Together. More Secure

Enhancing the Cybersecurity of Small Medium Enterprise (SME)

Cybersecurity

Journey with Genians

  • What are the cybersecurity challenges SMEs face today, such as those of a beauty supplier in NY?
  • What is the first thing SMEs should do?
  • Why is Network Access Control (NAC) required to help SMEs become more secure?
  • Why is Genians Next-Gen NAC the right choice for SMEs cybersecurity?
  • Learn more about Genians

“Expects to see 20 billion IoT devices and more than 65% of enterprises adopt IoT by 2020. Unfortunately, most of these devices have little or no protection at the software and infrastructure levels.”

“Companies have up to 70 different security vendors installed and in their company to solve problems.”

“62% of companies are actively consolidating their cybersecurity vendors and looking for enterprise class providers”

“69% of companies see compliance mandates driving spending.”

“43 percent of cyber attacks target small business.”

“60 percent of small companies go out of business within six months of a cyber attack.”

  • What are the essentials of a cybersecurity foundation?
  • How can I get security empowered by compliance?
  • How reliable and affordable is the solution?
  • Is it sustainable?

“I just don’t want to add another touch point as I am busy with our existing cybersecurity solutions, which are not working efficiently enough to catch up with current business demands, as well as compliance.

I could not figure out a way to solve my daily issues caused by IT security fundamentally. Also, budget is another headache”

- John, IT Manager

A beauty supply company in NY

SME

Cybersecurity

Journey with Genians

  • What are the cybersecurity challenges SMEs face today, such as those of a beauty supplier in NY?
  • What is the first thing SMEs should do?
  • Why is Network Access Control (NAC) required to help SMEs become more secure?
  • Why is Genians Next-Gen NAC the right choice for SMEs cybersecurity?
  • Learn more about Genians

The Critical 3 Steps for Cybersecurity

BASIC

FOUNDATIONAL

ORGANIZATIONAL

NAC

Find out what is existing and happening in your network

Manage your network access by assessing policy compliance

Automate IT security practice by integrating with IT resources

By implementing Center for Internet Security (CIS) BASIC Control,

your organization can defeat over 85% of common attacks

* Network Access Control (NAC) is the key for the BASIC Control.

Common Requirements for Regulatory Compliances

CIS BASIC Controls

PCI DSS

HIPAA

ISO 27002

Cloud Security Alliance

NIST

NSA

NERC CIP

Saudi AMA

1. Inventory and Control of Hardware Assets

2. Inventory and Control of Software Assets

3. Continuous Vulnerability Management

4. Controlled Use of Administrative Privileges

5. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers

6. Maintenance, Monitoring and Analysis of Audit Logs

By implementing Center for Internet Security (CIS) BASIC Controls, your organization can defeat over 85% of common attacks.

Cybersecurity

Journey with Genians

  • What are the cybersecurity challenges of SMEs, like a beauty supplier in NY?
  • What’s the first thing SMEs should do?
  • Why is Network Access Control (NAC) required to help SMEs become more secure?
  • Why Genians Next-Gen NAC is the right choice for SME’s cybersecurity?
  • Learn more about Genians

Maintenance, Monitoring and Analysis of Audit Logs

Monitor every single access event by devices and log all access history as part of the audit trail.

Inventory and Control of Hardware Assets

Inventory and Control of Software Assets

Continuous Vulnerability Management

Controlled Use of Administrative Privileges

Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers

Detect all IP-enabled devices on the network and identify their specific platform information

Collect installed software information on all devices.

Check the status of IT security policy compliance and remediate non-compliant devices.

Authorize devices/users based on users’ roles and responsibilities.

Inspect detected devices’ configuration and security settings and maintain security baseline.

1

2

3

4

5

6

Basic CIS Controls Guide

Network Access Control Can

Why Next-Gen NAC is Demanded?

Challenges

  • Technology: Difficult to deploy and maintain because of many dependencies
  • Affordability: Very expensive

SO WHAT IS NAC AGAIN?

NAC monitors IP-enabled devices on the network and performs compliance checks to ensure that all connected devices are identified, classified, authorized, and given policy-based access control to ensure the highest levels of IT security, availability, and resilience.

IT’S TIME TO SHARE AND EXPAND NAC CAPABILITIES FOR THE IOT ERA

  • Various devices in the IoT era must be manageable without disturbing dynamic networking environments.
  • NAC should be easy to manage and affordable for any organizations regardless of industry or company size.

