“i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

36
“i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks

Transcript of “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Page 1: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

“i7 Networks”

Manjunath M GowdaCEO & co-founder, i7 Networks

Page 2: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

“If you are an Enterprise allowing BYODs (with or without MDM) to connect to corporate network, then follow me…..”

(else back to your emails on your phone )

Page 3: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

“one SSH session from a mobile/tablet is all it takes to

breach your network”

Page 4: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Real story that happened in a US based publicly traded software

product company …..

Page 5: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

….

Corporate Network

Firewall

SSH,FTP, ..

SSH, FTP…

Corporate Resources

Malicious APPs

Malicious Server

Reverse SSH Tunnel

SSH

Page 6: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Copyright i7 Networks, i7nw.com

There are 2 ways to protect your network from BYODs :

Page 7: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Copyright i7 Networks, i7nw.com

“To protect themselves against the BYOD threats, organizations:

• need Visibility into precisely • what are these devices, • what are they doing/accessing, and • how to enforce control over these access, • something that can’t be captured with

traditional technologies”

Page 8: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

“Introducing i7’s Peregrine7”

Copyright i7 Networks, i7nw.com

Page 9: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Copyright i7 Networks, i7nw.com, [email protected]

Enterprise

MDM manage

d Devices

Unauthorized devices

Unmanaged devices

IoT devices

Unauthorized Apps

Apps from Alternate

Stores

Unsupported-OS devices Compromised

devices

Hot-spotted devices

Rogue/Insecure Devices

Vulnerable Devices

Authorized Apps

SSHSSH

FTP SVN

Page 10: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Copyright i7 Networks, i7nw.com, [email protected]

Enterprise

MDM manage

d Devices

Unauthorized devices

Unmanaged devices

IoT devices

Unauthorized Apps

Apps from Alternate

Stores

Unsupported-OS devices Compromised

devices

Hot-spotted devices

Rogue/Insecure Devices

Vulnerable Devices

Authorized Apps

Peregrine7

SSH

FTP

Page 11: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

“We provide complete

Visibility

Unique Device, App & Protocol Fingerprinting

Security & Vulnerability Analysis

Multi-Tier Secure-Granular Access Controls

for all your smart devices and apps”Copyright i7 Networks, i7nw.com

Page 12: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

“Our deployment is Super Simple….”

Copyright i7 Networks, i7nw.com

Page 13: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

All done 100% Agentless & Non-Intrusive. No app or client to install on the device - Zero-touch/Zero Footprint”

“Appliance connected to span port - hence Zero Latency and hence Zero Risk for IT to try out too!!

Fits into any network

Zero Burden on the IT/Support staff.

Copyright i7 Networks, i7nw.com

Page 14: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Let’s see some of the screen shots of Peregrine7 ……

Copyright i7 Networks, i7nw.com, [email protected]

Page 15: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Copyright i7 Networks, i7nw.com

BYOD inventory analysis

Page 16: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Copyright i7 Networks, i7nw.com

BYOD inventory analysis

Page 17: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Integrates with

Page 18: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

• 100% Agentless and non-intrusive (Zero-Footprint)

• Access control while being Offline/out-of-band (Zero Latency)

• Visibility via Hot-spotting & Wi-Fi Sniffing

• App Recognition on the Wire

• Device Compromise Check (Jailbroken/Rooted)

• Close Integration with Google Apps / Exchange / Office365 to provide MDM capabilities

Different from Competition

Copyright i7 Networks, i7nw.com, [email protected]

Page 19: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Paying Customers

Indian Conglomerate with more than 75,000 employees and a multi-billion dollar company; Managing 1500 users for now

Indian services company with more than 1,000 employees and a multi-million dollar company;Managing 1000 users

Indian data center with more than 3,000 employees and a multi-million dollar company;Managing 1000 users

Plus Dozens of large POC customers

Ideation – Jan 2013Released 1.0 – Sept

2013

Page 20: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Awards & Accolades

Page 21: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Investors & Advisors

