SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Confidential and Proprietary
SHOLOVE WEBSECURITY
Sholove International LLC.
“Extend Your Reach!”
Cloud & Mobile Services
www.sholove.org
480.553.9709
Confidential and Proprietary
WHAT MAKES US
DIFFERENT
Confidential and Proprietary
WHAT MAKES US DIFFERENT
SPEED  ACCURACY  REAL-TIME INSIGHT
We see more than anyone else.
+ RECURRENT PATTERN DETECTION
Our patented detection
technology
GLOBALVIEW™ CLOUD
The most robust transaction base in
the industry
Confidential and Proprietary
BUSINESS DRIVERS
Confidential and Proprietary
5
Confidential and Proprietary
• Naive End Users and Disgruntled Employees
• There’s No Perimeter to Protect
• Mobile Devices are Quickly Becoming Ideal Entry Points
• Loss of Mobile Devices
• Lack of Layered Defense
• Cyber-Criminals are Vastly Underestimated
• Users Don’t Keep Up with New Tactics
• Apps Aren't Secure
• For the Enterprise: Biometric Security
• Is the Government Watching?
BYOD AND INCREASED MOBILITY HAVE CHANGED THE WAY EMPLOYEES ACCESS THE
INTERNET
THE SECURITY CHALLENGE
Confidential and Proprietary
THE SECURITY CHALLENGE
THIS EXPLOSION HAS CREATED A CONTROL GAP
 Do I know what we are using
the Internet for?
 How do I protect my critical
business and customer data?
 How do I protect all these
devices?
 How do I ensure I don’t have
compliance/liability issues?
Confidential and Proprietary
THE POTENTIAL FOR THREATS IS GREATER THAN EVER
THE SECURITY CHALLENGE
“83% of small and medium sized
businesses have no formal
cyber security plan”¹
“72% of small and medium sized
organizations reported a data breach
in the last year”²
“Research sets the average annual
cost to small businesses of fraud and
online crime is $6,500 per year”³
¹ N a t i o n a l C y b e r S e c u r i t y
A l l i a n c e
2 0 1 2
² V e r i z o n D a t a B r e a c h
I n v e s t i g a t i o n R e p o r t 2 0 1 2
³ F e d e r a t i o n o f S m a l l
B u s i n e s s e s
2 0 1 3
Confidential and ProprietaryConfidential and Proprietary
THE SECURITY CHALLENGE
THIS LEADS TO INCREASED
COMPLEXITY IN
IMPLEMENTING, MANAGING
AND DEPLOYING
SECURITY SOLUTIONS
Confidential and Proprietary
THE SECURITY CHALLENGE
THE STATUS QUO ISN’T
GOOD ENOUGH ANYMORE.
SECURITY MUST EVOLVE TO REFLECT THESE CHANGES.
Confidential and Proprietary
Confidential and Proprietary
WEBSECURITY
Confidential and Proprietary
BENEFITS
 Industry-leading detection
 A ‘clean’ Internet connection
 Deploys in 3 clicks
 Instant control and visibility of all business web use
 Easy, intuitive management
 Only pay for what you use
Secure browsing from any device, anywhere - however you want.
 A total solution for roaming users, smartphones and tablets - including BYOD
 An intuitive customer experience – easy to set up and manage
