Problem: Without Centraya Gov Authorities Admins Cybercriminals - - PowerPoint PPT Presentation

problem without centraya
SMART_READER_LITE
LIVE PREVIEW

Problem: Without Centraya Gov Authorities Admins Cybercriminals - - PowerPoint PPT Presentation

Problem: Without Centraya Gov Authorities Admins Cybercriminals 2 In Information Protected by Centraya Name: 1Mz First name: 1kHy7h Company: 2owH= Gov Authorities Admins Cybercriminals 3 A Trustful Way


slide-1
SLIDE 1
slide-2
SLIDE 2

Problem: Without Centraya

Gov Authorities Admins Cybercriminals

2

slide-3
SLIDE 3

In Information Protected by Centraya

Gov Authorities Admins Cybercriminals Name: °¿1°Mz¿° First name: °¿1°kHy7h¿° Company: °¿2°owH=¿°

3

slide-4
SLIDE 4

A Trustful Way to the Cloud: CASB

slide-5
SLIDE 5

CASB Technology Overview

On Premise

Hold your own Key

Cloud based

Bring your own Key

Technology Stack: Cloud Traffic Discovery via HTML or API Application Based Field Level Encryption or Tokenization DLP, Threat Prevention Governance Modules

slide-6
SLIDE 6

Centraya Protected Applications

  • Salesforce
  • Salesforce Lightning
  • Salesforce Health Cloud
  • Salesforce Financial Services Cloud
  • Navatargroup FinServ
  • SugarCRM
  • Microsoft Dynamics 365
  • Sharepoint
  • ServiceNow
  • SAP Hybris C4C
  • Xing/LinkedIn
  • Symantec Endpoint Protection Cloud
  • BMC Remedyforce
  • Nimonik
  • Fortinet Analyzer
  • and whatever you need (nearly)

6

slide-7
SLIDE 7

Multi-protocol/content Protection

7

Protocol & Content html smtp xml

  • ftp

html5 json PDF DOCX GZIP XLS CSV Binary REST API custom protocol Protection Mechanism AES256 non deterministic AES256 searchable Password Protected ZIP Dynamic Key Generation Tokenization Dynamic Token Generation Format Preserving Function Preserving Selective Encryption Pseudonymization

slide-8
SLIDE 8

Cloud Access Security Broker

What is a CASB solution?

Visibility

  • Discover

Shadow IT

  • Cloud Usage

Analysis

Compliance

  • Data

Residency & Compliance

  • Risk of

specific cloud services

Data Security

  • Data Policy

Enforcement

  • Prevent

unwanted activity based on classification, discovery and activity monitoring

Threat Protection

  • Prevent

unwanted devices, users and versions of applications

  • Threat

Intelligence and Malware identification

slide-9
SLIDE 9

Market Overview

On Premises Cloud Based App Vendors Centraya (available since 2015) Skyhigh Networks (2011) Salesforce Shield Ciphercloud (2010) Netskope (2012) ServiceNow Edge Encryption Perspecsys (BlueCoat/Symantec 2009) Bitglass (2013) Eperi (2015) Cloudlock (Cisco 2011) Protegrity (1996) Adallom (Microsoft 2012) Elastica (Symantec 2012) Ciphercloud was one of the first products on the market. Currently suffering from major quality issues – customers want to migrate (Novartis, Roche,..). Perspecsys is now named CDP and is positioned as add on product to Elastica. All cloud based offerings are focusing more on governance reporting and less on real protection. App Vendor’s own protection is not getting too much traction outside the US. Customers want/need a third party to protect their data.

slide-10
SLIDE 10

10

Centraya Adaptive Cloud Protection Platform

Centraya Policy Driven Cloud Application Security

Shadow IT Analyzer Cloud Threat Prevention Cloud Data Loss Prevention Governance GDPR Assist Data Privacy Assurance Cloud Access Control Process & Workflow Integration

slide-11
SLIDE 11
slide-12
SLIDE 12