Manju, CEO & Co-Founder23 yrs. second startupFirst one (s7) got acquired by Bluecoat (Jan 2010) for $8.4MnExtremely good in GTM, Marketing & ExecutingBE, MS (Computer Sc.)MD for Bristol India and Bluecoat IndiaBristol, Wipro, S7, Bluecoat

Sachin, Chief mNetwork Architect, Co-FounderFew patents in the security space12+ years; worked with the team in S7BE (Comp Sc.)S7, Bluecoat

Srinivas, Chief mSecurity Architect, Co-FounderExpert in Cyber security; MS from IIT-B12+ years of exp.Few patents in the security spaceHP, Bluecoat

Jagadish, Senior Principal Engineer5+ years of Exp.Worked in S7 S7, Bluecoat

Geeta, Content-Marketing, inside-sales5+ years of Exp.Iron Mountain, Autonomy, Bluecoat

Brian Nesmith, ex-CEO of Bluecoat Systems, USA

Sharad Sharma, ex-CEO of Yahoo R&D, India

Core Te

am

Team together for second time; 1st venture S7 Software, ran successfully for 6 years & was acquired by Bluecoat Systems from the valley for $8.4Mn

Ofer Elzam, Dir. Network Security Sophos, USA

Page 22: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Questions?

Copyright i7 Networks, i7nw.com

[email protected]@i7networks

Page 23: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

“Additional Slides…..”

Copyright i7 Networks, i7nw.com

Page 24: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Copyright i7 Networks, i7nw.com, [email protected]

Page 25: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Copyright i7 Networks, i7nw.com, [email protected]

Page 26: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Copyright i7 Networks, i7nw.com, [email protected]

Page 27: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Copyright i7 Networks, i7nw.com, [email protected]

Page 28: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Copyright i7 Networks, i7nw.com

Single device in-depth Security Analysis

Page 29: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Tall Claims!!! but Let’s get drilled into details…..

Copyright i7 Networks, i7nw.com, [email protected]

Page 30: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Continuous Monitoring

2. Complete Visibility & Discovery

3. Detailed Fingerprinting of the device and the Apps

5. Vulnerability and malicious assessment (Intrusions, Trojans)

6. Granular policy enforcement (MULTI-

TIER)

8. Analytics, Log, Audit &

Compliance Reporting

1. Entry Verification – Corporate Wi-Fi or

VPN? Which Wi-Fi?

Deny

4. Compromised (Jailbroken/Rooted),

Unauthorized, Unmanaged, hot-spotting check (Devices & Apps)

Deny

7. Device Management with integration of

Google Apps/Exchange / office 365

Page 31: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Not what the device tells us what it is but we find out what the device it……

Copyright i7 Networks, i7nw.com, [email protected]

Page 32: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

DHCP Fingerprinting

TCP/IP fingerprinting

User Agent Analysis

Our Device profile Database Analysis

The Secure Fingerprinting Process

Various other Networking Parameters

Page 33: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

What access to allow and what not to allow based on MULTI-TIER:

D = DeviceU = UserA = AppsL = Location of the branch officeT = TimeI = Intrusions, malicious.E = End point integrity (compromised)?R = What Resource?

Copyright i7 Networks, i7nw.com

Granular Policy Enforcement

D

U A

L

TI

E

R

Page 34: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Let me get further deeper into our Security and Vulnerability details…..

Copyright i7 Networks, i7nw.com, [email protected]

Page 35: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Check for internal intrusions-using

BYOD specific internal IDS

Check for malwares n/w signatures, C&C servers against our database +

3rd party

Check for vulnerabilities – CVE and other databases

(DVI*)

Check for Anomalies, Patterns, Issues (port/protocol analysis, Blacklist, C&C, GeoIP) (DTI*)

Security and Vulnerability check

Check for EPP tools, & bad URLs

Check for Jailbroken/Rooted (again agentless)

Page 36: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks.

Copyright i7 Networks, i7nw.com