Benefits

  • Full visibility and network access control for entire networks
  • Unified IT security policy management

However, only larger organizations experience the benefits of NAC due to these challenges.

Cybersecurity

Journey with Genians

  • What are the cybersecurity challenges SMEs face today, such as those of a beauty supplier in NY?
  • What is the first thing SMEs should do?
  • Why is Network Access Control (NAC) required to help SMEs become more secure?
  • Why is Genians Next-Gen NAC the right choice for SMEs cybersecurity?
  • Learn more about Genians

Why Genians?

THE MOST TRUSTED COMPANY: GENIANS

Since 2005, Genians’ Next-Gen NAC solution has been deployed by more than 1,200 organizations of all sizes and in all industry verticals, including global Fortune 500 companies, the government, military, energy, finance, healthcare, education, and more. These organizations now possess clear visibility into their entire networks and are not only able to identify but to classify all network assets and automate compliance enforcement with IT security policies in real-time via integration and orchestration with existing IT security solutions..

INDUSTRY LEADER

Genians delivers an enterprise-grade NAC solution by leveraging Cloud technology for businesses of all sizes, including those that struggle with technical challenges and budget issues, especially SMEs.

Networks

Devices

Users

Network Surveillance

Network Access Control

Network Security Automation

GATHERING INTELLIGENCE

TAKING ACTIONS

Network Surveillance

Network Access Control

Network Security Automation

Next-Gen Network Access Control

Compliance

Security

Complete Visibility powered by Device Platform Intelligence and Context-based Access Control for the IoT era

A Critical Control for Regulation

Actionable Compliance

Provides network surveillance powered by DPI and performs ongoing compliance checks to ensure that all connected devices are automatically identified, classified, authorized, and given policy-based access control.

It also provides the following major features:

  • Mobile, BYOD, Guest
  • IP Address Management (IPAM)
  • Switch Port Management
  • WLAN Security
  • Endpoint Configuration Management
  • Built-in Services (DHCP, RADIUS, Syslog)

SURVEILLANCE

POLICY ENFORCEMENT

AUTOMATION

ACCESS

NETWORK

CONTROL

Device, User

IP/MAC, Switch Port, SSID

Authentication, Authorization Remediation, Auditing

NGFW, IDS/IPS, VM, MDM, SIEM

APT, DLP, EPP, Intranet system

Device Platform Intelligence

Device

Platform

Intelligence

Genian NAC incorporated with Device Platform Intelligence (DPI) can present the most accurate device identity, along with its contextual and risk information in order to enhance network visibility and secure network access for the IoT era.

DPI can be shared through the Genians Cloud.

IDENTITY

Distinct information

  • The name of the Device Platform consists of: manufacturer, device name, model number (Integrated with the Common Platform Enumeration (CPE) dictionary)
  • An actual image of each device platform
  • The list of device fingerprinting sources
  • Network connection type (Wired, Wireless)
  • Release date

CONTEXT

Access Information

  • IP/MAC, SSID, Switch Port
  • User information

Business Information

  • End of life (EOL)
  • End of support (EOS)
  • Manufacturer business status / location / homepage

Extended Information

  • Linked to Product webpage
  • Linked to Google search engine

RISK

Technology Vulnerability

  • Integrated with Common Vulnerabilities and Exposures (CVE)
  • Reports device platforms exposed to vulnerability issues in real time
  • Alerts and notifications

Business Vulnerability

  • Reports manufacturer / vendor going out of business or being acquired, which can introduce systems that cannot be upgraded or patched

Network

Surveillance

  • The most accurate device platform
  • Real time monitoring for compliance
  • Detects abnormal network traffic

COVERAGE

  • Monitors heterogeneous network environments: Wired, Wireless, ICS
  • Monitors wireless packets by Wireless Sensors or Agents
  • Monitors all managed, unmanaged, and even legacy networking devices

DETECTION

  • Provides the most accurate device platform information and sees access trends
  • Discovers contextual access information (What, Who, Where, When, How)
  • Detects compliance status change over time

OBSERVATION

  • Finds non-compliant, unknown, rogue, misconfigured devices
  • Discovers abnormal network traffic (e.g. ARP Spoof/Bomb, MAC/IP Cloning, Port scanning, Invalid Gateway)
  • Presents personalized information through fully customizable dashboards

DEVICE PLATFORM INTELLIGENCE FOR SURVEILLANCE

Presents the most accurate device identity, along with its contextual and risk information in order to enhance network visibility for the IoT era.

