SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
© 2014 CYREN Confidential and
Proprietary
1
25 March 2014 © 2014 CYREN Confidential and
Proprietary
HOW TO LAUNCH WEB SECURITY
IN THE CLOUD - IN AN HOUR
Chris Taylor and Avi Turiel
© 2014 CYREN Confidential and
Proprietary
2
© 2014 CYREN Confidential and
Proprietary
2
WHO WE ARE
© 2014 CYREN Confidential and
Proprietary
3
LEADING PROVIDER OF INTERNET
SECURITY TECHNOLOGY AND
CLOUD-BASED SERVICES
NASDAQ: CYRN
© 2014 CYREN Confidential and
Proprietary
4
WHO WE WORK WITH
© 2014 CYREN Confidential and
Proprietary
5
GLOBAL REACH
OFFICESDATA CENTERS
© 2014 CYREN Confidential and
Proprietary
© 2014 CYREN Confidential and
Proprietary
6
OUR PRODUCTS
WEB
The industry’s broadest and
most actionable security
intelligence combined with
a robust web filtering
platform secures all your
devices, anywhere you go
EMAIL
Not just scanning emails with
open source signatures; we
track and leverage the global
distribution patterns and our
global real-time insight to
stop the bad guys subverting
email
ANTIMALWARE
Our market leading
solutions secure your
platform from threats
without impacting
performance
© 2014 CYREN Confidential and
Proprietary
7
© 2014 CYREN Confidential and
Proprietary
7
WHAT MAKES US
DIFFERENT
© 2014 CYREN Confidential and
Proprietary
8
WHAT MAKES US DIFFERENT
+
SPEED  ACCURACY  REAL-TIME INSIGHT
We see more than anyone else.
RECURRENT PATTERN DETECTION
Our patented detection
technology
GLOBALVIEW™ CLOUD
The most robust transaction base in
the industry
© 2014 CYREN Confidential and
Proprietary
9
 We focus on our core
competencies so you can
focus on yours.
 Products designed for partners
 Won’t compete for your business
COMMITTED TO PARTNER SUCCESS
WHAT MAKES US DIFFERENT
© 2014 CYREN Confidential and
Proprietary
© 2014 CYREN Confidential and
Proprietary
10
POLL QUESTION #1
© 2014 CYREN Confidential and
Proprietary
11
© 2014 CYREN Confidential and
Proprietary
11
MARKET DRIVERS
© 2014 CYREN Confidential and
Proprietary
12
12© 2014 CYREN Confidential and
Proprietary
BYOD AND INCREASED
MOBILITY HAVE CHANGED
THE WAY EMPLOYEES
ACCESS THE INTERNET
THE SECURITY MARKET IS EVOLVING
© 2014 CYREN Confidential and
Proprietary
13
© 2014 CYREN Confidential and
Proprietary
THE SECURITY MARKET IS EVOLVING
LEADING TO INCREASED
COMPLEXITY IN
IMPLEMENTING, MANAGING
AND DEPLOYING
SECURITY SOLUTIONS
© 2014 CYREN Confidential and
Proprietary
14
Source: IDC, June 2013
THE SECURITY MARKET
SAAS IS BY FAR
THE LARGEST
GROWTH
OPPORTUNITY
© 2014 CYREN Confidential and
Proprietary
15
POLL QUESTION #2
© 2014 CYREN Confidential and
Proprietary
16
© 2014 CYREN Confidential and
Proprietary
16
CYREN WEBSECURITY
© 2014 CYREN Confidential and
Proprietary
17
LAUNCH YOUR OWN BRANDED
WEB SECURITY SERVICE WITH
STRONG DIFFERENTIATORS
INTRODUCING CYREN WEBSECURITY
© 2014 CYREN Confidential and
Proprietary
© 2014 CYREN Confidential and
Proprietary
18
SERVICE ARCHITECTURE
GlobalView™
Cloud
GlobalView
Database
Security Scanning
and URL Filtering
Branded Web-based
Provisioning,
Management and
Reporting
Internet
Mobile &
Roaming
Desktops
Routers &
Appliances
HeurisTech
Security
HeurisTech
Security
1. Product is neutral/CYREN branded as standard
2. Partner private labels the service, or,
3. Partner co-brands the service
4. End customers are provisioned and start using the service
© 2014 CYREN Confidential and
Proprietary
19
 Threat-sharing GlobalView network
 Integrated antimalware scanning
 Advanced Threat (APT) Detection (late 2014)
PROVEN CYREN CLOUD-BASED WEB
SECURITY PLATFORM
ADVANCED SECURITY
© 2014 CYREN Confidential and
Proprietary
© 2014 CYREN Confidential and
Proprietary
20
 Android and iOS
 White-labeled app for partner
rebranding
 Rule management for BYOD and
corporate devices
A TOTAL SOLUTION FOR ROAMING
USERS, SMARTPHONES AND TABLETS -
INCLUDING BYOD
MOBILITY
© 2014 CYREN Confidential and
Proprietary
© 2014 CYREN Confidential and
Proprietary
21
 Easy customer
provisioning
 Online private labeling
 Multi-tier management
portal
TRULY INTUITIVE WEB INTERFACE FOR
PARTNERS AND ALL LEVELS OF
ADMINISTRATORS
EASE OF USE
© 2014 CYREN Confidential and
Proprietary
© 2014 CYREN Confidential and
Proprietary
22
© 2014 CYREN Confidential and
Proprietary
22
DEMONSTRATION
© 2014 CYREN Confidential and
Proprietary
23

