SlideShare ist ein Scribd-Unternehmen logo
1 von 31
www. isheriff .com sales@ isheriff .com Understanding  SaaS Concepts  Web 2.0 Security in 2010
Email & Web 2.0 Security Today ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Email & Web 2.0 Security Today ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The State of Web 2.0 Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The iSheriff Solution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Snapshot Applying iSheriff to your daily Internet use
Twitter / MySpace / Facebook
Twitter / MySpace / Facebook ALERT! The requested URL has been  blocked  by  i Sher i ff URL:  http://newsnet6.com/monies Action: Blocked Reason: Security Risk More >> The website you requested was prevented from loading by  iSheriff Web Security  services as it is considered to be a security compliance risk. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator.
Twitter / MySpace / Facebook ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
YouTube / Streaming Media
YouTube / Streaming Media Access to  youtube.com  is controlled by  i Sher i ff URL:  http://youtube.com Action: Time Quota Restriction – 30 minutes (daily) Category: Social Media TIME REMAINING: 29 minutes More >> Access to the website you requested is controlled by  iSheriff Web Security  in compliance with your employer’s Internet access policies. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator.  OK
YouTube / Streaming Media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sports / News / Entertainment
Sports / News / Entertainment Access to  news.bbc.co.uk/sport  is controlled by  i Sher i ff URL:  http://news.bbc.co.uk/sport Action: Time Access Restriction – Out of Office Hours Category: Sports Restricted Hours: 09:00 – 12:00 / 13:00 – 16:30 hrs / Mon - Fri More >> Access to the website you requested is controlled by  iSheriff Web Security  in compliance with your employer’s Internet access policies. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator.  OK
Sports / News / Entertainment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anonymous Proxy
Anonymous Proxy  ALERT! The requested URL has been  blocked  by  i Sher i ff URL:  http://youhide.com Action: Blocked Reason: Anonymous Proxy More >> The website you requested was prevented from loading by  iSheriff Web Security  services as it is considered to be a security compliance risk. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator.
Anonymous Proxy  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Webmail
Webmail ALERT! An attempted file upload has been  blocked  by  i Sher i ff File:  Customer List (Copy).xlsx Action: Blocked Reason: Restricted File More >> An attempted file upload has been prevented by  iSheriff Web Security  services .  Unauthorized attempts to transmit this file are prohibited by your employer’s data security policy.  This activity has been logged. If you believe that this is an error and need to transmit this file, please advise your Network Administrator.
Webmail ,[object Object],[object Object],[object Object],[object Object]
Spam
Spam Your Blocked Spam Report [email_address] Spam messages blocked for you today:  87  /  105   (83% spam) The emails listed here have been quarantined as spam and will be deleted after 5 days.  From Date Subject [email_address] Today Give her a nice surprise Release  |  Delete [email_address] Today Enlarge your member today Release  |  Delete [email_address] Today Designer Watch Sale Release  |  Delete [email_address] Today You want a mortgage? Release  |  Delete [email_address] Today Prescription Pills delivered Release  |  Delete Showing messages  1  to  5  out of  87 |  Next
Spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Blended Threats
Blended Threats An email addressed to you has been  blocked  by  i Sher i ff [email_address] From:  [email_address] To: [email_address] Subject: MySpace account update Sent: Wed 2:02pm Action: Quarantined Reason: Security Risk More >> An email addressed to you had been quarantined by  iSheriff Email Security  services as it is considered a security compliance risk.  If you believe that this is an error and require the message, please advise your Network Administrator within 7 days before the message is permanently deleted.
Blended Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malware / Virus
Malware / Virus Virus Alert Download of the file  codecinst.exe  has been  blocked  by  i Sher i ff File:  codecinst.exe Action: Blocked Reason: Virus Detected More >> The file you requested was prevented from downloading by  iSheriff Web Security  services as a virus was detected. If you believe that this is an error or require urgent access to this file, please advise your Network Administrator.
Malware / Virus ,[object Object],[object Object],[object Object],[object Object]
www. isheriff .com sales@ isheriff .com Thank you  for your time! For more information Please visit us on the Web or send us an email

Weitere ähnliche Inhalte

Was ist angesagt?

beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
Jack McCullough
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Benedek Menesi
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
Sejahtera Affif
 

Was ist angesagt? (20)

beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
Seminar on Phishing Protection
Seminar on Phishing ProtectionSeminar on Phishing Protection
Seminar on Phishing Protection
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Barracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa PresentationBarracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa Presentation
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Internet safety
Internet safetyInternet safety
Internet safety
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Eseminar1
Eseminar1Eseminar1
Eseminar1
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...
 