SHOLOVE WEBSECURITY
CLOUD & MOBILE SERVICES WWW.SHOLOVE.ORG
Confidential and Proprietary
 Built on a cloud-based threat-sharing platform
 Integrated anti-malware scanning
 Designed for ease of use – no specialized skills
PROVEN CLOUD-BASED WEB SECURITY
ADVANCED SECURITY
Confidential and Proprietary
Confidential and Proprietary
 Android and iOS
 White-labeled app for partner
rebranding
 Rule management for BYOD and
corporate devices
A TOTAL SOLUTION FOR ROAMING
USERS, SMARTPHONES AND TABLETS -
INCLUDING BYOD
MOBILITY
© 2014 CYREN Confidential and
Proprietary
Confidential and Proprietary
 System setup in a few
clicks
 Management portal
TRULY INTUITIVE WEB INTERFACE
FOR ALL LEVELS OF USER
EASE OF USE
© 2014 CYREN Confidential and
Proprietary
Confidential and Proprietary
WALKTHROUGH
Confidential and Proprietary
SHOLOVE WEBSECURITY – CUSTOMER DASHBOARD OF WEB ACTIVITY
Confidential and Proprietary
SHOLOVE WEBSECURITY – CUSTOMER DEFINES USERS AND MOBILE/BYOD
Confidential and Proprietary
DEFINE SECURITY POLICY
Confidential and Proprietary
APPLY POLICY TO USERS – INCLUDING ROAMING/BYOD
Confidential and Proprietary
DETAILED REPORTING
Confidential and Proprietary
SHOLOVE WEBSECURITY – EMPLOYEES OF CUSTOMER MCMILLAN ENGINEERING BLOCKED FROM ACCESSING A SITE
Confidential and Proprietary
RECAP
Confidential and Proprietary
SUMMARY
 The business computing model has changed
 On-demand applications and infrastructure are widely used
 Mobile (laptop/tablet/smartphone) devices are common
 Connection to systems outside the office is the norm
 Security has not kept pace with this change
 Security has lagged behind in covering the new technologies
 The classic ‘security perimeter’ is irrelevant to every day business
 Small and medium sized businesses are a primary target for
cyber criminals
 They offer a better ROI than consumers and Enterprises, at a lower cost
 Sholove WebSecurity solves the small and medium sized
business security challenge
 Proven, effective protection - on any device, anywhere
 3-click deployment, easy intuitive management
Confidential and Proprietary
THANK YOU.
ANY QUESTIONS?
Sholove International LLC.
“Extend Your Reach!”
Cloud & Mobile Services
www.sholove.org
480.553.9709 or info@Sholove.com
Confidential and Proprietary
ENGAGE
SHOLOVE/CYREN WEB SECURITY
ANNUAL CLOUD BASED WEB SECURITY PROVIDES THE “LAYERED SECURITY” COVERAGE FOR UP TO 5 DEVICES PER LICENSE
LICENSES ARE ON ANNUAL AGREEMENT FOR ONLY $99 + TAX OR ASK US FOR A MONTHLY QUOTE FOR BUSINESSES
SECURE YOUR DEVICES TODAY AND PAY IN 6 MONTHS USING PAYPAL CREDIT
WANT IT FREE? GET YOU ANNUAL SOLUTION TODAY AND REFER 10 PEOPLE THAT PURCHASE PROTECTION
SHOLOVE WILL REFUND YOUR $99 (MINUS TAX) DIRECTLY TO YOU.
CALL OR EMAIL TODAY!!!

