13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.  No capital expense for hardware or software  Eliminates the cost and complexity associated with installing and maintaining multiple appliances  Up-to-the-moment applied cyber intelligence  Simple to deploy, easy to administer, whether your operations are centralized or distributed  Scales with you - regardless of volume of users, devices, or locations The Lowest Total Cost of Ownership (TCO) Cloud-based Web Security as a Service drives down your cost
  • 14. 14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Phishing Protecting you from cybercriminal attempts to obtain corporate data, using impersonated trustworthy communication via an email or malicious URL The Best Protection from Today’s Threats Zero-hour protection, powered by our unique Cyber Intelligence, ensures you’re always protected against the latest threats Compliance and Productivity Unprecedented visibility of employee Web use, means you can set and enforce your Internet Use policies Applied Cyber Intelligence Disrupts the Cyber Kill Chain and Boosts Productivity Zero-day Malware
  • 15. 15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.  A ‘clean’ Internet connection protects users wherever they are  Simple deployment options  No requirement to backhaul remote workers’ traffic back to a centralized security stack  Policy enforcement and protection for up to 5 devices per user  Protect notebooks, tablets and smartphones, across multiple operating systems with flexible controls for BYOD/corporate  No discernible impact on device performance  Ensures clean, secure Internet connectivity for Corporate IoT deployments The Best Solution for Roaming, Remote, and IoT Designed for 21st Century business computing
  • 16. 16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Business has transformed the way it uses technology, opening up a new threat landscape The traditional centralized, hardware-driven approach to Web security was never designed for this landscape 21st Century threats require a 21st Century solution – Web security as a service CYREN WebSecurity is that solution Summary
  • 17. 17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. You can also find us here: www.CYREN.com twitter.com/cyreninc linkedin.com/company/cyren ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Thank You. Any Questions or Thoughts? Chris Taylor CYREN Marketing +1 703.760.3320 Christopher.taylor@CYREN.com