Network

Access Control

  • Dynamic node grouping
  • Granular policy management
  • Layered security

DYNAMIC CLASSIFICATION

  • Condition-based grouping (Over 500 predefined conditions)
  • Policy assignment based on the status change of endpoint compliance

MULTI-LAYERED SECURITY

  • Layer 2: ARP Poisoning (using Network Sensor)
  • Layer 3: TCP reset (using Mirror Sensor)
  • Layer 3: Inline enforcer (Dual-homed Gateway)
  • Agent: NIC/Power Control, Alert Popup
  • 802.1x: Built-in RADIUS server
  • DHCP: Built-in DHCP server
  • Integration: Firewall, Switch port shutdown
  • Captive Web Portal for guest, non-compliant

DEVICE PLATFORM INTELLIGENCE FOR NETWORK ACCESS CONTROL

Classify device groups based on dynamic security compliance requirements. Security policies can thus be enforced more effectively for each group to maintain a security baseline for the IoT era.

Network

Security Automation

  • Next-Gen Firewall
  • IDS/IIPS
  • VM
  • MDM
  • SIEM
  • APT
  • DLP
  • Intranet

AUTOMATE DAILY IT SECURITY OPERATIONS & CONTROLS

Genian NAC integrates a wide range of IT security and business solutions into each enterprise’s Policy Server to ensure unified policy enforcement. Genian NAC supports custom integration using Syslog, Webhook, REST API, and Syslog.

Perimeter Security

  • Give: IP-User information for user-aware policy
  • Take: Receive Infected Endpoint IP or MAC then quarantine it

Threat Detection

  • Give: IP information (user, history, platform.)
  • Take: Receive Infected Endpoint IP or MAC than quarantine it

Enterprise Mobility

  • Give: New device information
  • Take: Block mobile devices if EMM agent is not installed

How It Works

Genian NAC uses Layer 2- based Network Sensors

  • Out-of-band
  • No network config changes
  • Real time network surveillance
  • Granular access control
  • Easy scalability
  • Runs on virtual or physical machines (Intel-based)

CLOUD

  • Review and refine Device Platform Intelligence (DPI)
  • Deliver DPI to Policy Servers regularly
  • Run Policy Server Instance

NETWORK SENSOR

  • Scan and assess networks (Wired, Wireless, Virtual)
  • Enforce access control policies
  • Perform as Proxy Server for Windows Updates
  • Support 802.1q Trunk Port

POLICY SERVER

  • Manage data and policies
  • Manage endpoint configurations
  • Provide report and auditing
  • Provide built-in Services (DHCP, RADIUS, Syslog)

AGENT

  • Control installed HW/SW
  • Control desktop configuration setting
  • Detect status change in real time
  • Perform incremental updates
  • Perform Wi-Fi Sensor
  • Support Windows/macOS/Linux

You Pick. We Deliver.

FLEXIBLE DEPLOYMENT OPTIONS

FREE & AFFORDABLE EDITIONS

BASIC (FREE UP TO 300)

Network Surveillance

PROFESSIONAL

Network Access Control

ENTERPRISE

Network Security Automation

SOFTWARE

Host Genian NAC on your local server

CLOUD-MANAGED

Run your Policy Server in the cloud

MANAGED SERVICE PROVIDER (MSP) READY

Build your own NAC-as-a-Service

License based on # of active devices

Easy Scalability. No Disruption.

Genian NAC at a Glance

Genians’ Layer 2-based sensing technology ensures full network surveillance for all connected devices in real time and provides dynamic access control to maintain compliance with IT security policies without disturbing existing network infrastructure. It also provides the most essential cybersecurity features out of the box.

  • Network Surveillance
  • Device Platform Intelligence (DPI)
  • Network Access Control
  • BYOD, Guest Management
  • IP Address Management
  • Switch Port Management
  • WLAN Security
  • Endpoint Configuration Management
  • Network Security Automation

Genian NAC can be delivered by three deployment options: On-prem, Cloud-managed, NAC-as-a-Service by the most affordable edition models.

Cybersecurity

Journey with Genians

  • What are the cybersecurity challenges SMEs face today, such as those of a beauty supplier in NY?
  • What is the first thing SMEs should do?
  • Why is Network Access Control (NAC) required to help SMEs become more secure?
  • Why is Genians Next-Gen NAC the right choice for SMEs cybersecurity?
  • Learn more about Genians

Overview

Genians delivers the industry’s leading cybersecurity solution, which helps maintain network surveillance and access control of all IT assets (Networks, Devices, Users) and ensures they are operating at the highest level of security and compliance in an automated fashion.