Weitere ähnliche Inhalte

Was ist angesagt?

Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Indus Khaitan
 
I3 Technologies Corporation Profile
I3 Technologies Corporation ProfileI3 Technologies Corporation Profile
I3 Technologies Corporation Profile
jaymieann
 

Was ist angesagt? (20)

Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present Danger
 
Iiwari's solution for social distancing
Iiwari's solution for social distancingIiwari's solution for social distancing
Iiwari's solution for social distancing
 
Mobility solutions with shore tel v1
Mobility solutions with shore tel v1Mobility solutions with shore tel v1
Mobility solutions with shore tel v1
 
Building the Anytime, Anywhere Network
Building the Anytime, Anywhere NetworkBuilding the Anytime, Anywhere Network
Building the Anytime, Anywhere Network
 
OpenTouch 2.1 Fosters Innovation and Growth
OpenTouch 2.1 Fosters Innovation and GrowthOpenTouch 2.1 Fosters Innovation and Growth
OpenTouch 2.1 Fosters Innovation and Growth
 
Implementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD EraImplementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD Era
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
Straight Up Technologies - Salt Lake City Smart Cities
Straight Up Technologies - Salt Lake City Smart Cities Straight Up Technologies - Salt Lake City Smart Cities
Straight Up Technologies - Salt Lake City Smart Cities
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
Service_iOmando_ENG 2
Service_iOmando_ENG 2Service_iOmando_ENG 2
Service_iOmando_ENG 2
 
Bmit meet theexperts_2013
Bmit meet theexperts_2013Bmit meet theexperts_2013
Bmit meet theexperts_2013
 
Surfing Safe on the Road
Surfing Safe on the RoadSurfing Safe on the Road
Surfing Safe on the Road
 
IoT in Home Automation: Create an Ultimate IoT Smart Home
IoT in Home Automation: Create an Ultimate IoT Smart HomeIoT in Home Automation: Create an Ultimate IoT Smart Home
IoT in Home Automation: Create an Ultimate IoT Smart Home
 
Auth shield information security solution provider for banking sector in india
Auth shield  information security solution provider for banking sector in indiaAuth shield  information security solution provider for banking sector in india
Auth shield information security solution provider for banking sector in india
 
Digital workplace security for gen z
Digital workplace security for gen zDigital workplace security for gen z
Digital workplace security for gen z
 
I3 Technologies Corporation Profile
I3 Technologies Corporation ProfileI3 Technologies Corporation Profile
I3 Technologies Corporation Profile
 
UL TS - CSA NL SUMMIT
UL TS - CSA NL SUMMITUL TS - CSA NL SUMMIT
UL TS - CSA NL SUMMIT
 

Andere mochten auch

The unpleasant smell of pets
The unpleasant smell of petsThe unpleasant smell of pets
The unpleasant smell of pets
Maria Gravino
 
Visionary Leader of the Year
Visionary Leader of the YearVisionary Leader of the Year
Visionary Leader of the Year
cjohns56
 
Xv beogradska gimnazija nemanja glumac
Xv beogradska gimnazija   nemanja glumacXv beogradska gimnazija   nemanja glumac
Xv beogradska gimnazija nemanja glumac
Nemanja Glumac
 
Diary entries presentation
Diary entries presentationDiary entries presentation
Diary entries presentation
Talia Gal-Or
 
Královéhradecký kraj
Královéhradecký krajKrálovéhradecký kraj
Královéhradecký kraj
Aprochazkova
 

Andere mochten auch (16)

Above the line
Above the lineAbove the line
Above the line
 
Metodología del plan
Metodología del plan Metodología del plan
Metodología del plan
 
Sholove cyber security 101 28 june 2015
Sholove cyber security 101 28 june 2015Sholove cyber security 101 28 june 2015
Sholove cyber security 101 28 june 2015
 
Chindogu2013
Chindogu2013Chindogu2013
Chindogu2013
 
The unpleasant smell of pets
The unpleasant smell of petsThe unpleasant smell of pets
The unpleasant smell of pets
 
Hiv
HivHiv
Hiv
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Chindogu2
Chindogu2Chindogu2
Chindogu2
 
Bolo chá de bebê
Bolo chá de bebêBolo chá de bebê
Bolo chá de bebê
 
Visionary Leader of the Year
Visionary Leader of the YearVisionary Leader of the Year
Visionary Leader of the Year
 
Xv beogradska gimnazija nemanja glumac
Xv beogradska gimnazija   nemanja glumacXv beogradska gimnazija   nemanja glumac
Xv beogradska gimnazija nemanja glumac
 
Diary entries presentation
Diary entries presentationDiary entries presentation
Diary entries presentation
 
2.rocas y aridos[1]
2.rocas y aridos[1]2.rocas y aridos[1]
2.rocas y aridos[1]
 
