SlideShare a Scribd company logo
1 of 31
www. isheriff .com sales@ isheriff .com Understanding  SaaS Concepts  Web 2.0 Security in 2010
Email & Web 2.0 Security Today ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Email & Web 2.0 Security Today ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The State of Web 2.0 Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The iSheriff Solution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Snapshot Applying iSheriff to your daily Internet use
Twitter / MySpace / Facebook
Twitter / MySpace / Facebook ALERT! The requested URL has been  blocked  by  i Sher i ff URL:  http://newsnet6.com/monies Action: Blocked Reason: Security Risk More >> The website you requested was prevented from loading by  iSheriff Web Security  services as it is considered to be a security compliance risk. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator.
Twitter / MySpace / Facebook ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
YouTube / Streaming Media
YouTube / Streaming Media Access to  youtube.com  is controlled by  i Sher i ff URL:  http://youtube.com Action: Time Quota Restriction – 30 minutes (daily) Category: Social Media TIME REMAINING: 29 minutes More >> Access to the website you requested is controlled by  iSheriff Web Security  in compliance with your employer’s Internet access policies. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator.  OK
YouTube / Streaming Media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sports / News / Entertainment
Sports / News / Entertainment Access to  news.bbc.co.uk/sport  is controlled by  i Sher i ff URL:  http://news.bbc.co.uk/sport Action: Time Access Restriction – Out of Office Hours Category: Sports Restricted Hours: 09:00 – 12:00 / 13:00 – 16:30 hrs / Mon - Fri More >> Access to the website you requested is controlled by  iSheriff Web Security  in compliance with your employer’s Internet access policies. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator.  OK
Sports / News / Entertainment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anonymous Proxy
Anonymous Proxy  ALERT! The requested URL has been  blocked  by  i Sher i ff URL:  http://youhide.com Action: Blocked Reason: Anonymous Proxy More >> The website you requested was prevented from loading by  iSheriff Web Security  services as it is considered to be a security compliance risk. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator.
Anonymous Proxy  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Webmail
Webmail ALERT! An attempted file upload has been  blocked  by  i Sher i ff File:  Customer List (Copy).xlsx Action: Blocked Reason: Restricted File More >> An attempted file upload has been prevented by  iSheriff Web Security  services .  Unauthorized attempts to transmit this file are prohibited by your employer’s data security policy.  This activity has been logged. If you believe that this is an error and need to transmit this file, please advise your Network Administrator.
Webmail ,[object Object],[object Object],[object Object],[object Object]
Spam
Spam Your Blocked Spam Report [email_address] Spam messages blocked for you today:  87  /  105   (83% spam) The emails listed here have been quarantined as spam and will be deleted after 5 days.  From Date Subject [email_address] Today Give her a nice surprise Release  |  Delete [email_address] Today Enlarge your member today Release  |  Delete [email_address] Today Designer Watch Sale Release  |  Delete [email_address] Today You want a mortgage? Release  |  Delete [email_address] Today Prescription Pills delivered Release  |  Delete Showing messages  1  to  5  out of  87 |  Next
Spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Blended Threats
Blended Threats An email addressed to you has been  blocked  by  i Sher i ff [email_address] From:  [email_address] To: [email_address] Subject: MySpace account update Sent: Wed 2:02pm Action: Quarantined Reason: Security Risk More >> An email addressed to you had been quarantined by  iSheriff Email Security  services as it is considered a security compliance risk.  If you believe that this is an error and require the message, please advise your Network Administrator within 7 days before the message is permanently deleted.
Blended Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malware / Virus
Malware / Virus Virus Alert Download of the file  codecinst.exe  has been  blocked  by  i Sher i ff File:  codecinst.exe Action: Blocked Reason: Virus Detected More >> The file you requested was prevented from downloading by  iSheriff Web Security  services as a virus was detected. If you believe that this is an error or require urgent access to this file, please advise your Network Administrator.
Malware / Virus ,[object Object],[object Object],[object Object],[object Object]
www. isheriff .com sales@ isheriff .com Thank you  for your time! For more information Please visit us on the Web or send us an email

More Related Content

What's hot

beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecuritySymantec
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutionsCyberhunter Cyber Security
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideBenedek Menesi
 
