INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats. COPYRIGHT 2015 isheriff, INC.
isheriff BACKGROUND isheriff is a leading cloud-based cyber-security company. Our unique cloud-based platform and global security network deliver multi-layered threat protection to thousands of organizations around the world. We are ranked #1 in anti-malware effectiveness, and provide our customers with the easiest, best and most cost-effective way to protect their data and devices from cyber-threats. isheriff Cloud Security leverages the power and flexibility of a cloud computing platform with the delivery of true multi-layered protection through the integration of three critical security technologies: Web Security Real-time malware protection, content filtering, application control and data leak prevention Endpoint Security Advanced anti-malware protection and application controls Email Security Anti-spam, anti-phishing, malware protection, data leak prevention and email archiving This combination of cloud delivery, multi-layered security and integrated policies ensures isheriff Cloud Security keeps pace with the changing nature of threats, blocks those threats before they ever get to an organization s network or devices, and keeps users protected wherever they are. isheriff has been recognized and honored by analysts and publications including IDC, SC Magazine, Infotech Partners, Infosecurity Products Guide and Networks Product Guide. COPYRIGHT 2015 isheriff, INC. 2
TODAY S SECURITY CHALLENGE Cyber-threats continue to increase in both volume and sophistication, often employing multiple attack vectors in parallel. A typical advanced attack might start by targeting individuals within an organization through spear-phishing (phishing is proving to be an increasing effective entry point for attacks, with over 23% of recipients open phishing emails, and 11% clicking on phishing attachments ). One of the phishing targets then clicks on a link to a malicious page, which then downloads an exploit onto the their device (nearly 70% of attacks involve inadvertent download of a malicious file from an infected web site). This malicious application then opens a backdoor for the attacker to ultimately gain access to the target organization s entire network, leading to exfiltration of sensitive data or other forms of compromise. A breach can have disastrous effects as the median time between a breach occurring and its discovery is around 3 months, with almost 50% of breaches resulting in the loss of personally identifiable information and other critical data. Roaming users are a significant and growing part of the problem. The security industry has invested heavily in ever more sophisticated ways to defend the network, applications and data from attack. Customers have scrambled to keep pace, investing in defense-in-depth architectures to beef up their perimeter. Yet it is a common matter for users to get unknowingly, and unintentionally, infected with malware whilst off-network. Coming back into the office, the roaming user passes literally right under the nose of the ever-watchful network security team (and their banks of perimeter security appliances and infrastructure)! Once the infected device is inside the network, the malware can easily spider out and gain access to sensitive internal systems. The unfortunate reality for most organizations is that they do not have the expertise, personnel or resources to cope with this increasingly complex and dangerous threat landscape. Organizations of all sizes must take a serious look at their cyber-security strategy, processes and infrastructure. It s no longer good enough to say this won t happen to me. It is also no longer good enough to trust your security to the cheapest or lowest-common denominator legacy products. The costs of a breach, in terms of reputational and financial damage, can be devastating. isheriff is here to help with a true multi-layered, cloud-based, security service that is rated #1 in the industry in detecting and blocking new threats. We look forward to talking with you about how we can help. COPYRIGHT 2015 isheriff, INC. 3
WHY isheriff CLOUD SECURITY? VALUE PROPOSITION isheriff s cloud-based multi-layered security service offers a superior approach over traditional perimeter and host-based security models by providing: Simplified security management More effective threat detection & remediation Better economics for lower total cost of ownership isheriff DELIVERS SIMPLIFIED SECURITY MANAGEMENT DRAMATICALLY SIMPLER DEPLOYMENT. By utilizing a cloud-based architecture, isheriff Cloud Security can be deployed across an organization in a matter of hours rather than the days or weeks that are typical for software and appliance implementations. There are no lengthy downloads or hardware installations, or memory and network intensive processes. Remote deployments can also be performed efficiently in even the most complex environments. Equally important the same solution can be used for Windows, Mac and Linux devices. ONE SET OF ENFORCEABLE POLICIES. With isheriff Cloud Security policy can be set once at the cloud level and applied and enforced instantly, locking down threat vectors and access points, providing administrative consistency and ensuring there are no security gaps. This capability is becoming more critical with regulatory compliance and data protection requirements driving the need for security policies that can be enforced across the organization. CENTRALIZED CONFIGURATION. One of the most common security flaws is human error - a security policy is misconfigured or simply forgotten. With isheriff Cloud Security, security is managed at the cloud level thus ensuring continuous and consistent security policy enforcement across all devices. This capability is especially important in the configuration and management of remote devices, which now can be managed without the need for in-person access. COPYRIGHT 2015 isheriff, INC. 4
isheriff DELIVERS BETTER SECURITY MULTI-LAYERED PROTECTION. Today s threats are no longer the simple viruses most security products were designed to block. They are delivered through the web and web-based emails, and use multiple vectors of attack - an infected Web site, a viral attachment, an offer to click through to a compromised website. With users increasingly accessing corporate data and business applications over the Web, strong protection at the network and browser level has become critical. isheriff Cloud Security integrates advanced real-time anti-malware, secure web filtering, and email protection to identify and block these complex attacks. STOPS THREATS BEFORE THEY REACH THE ENDPOINT. Most security products are designed to attempt to stop threats at the perimeter or endpoint level. isheriff identifies and blocks bad actors at the cloud level and prevents attacks from ever reaching your network or endpoint devices. THE MOST ADVANCED ANTI-MALWARE TECHNOLOGY. The heart of most competing security software programs is the anti-malware engine, a piece of code written to detect and stop malware. Unfortunately, that code