SlideShare una empresa de Scribd logo
1 de 27
Descargar para leer sin conexión
© 2014 CYREN Confidential and
Proprietary
1
25 March 2014 © 2014 CYREN Confidential and
Proprietary
HOW TO LAUNCH WEB SECURITY
IN THE CLOUD - IN AN HOUR
Chris Taylor and Avi Turiel
© 2014 CYREN Confidential and
Proprietary
2
© 2014 CYREN Confidential and
Proprietary
2
WHO WE ARE
© 2014 CYREN Confidential and
Proprietary
3
LEADING PROVIDER OF INTERNET
SECURITY TECHNOLOGY AND
CLOUD-BASED SERVICES
NASDAQ: CYRN
© 2014 CYREN Confidential and
Proprietary
4
WHO WE WORK WITH
© 2014 CYREN Confidential and
Proprietary
5
GLOBAL REACH
OFFICESDATA CENTERS
© 2014 CYREN Confidential and
Proprietary
© 2014 CYREN Confidential and
Proprietary
6
OUR PRODUCTS
WEB
The industry’s broadest and
most actionable security
intelligence combined with
a robust web filtering
platform secures all your
devices, anywhere you go
EMAIL
Not just scanning emails with
open source signatures; we
track and leverage the global
distribution patterns and our
global real-time insight to
stop the bad guys subverting
email
ANTIMALWARE
Our market leading
solutions secure your
platform from threats
without impacting
performance
© 2014 CYREN Confidential and
Proprietary
7
© 2014 CYREN Confidential and
Proprietary
7
WHAT MAKES US
DIFFERENT
© 2014 CYREN Confidential and
Proprietary
8
WHAT MAKES US DIFFERENT
+
SPEED  ACCURACY  REAL-TIME INSIGHT
We see more than anyone else.
RECURRENT PATTERN DETECTION
Our patented detection
technology
GLOBALVIEW™ CLOUD
The most robust transaction base in
the industry
© 2014 CYREN Confidential and
Proprietary
9
 We focus on our core
competencies so you can
focus on yours.
 Products designed for partners
 Won’t compete for your business
COMMITTED TO PARTNER SUCCESS
WHAT MAKES US DIFFERENT
© 2014 CYREN Confidential and
Proprietary
© 2014 CYREN Confidential and
Proprietary
10
POLL QUESTION #1
© 2014 CYREN Confidential and
Proprietary
11
© 2014 CYREN Confidential and
Proprietary
11
MARKET DRIVERS
© 2014 CYREN Confidential and
Proprietary
12
12© 2014 CYREN Confidential and
Proprietary
BYOD AND INCREASED
MOBILITY HAVE CHANGED
THE WAY EMPLOYEES
ACCESS THE INTERNET
THE SECURITY MARKET IS EVOLVING
© 2014 CYREN Confidential and
Proprietary
13
© 2014 CYREN Confidential and
Proprietary
THE SECURITY MARKET IS EVOLVING
LEADING TO INCREASED
COMPLEXITY IN
IMPLEMENTING, MANAGING
AND DEPLOYING
SECURITY SOLUTIONS
© 2014 CYREN Confidential and
Proprietary
14
Source: IDC, June 2013
THE SECURITY MARKET
SAAS IS BY FAR
THE LARGEST
GROWTH
OPPORTUNITY
© 2014 CYREN Confidential and
Proprietary
15
POLL QUESTION #2
© 2014 CYREN Confidential and
Proprietary
16
© 2014 CYREN Confidential and
Proprietary
16
CYREN WEBSECURITY
© 2014 CYREN Confidential and
Proprietary
17
LAUNCH YOUR OWN BRANDED
WEB SECURITY SERVICE WITH
STRONG DIFFERENTIATORS
INTRODUCING CYREN WEBSECURITY
© 2014 CYREN Confidential and
Proprietary
© 2014 CYREN Confidential and
Proprietary
18
SERVICE ARCHITECTURE
GlobalView™
Cloud
GlobalView
Database
Security Scanning
and URL Filtering
Branded Web-based
Provisioning,
Management and
Reporting
Internet
Mobile &
Roaming
Desktops
Routers &
Appliances
HeurisTech
Security
HeurisTech
Security
1. Product is neutral/CYREN branded as standard
2. Partner private labels the service, or,
3. Partner co-brands the service
4. End customers are provisioned and start using the service
© 2014 CYREN Confidential and
Proprietary
19
 Threat-sharing GlobalView network
 Integrated antimalware scanning
 Advanced Threat (APT) Detection (late 2014)
PROVEN CYREN CLOUD-BASED WEB
SECURITY PLATFORM
ADVANCED SECURITY
© 2014 CYREN Confidential and
Proprietary
© 2014 CYREN Confidential and
Proprietary
20
 Android and iOS
 White-labeled app for partner
rebranding
 Rule management for BYOD and
corporate devices
A TOTAL SOLUTION FOR ROAMING
USERS, SMARTPHONES AND TABLETS -
INCLUDING BYOD
MOBILITY
© 2014 CYREN Confidential and
Proprietary
© 2014 CYREN Confidential and
Proprietary
21
 Easy customer
provisioning
 Online private labeling
 Multi-tier management
portal
TRULY INTUITIVE WEB INTERFACE FOR
PARTNERS AND ALL LEVELS OF
ADMINISTRATORS
EASE OF USE
© 2014 CYREN Confidential and
Proprietary
© 2014 CYREN Confidential and
Proprietary
22
© 2014 CYREN Confidential and
Proprietary
22
DEMONSTRATION
© 2014 CYREN Confidential and
Proprietary
23

