“i7 networks” manjunath m gowda ceo & co-founder, i7 networks
TRANSCRIPT
![Page 1: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/1.jpg)
“i7 Networks”
Manjunath M GowdaCEO & co-founder, i7 Networks
![Page 2: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/2.jpg)
“If you are an Enterprise allowing BYODs (with or without MDM) to connect to corporate network, then follow me…..”
(else back to your emails on your phone )
![Page 3: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/3.jpg)
“one SSH session from a mobile/tablet is all it takes to
breach your network”
![Page 4: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/4.jpg)
Real story that happened in a US based publicly traded software
product company …..
![Page 5: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/5.jpg)
….
Corporate Network
Firewall
SSH,FTP, ..
SSH, FTP…
Corporate Resources
Malicious APPs
Malicious Server
Reverse SSH Tunnel
SSH
![Page 6: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/6.jpg)
Copyright i7 Networks, i7nw.com
There are 2 ways to protect your network from BYODs :
![Page 7: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/7.jpg)
Copyright i7 Networks, i7nw.com
“To protect themselves against the BYOD threats, organizations:
• need Visibility into precisely • what are these devices, • what are they doing/accessing, and • how to enforce control over these access, • something that can’t be captured with
traditional technologies”
![Page 8: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/8.jpg)
“Introducing i7’s Peregrine7”
Copyright i7 Networks, i7nw.com
![Page 9: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/9.jpg)
Copyright i7 Networks, i7nw.com, [email protected]
Enterprise
MDM manage
d Devices
Unauthorized devices
Unmanaged devices
IoT devices
Unauthorized Apps
Apps from Alternate
Stores
Unsupported-OS devices Compromised
devices
Hot-spotted devices
Rogue/Insecure Devices
Vulnerable Devices
Authorized Apps
SSHSSH
FTP SVN
![Page 10: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/10.jpg)
Copyright i7 Networks, i7nw.com, [email protected]
Enterprise
MDM manage
d Devices
Unauthorized devices
Unmanaged devices
IoT devices
Unauthorized Apps
Apps from Alternate
Stores
Unsupported-OS devices Compromised
devices
Hot-spotted devices
Rogue/Insecure Devices
Vulnerable Devices
Authorized Apps
Peregrine7
SSH
FTP
![Page 11: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/11.jpg)
“We provide complete
Visibility
Unique Device, App & Protocol Fingerprinting
Security & Vulnerability Analysis
Multi-Tier Secure-Granular Access Controls
for all your smart devices and apps”Copyright i7 Networks, i7nw.com
![Page 12: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/12.jpg)
“Our deployment is Super Simple….”
Copyright i7 Networks, i7nw.com
![Page 13: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/13.jpg)
All done 100% Agentless & Non-Intrusive. No app or client to install on the device - Zero-touch/Zero Footprint”
“Appliance connected to span port - hence Zero Latency and hence Zero Risk for IT to try out too!!
Fits into any network
Zero Burden on the IT/Support staff.
Copyright i7 Networks, i7nw.com
![Page 14: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/14.jpg)
Let’s see some of the screen shots of Peregrine7 ……
Copyright i7 Networks, i7nw.com, [email protected]
![Page 15: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/15.jpg)
Copyright i7 Networks, i7nw.com
BYOD inventory analysis
![Page 16: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/16.jpg)
Copyright i7 Networks, i7nw.com
BYOD inventory analysis
![Page 17: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/17.jpg)
Integrates with
![Page 18: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/18.jpg)
• 100% Agentless and non-intrusive (Zero-Footprint)
• Access control while being Offline/out-of-band (Zero Latency)
• Visibility via Hot-spotting & Wi-Fi Sniffing
• App Recognition on the Wire
• Device Compromise Check (Jailbroken/Rooted)
• Close Integration with Google Apps / Exchange / Office365 to provide MDM capabilities
Different from Competition
Copyright i7 Networks, i7nw.com, [email protected]
![Page 19: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/19.jpg)
Paying Customers
Indian Conglomerate with more than 75,000 employees and a multi-billion dollar company; Managing 1500 users for now
Indian services company with more than 1,000 employees and a multi-million dollar company;Managing 1000 users
