SlideShare a Scribd company logo
1 of 54
r1secure.com r1prive.com
ezSec
R1
ezsec.us - ezsec.ca - ezsec.org - ezsec.net - ezsec.io
R1
Security on the R1
Tiny Robust Attack Surface
It was built from the ground up with as little software and
potential vulnerabilities as possible.
It even has its own Antivirus.
So robust it passed the most difficult of penetration tests, by
one of the most known pentesting labs and skilled hackers.
Enterprise Network Security
No evil twin, since nobody has the private certificate on the R1
Enterprise Network Security - Cont’d
The R1 will shoot down any evil twin it detects in the vicinity.
Intrusion Detection/Prevention System
The modified engine is able to filter out almost all bad traffic on the network.
Intrusion Detection System (2)
Deep Learning based Intrusion detection system, Data Science @ ezSec.
Intrusion Detection System (3)
Machine Learning powers an Anomaly Detector, with threat visualization..
Network Scanner
The R1 periodically scans all your devices for vulnerabilities and reports back.
Web Filtering (Network Level)
R1 will block malicious, advertising, or background data collecting web content off
your browsing session for safe and seamless browsing.
Threat Intelligence
The R1 is part of a TI blockchain, sharing and studying information about the
latest zero-days. hacking campaigns, hacking techniques and tactics, and more.
Policies/Firewall
With a Remote Management Server and an extensive admin GUI it is very easy to
setup your own rules and fully customize your network and R1.
Data Encryption
The R1 can be used as the key to decrypt files on devices.
Behavioral Analytics
The R1 models your behaviour and detects anomalies.
This was shown to detect unauthorized use of your devices.
Identity Verification
The R1 makes sure everything is healthy and appends a healthy flag to the
connection stream to enable access to the organization’s important resources.
Hardware U2F Key
Connect your R1 to your Device for your 2nd Auth on Important Accounts.
Security Education
The R1 will explain every action in layman terms.
And share tips & Recommendations periodically.
Optional Module: TOR
Maximum privacy and anonymity on the network.
To Be Released: SSL DPI
Sophisticated hackers may use SSL to bypass certain intrusion detection
techniques, we have built prototypes to listen onto their SSL traffic and perform
Deep Packet Inspection, eliminating the threat vector.
R1 Other Features
Power Bank
Connect your charger to the R1 USB for some quick charging on the go.
Network-attached storage
Put a USB Flash Drive into your R1 USB port and access the files from all WIFI
connected devices.
Customizable Adblock
Network level block certain groups of websites (Adult, Advertisements,
Background Data, Potentially Unwanted, Pop-ups, etc.).
Fast Connectivity
Boots up in under one second. With one touch!
Full Organization’s Support
The organization can monitor, control, modify and connect to the R1 remotely.
ezSec’s Support & Solution Customization
ezSec is a local startup.
Very easy to reach the management and get things moving in an agile manner.
People
Testing
Beta Testers
If you are interested to test some beta versions in your home/car/travel setting.
Let us know!
You will get few credits towards pricing as well. And a rewards package.
Demo
Configuration
Black Sony Vaio | Intel i7 6GB RAM | (Attacker Machine)
Attackers Network Arsenal: High gain Alfa Network AWUS036NHA & High
gain Alfa AWUSO36NH network adapters with 5dbi & 9dbi antennas.
Hak5 Wifi Pineapple Nano with a Samsung Galaxy Note 3.
Black HP Pavilion DV6 | Intel i7 8GB RAM | (User 1 Machine)
Grey Dell Latitude | Intel i7 4GB RAM | (User 2 Machine)
MacBook -- Presentation Laptop (Spectator Machine)
Samsung Galaxy Note 8 (Internet Connected WiFi AP)
Attack Scenario
Attacker, User 1, and User 2 connect successfully to the R1 Secure Wifi.
Attacker tries to attack User 1. Packets Dropped by R1 and reported.
Attacker tries to attack User 2. Packets Dropped by R1 and reported.
Spectator is able to see this and kick Attacker out!
Attack Scenario - Cont’d
Attacker sets up an Evil Twin to get User 1 & User 2 to connect to his machine
and compromise their security.
R1 detects evil twin and unleashes an attack against it.
User 1 & User 2 are unable to connect to evil twin so they connect back to R1
legitimate R1 Secure wifi.
Attacker gives up after few minutes.
Connectivity
User plugs in a Cellular modem and instructs the R1 to connect.
R1 takes 1.5 seconds to setup a secure wifi - cellular connection seamlessly.
__
User selects WIFI and instructs the R1 to connect to it .
R1 takes 1 second to setup a secure wifi - wifi connection seamlessly.
__
User plugs in 1GBps ethernet.cable and instructs the R1 to connect.
R1 takes <1 second to setup a secure wifi - ethernet connection seamlessly.
Web Filtering
Phone APP is the best way to test this.
Since an APP cannot be supplemented by a browser extension, users are left with
no other choice.
R1 is now your other choice!
Quick Charge
Plug charger into R1!
GUI
Visit the HTTPS protected GUI dashboard.
RMS
Visit the Remote Management Server web page. (Visualization Page)
Why Security Travel Router?
Mobile devices are vulnerable! So is WIFI.
A Mobile connection is a security nightmare.
Based on Kaspersky 2017 survey, 38% of enterprise businesses experienced
exploits or loss through mobile devices as the main attack vector.
Wifi is a security problem, Public Wifi is a disaster.
25% of hotspots use no encryption, and there is 1 hotspot for each 20 humans.
Everybody is mobile, tho! And that’s great!
Mobile workers are productive.
1.45 Billion global mobile workers in 2016, 61% of workers report working outside
the office at least part of the time. [citrix]
BYOD is a productivity trend.
Only 11% of companies have not deployed a BYOD program. [Insight]
Pricing
Travel Router
+Support 6+ Connections
+U2F FIDO Key
+Thermometer monitored Battery
+Compact + Slim
+Quick Charge
+Cellular Support
+WifI-Wifi
$200-$500 + Monthly Service
Home Router
+Support 10+ Connections
+AC Powered
+Heat Management
+Excessive Security Protections & Alerts
+Parental Controls
+IoT Integration & Control
$200-$900 + Monthly Service
Office Router
+Support 10-80+ Connections
+Bigger Antennas & Range
+Better throughput
+AC Powered
+Heat Management
+Excessive Security Protections & Alerts
+IoT Integration & Control
$500-$2000 + Monthly Service
Pre-Orders
Delivering Q3 2019 and the DHL Partnership
Pre order now to see it come into market.
Pricing will increase every month we are closer to the release date.
Orders help us make projections & allocate funds earlier so we can supply demand.
Discussion
What features do you want to have on the R1?
Analytics?
Reporting?
Security?
Privacy?
Details.
Recap
We are selling you peace of mind, not the R1.
Peace of mind on the go, in the office, and in home.
We help you buy your way out of security incidents hindering your business
growth.
The R1 was designed as imagined early on 2015 when the founders were
ethically hacking multiple remote connections in a Yale University Hackathon. This
exposed multiple weaknesses in mobile devices and wireless internet sources.
54
THANK YOU
Any questions?
You can find more about us
▫ @ezsecorg
▫ www.ezsec.org
ezsec.us ezsec.ca ezsec.org ezsec.net ezsec.io

