Download
1 / 15

Pravin Kothari - PowerPoint PPT Presentation


  • 62 Views
  • Uploaded on

Pravin Kothari. Founder & CEO CipherCloud (former VPE & co-founder ArcSight ). Cloud’s Explosive Growth in SMB Entering Enterprises and Governments. Security Breaches Escalating Highly Advanced & Persistent Cyber Threats.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Pravin Kothari' - orli-nixon


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Pravin kothari

Pravin Kothari

Founder & CEO

CipherCloud

(former VPE & co-founder ArcSight)


Cloud s explosive growth in smb entering enterprises and governments
Cloud’s Explosive Growth in SMBEntering Enterprises and Governments


Security breaches escalating highly advanced persistent cyber threats
Security Breaches EscalatingHighly Advanced & Persistent Cyber Threats


Cloud computing in enterprise government tug of war between end users security
Cloud Computing in Enterprise/GovernmentTug of War Between End Users & Security

Business Execs DesireMore Cloud Services

Security/Compliance ExecsHave Cloud Concerns

Agility & Flexibility

Lack of Control & Visibility

Data Privacy

Reduce cost

Data Residency

Minimal Administration

Regulatory Compliance

Best-of-breed apps


Revolutionary CipherCloud Encryption GatewayEncrypt Sensitive Data in Real-time Before it’s Sent to the Cloud

  • Encryption Preserves App’sFormat & Operations

  • Keys retained by Customer

  • No impact on usability


Record

as seen by

“authorized users”

Configuration

for each Application

Record as seen by “Unauthorized Users”


Encrypt data at the source before it leaves your network
Encrypt Data at the Source Before it Leaves Your Network

Customer’s encryption at the source can satisfy controls that are left for customers in Provider’s FISMA / ISO-27001 certification.



Open extensible platform for ecosystem rapid development of 3 rd party cloud app plug ins
Open & Extensible Platform for EcosystemRapid Development of 3rd-Party Cloud/App Plug-ins

PrivateCloud

Ownership

CipherCloud

Gateway

Out-of-the-box Cloud

Integration

Open Plug-inFramework


Customer benefits
Customer Benefits

  • Protect against emerging cloud threats

  • Eliminate data privacy and security concerns

  • Satisfy compliance and data-residency requirements

  • Avoid risk of privacy breaches (e.g. Sony, Epsilon, RSA)

    • Data Breach cost estimated at $214 per customer record*

  • Accelerate cloud adoption

    • Significant cost savings migrating on-premise apps to cloud

*The Ponemon Institute

“Without CipherCloud, we won’t be able to use cloud.” Customer interview in SearchCloudSecurity.com


Key partners
Key Partners

Strategic Cloud Partners

ISV OEM/VARs

Distributors

Global SIs


Proven team
Proven Team

Seasoned Executives

KPMG Partner- ShahedLatif

AIG Global CISO– Paul de Graaff

Prudential ex-CISO- Ken Tymisnki

  • Marriott ex-VP,Info Protection, Chris Zoladz

Fifth Third Bank ex-CISO Bob West

  • Kaiser Director Risk –RamyHoussaini

    QualysFounder – Gilles Samoun

  • Sun-Microsoft - Dev Ghoshal

Expert Advisory

Board

Top Tier Investors

Strategic Investment


Honors and awards in 2011
Honors and Awards in 2011

  • Gartner Cool Vendor in Cloud Security Services 2011

  • Most Innovative Company Finalist, RSA Conference 2011

  • Best in Security , Under The Radar 2011 Judge & Audience Choice Winner

  • Best in Software & Cloud , TiEcon 2011 Innovation Expo Winner

  • Best Security Startup, America West, Global Security Challenge (Oct 2011)

  • 5 Cloud Security Companies to Watch, Network World (Oct 2011)


Takeaways
Takeaways

  • Your Data-At-Rest in the cloud is exposed to emerging cloud threats

    • Most SaaS/cloud databases are in ‘plaintext’

  • Encrypt the sensitive data at source before it leaves your network

    • Protect your data against all external threats

  • Encryption keys should be with customers, not shared with providers

    • Innovative technologies, such as CipherCloud, make it possible

      Please visit the demo area for a live demo

      Free Trials available at CipherCloud.com