SlideShare a Scribd company logo
1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
Closing Critical Security Gaps:
Cloud-Based Web Security as First/Last Line of Defense
Chris Taylor, CYREN Marketing
2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015 CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Adoption of New Technologies Drives Business Growth…
Source: Intel Corp
The Digital Enterprise is here:
• Common business applications ‘as a service’
• High availability, on-demand infrastructure
• Remote/roaming workers with
mobile/BYOD technology
• Ubiquitous network connectivity
Users need access to business infrastructure - wherever they are
4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015 CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
SaaS
Social and
Consumerization
Mobility and BYOD
Cloud
and Virtualization
Critical Threats to
Information
Security
…But They Also Open Gaps in Security
Reduced IT visibility and
control of enterprise data
Devices are rarely controlled
5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Threats Evolve to Target Those Gaps – Through Users
http://pages.cyren.com/CyberThreats_Report_2015Q2.html?utm_campaign=ALL_ALL_2015_Q2_CyberThreats_Report&utm_medium=ad_banner&utm_source=resource_center
6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Security Best Practice Struggles to Keep Up
Load Balancer
Edge FirewallServer–Side SSL Tunnel
Aggregation firewall
Client - side
SSL tunnel
Sandbox SSLWeb Filter
Logfiles
Flow Management Content Inspection
PAC
File
SSL
SSL
Designed to Protect Locations, Not Users – Not a Good Fit with New Model
Incremental
network hops
create latency
Redundancy demands
duplication of
Expensive Hardware
7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 7©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
So Where
Does This
Leave Us?
7
8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Top Challenges to Web Security
48%
45%
43%
39%
39%
38%
36%
36%
32%
30%
27%
25%
21%
4%
Multiple devices creating numerous “entry points” (laptops, tablets,…
Lack of the continuous visibility needed to detect advanced attacks
Lack of resources to implement new security solutions
Difficulty assessing your organization’s level of risk/ threat profile
No clear or uniform strategy for "incident response" (response is ad-…
Existing blocking and prevention solutions are insufficient to protect…
Lack of access to real-time intelligence around the latest web security…
Web security solutions are costly and difficult to integrate
Conventional security solutions don’t work well in cloud/hybrid…
Movement towards cloud infrastructure and “anytime” data access from…
Lack of support from the business for new security investments
Data and applications are moving to the Cloud
Lack of scalable security solutions (consistent through peak activity times…
Other
9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Rate Your Current Web Security Solution
11%
16%
13%
7%
34%
27%
21%
27%
39%
43%
46%
36%
11%
11%
14%
18%
5%
4%
5%
13%
Continuous monitoring
Attack prevention
Attack detection
Protection speed (how fast zero-hour
vulnerabilities are blocked)
Extremely effective Very effective Somewhat effective Not very effective Not at all effective
45%
43%
% Extremely/ Very
Effective
34%
34%
Users of cloud-based web security are much less likely to assign a low effectiveness rating to
current solution - particularly in the area of protection speed.
10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 10©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 10©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
The Solution.
Re-orient Security
from protecting
locations, to users
and their devices -
wherever they are
and however they
connect
11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
APPLICATION
Policy, Enforcement, Logging,
Alerting, Reporting
ANALYSIS
RPD, Heuristics, Signature, Sand box,
Human, etc.
THREAT DATA
17 BILLION transactions per day
ENDPOINTS
500 THOUSAND points of presence,
protecting 600 MILLION users
SECURITY
Applied
Cyber Intelligence
INSIGHT
Cyber Intelligence
Pre-Compromise Compromise Post-Compromise
Reconnaissance Weaponization Delivery Exploitation Installation Command
& Control
Actions
on Target
Real-Time Protection to Disrupt the Cyber Kill Chain
12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Low TCO
A First / Last Line of Defense Against Today’s Threats
Zero-Hour
Security
Any Device
13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015 CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Lowest Total Cost of Ownership
 Appliance replacement
 No Cap Ex for hardware or software
 Virtually scalable
Security
 Phishing web site filtering
 Safe-Search
 Malicious web site filtering
 Anti-virus traffic inspection
 SSL traffic inspection
 DNS traffic inspection
CYREN WebSecurity Overview
Features
Best Protection for Today’s Threats
 Phishing
 Zero-day Malware
 Compliance and productivity
Complete Solution for Remote,
Roaming, and IoT
 Protects wherever, whenever
 Up to 5 devices per user
 Protects all users and devices
Management
 Cloud-based dashboard
 Logging and reporting
 Onboarding automation
 Active directory integration
 Granular policy management
Mobility
 Roaming users
 Android and iOS device
support
Web Filtering
 Custom categories
 File type control
14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
A New Standard for Regional Privacy
• Application layer is served within the