Business Name

Genians, Inc.

Main Product

Genian NAC

Established

2005

Publicly Traded

263860:KS Listed on KOSDAQ

Employees

123 (70% are engineers)

Customers

Over 1,200

#1

Korean Market

1,200

Happy Customers

14 Years

Proven NAC

#1

Next-Gen NAC

A Holistic Approach to Cybersecurity

GATHERING INTELLIGENCE

TAKING ACTIONS

Threats

Networks

Devices

Users

Cybersecurity Awareness

Endpoint Detection & Response

Network Surveillance

Network Access Control

Network Security Automation

Education

Training

Leadership

Business Name

Genians, Inc.

Main Product

Genian NAC

Established

2005

Publicly Traded

263860:KS Listed on KOSDAQ

Employee s

123 (70% are engineers)

Customers

Over 1,200

1. Korean NAC Market Pioneer and leader

Early Market Formation in 2005

Layer 2-based NAC

2. Korean Government’s Trusted Partner

3. The Leader of Next-Gen NAC for the IoT era

Designated a cybersecurity company to lead Digital Transformation

NAC as the foundation of cybersecurity framework for the IoT era

Cloud-managed NAC

NAC-as-a-Service

Growth

Business Name

Genians, Inc.

Main Product

Genian NAC

Established

2005

Publicly Traded

263860:KS Listed on KOSDAQ

Employees

123 (70% are engineers)

Customers

Over 1,200

Genians has seen 2X growth in sales revenue over the last five years. Achieved more than 20% operating margin for the last 3 years

Customers

Over 1,200 including global Fortune 500 companies, the government, the military, energy, finance, healthcare, education, and more.

  • Network Surveillance
  • Network Access Control
  • Network Security Automation

Enterprise

Financial

Gov/Military

Education

Infra/Energy

Healthcare

Genians at a Glance

Business Name

Genians Inc.

Established

January 6th, 2005

Employees

123

Address

Headquarters and R&D center

12F A, Pyeongchon HIFIELD Knowledge industrial Center, 66 Beolmal-ro, Dongan-gu. Anyang-si, Gyeonggi-do, 14057, South Korea

Global Business

50 High Street, Suite 45

North Andover, MA, 01845 USA

CEO

Dong-bum Lee

Initial Capital

2.4M USD

Business Domain

Cybersecurity (Network Access Control)

Major Product

Genian NAC

2005 ~ 2019

CEO, Genians Inc.

2018

Senior Vice President, KISIA

2016

Awarded the Korean Prime Minister’s Commendation

2002 ~ 2004

Advisory Board member of Korean Supreme Prosecutors’ Office

1998 ~ 2004

CTO, Oullim Security, Inc.

1995 ~ 1997

Doosan Corporation I&C

263860:KS

KOSDAQ

Stakeholders

Ownership

Major

Dong-bum Lee and 5 co-founders

50.63%

Investor

Premier Growth-M&A Investment

10.00%

Employees

Stock Ownership association

00.47%

Genians Named a Representative Vendor in

Gartner’s 2018 Market Guide for Network Access Control

www.genians.com

Together. More Secure

Disclaimer

This presentation has been prepared by Genians, Inc. (“Genians” or “the Company”) for potential customers, partners, investors, solely for informational purposes. The information contained herein is intended to assist prospective investors in making their own evaluation of the Company and does not purport to be all-inclusive or to contain all of the information a prospective or existing investor may desire. In all cases, interested parties should conduct their own investigation and analysis of the Company and the data set forth in this information. Genians makes no representation or warranty as to the accuracy or completeness of this information and shall not have any liability for any representations (expressed or implied) regarding information contained in, or for any omissions from, this information or any other written or oral communications transmitted to the recipient in the course of its evaluation of the Company.

This Information includes certain statements and estimates provided by the Company with respect to the projected future performance of the Company. Such statements, estimates and projections reflect various assumptions by management concerning possible anticipated results, which assumptions may or may not be correct. No representations are made as to the accuracy of such statements, estimates or projections. Prospective investors will be expected to have conducted their own due diligence investigation regarding these and all other matters pertinent to investment in the Company. This presentation may contain statements that are not historical facts, referred to as “forward looking statements.” The corporation’s actual future results may differ materially from those suggested by such statements, depending on various factors including those described in filings made with the KOSDAQ. This presentation is strictly confidential and any disclosure, use, copying and circulation of it is prohibited without the written consent of the Company.

Enhancing the Cybersecurity of SMEs - Google Slides