Screenshots i7 peregrine7 - Agentless BYOD security tool
-
Upload
i7networks -
Category
Technology
-
view
364 -
download
1
description
Transcript of Screenshots i7 peregrine7 - Agentless BYOD security tool
Peregrine7 Screenshots
Peregrine7 helps protect Enterprise network from malicious/infected BYODs
Copyright i7 Networks, i7nw.com
Manjunath M GowdaCEO, i7 NetworksBangalore, India
manju_s7in/manjunathgowda/
Copyright i7 Networks, i7nw.com
COMPLETE BYOD INVENTORY SCREENSHOT
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
This alerts are the BYOD specific from added,
modified and curated SNORT specific to BYODs and very
specific to Internal originated threats
Copyright i7 Networks, i7nw.com
DEEP DIVE OF A DEVICE DETAILS
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
COMPLETE VULNERABILITIES LIST
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.co
COMPLETE DEVICE DETAILS
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
BANDWIDTH USAGE OF ALL BYODS, INCLUDING INTERNAL SERVER USAGE & LOGS
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
BYOD SPECIFIC POLICY – DRAG & DROP; ACTS LIKE INTERNAL BYOD FIREWALL AND GATEWAY
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com