Seminar on Phishing Protection
Seminar on Phishing ProtectionSeminar on Phishing Protection
Seminar on Phishing ProtectionCristian Garcia G.
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
Barracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa PresentationBarracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa PresentationCarolynrahn
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenCMR WORLD TECH
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet securitySejahtera Affif
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...Liberteks
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats mohamad Hamizi
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices mohamad Hamizi
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesSlideTeam
 

What's hot (20)

beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
Seminar on Phishing Protection
Seminar on Phishing ProtectionSeminar on Phishing Protection
Seminar on Phishing Protection
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Barracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa PresentationBarracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa Presentation
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Internet safety
Internet safetyInternet safety
Internet safety
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Eseminar1
Eseminar1Eseminar1
Eseminar1
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...
 
M
MM
M
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
 

Viewers also liked

Velocityontwitterforb2b 090309091543 Phpapp02
Velocityontwitterforb2b 090309091543 Phpapp02Velocityontwitterforb2b 090309091543 Phpapp02
Velocityontwitterforb2b 090309091543 Phpapp02Stan Woods
 
Business Implications Of Multi Tenancy In SaaS
Business Implications Of Multi Tenancy In SaaSBusiness Implications Of Multi Tenancy In SaaS
Business Implications Of Multi Tenancy In SaaSLincoln Murphy
 
Understanding the Business Implications of SaaS Multi-Tenancy
Understanding the Business Implications of SaaS Multi-TenancyUnderstanding the Business Implications of SaaS Multi-Tenancy
Understanding the Business Implications of SaaS Multi-TenancyScioSales
 
Business Case For Multi Tenancy in SaaS
Business Case For Multi Tenancy in SaaSBusiness Case For Multi Tenancy in SaaS
Business Case For Multi Tenancy in SaaSLincoln Murphy
 
SaaS Business Model: A Unique Business Architecture
SaaS Business Model: A Unique Business ArchitectureSaaS Business Model: A Unique Business Architecture
SaaS Business Model: A Unique Business ArchitectureLincoln Murphy
 

Viewers also liked (9)

SaaS E- Book Part 1
SaaS E- Book Part 1SaaS E- Book Part 1
SaaS E- Book Part 1
 
Velocityontwitterforb2b 090309091543 Phpapp02
Velocityontwitterforb2b 090309091543 Phpapp02Velocityontwitterforb2b 090309091543 Phpapp02
Velocityontwitterforb2b 090309091543 Phpapp02
 
Animals
AnimalsAnimals
Animals
 
Animals
AnimalsAnimals
Animals
 
Business Implications Of Multi Tenancy In SaaS
Business Implications Of Multi Tenancy In SaaSBusiness Implications Of Multi Tenancy In SaaS
Business Implications Of Multi Tenancy In SaaS
 
Prezentacja o X11
Prezentacja o X11Prezentacja o X11
Prezentacja o X11
 
Understanding the Business Implications of SaaS Multi-Tenancy
Understanding the Business Implications of SaaS Multi-TenancyUnderstanding the Business Implications of SaaS Multi-Tenancy
Understanding the Business Implications of SaaS Multi-Tenancy
 
Business Case For Multi Tenancy in SaaS
Business Case For Multi Tenancy in SaaSBusiness Case For Multi Tenancy in SaaS
Business Case For Multi Tenancy in SaaS
 
SaaS Business Model: A Unique Business Architecture
SaaS Business Model: A Unique Business ArchitectureSaaS Business Model: A Unique Business Architecture
SaaS Business Model: A Unique Business Architecture
 

Similar to Understanding SaaS Concepts

Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityNeeraj Negi
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02mark scott
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Securitycrussell79
 
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop ThemAnvesh Vision Private Limited
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_Tahmid Munaz
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?SOCVault
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business NetworkAnindita Ghatak
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...AwodiranOlumide
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Office365 from a hacker's perspective: Real-life Threats, Tactics and Remedies
Office365 from a hacker's perspective: Real-life Threats, Tactics and Remedies Office365 from a hacker's perspective: Real-life Threats, Tactics and Remedies
Office365 from a hacker's perspective: Real-life Threats, Tactics and Remedies Benedek Menesi
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaPrime Infoserv
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 

Similar to Understanding SaaS Concepts (20)

Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
 
PHISHING PROTECTION
 PHISHING PROTECTION PHISHING PROTECTION
PHISHING PROTECTION
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Office365 from a hacker's perspective: Real-life Threats, Tactics and Remedies
Office365 from a hacker's perspective: Real-life Threats, Tactics and Remedies Office365 from a hacker's perspective: Real-life Threats, Tactics and Remedies
Office365 from a hacker's perspective: Real-life Threats, Tactics and Remedies
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Data security
 Data security  Data security
Data security
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 

Recently uploaded

State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 

Recently uploaded (20)

State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

Understanding SaaS Concepts

  • 1. www. isheriff .com sales@ isheriff .com Understanding SaaS Concepts Web 2.0 Security in 2010
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Snapshot Applying iSheriff to your daily Internet use
  • 7. Twitter / MySpace / Facebook
  • 8. Twitter / MySpace / Facebook ALERT! The requested URL has been blocked by i Sher i ff URL: http://newsnet6.com/monies Action: Blocked Reason: Security Risk More >> The website you requested was prevented from loading by iSheriff Web Security services as it is considered to be a security compliance risk. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator.
  • 9.
  • 11. YouTube / Streaming Media Access to youtube.com is controlled by i Sher i ff URL: http://youtube.com Action: Time Quota Restriction – 30 minutes (daily) Category: Social Media TIME REMAINING: 29 minutes More >> Access to the website you requested is controlled by iSheriff Web Security in compliance with your employer’s Internet access policies. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator. OK
  • 12.
  • 13. Sports / News / Entertainment
  • 14. Sports / News / Entertainment Access to news.bbc.co.uk/sport is controlled by i Sher i ff URL: http://news.bbc.co.uk/sport Action: Time Access Restriction – Out of Office Hours Category: Sports Restricted Hours: 09:00 – 12:00 / 13:00 – 16:30 hrs / Mon - Fri More >> Access to the website you requested is controlled by iSheriff Web Security in compliance with your employer’s Internet access policies. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator. OK
  • 15.
  • 17. Anonymous Proxy ALERT! The requested URL has been blocked by i Sher i ff URL: http://youhide.com Action: Blocked Reason: Anonymous Proxy More >> The website you requested was prevented from loading by iSheriff Web Security services as it is considered to be a security compliance risk. If you believe that this is an error or require urgent access to this website, please advise your Network Administrator.
  • 18.
  • 20. Webmail ALERT! An attempted file upload has been blocked by i Sher i ff File: Customer List (Copy).xlsx Action: Blocked Reason: Restricted File More >> An attempted file upload has been prevented by iSheriff Web Security services . Unauthorized attempts to transmit this file are prohibited by your employer’s data security policy. This activity has been logged. If you believe that this is an error and need to transmit this file, please advise your Network Administrator.
  • 21.
  • 22. Spam
  • 23. Spam Your Blocked Spam Report [email_address] Spam messages blocked for you today: 87 / 105 (83% spam) The emails listed here have been quarantined as spam and will be deleted after 5 days. From Date Subject [email_address] Today Give her a nice surprise Release | Delete [email_address] Today Enlarge your member today Release | Delete [email_address] Today Designer Watch Sale Release | Delete [email_address] Today You want a mortgage? Release | Delete [email_address] Today Prescription Pills delivered Release | Delete Showing messages 1 to 5 out of 87 | Next
  • 24.
  • 26. Blended Threats An email addressed to you has been blocked by i Sher i ff [email_address] From: [email_address] To: [email_address] Subject: MySpace account update Sent: Wed 2:02pm Action: Quarantined Reason: Security Risk More >> An email addressed to you had been quarantined by iSheriff Email Security services as it is considered a security compliance risk. If you believe that this is an error and require the message, please advise your Network Administrator within 7 days before the message is permanently deleted.
  • 27.
  • 29. Malware / Virus Virus Alert Download of the file codecinst.exe has been blocked by i Sher i ff File: codecinst.exe Action: Blocked Reason: Virus Detected More >> The file you requested was prevented from downloading by iSheriff Web Security services as a virus was detected. If you believe that this is an error or require urgent access to this file, please advise your Network Administrator.
  • 30.
  • 31. www. isheriff .com sales@ isheriff .com Thank you for your time! For more information Please visit us on the Web or send us an email