More Related Content

What's hot

Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
gruzabb
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
dvanwyk30
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
David Fuchs
 

What's hot (19)

[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares
 
Mobile Security Qualcom mr. patrick tsie - qualcomm
Mobile Security Qualcom   mr. patrick tsie - qualcommMobile Security Qualcom   mr. patrick tsie - qualcomm
Mobile Security Qualcom mr. patrick tsie - qualcomm
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Better VoIP Network Troubleshooting
Better VoIP Network Troubleshooting Better VoIP Network Troubleshooting
Better VoIP Network Troubleshooting
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
 
Florencio Cano - Patient data security in a wireless and mobile world
Florencio Cano - Patient data security in a wireless and mobile worldFlorencio Cano - Patient data security in a wireless and mobile world
Florencio Cano - Patient data security in a wireless and mobile world
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Mobile Defense Product Overview
Mobile Defense Product OverviewMobile Defense Product Overview
Mobile Defense Product Overview
 

Similar to R1 - Slides

Building a data network (wired and wireless
Building a data network (wired and wirelessBuilding a data network (wired and wireless
Building a data network (wired and wireless
Fedora Leo
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf
TouhemiJamel
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
Angie Lee
 

Similar to R1 - Slides (20)

Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
[GITSN] wireless data security system
[GITSN] wireless data security system[GITSN] wireless data security system
[GITSN] wireless data security system
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Building a data network (wired and wireless
Building a data network (wired and wirelessBuilding a data network (wired and wireless
Building a data network (wired and wireless
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
COMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptxCOMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptx
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking AboutCybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 

