Upload
i7networks
View
364
Download
1
Tags:
Embed Size (px)
DESCRIPTION
This shows detailed screenshots of i7's peregrine7 - an AGENTLESS BYOD security too. Peregrine7 discovers, detailed fingerprints and even checks the security/threat status of the device (compromised, vulnerable, malicious, intrusive etc) and then based on the threat status allow/deny the device connecting to corporate network. We also detect apps on the wire. We support irrespective of how the device enters the corporate network - via Corporate Wi-Fi or via public Wi-Fi or 3G/4G/LTE (VPN). All done 100% agentless and non-intrusive what we call ZERO-TOUCH and our deployment is completely out-of-band and hence we don't introduce any latency and we connect to the SPAM or Mirror port and we call it ZERO-LATENCY. We also detect whether any anti-virus software is installed on the device what we call the posture assessment. Our value proposition is that “We protect your network from malicious/infected BYODs” “We Protect the Enterprise Network” by Detect & Fingerprint1 all personal devices Prevent the malicious devices from connecting 100% Agentless (Zero-touch) Zero-Latency Deployment Provide detailed Compliance Reports “To Know & To Protect” 1 Secure detection & fingerprinting (US patent pending) The Questions we answer are: What devices are getting into the network? Who do they belong to? Are they infected? Are they compromised or malicious? How vulnerable are they? What are they accessing? What apps* are they running? Can I control the access? Can I get Compliance audit reports?
Citation preview
Peregrine7 Screenshots
Peregrine7 helps protect Enterprise network from malicious/infected BYODs
Copyright i7 Networks, i7nw.com
Manjunath M GowdaCEO, i7 NetworksBangalore, India
manju_s7in/manjunathgowda/
Copyright i7 Networks, i7nw.com
COMPLETE BYOD INVENTORY SCREENSHOT
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
This alerts are the BYOD specific from added,
modified and curated SNORT specific to BYODs and very
specific to Internal originated threats
Copyright i7 Networks, i7nw.com
DEEP DIVE OF A DEVICE DETAILS
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
COMPLETE VULNERABILITIES LIST
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.co
COMPLETE DEVICE DETAILS
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
BANDWIDTH USAGE OF ALL BYODS, INCLUDING INTERNAL SERVER USAGE & LOGS
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com
BYOD SPECIFIC POLICY – DRAG & DROP; ACTS LIKE INTERNAL BYOD FIREWALL AND GATEWAY
Copyright i7 Networks, i7nw.com
Copyright i7 Networks, i7nw.com