region
• Personal private (PII) data (user
name, email, site name, customer
name) never leaves the home region
• Public data (policy, configuration,
hashed values) replicated across
regions enables seamless roaming
• Logs do not include any PII
• Hashed values map to private data
for reporting purposes only in the
relevant home region
Comply with privacy laws prohibiting transfer of users’ personal data outside the region
15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
The Best Protection Against Today’s Threats
Up-to-the-moment Cyber Intelligence, applied in real-time
Zero-Hour Phishing Compliance / ProductivityZero-Hour Malware
“CYREN consistently demonstrates the best performance; detecting new phishing attacks faster
than others, and providing unique detection of many attacks.”
Greg Ogorek, Sr. Director, Cyber Security Operations, Cyveillance
16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
 A ‘clean’ Internet connection protects users wherever they are
 Policy enforcement and protection – delivered globally
 Simple deployment options
 Protect notebooks, tablets and smartphones, across multiple
operating systems with flexible controls for BYOD/corporate
 No need to backhaul remote workers’ traffic back to a
centralized security stack
 No discernible impact on device performance
The Best Solution for Every User Model
A solution that fits any technology deployment model
17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
 Unified policy definition, enforcement, and reporting
 A single license covers the user for up to 5 devices
 No capital expense for hardware or software
 Eliminates the cost and complexity of multiple appliances
 Up-to-the-moment applied cyber intelligence minimizes the
cost of post-compromise remediation
 Simple to deploy, easy to administer - centralized or distributed
 Scales with you - regardless of volume of users, devices, or
locations
The Lowest Total Cost of Ownership (TCO)
Cloud-based Internet Security drives down your cost
18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
User-Oriented Total Web Security
Mobile App
Consumer Cloud
Private Cloud
Blocking Threats
Enforcing Compliance
Cloud App
Public Cloud
Analyzing Internet Traffic
Applying Cyber Intelligence
Bot
Exploits APT
Malware
Roaming HomeOn Call Wearables/IoTPCP MobileHospital Clinic
19©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 19
But Can I Trust the Cloud?
20©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Cloud as a Solution for Web Security
What is holding your organization back from
considering a cloud-based web security model?
Of those that do not see cloud as a viable solution for addressing Web security
67% of respondents either already use, or would consider, a cloud-based solution for Web security.
Among those who are hesitant, lack of trust in cloud-based security is the top obstacle.
Yes, we don’t currently use but
would investigate or consider a
cloud-based Web security solution
21%
46%
32%
61%
39%
28%
28%
22%
17%
17%
28%
Don’t trust cloud-based…
Our current equipment does…
Our security mindset is…
Staff doesn’t have training,…
Timing, recently invested in…
Switching costs are too high
Never heard of cloud-based…
OtherYes, we have a cloud-based Web
security solution in use today
No
21©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
What the Analysts Say…
"Cloud computing, by its very nature, is uniquely vulnerable to the risks of myths. It is all about
capabilities delivered as a service, with a clear boundary between the provider of the service and the
consumer. From a consumer perspective, 'in the cloud' means where the magic happens, where the
implementation details are supposed to be hidden. So it should be no surprise that such an environment
is rife with myths and misunderstandings."
David Mitchell Smith, Gartner
"The cloud is more secure than you are. If you're Coke and in the cloud, Pepsi can be right next door."
James Staten, Forrester
"Cloud computing is perceived as less secure. This is more of a trust issue than based on any reasonable
analysis of actual security capabilities. To date, there have been very few security breaches in the public
cloud — most breaches continue to involve on-premises data center environments“
David Mitchell Smith, Gartner
22©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 22©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
About CYREN
THE BEST KEPT SECRET IN INFORMATION SECURITY FOR
MORE THAN A DECADE
Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a
long-time innovator in cybersecurity. With full-function
Security as a Service (SecaaS) solutions and technology
components for embedded deployments, CYREN provides
web, email, endpoint and mobile security solutions that the
world’s largest IT companies trust for protection against
today’s advanced threats.
22©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
23©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN Powers the World’s Security
200+
OEM customers
500K
Points of presence
600M
End users
17B
Daily Transactions
24©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
You can also find us here:
www.CYREN.com
twitter.com/cyreninc
linkedin.com/company/cyren
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Questions, Next Steps
Chris Taylor
CYREN Marketing
+1 703.760.3320
Christopher.taylor@CYREN.com
To Learn More or Request a Demo:
http://www.cyren.com/websecurity-direct.html