HeurisTech
Security
Partner
Customer
Office Users Mobile
users
Customer
Partner
Customer
Office users
CYREN WEBSECURITY – PARTNER
McMillan
ENGINEERING
© 2014 CYREN Confidential and
Proprietary
24
POLL QUESTION #3
© 2014 CYREN Confidential and
Proprietary
25
© 2014 CYREN Confidential and
Proprietary
25
RECAP
© 2014 CYREN Confidential and
Proprietary
26
WEB SECURITY OPPORTUNITY
 Partner-ready and partner-friendly revenue opportunity
 Turnkey Web Security recurring revenue
 Business logic enables any go-to-market model or sales ecosystem
 Partner portal for provisioning, management and reporting
 Ease of management / ease of use
 Built to be consumable by SMBs but scalable to the Enterprise
 The best account and end user provisioning experience in the industry
 Easy provisioning and management for corporate users and BYOD devices
 Cloud-based security analysis and detection quality
 Detection you know – already powering solutions across the industry
 Ongoing Innovation – existing and new services such as APT
© 2014 CYREN Confidential and
Proprietary
27
© 2014 CYREN Confidential and
Proprietary
27
THANK YOU.
ANY QUESTIONS?
“We are excited to see the emergence of state-of-the-art cloud
based protection for mobile and roaming users. CYREN
WebSecurity will help MXSweep deliver the easy to consume and
best of breed cloud based security that our customers expect.”
Tom O’Brien
CEO
MXSweep

Más contenido relacionado

Destacado

What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computingKevin Murtha
 
Stateless load balancing - Research overview
Stateless load balancing - Research overviewStateless load balancing - Research overview
Stateless load balancing - Research overviewAndrea Tino
 
Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...
Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...
Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...The Pathway Group
 

Destacado (6)

Presentation2
Presentation2Presentation2
Presentation2
 
Common Online Terminologies
Common Online TerminologiesCommon Online Terminologies
Common Online Terminologies
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
 
Stateless load balancing - Research overview
Stateless load balancing - Research overviewStateless load balancing - Research overview
Stateless load balancing - Research overview
 
Government Jobs India
Government Jobs IndiaGovernment Jobs India
Government Jobs India
 
Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...
Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...
Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...
 

Similar a HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR

Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 
Don't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound SpamDon't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound SpamCyren, Inc
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeDual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeCyren, Inc
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportCyren, Inc
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application EconomyCA Technologies
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of thingsChristian Milde
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Cyren, Inc
 
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things eCornell
 
Developing a 360° view of risk and compliance
Developing a 360° view of risk and complianceDeveloping a 360° view of risk and compliance
Developing a 360° view of risk and complianceInuit AB
 
CipherCloud_Corporate Overview
CipherCloud_Corporate OverviewCipherCloud_Corporate Overview
CipherCloud_Corporate OverviewScott Dierks
 
Leveraging Technology for Government Service Delivery
Leveraging Technology for Government Service DeliveryLeveraging Technology for Government Service Delivery
Leveraging Technology for Government Service DeliveryeGov Magazine
 
10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify service10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify serviceChristine Gupta
 

Similar a HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR (20)

Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
Don't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound SpamDon't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound Spam
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeDual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle Cybercrime
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Appi fi
Appi fiAppi fi
Appi fi
 
