SlideShare a Scribd company logo
1 of 22
Download to read offline
Sierra vApp:
Browser Isolation
2
Addressing the Modern Workforce
Web-delivered
malware
Threats in encrypted web
traffic, web-based email
Sensitive corporate
apps
Lack of control or
security over web apps,
mobile apps
High risk
access
Banks spend $ buying credit
cards from dark web, IT &
SecOps researching threats
3
What’s Needed
Seamless browser
isolation for PC and
mobile devices
Scan, detonate file
downloads; inspect SSL-
pinned sites
Security controls for
web & mobile apps
Use multi-factor auth,
geolocation, watermark
Audit trail of all user
access
Reduce risk of data leakage
without needing to integrate
MDM, VPN, server logs
4
VDI Isn’t the Solution
Expensive
VDI Shortcomings
PC apps not suited for
touch input or mobile
screen sizes
VDI = $1000/user/year
Citrix + MS CAL
Not designed for
Edge, Expensive
Cloud Hosting
1 Microsoft Desktop OS $187 per user, Citrix $100 per user
High Compute
Resources
Designed for
Windows
5
vApp Browser
Isolation
There is a solution…
6
Provide remote access to:
• Android, Apple iOS and Windows
Phone with client apps
• Any HTML 5-enabled device
vApp services hosts Linux desktop apps & Browser on remote servers
Centralize app management to:
▪ Eliminate need to install End-Point
security and other expenses
Isolation and Secure Data Storage
7
Lower TCO, Cloud, Edge & In-house
High Performance & Light weight Docker based
solution
Security like Dual Factor Authentication, 4096 SSL,
Load Balancing require expensive 3rd party solution
Optimized for B/W & Latency sensitive apps
Lower TCO. <$15 Per-User
8
Isolation and Secure Data Storage
Sierra vApp Shield
4096-bit ECDHE
Encryption
Dual factor
authentication
Sierra vApp:
• Access any where from both Mobile and
Desktop
• Integrated Solution
• Secure File transfer
End user
9
Universal Isolation solution for Desktop and
Mobile
Security
Gateway
Clients
Authentication
Server
10
Browser Isolation: Cloud & Edge Ready
• Simplified Management
and Remote
administration
• Can be deployed in the
Cloud or Edge.
• Unified solution,
allowing user to migrate
to host with closest
geographical proximity
Firewall
Management
Server Farm
Power Users
IT Admin
Kiosk User
Scale To Cloud
REST APIs
Scale To Edge
11
Browser Isolation – Scaling with Docker
• Each Instance is fully isolated with
Docker
• No host dependency
• OpenGL, Display and Audio are all
rendered within a self-contained
Image/Container
• Can be deployed in Edge for lower
latency
• Transparent HTTP Proxy Mode
• Remote Desktop Mode
Sierra-X
Pulse Audio
User Input
Camera & GPS
12
Strong Authentication
Prevent unauthorized access with:
• Client certificates
• One-time password (sent via text message)
• Restricting access based on geographic location
• Brute force login protection
• Geofencing
• Telco Network Access Check & SIM check
Ensure only legitimate users access your data
MMR, Low
Latency
And Other
Highlights
14
Video Rendered as Display -vs-
MMR
Codec
Final
Composition via
GLES API
m.youtube.com
Display Data Stream from Cloud
m.youtube.com
Codec
m.youtube.c
om
Display Data + Encoded Video in Separate Channels
m.youtube.com
Without MMR
▪ Low Quality
▪ High
Bandwidth
▪ High Server
consumption
MMR
▪ High Quality
▪ Low Bandwidth
▪ No Server Load
▪ 4K@60fps
Video
15
DTLS with Error resiliency – Low Latency
Data
Ack
N/W
Latency
Time
TCP/SSL
▪ End to End data latency
will be 2-4x higher than
network latency
▪ Doesn’t handle burst
traffic
Data
DTLS
▪ Error resiliency is built in
VMI protocol itself
▪ No re-transmission
▪ Data is delivered as quick
as possible
16
Edge Optimized
Security, Performance, Scalability
17
Cloud, Edge, In-house
WIFI,MicroCell
On-siteDevices
On-prem Server
Edge Network
(<20msec latency)
RoamingUsers
Storage,
Managemen
t
Hyper Scale Cloud for non-latency
sensitive Apps like Browser, Email
18
Best In Class Solution
Performance Features Sierraware
Low Latency <90msec
Support HW GPU P
Lower Cost with Application Virtualization P
Adaptive Frame Refresh P
30/60fps
Native Font Rendering Apps, Webpages are
identical to native Device
19
Enhanced Security
Security Features Sierraware
Integrated Antivirus P
End-to-End Certificate Pinning for Man-in-
Middle Protection
P
Client App Tampering Check P
Encrypted Server Storage P
Native Two-Factor Authentication P
Passthrough Client Certificate P Push Client Cert to
Hosted Apps automatically
Watermark P
20
User Experience
Features Sierraware
Multimedia Re-direction 4K@60fps P
Wallpaper and User profile Sync P
Virtual Launcher & Hardware Button P
Background Notifications P
Pixel Style launcher and Native
Android User experience
P
Support for I/O All native I/Os like Camera, GPS,
Touch/Tilt, Audio are supported
Support apps like Skype, Kakao P
21
Easy Administration and Flexible
Features Sierraware
Lost Device Tracking P
Zero Configuration P
Active Directory Integration P
App based policy Each app can have separate
network, geofencing policies
User session recording P
REST API for scripting P
On Demand Scaling P
22
The End
www.sierraware.com