More Related Content

PDF
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
PDF
Webinar: Dispelling the Myths about Cloud Security
PDF
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
PDF
Webinar: Is your web security broken? - 10 things you need to know
PDF
Webinar: IT security at SMBs: 2016 benchmarking survey
PDF
Webinar: Insights from Cyren's 2016 cyberthreat report
PPTX
DDos Attacks and Web Threats: How to Protect Your Site & Information
PDF
Anatomy of the Compromised Insider
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Dispelling the Myths about Cloud Security
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Is your web security broken? - 10 things you need to know
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: Insights from Cyren's 2016 cyberthreat report
DDos Attacks and Web Threats: How to Protect Your Site & Information
Anatomy of the Compromised Insider

What's hot (19)

PDF
Webinar: Why evasive zero day attacks are killing traditional sandboxing
PDF
Webinar: Stopping evasive malware - how a cloud sandbox array works
PDF
A Blueprint for Web Attack Survival
PPTX
Why Network and Endpoint Security Isn’t Enough
PPT
The State of Application Security: Hackers On Steroids
PDF
The Non-Advanced Persistent Threat
PPTX
Stop Account Takeover Attacks, Right in their Tracks
PDF
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
PPTX
Beyond takeover: stories from a hacked account
PPTX
State of the Internet: Mirai, IOT and History of Botnets
PDF
Protect Your Data and Apps in the Public Cloud
PDF
terry-gilsenan-pie-operating.10433
PDF
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
PPTX
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
PDF
Common Security Misconception
PPTX
A Day in the Life of a GDPR Breach
PDF
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
PPTX
Cybereason - behind the HackingTeam infection server
PDF
Extend Enterprise Application-level Security to Your AWS Environment
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Stopping evasive malware - how a cloud sandbox array works
A Blueprint for Web Attack Survival
Why Network and Endpoint Security Isn’t Enough
The State of Application Security: Hackers On Steroids
The Non-Advanced Persistent Threat
Stop Account Takeover Attacks, Right in their Tracks
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
Beyond takeover: stories from a hacked account
State of the Internet: Mirai, IOT and History of Botnets
Protect Your Data and Apps in the Public Cloud
terry-gilsenan-pie-operating.10433
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Common Security Misconception
A Day in the Life of a GDPR Breach
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
Cybereason - behind the HackingTeam infection server
Extend Enterprise Application-level Security to Your AWS Environment
Ad

Similar to Webinar: Cloud-Based Web Security as First/Last Line of Defense (20)