Sholove cyren web security presentation2
Sholove cyren web security presentation2Sholove cyren web security presentation2
Sholove cyren web security presentation2
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things
 
Developing a 360° view of risk and compliance
Developing a 360° view of risk and complianceDeveloping a 360° view of risk and compliance
Developing a 360° view of risk and compliance
 
CipherCloud_Corporate Overview
CipherCloud_Corporate OverviewCipherCloud_Corporate Overview
CipherCloud_Corporate Overview
 
Digicomp Citrix Day 2015 : Keynote
Digicomp Citrix Day 2015 : KeynoteDigicomp Citrix Day 2015 : Keynote
Digicomp Citrix Day 2015 : Keynote
 
Leveraging Technology for Government Service Delivery
Leveraging Technology for Government Service DeliveryLeveraging Technology for Government Service Delivery
Leveraging Technology for Government Service Delivery
 
10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify service10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify service
 

Más de Cyren, Inc

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowCyren, Inc
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareCyren, Inc
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksCyren, Inc
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingCyren, Inc
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyCyren, Inc
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatCyren, Inc
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeCyren, Inc
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteCyren, Inc
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportCyren, Inc
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareCyren, Inc
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportCyren, Inc
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015Cyren, Inc
 
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Cyren, Inc
 
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportWebinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportCyren, Inc
 
Insights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportInsights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportCyren, Inc
 
Commtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCommtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCyren, Inc
 
(Full) Compromised Website Report 2012
(Full) Compromised Website Report 2012(Full) Compromised Website Report 2012
(Full) Compromised Website Report 2012Cyren, Inc
 

Más de Cyren, Inc (20)

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to know
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array works
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking survey
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threat
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrime
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsolete
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015
 
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
 
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportWebinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend report
 
Insights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportInsights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend Report
 
Commtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCommtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-final
 
(Full) Compromised Website Report 2012
(Full) Compromised Website Report 2012(Full) Compromised Website Report 2012
(Full) Compromised Website Report 2012
 