More Related Content

What's hot

Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sraMotty Ben Atia
 
KVM-Over-IP
KVM-Over-IPKVM-Over-IP
KVM-Over-IPCodero
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final Presentationshawn kelly
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentationdavebrosnan
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateAlex Kwan
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Zscaler
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Controlrkoscak
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Netpluz Asia Pte Ltd
 
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSKDefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSKPunky Duero
 
3DConsulting_Presentation
3DConsulting_Presentation3DConsulting_Presentation
3DConsulting_PresentationJoseph Baca
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéMarketingArrowECS_CZ
 

What's hot (20)

Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sra
 
KVM-Over-IP
KVM-Over-IPKVM-Over-IP
KVM-Over-IP
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final Presentation
 
EdgeWallFlyer2016
EdgeWallFlyer2016EdgeWallFlyer2016
EdgeWallFlyer2016
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone Update
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Control
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017
 
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSKDefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
 
Novinky F5
Novinky F5Novinky F5
Novinky F5
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
3DConsulting_Presentation
3DConsulting_Presentation3DConsulting_Presentation
3DConsulting_Presentation
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 

Similar to Sierra vApp: Browser Isolation Solution for Modern Workforce

Citrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureCitrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureEmirates Computers
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overviewdragnetNZ
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityDigicomp Academy AG
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Mersive Solstice SDS Management Software
Mersive Solstice SDS Management SoftwareMersive Solstice SDS Management Software
Mersive Solstice SDS Management SoftwarePaul Richards
 
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...Carsten Rhod Gregersen
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubiplotnikov
 
Hypori Performance Webinar
Hypori Performance WebinarHypori Performance Webinar
Hypori Performance WebinarGrafic.guru
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.sflynn073
 
How many way to sale f5 for enterprise
How many way to sale f5 for enterpriseHow many way to sale f5 for enterprise
How many way to sale f5 for enterpriseBach Phan
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustInformation Security Services SA
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustInformation Security Services SA
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?Digicomp Academy AG
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 

Similar to Sierra vApp: Browser Isolation Solution for Modern Workforce (20)

Citrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureCitrix Enterprise Access Infrastructure
Citrix Enterprise Access Infrastructure
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overview
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise Mobility
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
Mersive Solstice SDS Management Software
Mersive Solstice SDS Management SoftwareMersive Solstice SDS Management Software
Mersive Solstice SDS Management Software
 
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech club
 
Hypori Performance Webinar
Hypori Performance WebinarHypori Performance Webinar
Hypori Performance Webinar
 
Sunray Presentation
Sunray PresentationSunray Presentation
Sunray Presentation
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.
 
How many way to sale f5 for enterprise
How many way to sale f5 for enterpriseHow many way to sale f5 for enterprise
How many way to sale f5 for enterprise
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 

More from Sierraware

Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD SuccessSierraware
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and FinanceSierraware
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101Sierraware
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMISierraware
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware
 

More from Sierraware (9)

Cloud gaming
Cloud gamingCloud gaming
Cloud gaming
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD Success
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor
 

Recently uploaded

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Recently uploaded (20)