HeurisTech
Security
Partner
Customer
Office Users Mobile
users
Customer
Partner
Customer
Office users
CYREN WEBSECURITY – PARTNER
McMillan
ENGINEERING
© 2014 CYREN Confidential and
Proprietary
24
POLL QUESTION #3
© 2014 CYREN Confidential and
Proprietary
25
© 2014 CYREN Confidential and
Proprietary
25
RECAP
© 2014 CYREN Confidential and
Proprietary
26
WEB SECURITY OPPORTUNITY
 Partner-ready and partner-friendly revenue opportunity
 Turnkey Web Security recurring revenue
 Business logic enables any go-to-market model or sales ecosystem
 Partner portal for provisioning, management and reporting
 Ease of management / ease of use
 Built to be consumable by SMBs but scalable to the Enterprise
 The best account and end user provisioning experience in the industry
 Easy provisioning and management for corporate users and BYOD devices
 Cloud-based security analysis and detection quality
 Detection you know – already powering solutions across the industry
 Ongoing Innovation – existing and new services such as APT
© 2014 CYREN Confidential and
Proprietary
27
© 2014 CYREN Confidential and
Proprietary
27
THANK YOU.
ANY QUESTIONS?
“We are excited to see the emergence of state-of-the-art cloud
based protection for mobile and roaming users. CYREN
WebSecurity will help MXSweep deliver the easy to consume and
best of breed cloud based security that our customers expect.”
Tom O’Brien
CEO
MXSweep

Mais conteúdo relacionado

Destaque

What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computingKevin Murtha
 
Stateless load balancing - Research overview
Stateless load balancing - Research overviewStateless load balancing - Research overview
Stateless load balancing - Research overviewAndrea Tino
 
Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...
Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...
Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...The Pathway Group
 

Destaque (6)

Presentation2
Presentation2Presentation2
Presentation2
 
Common Online Terminologies
Common Online TerminologiesCommon Online Terminologies
Common Online Terminologies
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
 
Stateless load balancing - Research overview
Stateless load balancing - Research overviewStateless load balancing - Research overview
Stateless load balancing - Research overview
 
Government Jobs India
Government Jobs IndiaGovernment Jobs India
Government Jobs India
 
Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...
Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...
Pathway Professional - Certificate to teach in the Lifelong Learning Sector c...
 

Semelhante a HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR

Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 
Don't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound SpamDon't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound SpamCyren, Inc
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeDual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeCyren, Inc
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportCyren, Inc
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application EconomyCA Technologies
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of thingsChristian Milde
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Cyren, Inc
 
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things eCornell
 
Developing a 360° view of risk and compliance
Developing a 360° view of risk and complianceDeveloping a 360° view of risk and compliance
Developing a 360° view of risk and complianceInuit AB
 
CipherCloud_Corporate Overview
CipherCloud_Corporate OverviewCipherCloud_Corporate Overview
CipherCloud_Corporate OverviewScott Dierks
 
Leveraging Technology for Government Service Delivery
Leveraging Technology for Government Service DeliveryLeveraging Technology for Government Service Delivery
Leveraging Technology for Government Service DeliveryeGov Magazine
 
10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify service10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify serviceChristine Gupta
 

Semelhante a HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR (20)

Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
Don't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound SpamDon't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound Spam
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeDual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle Cybercrime
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Appi fi
Appi fiAppi fi
Appi fi
 
