i7 Networks Debuts with First ZERO-Latency & “Connect from Anywhere” Support to its ZERO-Touch BYOD Security Tool

Share Article

Enterprises can now not only discover and fingerprint all devices using our patent-pending algorithm but also prevent all infected, malicious and compromised personal devices from getting into the Corporate network by deploying in the offline mode (Zero-latency). Now they can connect from anywhere be it Corporate Wi-Fi or Public Wi-Fi or even using their 3G/4G/LTE and still provide the same functionality.

BYOD disocvery fingerprinting profiling

i7 Networks Peregrine7

According to recent survey by Dark Reading (July 2013), the second top most mobile security threat is infected devices getting into the corporate network.

i7 Networks, an innovator in enterprise mobile security specializing in BYOD solutions, today announced the launch of the world's first on-premise Zero-touch, Zero-latency as well as “connect from anywhere” mobile security service. i7 Networks peregrine7 is the first mobile specific network access control (mNAC(tm)).

"Every mobile device is a potential attack point-of-entry," said Manjunath Gowda, CEO of i7 networks. “A dynamic check whether the device is infected or not before allowing into the network is very critical.” "The mobile workforce is demanding better mobile productivity and collaboration without affecting the user experience or tracking them, but IT won't risk security, compliance or privacy breaches. i7’s peregrine7 offers the perfect balance between IT control and user flexibility. Also you don't have to go to the cloud to offer such a service and your data is all safe in the premises.” All these are done without installing any agent or a client or an app on the mobile device itself.

According to a recent survey by Dark Reading (July 2013), the second top most mobile security threat is “infected devices getting into the corporate network” (close first being sensitive data on the device). This is exactly what we solve. We dynamically discover & fingerprint all devices that are trying to enter the enterprise, dynamically calculate the Device Vulnerability Index (DVI(tm)) based on the malicious nature, existing vulnerabilities and whether the device is compromised or not. Based on these parameters decide whether to allow or deny the device and prevent any infected or highly vulnerable device getting onto the corporate network.

We have also included the “Connect from Anywhere” feature and it provide the same mobile network access controls when they connect from public Wi-Fi or 3G/4G/LTE too.

A recent study by Checkpoint showed that 79% businesses had a mobile incident last year alone and the cost was $500,000 per such mobile incident for large enterprises, and was $100,000 for an SMB.

"While employees expect anytime, anywhere access to their apps, content and data to get their work done, CIOs are now expected to support BYOD within their corporate environment and still need to have that control over the access to corporate network as well as corporate assets, as well as adhere to all compliance rules. Peregrine7 is a truly innovative solution that gives users complete BYOD freedom with access to all their corporate apps and data & not just email, while providing peace of mind for CIO in keeping track completely of which device did what, keep an eye on the malicious traffic from the device and deny the access dynamically. Also control what access can be given to what device and when; delivered in a way that is very low risk as far as deployment is concerned (zero-latency) and that's incredibly lightweight for CIOs to deploy and manage," said i7’s CTO – Chandra M Shekar.

Peregrin7 is immediately available. For a free trial, register at: http://www.i7nw.com/download.

About i7 Networks
i7 Networks is an innovator in Enterprise Mobile Security specializing in BYOD solutions that empower the mobile workforce while retaining the control with the CIO. The company has developed a unique on-premises service that gives enterprise ability to foolproof discover all devices agentless (zero-touch) while deploying is in the offline mode (zero-latency) and still has the ability to control the allow-deny access of the device onto corporate networks. It provides all features irrespective of how you connect. It also provides granular access based on device attributes and location. The peregrine7 'zero-touch' approach requires zero install or configuration, operates with a zero performance deficit, and helps enterprise by denying access to infected devices. It integrates into Microsoft AD, System Center, RADIUS and LDAP. Founded in 2012 by former executives from Bluecoat, HP and Cisco, the company is privately held with patent-pending technology. For more information, visit http://www.i7nw.com or follow @i7networks or write to us at info(at)i7nw(dot)com.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Geeta Gouri
Follow us on
Visit website