Presentation is loading. Please wait.

Presentation is loading. Please wait.

Applying Next Generation Security Principles to Todays Changing Networks.

Similar presentations


Presentation on theme: "Applying Next Generation Security Principles to Todays Changing Networks."— Presentation transcript:

1 Applying Next Generation Security Principles to Todays Changing Networks

2 Confidential McAfee Internal Use Only 2Title of presentation Every 18 Months, the Amount of Data on the Planet Doubles But to Your Network Team, It Probably Feels Like the Data Doubles Every Few Weeks…

3 Confidential McAfee Internal Use Only 3Title of presentation No Facebook 2006: 440K salesforce.com subscriptions June 2008 No iPhone apps Facebook: 400M+ users, 52K apps 2010: 2.1M salesforce.com subscriptions June billion iPhone apps downloaded 1 Day: 148K machines infected w/ Bots (Hourly botnet rental: $9) 1 Day: 1M victims of scareware scams 1 Day: 33K+ malware samples analyzed by McAfee

4 Confidential McAfee Internal Use Only 4Title of presentation Avg GDP Growth (USDL) How Do These Facts Impact Us? IT security product sales growth Avg (IDC) Growth, Network Security appliances and sw (Infonetics) Growth in unique malware samples, last 6 months (McAfee) Average incidents per year, large co (Bloor) Average cost of large incident 2010, large co (Bloor)

5 Confidential McAfee Internal Use Only 5Title of presentation Avg GDP Growth (USDL) How Do These Facts Impact Us? IT security product sales growth Avg (IDC) Growth, Network Security appliances and sw (Infonetics) Growth in unique malware samples, last 6 months (McAfee) Average incidents per year, large co (Bloor) Average cost of large incident 2010, large co (Bloor)

6 Confidential McAfee Internal Use Only 6Title of presentation Key Challenges We Face in Architecting Next Generation Security Open & Agile Networks.Targeted Threats, APTs 1.Advanced and targeted attacks 2.Insider Threats & data loss concerns, needle in haystack 3.MalApps the new reality; must detect and prevent Operational Efficiency 1.Spending controls (Opex, Capex), resource re- allocation 2.Enable business (data centers, consolidation, segmentation, virtualization 3.Streamline compliance reporting 1.Apps over port 80, on- premise, SaaS, Web 2.0, lack of visibility, control 2.Consumerization of IT 3.Perimeter disappearing; Must extend trust model 4.Difficult to enforce policies

7 Confidential McAfee Internal Use Only 7Title of presentation Recent Customer Conversations… Network security shouldnt be the brakes on the car that hold us back…it should be like the stability control enabling us to take the twists and turns faster…but safer… …I need to spend time deploying more apps…not time on controlling them… …For my datacenter upgrade – give me world-class protection… cut costs 40%…dont slow me down… …To beat competitors to market, I want to extend trust boundaries for collaboration with partners & contractors… …Advanced Persistent Threats? Show me the needle in the haystack without human analysis…

8 Confidential McAfee Internal Use Only 8Title of presentation Conventional Approach to Network Security Ticket Oriented ResolutionProtection Focused on Identifying Attack Packets Configuration Focused on FeaturesMulti-Vendor Strategies How to get to resolution? File tickets. Wait.How to protect? Find attack packets on wire How to implement policy? Rely on product features.Defense in Depth? Manage multiple silod products.

9 Confidential McAfee Internal Use Only 9Title of presentation Conventional Gets Obsolete Fast…How Fast We Forget…

10 Confidential McAfee Internal Use Only 10Title of presentation Sometimes, Optimization is the Only Answer

11 Confidential McAfee Internal Use Only 11Title of presentation Optimized Network Security Adapts to Change 11 RISK OPTIMIZATION Optimized spend ~4% Very low risk Compliant/Proactive spend ~8% of IT budget on security Medium risk Reactive spend ~3% of IT budget on security High risk Why has it been so challenging to reduce risk? 11 DYNAMIC Predictive and agile, the enterprise instantiates policy, illuminates events and helps the operators find, fix and target for response Tools Based Applying tools and technologies to assist people in reacting faster REACTIVE and Manual People only. No tools or processes. Putting out fires McAfee ePO integrated products, plus GRC and GTI Point products for System, network and data Reactive tools Firewalls Log analysis Trouble tickets Ineffective change control Ad hoc firewall rules Audit findings REACTIVE & MANUAL Point products IDS (compliance) SI/EM (logs) Structured firewall rule management Standard configurations Distributed consoles/mgmt Tedious audit preparation COMPLIANT Integrated tools IPS (threats) SI/EM (events) Automatic updates Automated firewall rule mgmt Centralized consoles/mgmt Streamlined compliance reports PROACTIVE Multi-layered, correlated solutions Predictive threat protection Policy-based control Proactive management Extensible architecture Automated compliance OPTIMIZED