PPTX
Webinar: CYREN WebSecurity for Enterprise
PDF
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
PDF
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
PPTX
CipherCloud for Salesforce - Solution Overview
PPTX
Scalar Security Roadshow - Vancouver Presentation
PPTX
Scalar Security Roadshow - Calgary Presentation
PPTX
Webinar: CYREN WebSecurity for Healthcare
PPTX
How to Predict, Detect and Protect Against Mobile Cyber Attacks
PPTX
Cloud Visibility & Cloud Data Loss Prevention Approaches
PPTX
Cyren cybersecurity of things
PDF
Scalar Security Roadshow - Ottawa Presentation
PDF
Delivering Unified IT Operations With Vistara
PPTX
How to Launch a Web Security Service in an Hour
PDF
Visibility and Automation for Enhanced Security
PDF
Advanced Authentication: Past, Present, and Future
PPTX
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
PPTX
Combating Insider Threats – Protecting Your Agency from the Inside Out
PPTX
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
PDF
Enterprise Mobility: Secure Containerization
PDF
CYRENWebSecurity
Webinar: CYREN WebSecurity for Enterprise
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
CipherCloud for Salesforce - Solution Overview
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Calgary Presentation
Webinar: CYREN WebSecurity for Healthcare
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Cloud Visibility & Cloud Data Loss Prevention Approaches
Cyren cybersecurity of things
Scalar Security Roadshow - Ottawa Presentation
Delivering Unified IT Operations With Vistara
How to Launch a Web Security Service in an Hour
Visibility and Automation for Enhanced Security
Advanced Authentication: Past, Present, and Future
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
Combating Insider Threats – Protecting Your Agency from the Inside Out
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Enterprise Mobility: Secure Containerization
CYRENWebSecurity
Ad

More from Cyren, Inc (17)

PDF
Webinar: A deep dive on ransomware
PDF
Webinar: A deep dive on phishing, today's #1 business threat
PDF
Webinar: Botnets - The clone army of cybercrime
PDF
Webinar: How hackers are making your security obsolete
PDF
Webinar: 10 steps you can take to protect your business from phishing attacks
PDF
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
PPTX
CeBIT 2015 Presentation
PDF
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
PPTX
CYREN Investor Presentation - January, 2015
PPTX
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
PPTX
Webinar: Insights from CYREN's Q3 trend report
PDF
Dual Detection Engines - Using Layered Security to Battle Cybercrime
PPTX
Insights from CYREN's Q2 2014 Internet Threats Trend Report
PPTX
Don't Risk the Blacklist - Stop Outbound Spam
PDF
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
PDF
Commtouch outbound-anti spam-webinar-201312-final
PDF
(Full) Compromised Website Report 2012
Webinar: A deep dive on ransomware
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: Botnets - The clone army of cybercrime
Webinar: How hackers are making your security obsolete
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
CeBIT 2015 Presentation
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
CYREN Investor Presentation - January, 2015
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Insights from CYREN's Q3 trend report
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Insights from CYREN's Q2 2014 Internet Threats Trend Report
Don't Risk the Blacklist - Stop Outbound Spam
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
Commtouch outbound-anti spam-webinar-201312-final
(Full) Compromised Website Report 2012

Recently uploaded (20)

PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PPT
tcp ip networks nd ip layering assotred slides
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PPTX
innovation process that make everything different.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Digital Literacy And Online Safety on internet
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
Internet___Basics___Styled_ presentation
PPTX
Funds Management Learning Material for Beg
Decoding a Decade: 10 Years of Applied CTI Discipline
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
tcp ip networks nd ip layering assotred slides
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
innovation process that make everything different.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Digital Literacy And Online Safety on internet
SASE Traffic Flow - ZTNA Connector-1.pdf
Job_Card_System_Styled_lorem_ipsum_.pptx
SAP Ariba Sourcing PPT for learning material
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Sims 4 Historia para lo sims 4 para jugar
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Design_with_Watersergyerge45hrbgre4top (1).ppt
introduction about ICD -10 & ICD-11 ppt.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Introuction about ICD -10 and ICD-11 PPT.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Internet___Basics___Styled_ presentation
Funds Management Learning Material for Beg

