Вы находитесь на странице: 1из 20

McAfee Delivers Intelligent Security

Security: Silicon to Satellite foundation level requirements for Services, Communication and Compliance
Stephen Poeppe Sales Engineer

IT Forces Impacting Government 2.0


DATA CENTER TRANSFORMATION SITUATIONAL AWARENESS

NEXT GENERATION NETWORK

NEXT GENERATION ENDPOINT WEB AND IDENTITY

COMPREHENSIVE MALWARE PROTECTION

Inherent Complexity
Virtualization

DATA CENTER TRANSFORMATION


Cloud

Continuous Monitoring

Real Time Visibility

Servers / Networks Database Security Encryption

Exploding Data

SITUATIONAL AWARENESS
Compliance Reporting

NEXT GENERATION NETWORK


Data Loss Prevention BYOD / Mobile Enable the Workforce Next Gen IPS

Identity and Access Control

Data Protection

Counter Stealth Attacks Intelligence-Driven Response

App Protection

Identity Achieve Cyber Readiness Protect Devices Web Protection

NEXT GENERATION ENDPOINT


Protect IP Reporting

COMPREHENSIVE MALWARE PROTECTION


Protect Critical Infrastructures

Social Media Protection

WEB AND IDENTITY


Identity Protection

OS Protection (Legacy, Win 7/8, Android, Mac)

Email Protection

Targeted Attacks

Compounded by Business Constraints


Virtualization

DECREASED/FLAT BUDGETS

DATA CENTER TRANSFORMATION


Cloud

Continuous Monitoring

Real Time Visibility

Servers / Networks Database Security

Exploding Data

SITUATIONAL AWARENESS
Compliance Reporting

LIMITED OR UNTRAINED RESOURCES

Encryption Identity and Access Control

NEXT GENERATION NETWORK


Data Loss Prevention

Data Protection

CHANGING BUSINESS DEMANDS

BYOD / Mobile

Enable the Workforce

Next Gen IPS

Counter Stealth Attacks Intelligence-Driven Response

App Protection

Identity Achieve Cyber Readiness Protect Devices Web Protection

NEXT GENERATION ENDPOINT

COMPREHENSIVE MALWARE PROTECTION


Protect Critical Infrastructures

UNPLANNED COMPLIANCE AND REPORTING REQUIREMENTS

Protect IP

Reporting OS Protection (Legacy, Win 7/8, Android, Mac)

Social Media Protection

WEB AND IDENTITY


Identity Protection

Email Protection

Targeted Attacks

The Security Dilemma

CAN?

How to Optimize Your Investment

HOW? CAN?

The Drive to Optimize


The Maturity Model of Enterprise Security

(~3% of IT Budget on Security)

REACTIVE

COMPLIANT/PROACTIVE
(~8% of IT Budget on Security)

(~4% of IT Budget on Security)

OPTIMIZED

TCO (CapEx +)

Security Posture

SECURITY OPTIMIZATION
7

Security Connected
Delivering an Optimized Security Capability

INTEGRATED AND INTELLIGENT SOLUTIONS

REAL TIME SITUATIONAL AWARENESS AND RESPONSE

1 0 1 0 1 0 1 0 1 0 110 0 00 1 011 001 011 001 11 0 10 0 110 100 110 100 0 01 10 11 01 10 01 10 01 10 0 11 00 10 01 10 01 10 01 11 01 01 0101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010

10101010101010101010101010101010101010101010101010101010101010101010101010101010101010101

1010101010101010101010101010101010101010101010

McAfee ConfidentialInternal Use Only

McAfee ConfidentialInternal Use Only

McAfee ConfidentialInternal Use Only

McAfee ConfidentialInternal Use Only

Use Case # 1 - Outage Prevention

McAfee ConfidentialInternal Use Only

Use Case # 1 - Outage Prevention

"I now have the most realtime view of the environment, rather than always looking like I was the last to know".
McAfee ConfidentialInternal Use Only

Use Case # 2 - Blacklisted Applications

All systems now clear of the blacklisted application

McAfee ConfidentialInternal Use Only

Use Case # 2 - Blacklisted Applications

All systems now clear of the blacklisted application

McAfee ConfidentialInternal Use Only

Other questions you can ask

Get Installed Applications contains * from all machines Get OS from all machines Who is logged in and running a particular process? What are the hashes of files that are connecting to a known bad IP address? Get McAfee File reputation from all machines Get McAfee HIPS Status from all machines Get Open Port[80] from all machines Get established connections to external IP
McAfee ConfidentialInternal Use Only

and actions you can take

Stop and start processes or services Add or delete files Read or modify registry keys Install, patch, update, or remove applications Anything else you can think of that you can accomplish on a command line or shell!

McAfee ConfidentialInternal Use Only

Security Connected Platform Vision

ANALYTICS THREAT INTELLIGENCE COUNTERMEASURES AND INTEGRATION SECURITY MANAGEMENT CONTEXT AND ORCHESTRATION
19

Вам также может понравиться