12 New Requirements for Optimized Network Security Ticket Oriented ResolutionProtection Focused on Identifying Attack Packets Configuration Focused on FeaturesMulti-Vendor Strategies Turn days of process into clicksCharacterize future threats today Focus on real organization, people, applications, usageIntegrated, collaborative, easily add new capabilities Proactive ManagementPredictive Threat Protection Policy-Based ControlExtensible Architecture

13 Consider Optimized Network Security Solutions GLOBAL THREAT INTELLIGENCE ePO NBA Web IPSSIA NDLP Risk Advisor Firewall NAC Network IPS: must be best performing Firewall: must have next gen features NAC: now is the time NBA: emerging visibility tool NDLP: more important than ever

14 When Optimized Low Effort, Low Risk Not Optimized High Effort, High Risk Protecting Critical Data Center from ZeuS Malware Benefit: Protection meets (and beats) hackers timelines, reduces alerts Predictive Threat Protection with NSP + GTI

15 Controlling Google Calendar Use Before a Merger Benefit: No need to map network topology to user, protects critical data Policy-Based Control with Next Gen Firewall When Optimized Low Effort, Low Risk Not Optimized High Effort, High Risk

16 Blocking Bot Command and Control Traffic Benefit: Eliminates days and weeks of effort while improving time to resolution Proactive Management in Action When Optimized Low Effort, Low Risk Not Optimized High Effort, High Risk

17 Confidential McAfee Internal Use Only 17Title of presentation Move Customer Portal to Cloud Data Center Benefit: No need to map network topology to user, eliminates SSH blind spot Policy-Based Control with Next Gen Firewall When Optimized Low Effort, Low Risk Not Optimized High Effort, High Risk

18 Confidential McAfee Internal Use Only 18Title of presentation Enabling IM, But Controlling IM Fileshare Benefit: Users enabled with IM, but risk reduced w/o file share; Rule reduction Policy-Based Control with Next Gen Firewall When Optimized Low Effort, Low Risk Not Optimized High Effort, High Risk

19 ePO Example: Extensible Management Platform Security Innovation Alliance (SIA) Delivers a Rich Security Ecosystem Associate Partner Technology Partner (McAfee Compatible) 19 Authentication and Encryption Theft and Forensics Risk and Compliance Security Event and Log Management Other Security, IT & Services Application and Database Security Single Sign-On SIA

20 Example: Global Threat Intelligence What it is and what it means for our customers McAfee Labs MFE Products Other feeds & analysis ServersFirewallsEndpointsAppliances File Reputation Engine Web Reputation Engine Network Threat Information IP and Sender Reputation Engine Vulnerability Information Global Threat Intelligence NBAFirewall IPS NDLPNAC Risk Advisor ePO NSM

21 Confidential McAfee Internal Use Only 21Title of presentation Optimized: Relieves Pressure Points, Reduces Risk Network Upgrade Next Gen Firewall simplifies policy management, scales to 10G+ APT Threat IPS, NBA, NTR detect reconnaissance, anomalies, targeted malware; NDLP finds data at risk Vulnerability Management IPS, Vulnerability Manager pinpoint at risk systems, IPS acts as pre-patch shield Data Center Consolidation Virtualized IPS and Firewalls collapse security OpEx, scale to 10G+ Enabling Apps Next Gen Firewall user and application aware, both grouped and fine grain policy enforcement

22 While Weve Been Chatting… Our global sensor grid characterized 229 unique pieces of malicious or unknowncode, based on: 570,000 file reputation queries460,000 IP reputation queries 69,000 attacks were stopped by McAfee IPS across all our customers Eliminated 64 trouble tickets and 8 critical escalations for our customers

23 sdfafasd


Download ppt "Applying Next Generation Security Principles to Todays Changing Networks."

Similar presentations


Ads by Google