M
MM
M
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
 

Andere mochten auch

Andere mochten auch (9)

SaaS E- Book Part 1
SaaS E- Book Part 1SaaS E- Book Part 1
SaaS E- Book Part 1
 
Velocityontwitterforb2b 090309091543 Phpapp02
Velocityontwitterforb2b 090309091543 Phpapp02Velocityontwitterforb2b 090309091543 Phpapp02
Velocityontwitterforb2b 090309091543 Phpapp02
 
Animals
AnimalsAnimals
Animals
 
Animals
AnimalsAnimals
Animals
 
Business Implications Of Multi Tenancy In SaaS
Business Implications Of Multi Tenancy In SaaSBusiness Implications Of Multi Tenancy In SaaS
Business Implications Of Multi Tenancy In SaaS
 
Prezentacja o X11
Prezentacja o X11Prezentacja o X11
Prezentacja o X11
 
Understanding the Business Implications of SaaS Multi-Tenancy
Understanding the Business Implications of SaaS Multi-TenancyUnderstanding the Business Implications of SaaS Multi-Tenancy
Understanding the Business Implications of SaaS Multi-Tenancy
 
Business Case For Multi Tenancy in SaaS
Business Case For Multi Tenancy in SaaSBusiness Case For Multi Tenancy in SaaS
Business Case For Multi Tenancy in SaaS
 
SaaS Business Model: A Unique Business Architecture
SaaS Business Model: A Unique Business ArchitectureSaaS Business Model: A Unique Business Architecture
SaaS Business Model: A Unique Business Architecture
 

Ähnlich wie Understanding SaaS Concepts

Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
mark scott
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
crussell79
 

Ähnlich wie Understanding SaaS Concepts (20)

Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
 
PHISHING PROTECTION
 PHISHING PROTECTION PHISHING PROTECTION
PHISHING PROTECTION
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Office365 from a hacker's perspective: Real-life Threats, Tactics and Remedies
Office365 from a hacker's perspective: Real-life Threats, Tactics and Remedies Office365 from a hacker's perspective: Real-life Threats, Tactics and Remedies
Office365 from a hacker's perspective: Real-life Threats, Tactics and Remedies
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Data security
 Data security  Data security
Data security
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Understanding SaaS Concepts

  • 1. www. isheriff .com sales@ isheriff .com Understanding SaaS Concepts Web 2.0 Security in 2010
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Snapshot Applying iSheriff to your daily Internet use
  • 7. Twitter / MySpace / Facebook
  • 8. Twitter / MySpace / Facebook ALERT! The requested URL has been blocked by i Sher i ff URL: http://newsnet6.com/monies Action: Blocked Reason: Security Risk More >> The website you requested was prevented from loading by iSheriff Web Security services as it is considered to be a security compliance risk. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator.
  • 9.
  • 11. YouTube / Streaming Media Access to youtube.com is controlled by i Sher i ff URL: http://youtube.com Action: Time Quota Restriction – 30 minutes (daily) Category: Social Media TIME REMAINING: 29 minutes More >> Access to the website you requested is controlled by iSheriff Web Security in compliance with your employer’s Internet access policies. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator. OK
  • 12.
  • 13. Sports / News / Entertainment
  • 14. Sports / News / Entertainment Access to news.bbc.co.uk/sport is controlled by i Sher i ff URL: http://news.bbc.co.uk/sport Action: Time Access Restriction – Out of Office Hours Category: Sports Restricted Hours: 09:00 – 12:00 / 13:00 – 16:30 hrs / Mon - Fri More >> Access to the website you requested is controlled by iSheriff Web Security in compliance with your employer’s Internet access policies. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator. OK
  • 15.
  • 17. Anonymous Proxy ALERT! The requested URL has been blocked by i Sher i ff URL: http://youhide.com Action: Blocked Reason: Anonymous Proxy More >> The website you requested was prevented from loading by iSheriff Web Security services as it is considered to be a security compliance risk. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator.
  • 18.
  • 20. Webmail ALERT! An attempted file upload has been blocked by i Sher i ff File: Customer List (Copy).xlsx Action: Blocked Reason: Restricted File More >> An attempted file upload has been prevented by iSheriff Web Security services . Unauthorized attempts to transmit this file are prohibited by your employer’s data security policy. This activity has been logged. If you believe that this is an error and need to transmit this file, please advise your Network Administrator.
  • 21.
  • 22. Spam
  • 23. Spam Your Blocked Spam Report [email_address] Spam messages blocked for you today: 87 / 105 (83% spam) The emails listed here have been quarantined as spam and will be deleted after 5 days. From Date Subject [email_address] Today Give her a nice surprise Release | Delete [email_address] Today Enlarge your member today Release | Delete [email_address] Today Designer Watch Sale Release | Delete [email_address] Today You want a mortgage? Release | Delete [email_address] Today Prescription Pills delivered Release | Delete Showing messages 1 to 5 out of 87 | Next
  • 24.
  • 26. Blended Threats An email addressed to you has been blocked by i Sher i ff [email_address] From: [email_address] To: [email_address] Subject: MySpace account update Sent: Wed 2:02pm Action: Quarantined Reason: Security Risk More >> An email addressed to you had been quarantined by iSheriff Email Security services as it is considered a security compliance risk. If you believe that this is an error and require the message, please advise your Network Administrator within 7 days before the message is permanently deleted.
  • 27.
  • 29. Malware / Virus Virus Alert Download of the file codecinst.exe has been blocked by i Sher i ff File: codecinst.exe Action: Blocked Reason: Virus Detected More >> The file you requested was prevented from downloading by iSheriff Web Security services as a virus was detected. If you believe that this is an error or require urgent access to this file, please advise your Network Administrator.
  • 30.
  • 31. www. isheriff .com sales@ isheriff .com Thank you for your time! For more information Please visit us on the Web or send us an email