Sholove cyren web security presentation2
Sholove cyren web security presentation2Sholove cyren web security presentation2
Sholove cyren web security presentation2
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things
 
Developing a 360° view of risk and compliance
Developing a 360° view of risk and complianceDeveloping a 360° view of risk and compliance
Developing a 360° view of risk and compliance
 
CipherCloud_Corporate Overview
CipherCloud_Corporate OverviewCipherCloud_Corporate Overview
CipherCloud_Corporate Overview
 
Digicomp Citrix Day 2015 : Keynote
Digicomp Citrix Day 2015 : KeynoteDigicomp Citrix Day 2015 : Keynote
Digicomp Citrix Day 2015 : Keynote
 
Leveraging Technology for Government Service Delivery
Leveraging Technology for Government Service DeliveryLeveraging Technology for Government Service Delivery
Leveraging Technology for Government Service Delivery
 
10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify service10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify service
 

Mais de Cyren, Inc

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowCyren, Inc
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareCyren, Inc
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksCyren, Inc
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingCyren, Inc
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyCyren, Inc
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatCyren, Inc
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeCyren, Inc
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteCyren, Inc
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportCyren, Inc
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareCyren, Inc
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportCyren, Inc
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015Cyren, Inc
 
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Cyren, Inc
 
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportWebinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportCyren, Inc
 
Insights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportInsights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportCyren, Inc
 
Commtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCommtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCyren, Inc
 
(Full) Compromised Website Report 2012
(Full) Compromised Website Report 2012(Full) Compromised Website Report 2012
(Full) Compromised Website Report 2012Cyren, Inc
 

Mais de Cyren, Inc (20)

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to know
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array works
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking survey
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threat
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrime
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsolete
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015
 
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
 
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportWebinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend report
 
Insights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportInsights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend Report
 
Commtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCommtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-final
 
(Full) Compromised Website Report 2012
(Full) Compromised Website Report 2012(Full) Compromised Website Report 2012
(Full) Compromised Website Report 2012
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR

  • 1. © 2014 CYREN Confidential and Proprietary 1 25 March 2014 © 2014 CYREN Confidential and Proprietary HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR Chris Taylor and Avi Turiel
  • 2. © 2014 CYREN Confidential and Proprietary 2 © 2014 CYREN Confidential and Proprietary 2 WHO WE ARE
  • 3. © 2014 CYREN Confidential and Proprietary 3 LEADING PROVIDER OF INTERNET SECURITY TECHNOLOGY AND CLOUD-BASED SERVICES NASDAQ: CYRN
  • 4. © 2014 CYREN Confidential and Proprietary 4 WHO WE WORK WITH
  • 5. © 2014 CYREN Confidential and Proprietary 5 GLOBAL REACH OFFICESDATA CENTERS © 2014 CYREN Confidential and Proprietary
  • 6. © 2014 CYREN Confidential and Proprietary 6 OUR PRODUCTS WEB The industry’s broadest and most actionable security intelligence combined with a robust web filtering platform secures all your devices, anywhere you go EMAIL Not just scanning emails with open source signatures; we track and leverage the global distribution patterns and our global real-time insight to stop the bad guys subverting email ANTIMALWARE Our market leading solutions secure your platform from threats without impacting performance
  • 7. © 2014 CYREN Confidential and Proprietary 7 © 2014 CYREN Confidential and Proprietary 7 WHAT MAKES US DIFFERENT
  • 8. © 2014 CYREN Confidential and Proprietary 8 WHAT MAKES US DIFFERENT + SPEED ACCURACY REAL-TIME INSIGHT We see more than anyone else. RECURRENT PATTERN DETECTION Our patented detection technology GLOBALVIEW™ CLOUD The most robust transaction base in the industry
  • 9. © 2014 CYREN Confidential and Proprietary 9  We focus on our core competencies so you can focus on yours.  Products designed for partners  Won’t compete for your business COMMITTED TO PARTNER SUCCESS WHAT MAKES US DIFFERENT © 2014 CYREN Confidential and Proprietary
  • 10. © 2014 CYREN Confidential and Proprietary 10 POLL QUESTION #1
  • 11. © 2014 CYREN Confidential and Proprietary 11 © 2014 CYREN Confidential and Proprietary 11 MARKET DRIVERS
  • 12. © 2014 CYREN Confidential and Proprietary 12 12© 2014 CYREN Confidential and Proprietary BYOD AND INCREASED MOBILITY HAVE CHANGED THE WAY EMPLOYEES ACCESS THE INTERNET THE SECURITY MARKET IS EVOLVING
  • 13. © 2014 CYREN Confidential and Proprietary 13 © 2014 CYREN Confidential and Proprietary THE SECURITY MARKET IS EVOLVING LEADING TO INCREASED COMPLEXITY IN IMPLEMENTING, MANAGING AND DEPLOYING SECURITY SOLUTIONS
  • 14. © 2014 CYREN Confidential and Proprietary 14 Source: IDC, June 2013 THE SECURITY MARKET SAAS IS BY FAR THE LARGEST GROWTH OPPORTUNITY
  • 15. © 2014 CYREN Confidential and Proprietary 15 POLL QUESTION #2
  • 16. © 2014 CYREN Confidential and Proprietary 16 © 2014 CYREN Confidential and Proprietary 16 CYREN WEBSECURITY
  • 17. © 2014 CYREN Confidential and Proprietary 17 LAUNCH YOUR OWN BRANDED WEB SECURITY SERVICE WITH STRONG DIFFERENTIATORS INTRODUCING CYREN WEBSECURITY © 2014 CYREN Confidential and Proprietary
  • 18. © 2014 CYREN Confidential and Proprietary 18 SERVICE ARCHITECTURE GlobalView™ Cloud GlobalView Database Security Scanning and URL Filtering Branded Web-based Provisioning, Management and Reporting Internet Mobile & Roaming Desktops Routers & Appliances HeurisTech Security HeurisTech Security 1. Product is neutral/CYREN branded as standard 2. Partner private labels the service, or, 3. Partner co-brands the service 4. End customers are provisioned and start using the service
  • 19. © 2014 CYREN Confidential and Proprietary 19  Threat-sharing GlobalView network  Integrated antimalware scanning  Advanced Threat (APT) Detection (late 2014) PROVEN CYREN CLOUD-BASED WEB SECURITY PLATFORM ADVANCED SECURITY © 2014 CYREN Confidential and Proprietary
  • 20. © 2014 CYREN Confidential and Proprietary 20  Android and iOS  White-labeled app for partner rebranding  Rule management for BYOD and corporate devices A TOTAL SOLUTION FOR ROAMING USERS, SMARTPHONES AND TABLETS - INCLUDING BYOD MOBILITY © 2014 CYREN Confidential and Proprietary
  • 21. © 2014 CYREN Confidential and Proprietary 21  Easy customer provisioning  Online private labeling  Multi-tier management portal TRULY INTUITIVE WEB INTERFACE FOR PARTNERS AND ALL LEVELS OF ADMINISTRATORS EASE OF USE © 2014 CYREN Confidential and Proprietary
  • 22. © 2014 CYREN Confidential and Proprietary 22 © 2014 CYREN Confidential and Proprietary 22 DEMONSTRATION
  • 23. © 2014 CYREN Confidential and Proprietary 23 HeurisTech Security Partner Customer Office Users Mobile users Customer Partner Customer Office users CYREN WEBSECURITY – PARTNER McMillan ENGINEERING
  • 24. © 2014 CYREN Confidential and Proprietary 24 POLL QUESTION #3
  • 25. © 2014 CYREN Confidential and Proprietary 25 © 2014 CYREN Confidential and Proprietary 25 RECAP
  • 26. © 2014 CYREN Confidential and Proprietary 26 WEB SECURITY OPPORTUNITY  Partner-ready and partner-friendly revenue opportunity  Turnkey Web Security recurring revenue  Business logic enables any go-to-market model or sales ecosystem  Partner portal for provisioning, management and reporting  Ease of management / ease of use  Built to be consumable by SMBs but scalable to the Enterprise  The best account and end user provisioning experience in the industry  Easy provisioning and management for corporate users and BYOD devices  Cloud-based security analysis and detection quality  Detection you know – already powering solutions across the industry  Ongoing Innovation – existing and new services such as APT
  • 27. © 2014 CYREN Confidential and Proprietary 27 © 2014 CYREN Confidential and Proprietary 27 THANK YOU. ANY QUESTIONS? “We are excited to see the emergence of state-of-the-art cloud based protection for mobile and roaming users. CYREN WebSecurity will help MXSweep deliver the easy to consume and best of breed cloud based security that our customers expect.” Tom O’Brien CEO MXSweep