Último

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 

Último (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR

  • 1. © 2014 CYREN Confidential and Proprietary 1 25 March 2014 © 2014 CYREN Confidential and Proprietary HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR Chris Taylor and Avi Turiel
  • 2. © 2014 CYREN Confidential and Proprietary 2 © 2014 CYREN Confidential and Proprietary 2 WHO WE ARE
  • 3. © 2014 CYREN Confidential and Proprietary 3 LEADING PROVIDER OF INTERNET SECURITY TECHNOLOGY AND CLOUD-BASED SERVICES NASDAQ: CYRN
  • 4. © 2014 CYREN Confidential and Proprietary 4 WHO WE WORK WITH
  • 5. © 2014 CYREN Confidential and Proprietary 5 GLOBAL REACH OFFICESDATA CENTERS © 2014 CYREN Confidential and Proprietary
  • 6. © 2014 CYREN Confidential and Proprietary 6 OUR PRODUCTS WEB The industry’s broadest and most actionable security intelligence combined with a robust web filtering platform secures all your devices, anywhere you go EMAIL Not just scanning emails with open source signatures; we track and leverage the global distribution patterns and our global real-time insight to stop the bad guys subverting email ANTIMALWARE Our market leading solutions secure your platform from threats without impacting performance
  • 7. © 2014 CYREN Confidential and Proprietary 7 © 2014 CYREN Confidential and Proprietary 7 WHAT MAKES US DIFFERENT
  • 8. © 2014 CYREN Confidential and Proprietary 8 WHAT MAKES US DIFFERENT + SPEED ACCURACY REAL-TIME INSIGHT We see more than anyone else. RECURRENT PATTERN DETECTION Our patented detection technology GLOBALVIEW™ CLOUD The most robust transaction base in the industry
  • 9. © 2014 CYREN Confidential and Proprietary 9  We focus on our core competencies so you can focus on yours.  Products designed for partners  Won’t compete for your business COMMITTED TO PARTNER SUCCESS WHAT MAKES US DIFFERENT © 2014 CYREN Confidential and Proprietary
  • 10. © 2014 CYREN Confidential and Proprietary 10 POLL QUESTION #1
  • 11. © 2014 CYREN Confidential and Proprietary 11 © 2014 CYREN Confidential and Proprietary 11 MARKET DRIVERS
  • 12. © 2014 CYREN Confidential and Proprietary 12 12© 2014 CYREN Confidential and Proprietary BYOD AND INCREASED MOBILITY HAVE CHANGED THE WAY EMPLOYEES ACCESS THE INTERNET THE SECURITY MARKET IS EVOLVING
  • 13. © 2014 CYREN Confidential and Proprietary 13 © 2014 CYREN Confidential and Proprietary THE SECURITY MARKET IS EVOLVING LEADING TO INCREASED COMPLEXITY IN IMPLEMENTING, MANAGING AND DEPLOYING SECURITY SOLUTIONS
  • 14. © 2014 CYREN Confidential and Proprietary 14 Source: IDC, June 2013 THE SECURITY MARKET SAAS IS BY FAR THE LARGEST GROWTH OPPORTUNITY
  • 15. © 2014 CYREN Confidential and Proprietary 15 POLL QUESTION #2
  • 16. © 2014 CYREN Confidential and Proprietary 16 © 2014 CYREN Confidential and Proprietary 16 CYREN WEBSECURITY
  • 17. © 2014 CYREN Confidential and Proprietary 17 LAUNCH YOUR OWN BRANDED WEB SECURITY SERVICE WITH STRONG DIFFERENTIATORS INTRODUCING CYREN WEBSECURITY © 2014 CYREN Confidential and Proprietary
  • 18. © 2014 CYREN Confidential and Proprietary 18 SERVICE ARCHITECTURE GlobalView™ Cloud GlobalView Database Security Scanning and URL Filtering Branded Web-based Provisioning, Management and Reporting Internet Mobile & Roaming Desktops Routers & Appliances HeurisTech Security HeurisTech Security 1. Product is neutral/CYREN branded as standard 2. Partner private labels the service, or, 3. Partner co-brands the service 4. End customers are provisioned and start using the service
  • 19. © 2014 CYREN Confidential and Proprietary 19  Threat-sharing GlobalView network  Integrated antimalware scanning  Advanced Threat (APT) Detection (late 2014) PROVEN CYREN CLOUD-BASED WEB SECURITY PLATFORM ADVANCED SECURITY © 2014 CYREN Confidential and Proprietary
  • 20. © 2014 CYREN Confidential and Proprietary 20  Android and iOS  White-labeled app for partner rebranding  Rule management for BYOD and corporate devices A TOTAL SOLUTION FOR ROAMING USERS, SMARTPHONES AND TABLETS - INCLUDING BYOD MOBILITY © 2014 CYREN Confidential and Proprietary
  • 21. © 2014 CYREN Confidential and Proprietary 21  Easy customer provisioning  Online private labeling  Multi-tier management portal TRULY INTUITIVE WEB INTERFACE FOR PARTNERS AND ALL LEVELS OF ADMINISTRATORS EASE OF USE © 2014 CYREN Confidential and Proprietary
  • 22. © 2014 CYREN Confidential and Proprietary 22 © 2014 CYREN Confidential and Proprietary 22 DEMONSTRATION
  • 23. © 2014 CYREN Confidential and Proprietary 23 HeurisTech Security Partner Customer Office Users Mobile users Customer Partner Customer Office users CYREN WEBSECURITY – PARTNER McMillan ENGINEERING
  • 24. © 2014 CYREN Confidential and Proprietary 24 POLL QUESTION #3
  • 25. © 2014 CYREN Confidential and Proprietary 25 © 2014 CYREN Confidential and Proprietary 25 RECAP
  • 26. © 2014 CYREN Confidential and Proprietary 26 WEB SECURITY OPPORTUNITY  Partner-ready and partner-friendly revenue opportunity  Turnkey Web Security recurring revenue  Business logic enables any go-to-market model or sales ecosystem  Partner portal for provisioning, management and reporting  Ease of management / ease of use  Built to be consumable by SMBs but scalable to the Enterprise  The best account and end user provisioning experience in the industry  Easy provisioning and management for corporate users and BYOD devices  Cloud-based security analysis and detection quality  Detection you know – already powering solutions across the industry  Ongoing Innovation – existing and new services such as APT
  • 27. © 2014 CYREN Confidential and Proprietary 27 © 2014 CYREN Confidential and Proprietary 27 THANK YOU. ANY QUESTIONS? “We are excited to see the emergence of state-of-the-art cloud based protection for mobile and roaming users. CYREN WebSecurity will help MXSweep deliver the easy to consume and best of breed cloud based security that our customers expect.” Tom O’Brien CEO MXSweep