Indian data center with more than 3,000 employees and a multi-million dollar company;Managing 1000 users
Plus Dozens of large POC customers
Ideation – Jan 2013Released 1.0 – Sept
2013
![Page 20: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/20.jpg)
Awards & Accolades
![Page 21: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/21.jpg)
Investors & Advisors
Manju, CEO & Co-Founder23 yrs. second startupFirst one (s7) got acquired by Bluecoat (Jan 2010) for $8.4MnExtremely good in GTM, Marketing & ExecutingBE, MS (Computer Sc.)MD for Bristol India and Bluecoat IndiaBristol, Wipro, S7, Bluecoat
Sachin, Chief mNetwork Architect, Co-FounderFew patents in the security space12+ years; worked with the team in S7BE (Comp Sc.)S7, Bluecoat
Srinivas, Chief mSecurity Architect, Co-FounderExpert in Cyber security; MS from IIT-B12+ years of exp.Few patents in the security spaceHP, Bluecoat
Jagadish, Senior Principal Engineer5+ years of Exp.Worked in S7 S7, Bluecoat
Geeta, Content-Marketing, inside-sales5+ years of Exp.Iron Mountain, Autonomy, Bluecoat
Brian Nesmith, ex-CEO of Bluecoat Systems, USA
Sharad Sharma, ex-CEO of Yahoo R&D, India
Core Te
am
Team together for second time; 1st venture S7 Software, ran successfully for 6 years & was acquired by Bluecoat Systems from the valley for $8.4Mn
Ofer Elzam, Dir. Network Security Sophos, USA
![Page 23: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/23.jpg)
“Additional Slides…..”
Copyright i7 Networks, i7nw.com
![Page 24: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/24.jpg)
Copyright i7 Networks, i7nw.com, [email protected]
![Page 25: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/25.jpg)
Copyright i7 Networks, i7nw.com, [email protected]
![Page 26: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/26.jpg)
Copyright i7 Networks, i7nw.com, [email protected]
![Page 27: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/27.jpg)
Copyright i7 Networks, i7nw.com, [email protected]
![Page 28: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/28.jpg)
Copyright i7 Networks, i7nw.com
Single device in-depth Security Analysis
![Page 29: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/29.jpg)
Tall Claims!!! but Let’s get drilled into details…..
Copyright i7 Networks, i7nw.com, [email protected]
![Page 30: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/30.jpg)
Continuous Monitoring
2. Complete Visibility & Discovery
3. Detailed Fingerprinting of the device and the Apps
5. Vulnerability and malicious assessment (Intrusions, Trojans)
6. Granular policy enforcement (MULTI-
TIER)
8. Analytics, Log, Audit &
Compliance Reporting
1. Entry Verification – Corporate Wi-Fi or
VPN? Which Wi-Fi?
Deny
4. Compromised (Jailbroken/Rooted),
Unauthorized, Unmanaged, hot-spotting check (Devices & Apps)
Deny
7. Device Management with integration of
Google Apps/Exchange / office 365
![Page 31: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/31.jpg)
Not what the device tells us what it is but we find out what the device it……
Copyright i7 Networks, i7nw.com, [email protected]
![Page 32: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/32.jpg)
DHCP Fingerprinting
TCP/IP fingerprinting
User Agent Analysis
Our Device profile Database Analysis
The Secure Fingerprinting Process
Various other Networking Parameters
![Page 33: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/33.jpg)
What access to allow and what not to allow based on MULTI-TIER:
D = DeviceU = UserA = AppsL = Location of the branch officeT = TimeI = Intrusions, malicious.E = End point integrity (compromised)?R = What Resource?
Copyright i7 Networks, i7nw.com
Granular Policy Enforcement
D
U A
L
TI
E
R
![Page 34: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/34.jpg)
Let me get further deeper into our Security and Vulnerability details…..
Copyright i7 Networks, i7nw.com, [email protected]
![Page 35: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/35.jpg)
Check for internal intrusions-using
BYOD specific internal IDS
Check for malwares n/w signatures, C&C servers against our database +
3rd party
Check for vulnerabilities – CVE and other databases
(DVI*)
Check for Anomalies, Patterns, Issues (port/protocol analysis, Blacklist, C&C, GeoIP) (DTI*)
Security and Vulnerability check
Check for EPP tools, & bad URLs
Check for Jailbroken/Rooted (again agentless)
![Page 36: “i7 Networks” Manjunath M Gowda CEO & co-founder, i7 Networks](https://reader036.vdocuments.site/reader036/viewer/2022081504/56649d1f5503460f949f2a67/html5/thumbnails/36.jpg)
Copyright i7 Networks, i7nw.com