Webinar: Cloud-Based Web Security as First/Last Line of Defense

  • 1. 1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. Closing Critical Security Gaps: Cloud-Based Web Security as First/Last Line of Defense Chris Taylor, CYREN Marketing
  • 2. 2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
  • 3. 3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015 CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Adoption of New Technologies Drives Business Growth… Source: Intel Corp The Digital Enterprise is here: • Common business applications ‘as a service’ • High availability, on-demand infrastructure • Remote/roaming workers with mobile/BYOD technology • Ubiquitous network connectivity Users need access to business infrastructure - wherever they are
  • 4. 4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015 CYREN Ltd. All Rights Reserved. Proprietary and Confidential. SaaS Social and Consumerization Mobility and BYOD Cloud and Virtualization Critical Threats to Information Security …But They Also Open Gaps in Security Reduced IT visibility and control of enterprise data Devices are rarely controlled
  • 5. 5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Threats Evolve to Target Those Gaps – Through Users http://pages.cyren.com/CyberThreats_Report_2015Q2.html?utm_campaign=ALL_ALL_2015_Q2_CyberThreats_Report&utm_medium=ad_banner&utm_source=resource_center
  • 6. 6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Security Best Practice Struggles to Keep Up Load Balancer Edge FirewallServer–Side SSL Tunnel Aggregation firewall Client - side SSL tunnel Sandbox SSLWeb Filter Logfiles Flow Management Content Inspection PAC File SSL SSL Designed to Protect Locations, Not Users – Not a Good Fit with New Model Incremental network hops create latency Redundancy demands duplication of Expensive Hardware
  • 7. 7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 7©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. So Where Does This Leave Us? 7
  • 8. 8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Top Challenges to Web Security 48% 45% 43% 39% 39% 38% 36% 36% 32% 30% 27% 25% 21% 4% Multiple devices creating numerous “entry points” (laptops, tablets,… Lack of the continuous visibility needed to detect advanced attacks Lack of resources to implement new security solutions Difficulty assessing your organization’s level of risk/ threat profile No clear or uniform strategy for "incident response" (response is ad-… Existing blocking and prevention solutions are insufficient to protect… Lack of access to real-time intelligence around the latest web security… Web security solutions are costly and difficult to integrate Conventional security solutions don’t work well in cloud/hybrid… Movement towards cloud infrastructure and “anytime” data access from… Lack of support from the business for new security investments Data and applications are moving to the Cloud Lack of scalable security solutions (consistent through peak activity times… Other
  • 9. 9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Rate Your Current Web Security Solution 11% 16% 13% 7% 34% 27% 21% 27% 39% 43% 46% 36% 11% 11% 14% 18% 5% 4% 5% 13% Continuous monitoring Attack prevention Attack detection Protection speed (how fast zero-hour vulnerabilities are blocked) Extremely effective Very effective Somewhat effective Not very effective Not at all effective 45% 43% % Extremely/ Very Effective 34% 34% Users of cloud-based web security are much less likely to assign a low effectiveness rating to current solution - particularly in the area of protection speed.
  • 10. 10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 10©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 10©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. The Solution. Re-orient Security from protecting locations, to users and their devices - wherever they are and however they connect
  • 11. 11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. APPLICATION Policy, Enforcement, Logging, Alerting, Reporting ANALYSIS RPD, Heuristics, Signature, Sand box, Human, etc. THREAT DATA 17 BILLION transactions per day ENDPOINTS 500 THOUSAND points of presence, protecting 600 MILLION users SECURITY Applied Cyber Intelligence INSIGHT Cyber Intelligence Pre-Compromise Compromise Post-Compromise Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Actions on Target Real-Time Protection to Disrupt the Cyber Kill Chain
  • 12. 12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Low TCO A First / Last Line of Defense Against Today’s Threats Zero-Hour Security Any Device
  • 13. 13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015 CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Lowest Total Cost of Ownership  Appliance replacement  No Cap Ex for hardware or software  Virtually scalable Security  Phishing web site filtering  Safe-Search  Malicious web site filtering  Anti-virus traffic inspection  SSL traffic inspection  DNS traffic inspection CYREN WebSecurity Overview Features Best Protection for Today’s Threats  Phishing  Zero-day Malware  Compliance and productivity Complete Solution for Remote, Roaming, and IoT  Protects wherever, whenever  Up to 5 devices per user  Protects all users and devices Management  Cloud-based dashboard  Logging and reporting  Onboarding automation  Active directory integration  Granular policy management Mobility  Roaming users  Android and iOS device support Web Filtering  Custom categories  File type control