Recently uploaded

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 

R1 - Slides

  • 1. r1secure.com r1prive.com ezSec R1 ezsec.us - ezsec.ca - ezsec.org - ezsec.net - ezsec.io
  • 2. R1
  • 3.
  • 5. Tiny Robust Attack Surface It was built from the ground up with as little software and potential vulnerabilities as possible. It even has its own Antivirus. So robust it passed the most difficult of penetration tests, by one of the most known pentesting labs and skilled hackers.
  • 6. Enterprise Network Security No evil twin, since nobody has the private certificate on the R1
  • 7. Enterprise Network Security - Cont’d The R1 will shoot down any evil twin it detects in the vicinity.
  • 8. Intrusion Detection/Prevention System The modified engine is able to filter out almost all bad traffic on the network.
  • 9. Intrusion Detection System (2) Deep Learning based Intrusion detection system, Data Science @ ezSec.
  • 10. Intrusion Detection System (3) Machine Learning powers an Anomaly Detector, with threat visualization..
  • 11. Network Scanner The R1 periodically scans all your devices for vulnerabilities and reports back.
  • 12. Web Filtering (Network Level) R1 will block malicious, advertising, or background data collecting web content off your browsing session for safe and seamless browsing.
  • 13. Threat Intelligence The R1 is part of a TI blockchain, sharing and studying information about the latest zero-days. hacking campaigns, hacking techniques and tactics, and more.
  • 14. Policies/Firewall With a Remote Management Server and an extensive admin GUI it is very easy to setup your own rules and fully customize your network and R1.
  • 15. Data Encryption The R1 can be used as the key to decrypt files on devices.
  • 16. Behavioral Analytics The R1 models your behaviour and detects anomalies. This was shown to detect unauthorized use of your devices.
  • 17. Identity Verification The R1 makes sure everything is healthy and appends a healthy flag to the connection stream to enable access to the organization’s important resources.
  • 18. Hardware U2F Key Connect your R1 to your Device for your 2nd Auth on Important Accounts.
  • 19. Security Education The R1 will explain every action in layman terms. And share tips & Recommendations periodically.
  • 20. Optional Module: TOR Maximum privacy and anonymity on the network.
  • 21. To Be Released: SSL DPI Sophisticated hackers may use SSL to bypass certain intrusion detection techniques, we have built prototypes to listen onto their SSL traffic and perform Deep Packet Inspection, eliminating the threat vector.
  • 23. Power Bank Connect your charger to the R1 USB for some quick charging on the go.
  • 24. Network-attached storage Put a USB Flash Drive into your R1 USB port and access the files from all WIFI connected devices.
  • 25. Customizable Adblock Network level block certain groups of websites (Adult, Advertisements, Background Data, Potentially Unwanted, Pop-ups, etc.).
  • 26. Fast Connectivity Boots up in under one second. With one touch!
  • 27. Full Organization’s Support The organization can monitor, control, modify and connect to the R1 remotely.
  • 28. ezSec’s Support & Solution Customization ezSec is a local startup. Very easy to reach the management and get things moving in an agile manner.
  • 30.
  • 32. Beta Testers If you are interested to test some beta versions in your home/car/travel setting. Let us know! You will get few credits towards pricing as well. And a rewards package.
  • 33. Demo
  • 34. Configuration Black Sony Vaio | Intel i7 6GB RAM | (Attacker Machine) Attackers Network Arsenal: High gain Alfa Network AWUS036NHA & High gain Alfa AWUSO36NH network adapters with 5dbi & 9dbi antennas. Hak5 Wifi Pineapple Nano with a Samsung Galaxy Note 3. Black HP Pavilion DV6 | Intel i7 8GB RAM | (User 1 Machine) Grey Dell Latitude | Intel i7 4GB RAM | (User 2 Machine) MacBook -- Presentation Laptop (Spectator Machine) Samsung Galaxy Note 8 (Internet Connected WiFi AP)
