* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Slide 1
Multilevel security wikipedia , lookup
IT risk management wikipedia , lookup
Next-Generation Secure Computing Base wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Cyberwarfare wikipedia , lookup
Post-quantum cryptography wikipedia , lookup
Information security wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Airport security wikipedia , lookup
Unix security wikipedia , lookup
Security printing wikipedia , lookup
Microsoft Security Essentials wikipedia , lookup
Wireless security wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Distributed firewall wikipedia , lookup
Mobile security wikipedia , lookup
Intel iAPX 432 wikipedia , lookup
Cybercrime countermeasures wikipedia , lookup
The New Age of Information Security Kimon Skarlatos Country Manager - McAfee May 25, 2017 McAfee-An Intel Company Enterprise Security CAN? How? McAfee-An Intel Company 2 Getting to Optimized: The Maturity Model of Enterprise Security REACTIVE COMPLIANT/PROACTIVE OPTIMIZED (~3% of IT Budget on Security) (~8% of IT Budget on Security) (~4% of IT Budget on Security) TCO (CapEx + OpEx) SECURITY POSTURE SECURITY OPTIMIZATION McAfee-An Intel Company 3 Technology Architecture for Security How Connected Is Your Security? DLP Agent Host IPS Agent Antivirus Agent Encryption NAC Systems Management Agent Audit Agent EVERY SOLUTION HAS AN AGENT EVERY AGENT HAS A CONSOLE EVERY CONSOLE REQUIRES A SERVER EVERY SERVER REQUIRES AN OS/DB EVERY OS/DB REQUIRES PEOPLE, MAINTENANCE, PATCHING WHERE DOES IT END? McAfee-An Intel Company 4 Technology Architecture for Security How Connected Is Your Security? McAfee ePO Server (AV, DLP, NAC, Encryption, PA, Site Advisor) SINGLE AGENT SINGLE CONSOLE McAfee-An Intel Company 5 Use Case: Unknown Threat Non-Optimized Approach ! • Notification & Analysis • Determine Protection Status • React Analysis • Monitor Protection Status Vulnerable Systems Priority Managed Systems Unmanaged Systems Next Steps Existing Countermeasures Exposed Risk AV IPS Manual Scans Ops Team Patch/ Updates IPS FW Log Analysis Policy Config Contact Vendor Monitor IPS AV IPS IPS FW AV AV FW FW AV McAfee-An Intel Company 6 Use Case Unknown Threat: Optimized Approach ! Situational Awareness Recommendations Ops Team Patch Policy Config Contact Vendor Monitor McAfee-An Intel Company 7 Optimized = Value SYSTEMS • Hardware / Software • OS / Database ENVIRONMENTS PROCESSES • Virtualization • SLA Monitoring • Power Management • Training • License • Process Improvements • Maintenance • Metrics / Reporting • Resource Time/FTE Cost • Reduced IR/ Forensics • Legal/ Contracting • Remediation • Compliance/ Audit McAfee-An Intel Company 8 Common Security Use Cases !! Consumerization of IT Unknown Threat Non-Optimized Optimized Non-Optimized Advanced Persistent Threats Optimized Non-Optimized Optimized Situational Analysis Awareness Protection Status Vulnerable Systems Managed Systems Priority Recommendations Unmanaged Systems Next Steps Exposed Risk AV Ops Team Log Analysis Manual Scans Existing Countermeasures IPS FW Ops Team Policy Config Policy Config Patch Patch/ Updates Continuous Compliance Data Protection Contact Vendor Monitor Next Generation Network Security Contact Vendor Monitor IPS Non-Optimized Optimized IPS AV Non-Optimized Optimized IPS IPS FW AV Non-Optimized AV FW FW Optimized AV McAfee-An Intel Company 9 McAfee Security Connected Solution Platform NETWORK SECURITY ENDPOINT SECURITY Malware Protection Device Encryption Application Whitelisting Desktop Firewall Device Control Email Protection Network Access Control Endpoint Web Protection Host Intrusion Protection Mobile Device Management High Assurance Firewall Network Intrusion Prevention Network Access Control Network Behavior Analysis INFORMATION SECURITY Email Security Web Security Data Loss Prevention Encryption Identity & Access Management API and Web Services Security Server & Database Protection Hardware Assisted Security Smartphone and Tablet Protection Virtual Machine and VDI Protection Embedded Device Protection SECURITY MANAGEMENT PARTNER COMMUNITY Security Operations Mgmt Policy Auditing & Management Vulnerability Management Risk Management Compliance Management 10 Security Innovation Alliance McAfee Connected Global Strategic Alliance Partners May 25, 2017 McAfee-An Intel Company McAfee’s Open Platform for Security Risk Management Industry Leadership to Drive Better Protection, Greater Compliance and Lower TCO SIA Associate Partner SIA Technology Partner (McAfee Compatible) Note: Partner list growing rapidly – inquire for current list May 25, 2017 McAfee-An Intel Company 11 What It Takes to Make An Organization SAFE WHAT WE MUST KNOW… Who Am I Dealing With What Is the Purpose What Data Is Accessed Evaluate Risk Datacenter Continuous Monitoring Learning and Intelligence McAfee-An Intel Company 12 What It Takes to Make An Organization SAFE WHAT WE MUST KNOW… DATA WE NEED TO EVALUATE… Who Am I Dealing With IP Address DNS Server Web Reputation Domain(s) What Is the Purpose Affiliations Web Activity Email Address Data Activity What Data Is Accessed Evaluate Risk Network Activity Protocol/Port File Reputation Mail Activity Application URL Sender Reputation Continuous Monitoring Learning and Intelligence Datacenter McAfee-An Intel Company 13 What It Takes to Make an Organization Safe Global Threat Intelligence Threat Reputation Network IPS Firewall 300M IPS attacks/mo. 300M IPS attacks/mo. Web Gateway Mail Gateway 2B Botnet C&C IP Reputation Queries/mo. 20B Message Reputation Queries/mo. Host AV 2.5B Malware Reputation Queries/mo. . Host IPS 300M IPS Attacks/mo. 3rd Party Feed Geo location feeds McAfee-An Intel Company 14 McAfee Security Connected Is Security Optimized McAfee Pursuit of Safe McAfee Approach: • GTI-powered intelligence in depth • Centralized management platform • Extensible architecture • Broadest set of technologies • Flexible delivery options Organizations with McAfee enjoy: • Lower operational costs • Enhanced overall security posture • Partnership with #1 name in Security McAfee-An Intel Company 15