“i7 Networks” Creates Its First Agentless Secure Mobile (BYOD) Access Gateway using Its Patent-Pending Agentless Discovery & Secure Fingerprinting

Share Article

Enterprises can now not only discover and securely fingerprint all personal devices using patent-pending algorithm that uses 100% agentless technology but also prevents all infected, malicious and compromised ones from getting into the Corporate Network including via VPN. i7’s Peregrine7 does a thorough intrusion and APT check using BYOD specific intrusion detection as well as BYOD specific behavioral analysis, and also does a complete granular access control based on mobile apps (whitelisting/blacklisting) as well as all device attributes thus discovered.

i7 Networks BYOD Security Tool - Peregrine7

i7 Networks BYOD Security Tool - Peregrine7

The greatest risk with adoption of BYOD is the advanced persistent threat (APT). The corporate networks cannot handle sophisticated, targeted and persistent threats arising from mobile devices at the workplace – Forrester Analyst

Redmond/Bangalore: i7 networks, an innovator in Enterprise Mobile Security specializing in BYOD security solutions, today announced the launch of latest version of Pergrine7 - the on-premise 100% agentless Secure Mobile Access Gateway (aSMAG). Peregrine7 discovers all personal devices, does a detailed foolproof fingerprinting, checks the security status of the device (compromised, malicious, infected/intrusive, authorized, unauthorized etc.) and check the security posture of the device (jailbroken, rooted, presence of anti-malware installed etc.) and looks into at app-traffic to find out what apps are running, all on the wire (agentless), does a detailed mobile specific behavioral analysis to catch any anomaly and does a simple allow/deny access of the device to a detailed granular access based on app whitelisting/blacklisting to based on all of the attributes thus discovered providing the next generation secure mobile access gateway access.

"At the rate the mobile malware are growing especially for android, no device will be malice-free and seems device infection is inevitable and anti-virus if installed can do only so much as all apps are sandboxed; To catch all the malicious intrusions into corporate network, the APTs (advanced persistence threat), you need to have one at the network layer to analyze the network traffic form these mobiles and catch the culprit when they spread their tentacles into corporate network" said Manjunath Gowda, CEO of i7 networks.

Gartner analysts came out and said that next-generation mobile anti-malware defenses will come from Mobile specific Web gateways that can block rogue app traffic, block Web apps and bad/ unproductive websites, and perform basic firewall functions. According to Forrester analyst Mantosh Das “The corporate networks cannot handle sophisticated, targeted and persistent threats arising from mobile devices at the workplace”

“Mobile phone are at a high risk of being infected with malicious software because of the OS/application vulnerabilities. Corporates should be very wary of these vulnerabilities as well as the infected devices getting onto their networks. Such devices enable malicious players to steal sensitive information, including corporate data and login credentials.

Our product tells you how vulnerable the connected devices are, the possible attack vectors and associated information via the Device Vulnerability Index (DVI) score. This could potentially enable administrators from warding potential network threats or compromises. Similarly we have another index called Device Threat Index (DTI) that gets computed in real-time for each device and quantifies the device’s anomalous/malicious behavior. Together these indices will provide enough data and intelligence to make decisions on how to control access to the corporate network from these devices” said i7’s CTO – Chandrashekar M.

Peregrin7 is immediately available. For a free trial, register at: http://www.i7nw.com/download.

About i7 Networks
i7 Networks is an innovator in Enterprise Mobile Security specializing in BYOD solutions that empower the mobile workforce while retaining the control with the CIO. The company has developed a unique on-premises service that gives enterprise ability to foolproof discover all devices agentless (zero-touch) while deploying is in the offline mode (zero-latency) and still has the ability to control the allow-deny access of the device onto corporate networks. It provides all features irrespective of how you connect. It also provides granular access based on device attributes thus discovered (gateway & access control). The peregrine7 'zero-touch' approach requires zero install or zero configuration, operates with a zero performance deficit, and helps enterprise by denying access to infected devices. It integrates into Microsoft AD, System Center, RADIUS and LDAP. Founded in 2012 by former executives from Bluecoat, HP and Cisco, the company is privately held with patent-pending technology For more information, visit http://www.i7networks.com or follow @i7networks or write to us at info(at)i7nw(dot)com

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Geeta Gouri
Follow us on
Visit website