  • 35. Attack Scenario Attacker, User 1, and User 2 connect successfully to the R1 Secure Wifi. Attacker tries to attack User 1. Packets Dropped by R1 and reported. Attacker tries to attack User 2. Packets Dropped by R1 and reported. Spectator is able to see this and kick Attacker out!
  • 36. Attack Scenario - Cont’d Attacker sets up an Evil Twin to get User 1 & User 2 to connect to his machine and compromise their security. R1 detects evil twin and unleashes an attack against it. User 1 & User 2 are unable to connect to evil twin so they connect back to R1 legitimate R1 Secure wifi. Attacker gives up after few minutes.
  • 37. Connectivity User plugs in a Cellular modem and instructs the R1 to connect. R1 takes 1.5 seconds to setup a secure wifi - cellular connection seamlessly. __ User selects WIFI and instructs the R1 to connect to it . R1 takes 1 second to setup a secure wifi - wifi connection seamlessly. __ User plugs in 1GBps ethernet.cable and instructs the R1 to connect. R1 takes <1 second to setup a secure wifi - ethernet connection seamlessly.
  • 38. Web Filtering Phone APP is the best way to test this. Since an APP cannot be supplemented by a browser extension, users are left with no other choice. R1 is now your other choice!
  • 40. GUI Visit the HTTPS protected GUI dashboard.
  • 41. RMS Visit the Remote Management Server web page. (Visualization Page)
  • 43. Mobile devices are vulnerable! So is WIFI. A Mobile connection is a security nightmare. Based on Kaspersky 2017 survey, 38% of enterprise businesses experienced exploits or loss through mobile devices as the main attack vector. Wifi is a security problem, Public Wifi is a disaster. 25% of hotspots use no encryption, and there is 1 hotspot for each 20 humans.
  • 44. Everybody is mobile, tho! And that’s great! Mobile workers are productive. 1.45 Billion global mobile workers in 2016, 61% of workers report working outside the office at least part of the time. [citrix] BYOD is a productivity trend. Only 11% of companies have not deployed a BYOD program. [Insight]
  • 46. Travel Router +Support 6+ Connections +U2F FIDO Key +Thermometer monitored Battery +Compact + Slim +Quick Charge +Cellular Support +WifI-Wifi $200-$500 + Monthly Service
  • 47. Home Router +Support 10+ Connections +AC Powered +Heat Management +Excessive Security Protections & Alerts +Parental Controls +IoT Integration & Control $200-$900 + Monthly Service
  • 48. Office Router +Support 10-80+ Connections +Bigger Antennas & Range +Better throughput +AC Powered +Heat Management +Excessive Security Protections & Alerts +IoT Integration & Control $500-$2000 + Monthly Service
  • 50. Delivering Q3 2019 and the DHL Partnership Pre order now to see it come into market. Pricing will increase every month we are closer to the release date. Orders help us make projections & allocate funds earlier so we can supply demand.
  • 52. What features do you want to have on the R1? Analytics? Reporting? Security? Privacy? Details.
  • 53. Recap We are selling you peace of mind, not the R1. Peace of mind on the go, in the office, and in home. We help you buy your way out of security incidents hindering your business growth. The R1 was designed as imagined early on 2015 when the founders were ethically hacking multiple remote connections in a Yale University Hackathon. This exposed multiple weaknesses in mobile devices and wireless internet sources.
  • 54. 54 THANK YOU Any questions? You can find more about us ▫ @ezsecorg ▫ www.ezsec.org ezsec.us ezsec.ca ezsec.org ezsec.net ezsec.io