  • 14. 14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. A New Standard for Regional Privacy • Application layer is served within the region • Personal private (PII) data (user name, email, site name, customer name) never leaves the home region • Public data (policy, configuration, hashed values) replicated across regions enables seamless roaming • Logs do not include any PII • Hashed values map to private data for reporting purposes only in the relevant home region Comply with privacy laws prohibiting transfer of users’ personal data outside the region
  • 15. 15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. The Best Protection Against Today’s Threats Up-to-the-moment Cyber Intelligence, applied in real-time Zero-Hour Phishing Compliance / ProductivityZero-Hour Malware “CYREN consistently demonstrates the best performance; detecting new phishing attacks faster than others, and providing unique detection of many attacks.” Greg Ogorek, Sr. Director, Cyber Security Operations, Cyveillance
  • 16. 16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.  A ‘clean’ Internet connection protects users wherever they are  Policy enforcement and protection – delivered globally  Simple deployment options  Protect notebooks, tablets and smartphones, across multiple operating systems with flexible controls for BYOD/corporate  No need to backhaul remote workers’ traffic back to a centralized security stack  No discernible impact on device performance The Best Solution for Every User Model A solution that fits any technology deployment model
  • 17. 17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.  Unified policy definition, enforcement, and reporting  A single license covers the user for up to 5 devices  No capital expense for hardware or software  Eliminates the cost and complexity of multiple appliances  Up-to-the-moment applied cyber intelligence minimizes the cost of post-compromise remediation  Simple to deploy, easy to administer - centralized or distributed  Scales with you - regardless of volume of users, devices, or locations The Lowest Total Cost of Ownership (TCO) Cloud-based Internet Security drives down your cost
  • 18. 18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. User-Oriented Total Web Security Mobile App Consumer Cloud Private Cloud Blocking Threats Enforcing Compliance Cloud App Public Cloud Analyzing Internet Traffic Applying Cyber Intelligence Bot Exploits APT Malware Roaming HomeOn Call Wearables/IoTPCP MobileHospital Clinic
  • 19. 19©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 19 But Can I Trust the Cloud?
  • 20. 20©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Cloud as a Solution for Web Security What is holding your organization back from considering a cloud-based web security model? Of those that do not see cloud as a viable solution for addressing Web security 67% of respondents either already use, or would consider, a cloud-based solution for Web security. Among those who are hesitant, lack of trust in cloud-based security is the top obstacle. Yes, we don’t currently use but would investigate or consider a cloud-based Web security solution 21% 46% 32% 61% 39% 28% 28% 22% 17% 17% 28% Don’t trust cloud-based… Our current equipment does… Our security mindset is… Staff doesn’t have training,… Timing, recently invested in… Switching costs are too high Never heard of cloud-based… OtherYes, we have a cloud-based Web security solution in use today No
  • 21. 21©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. What the Analysts Say… "Cloud computing, by its very nature, is uniquely vulnerable to the risks of myths. It is all about capabilities delivered as a service, with a clear boundary between the provider of the service and the consumer. From a consumer perspective, 'in the cloud' means where the magic happens, where the implementation details are supposed to be hidden. So it should be no surprise that such an environment is rife with myths and misunderstandings." David Mitchell Smith, Gartner "The cloud is more secure than you are. If you're Coke and in the cloud, Pepsi can be right next door." James Staten, Forrester "Cloud computing is perceived as less secure. This is more of a trust issue than based on any reasonable analysis of actual security capabilities. To date, there have been very few security breaches in the public cloud — most breaches continue to involve on-premises data center environments“ David Mitchell Smith, Gartner
  • 22. 22©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 22©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. About CYREN THE BEST KEPT SECRET IN INFORMATION SECURITY FOR MORE THAN A DECADE Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time innovator in cybersecurity. With full-function Security as a Service (SecaaS) solutions and technology components for embedded deployments, CYREN provides web, email, endpoint and mobile security solutions that the world’s largest IT companies trust for protection against today’s advanced threats. 22©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
  • 23. 23©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. CYREN Powers the World’s Security 200+ OEM customers 500K Points of presence 600M End users 17B Daily Transactions
  • 24. 24©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. You can also find us here: www.CYREN.com twitter.com/cyreninc linkedin.com/company/cyren ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. Questions, Next Steps Chris Taylor CYREN Marketing +1 703.760.3320 Christopher.taylor@CYREN.com To Learn More or Request a Demo: http://www.cyren.com/websecurity-direct.html