Quarri_Sales_Presentation_6-13x

Download Report

Transcript Quarri_Sales_Presentation_6-13x

Note: You need to
customize slides 2, 5, 7
and 8 before using this
presentation, and delete
slide 1.
Keeping Sensitive Data Secure
Prospect Logo Here
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property
of their respective owners.
Data Loss is Having Devastating Global Impact
Although potentially devastating, these breaches
are preventable, Litan says. "These types of
attacks can be stopped with a layered fraudprevention approach that starts with secure
browsing and includes multiple layers of user and
account monitoring, and appropriate
interventions."
Avivah Litan, Gartner Group “IMF Attack: 1 of Dozens of Breaches?”
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of
their respective owners.
Data Loss Is Expensive
►
Average cost of data breach is $5.4M
►
Human errors cause 35% of data breaches
►
Malicious attacks cause 37% of data breaches
►
Average lost business cost is $3.03M
►
►
►
Greatest risks are third-party applications, remote
employees/mobile devices, cloud computing and removable
media
Average malware incidents have nearly doubled from 27% in
2010 to 43%

50+ malware attempts per month within organizations

Only 40 percent say AV in top five most effective technologies
Web applications are the third most common breach vector
and account for over one-third of data loss1
Ponemon Institute 2013 Cost of Data Breach and 2012 State of the Endpoint Studies
12012
Verizon Data Breach Investigations Report
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of
their respective owners.
Browsers Are The New Security Perimeter
BYOD
Web Apps SaaS
Cloud
►
Browsers are the information consumption platform

►
Enterprise web apps, cloud, BYOD, SaaS services
Browsers are weakest link in security chain

►
Insert
prospect
website
Key loss vector for cybercrime and data theft
Unmanaged devices: little visibility or mitigation control

No knowledge of security state of machine
 No knowledge of user handling of content
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of
their respective owners.
About Quarri Technologies
►
►
Security software that keeps sensitive data secure

Prevent unauthorized use & replication of confidential data

Defend against both external and internal threats

Enable IT to enforce secure web sessions on demand
Headquartered in Austin, TX, USA

Privately held, investor-backed company

Patented, unique web information security technology
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of
their respective owners.
Enforce Secure Web Sessions On Demand
User info controls —
block copy, save, print,
screen capture
Browser
firewall
Keylogger
blocking
SSL Certificate
defenses
MITM
blocking
•
On-the-fly deployment;
no client software to
manage
•
Enforce single web
session usage
•
Centrally log users'
browser-related file
operations
User info controls extend to
Acrobat & MS Office applications
Insert
prospect
website
Frame
Grabber
blocking
Zero hour malware
defenses
Session data
(cookies, cache
file, password
store, history)
encrypted
End of session
data cleanse
Session timers
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of
their respective owners.
How Protect On Q Works
Protect On Q: the world’s only on-the-fly browser security system
Employees
Business Partners
Customers
Web Site Data Center
Insert
prospect
website
2. Enforcement
check (token valid?)
Protect On Q
►
►
Deployable with internal or external apps
Windows, iOS and Android platforms
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of
their respective owners.
Protect On Q Benefits
►
Mitigate Data Loss Risk and Maintain Compliance for
Cloud, SaaS and Web Applications



►
Cost Effective



►
Protect valuable browser-delivered data from being
replicated or stolen by internal and external threats while in
transport and in use
Central log files of user activities for audits
Organization can enforce usage
No client software installation or management
Deploys off existing infrastructure
Subscription pricing by user, not application
Increased Business Productivity

Securely implement BYOD Policies
•

Windows, iOS and Android
Extend data access while managing risk
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of
their respective owners.
Client Use Cases
►
Novartis: Top 5 Global Pharmaceutical


►
Miele: Global Appliance Manufacturer


►
Drug trial information displayed in
SharePoint, Outlook Web Access and
Office Live
Authorized users or malware can extract IP
Call center employees
PCI compliance
Whiting & Partners: Accounting Firm


Secure remote access from client sites to
confidential financial & corporate information
via OWA & Virtual Desktop
Man-in-the-browser attacks and keyloggers
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of
their respective owners.
Client Use Cases
►
US Infrastructure: Energy Company


►
Move With Us: UK Real Estate Firm


►
Information security for documents
accessible through their website
On-the-fly information controls for registered users
Zeus keyloggers, malware and cache mining
for call center employees
PCI compliance
Fisher Accounting: Accounting Firm


Secure remote access from client sites to
confidential financial & corporate information
MitB, keyloggers and data replication
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of
their respective owners.
Quarri Summary
►
►
Protect your most valuable browser-delivered data from
being replicated or stolen by internal and external
threats while in transport and in use.
Quarri enables you to:

Enforce secure web sessions on demand

Prevent unauthorized use & replication of confidential data

Defend against both external and internal threats
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of
their respective owners.
Thank you
Securing Internal Web Applications
POQ enforcement is placed between users and
web app
► Can be deployed directly on web app or HTTP
front end device
► No web app modification required
►
or
POQ Partner
Enforcement Module
POQ Filter Module
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of
their respective owners.
Securing Enterprise SaaS Apps
►
►
►
No need to install POQ at SaaS provider
Secures browser access without need to
proxy connections
No change to web application
Web SSO
Enterprise SaaS (Salesforce
Workday, Google Docs, Office365)
or
POQ Partner
Enforcement Module
POQ Filter Module
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of
their respective owners.
Deploying Protect On Q
POQ Server:
Manager:
-POQ
Provisions
Enforcer to end users
Support
UI for
policy
definition
-- Pulls
policy
from
POQ
Manager
Maintains policies
Enforcer binaries
-- Integrates
with web& apps
Collects POQ
log files
-- Multiple
servers can be deployed
►
►
►
►
►
Web Site Data Center
Software (Java) based solution
All communications via HTTPS
POQ Server
Recommend locating near web services
POQ integration via SOAP or NetScaler
POQ verification via .NET or Java servlet filter modules
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of
their respective owners.
POQ Manager
Third Party Validation
►
Accuvant LABS concluded that the product performed as
advertised and can resist browser-centric attacks:



►
By malware
Efforts by typical users to commit data leakage
Common exploitation approaches in use by a typical advanced
attacker or malware author
Malware Tests Conducted by Malware Research Group
Product
Financial Malware
Windows 7
(32)
Windows 7
(64)
Zeus Malware
Windows 7
(32)
Windows 7
(64)
Zero-hour Financial
Malware
Windows 7
(32)
Prevx
Quarri Protect On Q
Rapport
SandboxIE
SpyShelter
© 2013 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of
their respective owners.
Windows 7
(64)