Editor's Notes

  1. The R1 is a device first designed and patented to be a security focused travel router, created for an organization’s top professional on the go. But we are able to supply an office or home router.
  2. The R1 would act like a wall between you and everybody else, keeping all your devices safe in a secure bubble . Isolating them from networks and Providing Enterprise security All while being Portable and convenient
  3. Since the R1 now faces the internet for you. It was built from the ground up with as little software and vulnerabilities as possible. So much so it has its own Cisco Anti Virus. It was and still every version is being tested by a 3rd party pentesting lab. In 2019 we will throw it at the biggest ontario hackathon for hackers to try to hack it for a big reward!
  4. With RADIUS TLS (No evil twin, since nobody has the private certificate on the R1)
  5. Speaking of evil twins. The R1 will shoot down any evil twin it detects in the vicinity. Engaging in this fight with its superior hardware, to make sure the security of the client isn’t compromised.
  6. ezSec’s and Cisco’s patented technologies are seen here at work, with feeds from VRT at Cisco and Malware Research at ezSec, the modified Snort engine is able to filter out almost all bad traffic on the network.
  7. Utilizing the power of Deep Learning our Data Science team at ezSec was able to find a way to get almost perfect accuracy on a classical data set released by Darpa called KDD Cup and its NSL variant, these are the most cited databases in intrusion detection research. This beta module has been fed quite some simulated and real data and has been returning crazy results. Read more on this @ Boutaba et al. Journal of Internet Services and Applications
  8. Recently we announced a partnership with Amsterdam based startup, Elastic. They have crafted a very special pack for us to detect attacks like DNS, and HTTP exfiltration and more. This comes along with them being our Server Side, Visualization and Storage Infrastructure.
  9. Not only will the R1 tell you if it detected malicious communications on your network and report infected devices. It periodically scans all your devices for vulnerabilities and reports back on their risk of getting hacked.
  10. R1 will block malicious, advertising, or background data collecting web content off your browsing session for safe and seamless browsing. This means that app on your phone wont be able to get these annoying ads anymore.
  11. The R1 is part of a threat intelligence blockchain, sharing and studying information about the latest zero-days. hacking campaigns, hacking techniques and tactics, and more. The opensource blockchain belongs to our sister company THRINTEL MARKET, which raised more than a $100,000 in its first hour of the online crowdfund. The R1 has feeds from eSentire and AlienVault as well.
  12. With a Remote Management Server and an extensive admin GUI it is very easy to setup your own rules and fully customize your network and R1. We are able to customize all that for you ourselves as well. Or you may give our support team a call or chat online with them with 24/7 support.
  13. The R1 can be used as the key to decrypt files on devices. You connect to starbucks, you are unable to open the excel sheet anymore, you connect to the R1_Secure Network and there you go all yours.
  14. The R1 models your behaviour and detects anomalies. By behaviour we mean what websites you visit at what time for example. It would be challenging now for someone to impersonate you.
  15. The R1 makes sure everything is peaceful with the user’s device, no malicious activity, no change in the behaviour pattern, even ask a security question if needed, then send a flag showing a healthy device security connection, and confirming user behaviour and identity.
  16. Connect your R1 to your Device for your 2nd Authentication on Important Accounts. No more of these little usbs. Something you Know. (Password & R1 Security Questions if triggered) Something you Are. (R1 behaviour analytics & modelling) Something you Have. (R1 as a Hardware key) Fully compatible with Google Suite of tools, Facebook, Github, and more!
  17. No patch for stupidity? I think not! Security Education means we explain every action in layman terms!