Matematika 8
Matematika 8Matematika 8
Matematika 8
 
sillas
sillassillas
sillas
 
Královéhradecký kraj
Královéhradecký krajKrálovéhradecký kraj
Královéhradecký kraj
 

Ähnlich wie Sholove cyren web security presentation2

Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
Cyren, Inc
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
Hai Nguyen
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE코리아
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 

Ähnlich wie Sholove cyren web security presentation2 (20)

Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
CYRENWebSecurity
CYRENWebSecurityCYRENWebSecurity
CYRENWebSecurity
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
2012 ah emea deploying byod
2012 ah emea   deploying byod2012 ah emea   deploying byod
2012 ah emea deploying byod
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 

Kürzlich hochgeladen

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Kürzlich hochgeladen (6)

Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdf
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 

Sholove cyren web security presentation2

  • 1. Confidential and Proprietary SHOLOVE WEBSECURITY Sholove International LLC. “Extend Your Reach!” Cloud & Mobile Services www.sholove.org 480.553.9709
  • 3. Confidential and Proprietary WHAT MAKES US DIFFERENT SPEED ACCURACY REAL-TIME INSIGHT We see more than anyone else. + RECURRENT PATTERN DETECTION Our patented detection technology GLOBALVIEW™ CLOUD The most robust transaction base in the industry
  • 5. Confidential and Proprietary 5 Confidential and Proprietary • Naive End Users and Disgruntled Employees • There’s No Perimeter to Protect • Mobile Devices are Quickly Becoming Ideal Entry Points • Loss of Mobile Devices • Lack of Layered Defense • Cyber-Criminals are Vastly Underestimated • Users Don’t Keep Up with New Tactics • Apps Aren't Secure • For the Enterprise: Biometric Security • Is the Government Watching? BYOD AND INCREASED MOBILITY HAVE CHANGED THE WAY EMPLOYEES ACCESS THE INTERNET THE SECURITY CHALLENGE
  • 6. Confidential and Proprietary THE SECURITY CHALLENGE THIS EXPLOSION HAS CREATED A CONTROL GAP  Do I know what we are using the Internet for?  How do I protect my critical business and customer data?  How do I protect all these devices?  How do I ensure I don’t have compliance/liability issues?
  • 7. Confidential and Proprietary THE POTENTIAL FOR THREATS IS GREATER THAN EVER THE SECURITY CHALLENGE “83% of small and medium sized businesses have no formal cyber security plan”¹ “72% of small and medium sized organizations reported a data breach in the last year”² “Research sets the average annual cost to small businesses of fraud and online crime is $6,500 per year”³ ¹ N a t i o n a l C y b e r S e c u r i t y A l l i a n c e 2 0 1 2 ² V e r i z o n D a t a B r e a c h I n v e s t i g a t i o n R e p o r t 2 0 1 2 ³ F e d e r a t i o n o f S m a l l B u s i n e s s e s 2 0 1 3
  • 8. Confidential and ProprietaryConfidential and Proprietary THE SECURITY CHALLENGE THIS LEADS TO INCREASED COMPLEXITY IN IMPLEMENTING, MANAGING AND DEPLOYING SECURITY SOLUTIONS
  • 9. Confidential and Proprietary THE SECURITY CHALLENGE THE STATUS QUO ISN’T GOOD ENOUGH ANYMORE. SECURITY MUST EVOLVE TO REFLECT THESE CHANGES. Confidential and Proprietary
  • 11. Confidential and Proprietary BENEFITS  Industry-leading detection  A ‘clean’ Internet connection  Deploys in 3 clicks  Instant control and visibility of all business web use  Easy, intuitive management  Only pay for what you use Secure browsing from any device, anywhere - however you want.  A total solution for roaming users, smartphones and tablets - including BYOD  An intuitive customer experience – easy to set up and manage SHOLOVE WEBSECURITY CLOUD & MOBILE SERVICES WWW.SHOLOVE.ORG
