16
1 Thursday, March 24, 2022 © 2014 CYREN Confidential and Proprietary CYBERSECURITY OF THINGS A PRACTICAL LOOK AT THE INTERNET OF THINGS AND CYBERSECURITY Christian Milde Sales Director – DACH

Cyren cybersecurity of things

Embed Size (px)

Citation preview

1April 14, 2023 © 2014 CYREN Confidential and Proprietary

CYBERSECURITY OF THINGSA PRACTICAL LOOK AT THE INTERNET OF THINGS AND CYBERSECURITY

Christian MildeSales Director – DACH

© 2014 CYREN Confidential and Proprietary2

FRISK with Frisk founded 1989 (Iceland)

2012 Acquired by Commtouch (CYREN) First engine which used heuristic

technologies The only company which not had to buy

other engines

ABOUT CYREN = FOUNDATION OF 3 COMPANIES

1991 Founded 2010 Acquisition of Command AV 2012 Acquisition of FRISK 2012 Acquisition of Eleven 2014 CYREN renaming

Founded 2001 eXpurgate email security, used by

over 45,000 companies dominating email security in

Germany with 60% market share Processing more than 1 billion

emails per day in Germany

3

©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

CYREN POWERS THE WORLD’S SECURITY

Our Cyber Intelligence is the security foundation of many of the world’s largest and most influential information technology and Internet brands.

4© 2015 CYREN Confidential and Proprietary

4

IOT MARKET

5

©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

THE INTERNET OF THINGS IN 2020 - ACCORDING TO GARTNER

Over 25 BILLION IoT devices

Less than 5% of IoT connections will go through SIM-based, M2M cellular services

Over a quarter billion connected cars with automated driving capabilities

900 Exhibitors at CES 2015 were manufacturers of IoT devices

Today‘s hype will be mature within 5 years

6

Q&A FROM OUR CUSTOMERS

7

STATISTICS

Cybersecurity is the fastest growing risk for any business

While 73% of businesses don‘t have a plan for upcoming threats

Our analytics show Germany is the prime market for botnet origin email harvester with 73% followed by China with only 9%!

Source: Allianz

8© 2015 CYREN Confidential and Proprietary

8

CYBERSECURITYOF THINGS

9

IOT CYBERCECURITY BASICS

Device manufacturer must use: Secure boot Code hardening Access control Device authentication Secure provisioning

Despite this, devices will still be hacked… Poor Password Protection Firmware Exploit— hack in Firmware Bugs and Vulnerabilities at the access or

programming code

10

APPLIED CYBER INTELLIGENCE IS THE WAY FORWARD

APPLICATIONPolicy, Enforcement, Logging, Alerting, Reporting

ANALYSISRPD, Heuristics, Signature, Human, etc.

DATA17 BILLION transactions per day

SENSORS500 THOUSAND points of presence, protecting 600 MILLION users

Use

r Val

ue

SECURITYApplied

Cyber Intelligence

INSIGHTCyber Intelligence

Pre-Compromise Compromise Post-Compromise

Reconnaissance Weaponization Delivery Exploitation Installation Command & Control

Actions on Target

Stop the Cyber Kill Chain

11

CYREN BY NUMBERS

Inspection

Detection

Collection

SPEED, ACCURACY, AND REAL-TIME INSIGHT

12

©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Data Collection

Data Analysis

Solutions

ConsumptionCyber Feeds Software Development Kit Software as a Service

Products

- Advanced Malware dataset- Advanced Phishing dataset- Zero-hour threats- IP Reputation dataset- URL Categorization DB

- IP Reputation- Antispam SDK- Antivirus SDK- URL Categorization SDK

- Web Security- Email Security

Predictive / reputational dataZero Hour Threat Detection

Local and global threat patternsHTTP / IP Categorization

HTTPSMTP

IPDNS

0%10%

20%30%

40%50%

60%70%

80%90%

100%

CYREN’S INTELLIGENCE

13

FLEXIBLE DEPLOYMENT OPTIONS

99% queries answered via local cache Compatible with most Operating Systems For devices which regularly contact outside

networks

100% of queries are directed to the cloud from device

For devices which rarely contact outside networks and with low resources

Cyber Threat Protection

WebSecurity

OUTBOUND Botnet C&C Traffic, Malicious URL / IP, Spam

Virus, Adware, Spyware, Malicious Scripts, Emails INBOUND

14

PLACING CYBERSECURTY OF THINGS

1. Device Communication Analysis

2. Real time inspection in GlobalView Cloud

3. Detect communication to malicious IP, URL, etc.

4. Notify device / manufacturer for reset or remediation

ISP

32

41

15

JOIN AND WIN WITH US

Improved End-User Satisfaction

Increased Revenue

Product Differentiation

Sales, Marketing and Technical Support

CYREN helps you satisfy your customers’ needs, ensuring their users are protected on any device, from any location.

Be the first to market with best-of breed Internet security technology.

CYREN ensures you have everything you need to support your sales model.

Our products are easily integrated to ensure cost-effectiveness, scalability, and momentum.

16© 2015 CYREN Confidential and Proprietary

16

BE SAFE, FEEL GOOD.

You can also find us here:

www.CYREN.com

twitter.com/cyreninc

linkedin.com/company/cyren

Christian Milde

Sales Director - DACH

+49 1520 1647 213

[email protected]