Академический Документы
Профессиональный Документы
Культура Документы
Security: Silicon to Satellite foundation level requirements for Services, Communication and Compliance
Stephen Poeppe Sales Engineer
Inherent Complexity
Virtualization
Continuous Monitoring
Exploding Data
SITUATIONAL AWARENESS
Compliance Reporting
Data Protection
App Protection
Email Protection
Targeted Attacks
DECREASED/FLAT BUDGETS
Continuous Monitoring
Exploding Data
SITUATIONAL AWARENESS
Compliance Reporting
Data Protection
BYOD / Mobile
App Protection
Protect IP
Email Protection
Targeted Attacks
CAN?
HOW? CAN?
REACTIVE
COMPLIANT/PROACTIVE
(~8% of IT Budget on Security)
OPTIMIZED
TCO (CapEx +)
Security Posture
SECURITY OPTIMIZATION
7
Security Connected
Delivering an Optimized Security Capability
1 0 1 0 1 0 1 0 1 0 110 0 00 1 011 001 011 001 11 0 10 0 110 100 110 100 0 01 10 11 01 10 01 10 01 10 0 11 00 10 01 10 01 10 01 11 01 01 0101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010
10101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
1010101010101010101010101010101010101010101010
"I now have the most realtime view of the environment, rather than always looking like I was the last to know".
McAfee ConfidentialInternal Use Only
Get Installed Applications contains * from all machines Get OS from all machines Who is logged in and running a particular process? What are the hashes of files that are connecting to a known bad IP address? Get McAfee File reputation from all machines Get McAfee HIPS Status from all machines Get Open Port[80] from all machines Get established connections to external IP
McAfee ConfidentialInternal Use Only
Stop and start processes or services Add or delete files Read or modify registry keys Install, patch, update, or remove applications Anything else you can think of that you can accomplish on a command line or shell!
ANALYTICS THREAT INTELLIGENCE COUNTERMEASURES AND INTEGRATION SECURITY MANAGEMENT CONTEXT AND ORCHESTRATION
19