  • 12. Confidential and Proprietary  Built on a cloud-based threat-sharing platform  Integrated anti-malware scanning  Designed for ease of use – no specialized skills PROVEN CLOUD-BASED WEB SECURITY ADVANCED SECURITY Confidential and Proprietary
  • 13. Confidential and Proprietary  Android and iOS  White-labeled app for partner rebranding  Rule management for BYOD and corporate devices A TOTAL SOLUTION FOR ROAMING USERS, SMARTPHONES AND TABLETS - INCLUDING BYOD MOBILITY © 2014 CYREN Confidential and Proprietary
  • 14. Confidential and Proprietary  System setup in a few clicks  Management portal TRULY INTUITIVE WEB INTERFACE FOR ALL LEVELS OF USER EASE OF USE © 2014 CYREN Confidential and Proprietary
  • 16. Confidential and Proprietary SHOLOVE WEBSECURITY – CUSTOMER DASHBOARD OF WEB ACTIVITY
  • 17. Confidential and Proprietary SHOLOVE WEBSECURITY – CUSTOMER DEFINES USERS AND MOBILE/BYOD
  • 19. Confidential and Proprietary APPLY POLICY TO USERS – INCLUDING ROAMING/BYOD
  • 21. Confidential and Proprietary SHOLOVE WEBSECURITY – EMPLOYEES OF CUSTOMER MCMILLAN ENGINEERING BLOCKED FROM ACCESSING A SITE
  • 23. Confidential and Proprietary SUMMARY  The business computing model has changed  On-demand applications and infrastructure are widely used  Mobile (laptop/tablet/smartphone) devices are common  Connection to systems outside the office is the norm  Security has not kept pace with this change  Security has lagged behind in covering the new technologies  The classic ‘security perimeter’ is irrelevant to every day business  Small and medium sized businesses are a primary target for cyber criminals  They offer a better ROI than consumers and Enterprises, at a lower cost  Sholove WebSecurity solves the small and medium sized business security challenge  Proven, effective protection - on any device, anywhere  3-click deployment, easy intuitive management
  • 24. Confidential and Proprietary THANK YOU. ANY QUESTIONS? Sholove International LLC. “Extend Your Reach!” Cloud & Mobile Services www.sholove.org 480.553.9709 or info@Sholove.com
  • 25. Confidential and Proprietary ENGAGE SHOLOVE/CYREN WEB SECURITY ANNUAL CLOUD BASED WEB SECURITY PROVIDES THE “LAYERED SECURITY” COVERAGE FOR UP TO 5 DEVICES PER LICENSE LICENSES ARE ON ANNUAL AGREEMENT FOR ONLY $99 + TAX OR ASK US FOR A MONTHLY QUOTE FOR BUSINESSES SECURE YOUR DEVICES TODAY AND PAY IN 6 MONTHS USING PAYPAL CREDIT WANT IT FREE? GET YOU ANNUAL SOLUTION TODAY AND REFER 10 PEOPLE THAT PURCHASE PROTECTION SHOLOVE WILL REFUND YOUR $99 (MINUS TAX) DIRECTLY TO YOU. CALL OR EMAIL TODAY!!!

Hinweis der Redaktion

  1. Introduce our product… Built to address the problems and challenges we just described. Built to speed the adoption of effective security in today’s world Including industry-leading protection from a proven provider of security technology And delivered in a partner-friendly business model (soft-pedal this at this point)
  2. Simple one time authentication Encrypted (SSL) traffic inspection Local traffic routing nodes – minimum latency Roaming users browse in confidence, malware free according to organizational policy from everywhere Desktop applications for stronger security of the roaming users
  3. Easy provisioning and deployment Transparency Traffic optimization – compression, latency, geography Smooth authentication process Security enforcement No impact on battery life
  4. Active Directory integration Robust logging & search Web Services API Enhanced reporting License management Clean & intuitive user interface Simplified policy management Easy on-boarding process for evaluation and purchasing