Page 1
1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
Exploring Internet Security for Today’s Threat Landscape
Chris Taylor, CYREN Marketing
Page 2
2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
About CYREN
THE BEST KEPT SECRET IN INFORMATION SECURITY FOR MORE THAN A DECADE
Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time innovator of cyber intelligence solutions. CYREN provides web, email, endpoint, and roaming cybersecurity solutions that are relied upon by the world’s largest IT companies to protect them and the billions of customers they serve from today’s advanced threats.
2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Page 3
3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN Powers the World’s Security
Our Cyber Intelligence forms the security foundation of many of the world’s largest and most influential information technology and Internet security brands.
Page 4
4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN by the Numbers
The Best Data Delivers the Best Protection
Page 5
5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 5
The Changing Security Landscape
Page 6
6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Today’s Security Landscape
Business process is Web connected and exposes security vulnerabilities
Use of cloud-based apps reduces IT visibility and control of enterprise data
Workers are remote/roaming using mobile/BYOD technology, but devices are rarely controlled
Connecting to Public WiFi networks creates risk Corporate IoT increases security complexity because
IT may not be consulted
Source: Gartner The Growing Importance of Cloud Access Security Brokers (May 2012)
Page 7
7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Today’s Security Challenges
The cybercriminals are innovating faster than legacy solutions can keep up
Page 8
8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
2014 Malware Year in Review
Malware Emails Malware URLs Zero-hourMalwaredetection
Page 9
9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Phishing Continues to Grow as a Threat Vector
Source: CYREN Cyber Threat Q1 Report, April 2015
Page 10
10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
2015 Android Threats
Source: CYREN Cyber Threat Q1 Report, April 2015
Page 11
11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
40 to 50 million emails distributed in short bursts lasting only three- to five-minutes each
2014 Mapping Attacks
Page 12
12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Web Security is Trapped in a Legacy Approach
Load Balancer
Edge FirewallServer–Side SSL Tunnel
Aggregation firewall
Client - side SSL tunnel
Sandbox SSLWeb Filter
Logfiles
Flow Management Content Inspection
SSLSSL
SSL
PAC File
SSL
SSL
This approach was defined for a 1990s computing model – centralized and static
Page 13
13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Do We Put This Everywhere We Need Connectivity?
Load Balancer
Edge FirewallServer–Side SSL Tunnel
Aggregation firewall
Client - side SSL tunnel
Sandbox SSLWeb Filter
Logfiles
Flow Management Content Inspection
SSLSSL
SSL
PAC File
SSL
SSL
NO. Security must evolve to reflect the changing model of business computing
Page 14
14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
TCO
A Modern Solution to Today’s Threats
Security Roaming
Page 15
15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
APPLICATIONPolicy, Enforcement, Logging, Alerting, Reporting
ANALYSISRPD, Heuristics, Signature, Sand box, Human, etc.
THREAT DATA17 BILLION transactions per day
ENDPOINTS500 THOUSAND points of presence, protecting 600 MILLION users
SECURITYApplied
Cyber Intelligence
INSIGHTCyber Intelligence
Pre-Compromise Compromise Post-Compromise
Reconnaissance Weaponization Delivery Exploitation Installation Command & Control
Actions on Target
Helping Enterprises Disruptthe Cyber Kill Chain
Applied Cyber Intelligence is the Answer
Page 16
16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
The fastest, best protection, from the brand the security industry trusts
The Cyber Intelligence that protects 600+ Million global users today
Cloud economics and ease of use combine for the lowest Total Cost of Ownership
Your security scales with you, no matter how big or complex your infrastructure becomes
A total security solution for office-based, remote, roaming, and corporate IoT devices
Protection for users and for Public/Guest WiFi networks
CYREN WebSecurity Is Applied Cyber Intelligence
Page 17
17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. © 2014 CYREN Confidential and Proprietary 17
Mobile App
Consumer Cloud
Private Cloud
Blocking Threats Enforcing Business Policy
Cloud AppPublic Cloud
Analyzing Web Traffic Applying Cyber Intelligence
BotExploits APT
Malware
Roaming HomeProduction Industrial Internet of
Things
Branch MobileHQ Remote Office
Security for Every Business or Technology Model
Page 18
18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Zero-Hour Phishing
Faster Detection Means Better Protection
Compliance / ProductivityZero-Hour Malware
“CYREN consistently demonstrates the best performance; detecting new phishing attacks faster than others, and providing unique detection of many attacks.” Greg Ogorek, Sr. Director, Cyber Security Operations, Cyveillance
Applied Cyber Intelligence Disrupts the Cyber Kill Chain and Boosts Productivity
Page 19
19©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
No capital expense for hardware or software Eliminates the cost and complexity associated with installing and
maintaining multiple appliances Up-to-the-moment applied cyber intelligence Simple to deploy, easy to administer, whether your operations are
centralized or distributed Scales with you - regardless of volume of users, devices, or locations
The Lowest Total Cost of Ownership (TCO)Cloud-based Web Security as a Service drives down your cost
Page 20
20©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
A ‘clean’ Internet connection protects users wherever they are Simple deployment options No requirement to backhaul remote workers’ traffic back to a
centralized security stack Policy enforcement and protection for up to 5 devices per user Protect notebooks, tablets and smartphones, across multiple
operating systems with flexible controls for BYOD/corporate No discernible impact on device performance Ensure clean, secure Internet connectivity for Corporate IoT An effective option for Public/Guest WiFi networks
The Best Solution for Roaming and RemoteDesigned for modern business computing
Page 21
21©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Business technology use has transformed, creating gaps in security
Cyber criminals are systematically targeting these gaps
The legacy, hardware-driven approach to Web security is inadequate to close them
21st Century threats require a 21st Century solution with fast, accurate protection
CYREN WebSecurity is that solution
Summary
Page 22
22©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
You can also find us here:
www.CYREN.com
twitter.com/cyreninc
linkedin.com/company/cyren
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Thank You. Any Questions or Thoughts?
Chris TaylorCYREN Marketing+1 [email protected]