is typically several years old; any fixes require a separate download, and major changes cannot be performed without a complete upgrade or repurchase of the software. In contrast, with isheriff Cloud Security, the latest security advances are applied instantaneously through the cloud, without the lengthy update and product refresh cycles required in legacy appliance and software solutions. isheriff Cloud Security is always up to date, keeping pace with the changing nature of threats, and has been rated #1 in effectiveness against new and emerging threats by Virus Bulletin. PROTECTS ALL YOUR DEVICES. The days of the ubiquitous and standard Windows desktop are over. Today most professionals use a combination of devices and operating systems. However, the security industry requires customers to purchase several different security programs to safeguard these devices. isheriff s lightweight endpoint anti-malware agent can be deployed on all of your devices at no extra cost. PROTECTS ROAMING USERS. Most security solutions are designed to provide protection within the confines of the corporate network. However, today s professionals are increasingly working remotely, at home, while travelling, or at the corner café. With isheriff Cloud Security, users remain fully protected COPYRIGHT 2015 isheriff, INC. 5
even when they are connecting to the Internet from outside of the corporate network. Security policies and protection are consistently applied wherever, or however, users are connecting to the Internet. GRANULAR APPLICATION CONTROLS. Proliferation of application vulnerabilities requires the identification and prioritization of risks and control of which applications are allowed to operate on devices within the business. Popular applications, such as file sharing, remote desktop access and instant messaging, have been proven to create significant security vulnerabilities. isheriff Cloud Security allows policy-based enforcement of which applications may be used at the group and user level. DEEP SECURITY INSIGHT. isheriff Cloud Security delivers comprehensive visibility across all of a customer s Web and Email traffic and devices, allowing unparalleled insight into emerging threats, and the flexibility and speed to rapidly adapt defenses. isheriff DELIVERS SUPERIOR ECONOMICS NO NEED FOR NEW HARDWARE. With isheriff Cloud Security there is no hardware to own and manage and no complex software to deploy and maintain. LOWER TOTAL COST OF OWNERSHIP. Studies estimate that 80% of the cost of an organization s devices are attributable to the numerous help desk calls, maintenance calls, software patches, and other time sinks handled by IT support. isheriff Cloud Security s simple cloud-based deployment and management significantly reduces help desk calls, install problems, and maintenance - reducing total cost of ownership by up to 80%. FEWER INTEGRATION HEADACHES AND EXPENSES. Organizations have typically relied on security point solutions from multiple vendors, or even from the same vendor, which require resources to implement, manage and monitor and requiring multiple licenses and complex integration. isheriff Cloud Security has integrated the capabilities of three solutions into a single service and can integrate new technologies at the cloud level for its customers. FLEXIBLE LICENSING MODEL. The flexible isheriff Cloud Security subscription plan allows customers to scale their usage as their needs change, and provides access to the same powerful technology whether they have 10 users or 10,000. COPYRIGHT 2015 isheriff, INC. 6
OTHER KEY FEATURES & BENEFITS GLOBAL CLOUD NETWORK Global data center coverage Direct connections with more than 1,000 access points Support for end user roaming on world-wide basis Private backbone network, not shared with public Internet traffic EASE OF USE Powerful and intuitive Web console, with flexible drag & drop configurability Full integration with all major directory services for hassle-free set-up and group/user maintenance Comprehensive and configurable reporting and analytics across all policies, security vectors and directory elements Policy enforcement through real-time reporting and alerting Lightweight endpoint anti-malware agent deployable on all current version of Windows, Mac and Linux COMPREHENSIVE SECURITY CONTROLS Highly configurable content filtering, based on isheriff s proprietary URL database and real-time dynamic Web content classification ensuring that acceptable use policies are enforced Highly flexible application controls, enabling policy enforcement for application permissions Bandwidth controls, enabling management of bandwidth usage through policy Data leak protection for data-in-motion across both Web and Email transport layers, to ensure that sensitive corporate information is kept secure ADDITIONAL BENEFITS Multi-tenant management framework and dashboard, enabling management of deployment, policies and reporting for MSPs, VARs and distributed organizations through an integrated Webbased console Unlimited Email archiving, and e-discoverability COPYRIGHT 2015 isheriff, INC. 7
isheriff SUPPORT & SERVICE isheriff offers free customer support and service on a 24x7 basis around the globe. Our support and service organization is available to help with any of the following: Design a security solution customized to meet the needs of your business Provide full security assessments as well as demos and trials of our solutions Engage and manage any tech support, license or account management questions Provide the latest information on current threats Help select the right channel partner for your specific needs Provide you with the highest levels of personal service in the industry Develop a Cloud Security strategy Share product road maps and future release schedules Provide competitive pricing, references and free trial accounts FREE TRIAL isheriff Cloud Security can be easily and freely evaluated. Just provide us with some simple details through the form below and we can have a free 15-day trial of isheriff Cloud Security up and running for you within 24 hours. There is no obligation to purchase and it is quick and easy to disconnect the service if you don t wish to continue. Sign up now at http: /info.isheriff.com/freetrial.html LEARN MORE To learn more about isheriff Cloud Security, visit http: /www.isheriff.com To contact sales, call 1.650.412.4450 or email sales@isheriff.com ABOUT ISHERIFF isheriff is the leading provider of content and endpoint security from the cloud. We keep organizations and individuals safe from cybercrime, malware and digital threats. Thousands of businesses across a wide array of industries have deployed our solutions, including some of the most sophisticated buyers of security technology worldwide. isheriff has operations in New York, California, Ireland and Asia. COPYRIGHT 2015 isheriff, INC. 8
Learn more by visiting www.isheriff.com 2015 isheriff. isheriff is a registered trademark of isheriff. All other trademarks are the property of their respective owners. Specifications subject to change without notice. All rights reserved.