Presentation is loading. Please wait.

Presentation is loading. Please wait.

Complete Cloud Security Anyone, anywhere, any app, any device.

Similar presentations


Presentation on theme: "Complete Cloud Security Anyone, anywhere, any app, any device."— Presentation transcript:

1 Complete Cloud Security Anyone, anywhere, any app, any device

2 “Corporate confidentiality and communications policies have been ripped to shreds by the social networking phenomenon.” FT Report, Oct 2015 “Many enterprises lack a complete understanding of the cloud services they consume and the risks they represent, which makes compliance and protection difficult” Gartner How to Evaluate and Operate a Cloud Access Security Broker | Published: 8 Dec 2015 | Analyst(s): Neil MacDonald, Craig Lawson “40% of enterprises will have from 25% to 49% of their workloads in public clouds in five years. Over the next three years, the majority of enterprise senior executives forecast between 21 to 30% of applications will be SaaS-based.” Forbes/Tech, May 2015

3 Increasingly mobile workforce Lack of visibility and control Rise of Cloud Applications “By 2016, 25% of enterprises will secure access to cloud-based services using a CASB platform, up from less than 1% in 2012, reducing the cost of securing access by 30%” - Gartner The World has Changed …

4 The need for evolution and education Hacking 32% of attacks were Aimed at companies with fewer than 250 employees Targeted Attacks From 2012 – 2014 $ Ransomware The British insurance company Lloyd’s estimates that cyber attacks cost businesses as much as $400 billion a year, which includes direct damage plus post-attack disruption to the normal course of business. Forbes, Nov 2015 Hacking is the fastest growing crime type Targeted attacks grew 62% 24,000 victims per day in 2014

5 Cloud Applications provide flexibility & scalability But do you know which applications your employees are using? And what they are doing? The flexibility, scalability and usability of the plethora of cloud applications, enables employees to become more productive and businesses to grow Do you know which applications your people are using? Where your confidential data is stored? What data is being shared on unsecure applications?

6 Top 5 Business Concerns ”Unauthorised or unrestricted use of cloud application can lead to data security and compliance breaches” “The world has gone mobile but security has not changed” ”Compliance is not optional. Use cloud application but retain visibility and control” ”Users are working in-office or on the move and security has to follow the user regardless of the device used” “Company and personally owned devices can increase productivity but access to corporate data and the network have to be protected at all times” Shadow IT Security Compliance BYOD Productivity

7 Current Security Vendors only solve part of the problem … Web Security Email Security Cloud Application Control

8 Censornet Provides Complete Cloud Security Follow the person across devices, networks and applications Apply the same policy, permissions and control on web, email and cloud applications consistently Track data as it is moved between web applications and shared via email, file sharing or social media Spot use of unauthorised or risky cloud applications and prevent sensitive data from being shared Monitor sensitive data from one consul and track security events that involve more than one application or medium Benefit from the scalability and flexibility of cloud application adoption and BYOD without risking security

9 Cloud Activity Governance Anomaly and Threat Detection and Protection Visibility into Cloud App Usage Enables business to benefit from the scalability and flexibility of the cloud without the risks

10 Location, Devise, Public or Private network A Person In a Context Accesses an Application To perform a function With Data Censornet The only way to completely protect your data

11 Location, Devise, Public or Private network Censornet The only way to completely protect your data A Person In a Secure Context

12 Location, Devise, Public or Private network A Person Accesses an Application they are authorised to use Censornet The only way to completely protect your data In a Secure Context

13 Location, Devise, Public or Private network A Person Censornet The only way to completely protect your data Accesses an Application they are authorised to use In a Secure Context To perform a Permitted function

14 Location, Devise, Public or Private network A Person With Data they are allowed to use Censornet The only way to completely protect your data Accesses an Application they are authorised to use In a Secure Context To perform a Permitted function

15 Public Network A Person Or trying to access an Application they are not authorised to use Or to perform a function not allowed from that application or context Or with Data they don’t have permission to use Censornet The only way to completely protect your data In an Unsecure Context

16 Or with Data they don’t have permission to use Location, Devise, Public or Private network A Person Censornet The only way to completely protect your data Or to perform a function not allowed from that application or context Or trying to access an Application they are not authorised to use In a Secure Context

17 A Person Censornet The only way to completely protect your data Or with Data they don’t have permission to use To perform a function not allowed from that application or context Accesses an Application they are authorised to use In a Secure Context

18 Or with Data they don’t have permission to use To perform a function allowed from that application or context Accesses an Application they are authorised to use In a Secure Context A Person Censornet The only way to completely protect your data