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

Sierra vApp: Browser Isolation Solution for Modern Workforce

  • 2. 2 Addressing the Modern Workforce Web-delivered malware Threats in encrypted web traffic, web-based email Sensitive corporate apps Lack of control or security over web apps, mobile apps High risk access Banks spend $ buying credit cards from dark web, IT & SecOps researching threats
  • 3. 3 What’s Needed Seamless browser isolation for PC and mobile devices Scan, detonate file downloads; inspect SSL- pinned sites Security controls for web & mobile apps Use multi-factor auth, geolocation, watermark Audit trail of all user access Reduce risk of data leakage without needing to integrate MDM, VPN, server logs
  • 4. 4 VDI Isn’t the Solution Expensive VDI Shortcomings PC apps not suited for touch input or mobile screen sizes VDI = $1000/user/year Citrix + MS CAL Not designed for Edge, Expensive Cloud Hosting 1 Microsoft Desktop OS $187 per user, Citrix $100 per user High Compute Resources Designed for Windows
  • 6. 6 Provide remote access to: • Android, Apple iOS and Windows Phone with client apps • Any HTML 5-enabled device vApp services hosts Linux desktop apps & Browser on remote servers Centralize app management to: ▪ Eliminate need to install End-Point security and other expenses Isolation and Secure Data Storage
  • 7. 7 Lower TCO, Cloud, Edge & In-house High Performance & Light weight Docker based solution Security like Dual Factor Authentication, 4096 SSL, Load Balancing require expensive 3rd party solution Optimized for B/W & Latency sensitive apps Lower TCO. <$15 Per-User
  • 8. 8 Isolation and Secure Data Storage Sierra vApp Shield 4096-bit ECDHE Encryption Dual factor authentication Sierra vApp: • Access any where from both Mobile and Desktop • Integrated Solution • Secure File transfer End user
  • 9. 9 Universal Isolation solution for Desktop and Mobile Security Gateway Clients Authentication Server
  • 10. 10 Browser Isolation: Cloud & Edge Ready • Simplified Management and Remote administration • Can be deployed in the Cloud or Edge. • Unified solution, allowing user to migrate to host with closest geographical proximity Firewall Management Server Farm Power Users IT Admin Kiosk User Scale To Cloud REST APIs Scale To Edge
  • 11. 11 Browser Isolation – Scaling with Docker • Each Instance is fully isolated with Docker • No host dependency • OpenGL, Display and Audio are all rendered within a self-contained Image/Container • Can be deployed in Edge for lower latency • Transparent HTTP Proxy Mode • Remote Desktop Mode Sierra-X Pulse Audio User Input Camera & GPS
  • 12. 12 Strong Authentication Prevent unauthorized access with: • Client certificates • One-time password (sent via text message) • Restricting access based on geographic location • Brute force login protection • Geofencing • Telco Network Access Check & SIM check Ensure only legitimate users access your data
  • 14. 14 Video Rendered as Display -vs- MMR Codec Final Composition via GLES API m.youtube.com Display Data Stream from Cloud m.youtube.com Codec m.youtube.c om Display Data + Encoded Video in Separate Channels m.youtube.com Without MMR ▪ Low Quality ▪ High Bandwidth ▪ High Server consumption MMR ▪ High Quality ▪ Low Bandwidth ▪ No Server Load ▪ 4K@60fps Video
  • 15. 15 DTLS with Error resiliency – Low Latency Data Ack N/W Latency Time TCP/SSL ▪ End to End data latency will be 2-4x higher than network latency ▪ Doesn’t handle burst traffic Data DTLS ▪ Error resiliency is built in VMI protocol itself ▪ No re-transmission ▪ Data is delivered as quick as possible
  • 17. 17 Cloud, Edge, In-house WIFI,MicroCell On-siteDevices On-prem Server Edge Network (<20msec latency) RoamingUsers Storage, Managemen t Hyper Scale Cloud for non-latency sensitive Apps like Browser, Email
  • 18. 18 Best In Class Solution Performance Features Sierraware Low Latency <90msec Support HW GPU P Lower Cost with Application Virtualization P Adaptive Frame Refresh P 30/60fps Native Font Rendering Apps, Webpages are identical to native Device
  • 19. 19 Enhanced Security Security Features Sierraware Integrated Antivirus P End-to-End Certificate Pinning for Man-in- Middle Protection P Client App Tampering Check P Encrypted Server Storage P Native Two-Factor Authentication P Passthrough Client Certificate P Push Client Cert to Hosted Apps automatically Watermark P
  • 20. 20 User Experience Features Sierraware Multimedia Re-direction 4K@60fps P Wallpaper and User profile Sync P Virtual Launcher & Hardware Button P Background Notifications P Pixel Style launcher and Native Android User experience P Support for I/O All native I/Os like Camera, GPS, Touch/Tilt, Audio are supported Support apps like Skype, Kakao P
  • 21. 21 Easy Administration and Flexible Features Sierraware Lost Device Tracking P Zero Configuration P Active Directory Integration P App based policy Each app can have separate network, geofencing policies User session recording P REST API for scripting P On Demand Scaling P