1 / 20

Cicada – Active Theft / Tamper Protection

Cicada – Active Theft / Tamper Protection. Cicada Security Technology - Agenda. Company Overview Threat Landscape Product & Technology Leadership Partnership Opportunity. Company Overview . Organization. Developer of innovative Security technologies. Founded 2010, 4 employees

minowa
Download Presentation

Cicada – Active Theft / Tamper Protection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cicada – Active Theft / Tamper Protection

  2. Cicada Security Technology - Agenda • Company Overview • Threat Landscape • Product & Technology Leadership • Partnership Opportunity

  3. Company Overview Organization • Developer of innovative Security technologies. Founded 2010, 4 employees • Headquarters: Montreal, QC • Private company – Cicada Security Technology (CST) Cicada Value Proposition • Detects: Attempted theft or tamper in real time, that other products can’t detect • Deter, protect, alert: Responsive protection the moment compromise occurs. • Eliminates Data Exposure from local or network accessible data stores Customers and Partners • Field tested by the Government of Canada in 2013 • Channel partners in USA, Canada and the UK, • OPSWAT Silver Level partner Technology Leader • The only commercially available product in its class • Enabling technology for the enhanced security of other end-point security technologies • Patented technology: First technology of its type on the market.

  4. Management Team

  5. Management Team Cont’d

  6. Cicada Security Technology - Agenda • Company Overview • Threat Landscape • Product & Technology Leadership • Partnership Opportunity

  7. All Eyes Are on Logic Level Threat CST provides the first commercially available, physical threat aware data protection platform designed to secure confidential data against exposure due to the theft or tamper of active computers or mobile devices. While every security vendor has focused their efforts on delivering protection against logic level threat, only CST addresses the challenge of how to secure external computing devices used by telecommuters against physical threat, and human error. No native visibility to theft or tamper

  8. Physical security today Current theft protection products are incapable of detecting live threat, and are limited to physical restraint type products, or after–the-fact recovery services. • Physical Restraint Hardware Products • Compliance nightmare • Low level deterrent • Does NOT protect data • Asset recovery services • Incapable live threat detection • User initiated post incident • Does not address tamper • No assurance of data protection

  9. Security challenges for protecting critical data • Stolen computers are the cause of 17% of reported data loss incidents • Tampering - 4th most significant enterprise security threat • Current solutions are ineffective. • No ability to audit, or enforce the physical security of computers or mobile devices used by telecommuters • Authentication and Full disk encryption technologies fail at protecting a live computer

  10. Today’s Enterprise 1,000,000’s of vulnerable active computers and Cicada is the only solution able to actively detect, deter, and protect against data, certificate, and crypto key exposure!

  11. Cicada Security Technology - Agenda • Company Overview • Threat Landscape • Product & Technology Leadership • Partnership Opportunity

  12. Cicada delivers unparalleled protection - Active threat detection - Configurable security policies - Responsive protection model - Live event notification alerts - Real time data protection - Hardware authentication factor - Usage compliance - Non-invasive

  13. Cicada I & II address a known security gap • PROTECTION • Lock Console to OS Login • Dismount of Encrypted Storage • Disconnect Secure Networks • Activate Cicada Siren • Activate Host Siren • DETECTION • Motion • Power State • Device insertion/removal • Insertion of writable media • USB Storage insertion/removal • Bluetooth State • Network State • Wi-Fi State • ALERTING • Live Cicada Monitoring • Instant Event Notification • SMS or email Delivery Proactive tracking

  14. Cicada II & Cicada EO Cicada II Cicada II, a Bluetooth based security appliance, extends the Cicada protective model to include the active protection of data stored or accessible by mobile cellular devices and tablets. Cicada II is engineered as a complementary solution designed to address security gaps which exist in BYOD and Mobile Device Management deployments. Cicada EO Cicada EO is a proprietary process which is the foundation of a centrally administered data managed destruction service. Leveraging government developed data purge technology, Cicada EO provides an unparalleled level of information elimination from end of life storage hardware without the need to remove the asset from the original location, whereby eliminating the potential for data exposure due to loss of care, custody and control of the asset. Cicada EO is developed in partnership with 2 major security partners, and is delivered globally by large service providers positioned in delivering security to enterprise and government clients.

  15. Cicada EO competitive matrix

  16. Use of Funds / Development Multi-engine AV scan Cicada I Client for Apple Application Whitelisting Cicada I Client for Linux Certificate Validation Cicada II Drivers for all mobile platforms Direct physical disk inspection Cicada EO Proof of Concept Modeling Development of Sales and Marketing Live Memory Analysis Operational expenses during pre-profit

  17. Cicada Security Technology - Agenda • Company Overview • Threat Landscape • Product & Technology Leadership • Partnership Opportunity

  18. Customer profiles

  19. Clients and Partners Cients: Technology partners:

  20. Cicada – Data Protection Technologies Eliminating Data Exposure due to Security Gaps cicadasecurity.com

More Related