19 A Person Censornet The only way to completely protect your data In an Unsecure Context Or trying to access an Application they are not authorised to use Or to perform a function not allowed from that application or context Or with Data they don’t have permission to use

20 The clear merits One dashboard covering web, email and Cloud Application Control Mobile / BYOD / LAN secured Shared analytics & incident reporting across web, email and applications Cloud deployment model + “private cloud”

21 Product Portfolio Overview Secure Web Gateway Email Security Hybrid Web Security Cloud Application Control Product Portfolio Unified Security Solution Desktop Monitoring

22 Features include: Roaming users & BYOD Granular policy setting. No proxy architecture Deployment: hybrid cloud; endpoint agent. virtual machine Features include: Hosted email security & filtering. Backup SecureMail and Emergency Inbox Deployment: cloud service via MX records Features include: Shadow IT discovery Cloud Application Analysis. Forensic Analysis Deployment: Cloud service Email Security Hybrid Web Security Cloud Application Control Unified Security Solution

23 Unified Security Service www.censornet.com Product Overview

24 One view of the cloud - email, web and applications Easily apply consistent policies Visibility and control of who is doing what on your network Ability to track data as it is moved between emails, web applications, social media and file sharing Spot use of unsecure or risky cloud application Email Security Hybrid Web Security Cloud Application Control Unified Security Solution

25 Product Portfolio Overview

26

27 Web usage, email flow and cloud application control all managed from one place

28 Product Portfolio Overview

29 Data can be tracked across email, web, social media and cloud applications, all in one view. Alerts are produced as File customer_data2015 is exported from Salesforce.com and then downloaded, then sent as an email and uploaded to Dropbox

30 Product Portfolio Overview

31 Policies can be set up depending on roles, devices and location.

32 Product Portfolio Overview

33 It is easy to see Which specific cloud applications are being used Who is using them Which types of applications are most useful Where your data is being stored

34 Product Portfolio Overview

35

36

37 Track specific actions in cloud applications. Set the risk levels to suit your organisation and create alerts to warn you of risky activity

38 Product Portfolio Overview

39 Email is not only protected from malware, but also archived so that users can access their inbox and continue to send and receive emails even if your email server is not available.

40 Product Portfolio Overview

41 Transparent data analytics across email. web and cloud applications Easily apply consistent policies Visibility and control of who is doing what on your network Ability to track data as it is moved between emails, web applications, social media and file sharing Spot use of unsecure or risky cloud application

42 The clear merits One dashboard covering web, email and Cloud Application Control Mobile / BYOD / LAN secured Shared analytics & incident reporting across web, email and applications Cloud deployment model + “private cloud”

43 Unified Security Service www.censornet.com Architecture

44 USS The component technology Control Portal Web Security Cloud Application Control Email Security

45 Configurable Control Portal

46 Cloud based, access from anywhere and any device Configurable dashboard, to suit each business and role Policies can be set by person, role, function, location or device One view of web, email and cloud applications Configurable Control Portal

47 Product Portfolio Overview User requests web resource Proxy delivers web resource Proxy requests web resource Proxy receives web resource User requests web resource Protocol Method URL Query String Post Parameters Headers Web Classification App Classification Unique Architecture CensorNet way User accesses web resource directly Traditional Proxy: The whole web request is downloaded twice, once for the cloud proxy to decide if it is safe and once for the end user Only the information required to decide if the web request is safe is sent to the proxy. If the request is allowed the user goes directly to the website.

48 Product Portfolio Overview User requests web resource Proxy delivers web resource Proxy requests web resource Proxy receives web resource User requests web resource Protocol Method URL Query String Post Parameters Headers Web Classification App Classification Unique Architecture CensorNet way User accesses web resource directly Traditional Proxy: The whole web request is downloaded twice, once for the cloud proxy to decide if it is safe, and once for the end user Only the information required to decide if the web request is safe is sent to the proxy. If the request is allowed the user goes directly to the website. Reduced latency, the users have the same web experience as they would without the security Cloud applications remain location aware for mobile users and don’t take the location of the datacentre Tablets/mobile devises with GPS don’t give false results of identity theft/spoofing

49 Product Portfolio Overview USS Benefits Emergency Inbox E-mail Backup Prevent data loss via email Increase mail server resilience Cloud based Web Security Service Integration via API Endpoint, network, BYOD and roaming user protection Shadow IT Discovery Cloud Application Analysis Forensic Risk Analysis Prevent data loss via apps


Download ppt "Complete Cloud Security Anyone, anywhere, any app, any device."

Similar presentations


Ads by Google