  18. We have built and tested TOR modules for the R1. It can be paired with VPN and obfuscation bridges for maximum possible anonymity from ISP and Big Brother. The technology is the state of the art in terms of privacy on the internet.
  19. Sophisticated hackers may use SSL to bypass certain intrusion detection techniques, we have built prototypes to listen onto their SSL traffic and perform Deep Packet Inspection, eliminating the threat vector.
  20. Other features packed into the R1
  21. Quick charging to your devices on the go (For the train, airplane, commute, etc). Connect your charger to the R1 USB for some quick charging on the go.
  22. Share files with every device on the network (Either plug a USB or upload files into the R1 itself (its sandboxed ofcourse and needs full authorization to upload from IT staff)
  23. R1 can easily block certain groups of websites (Adult, Advertisements, Background Data, Potentially Unwanted, Pop-ups, etc.)
  24. Boots up in under one second. With one touch!
  25. The organization can monitor, control, modify and connect to the R1 remotely. The R1 comes with a Remote Mgmt System so that the organization can monitor and run all the extra security modules. RMS includes (Behavioral Analytics Engine, Visualization and database, C&C, and the Deep Learning Based IDS) Not only that but the R1 comes with two GUIs a very extensive one and another very simple GUI.
  26. ezSec is a local startup. Very easy to reach the management and get things moving in an agile manner.
  27. Lot’s of contractors and short term employees. Just going to mention the core team affiliations here.
  28. Team experience and education highlights
  29. If you are interested to test some beta versions in your home/car/travel setting. Let us know! You will get few credits towards pricing as well. And a rewards package.
  30. Interested in a Demo? I can make it quick! I am not gunna do everything here just the highlights. __ Phone is my internet source R1 connects wirelssly to my phone Then hosts a hotspot called r1secure
  31. Demo, demo, demo This is the hacker These are users.
  32. Here im going to go old school And look thru terminal files to show you the structure under the hood The attack here is an icmp ping to keep things simple The ping is dropped and reported
  33. Skip that as well although this is very sick Note8 is attacker Note 3 is user R1 is legit
  34. Easy
  35. R1.secure in browser Network joinwifi and scan & system processes
  36. Here is what am authorized to show right now ML > anom exp> job then remote ip and low req > single metric viewer
  37. See you know well we need security in the office and home routers. So am not gonna talk about that. But a security travel router?
  38. A Mobile connection is a security nightmare. Based on Kaspersky 2017 survey, 38% of enterprise businesses experienced exploits or loss through mobile devices as the main attack vector. $1,700,000 is the average Enterprise cost of a security incident involving exploits or data loss through mobile devices. [Kaspersky] Wifi is a security problem, Public Wifi is a disaster. Even worse, Mobile Connections are mostly wireless, so not only are they using WIFI on mobile devices that can’t protect themselves effectively, they are joining mostly public free hotspots with a plethora of infected/malicious devices around. 25% of hotspots use no encryption, and there is 1 hotspot for each 20 humans!
  39. Mobile workers are productive. 1.45 Billion global mobile workers in 2016, 38.8% of workforce and increasing to 1.87B by 2022. [strategyanalytics] And, 61% of workers report working outside the office at least part of the time. [citrix] BYOD is a productivity trend. Only 11% of companies have not deployed a BYOD program. [Insight] A report by MyCloudIT found workers are more productive when they can bring their own device, and when workplace mobility is encouraged.One reason is because workers are prone to having their own devices on them at all times, which increases accessibility and eliminates the learning curve.
  40. We shall be delivering our first official batch in 3rd Quarter in 2019. Global shipping costs are vastly reduced as we have set up a long term partnership with DHL earlier this year. This will enable global market penetration. We’ve got an early access program however. We will send you an email about that. Since we will have units ready within 2 months They can be Home/Office/Travel.
  41. Thank you ezSec your usable security company