Presentation is loading. Please wait.

Presentation is loading. Please wait.

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.

Similar presentations


Presentation on theme: "Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle."— Presentation transcript:

1 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Top of Content Box Line Subtitle Line Title Line September 2014 ​ McAfee Next Generation Firewall ​ and Security Connected Threat Ecosystem

2 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. “Connected” NGFW Performance Enhanced NGFW First NGFW Firewall Evolution 2 Connected to endpoint security Connected to SIEM Connected to advanced threat detection Connected to real-time global threat database Central management for large networks High availability Advanced evasion protection Inspection Application and user awareness Traditional FW Completeness of Security

3 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Delivers the Big Picture of Security 3 3

4 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Benefits 4 Network Personnel Service availability High performance Managed QoS Minimal downtime Administrators Centralized, holistic network view Easy-to-use tools and workflow automation McAfee Next Generation Firewall Security Specialists Proven malware protection Continual security updates and support Detailed reports and forensics Granular policies CIO / CISO / CEO / CFO Ensure business continuity and protect key assets Complete, cost-effective security solution

5 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Differentiators 5 Unified Software Core Strong Centralized Management High Availability Advanced Evasion Prevention Security Connected

6 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Differentiators 6 Unified Software Core Strong Centralized Management High Availability Advanced Evasion Prevention Security Connected

7 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Flexible Delivery Unified Software Core 7 Adjustable security levels support a wide variety of deployment scenarios Performance levels are maintained even with deep packet inspection enabled NEXT GENERATION FIREWALL FIREWALL LAYER 2 FIREWALL IPS MILITARY GLOBAL ENTERPRISE COMMERCIAL SMB VPN SOFTVIRTUALPHYSICAL McAfee

8 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Enables Multiple Deployment Configurations Unified Software Core 8 Reconfigure security effortlessly as requirements change without license renegotiations or hardware “forklift” upgrades FW / VPN L2FW IPS FW / VPN

9 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. “All inclusive” licensing enables easy budgeting for long-term TCO reduction Lower TCO Unified Software Core 9 Typical Cost McAfee Change in threat Landscape More performance needed Security as a business enabler Total cost

10 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Differentiators 10 Unified Software Core Strong Centralized Management High Availability Advanced Evasion Prevention Security Connected

11 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Centralized Management Resource Optimization Hierarchical templates and aliases Security automation with scheduling e.g. upgrades Policy validation and analysis Security automation with plug and play Hierarchical Templates And Aliases Policy Validation and Analysis Security Automation with Scheduling Security Automation with Plug and Play InitialConfiguration POLICY TEMPLATE MAIN POLICY SUB POLICY 2 SUB POLICY 3 SUB POLICY 1

12 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Differentiators 12 Unified Software Core Strong Centralized Management High Availability Advanced Evasion Prevention Security Connected

13 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee NGFW is tested against 800 million+ evasions or combinations Evasions – what, why and when? Advanced Evasion Prevention Means to disguise an attack Bypass network security devices leaving no traces Extremely difficult to track Unlimited variations and combinations Most network security devices are easily evaded 13 Internet Security Device Vulnerable Target A c k t a t Attack A c k t a t A c k t a t

14 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Fundamental Difference Advanced Evasion Prevention 14 Traditional Inspection Architecture ta t a ? McAfee NGFW Stream-Based Full Stack Normalization Protocol agents ta ck at ck attack ! All traffic must be normalized before inspection in order to expose attacks

15 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Advanced Evasion Prevention Device Testing 15 With Evader getting access to the “protected” network is as simple as: Select the Exploit 1 Identify Attack Target 2 Cisco Palo Alto Networks Check Point Fortinet Juniper SourceFire Tipping Point Select the Evasion Technique 3

16 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Differentiators 16 Unified Software Core Strong Centralized Management High Availability Advanced Evasion Prevention Security Connected

17 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Native Active-Active Clustering High Availability 17 Node 1 Node 6 …16 Node 2Node 3 Node 5Node 4 Mix of hardware and software versions Internet “I can update a FW cluster without dropping a single packet” – McAfee NGFW customer

18 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Cost-effective and secure site-to-site connectivity provides adjustable resilience and capacity High Availability Multi-Link and Augmented VPNs 18 2 Mbps = up to 6 Mbps + HQ Distant Site + MPLS ADSL ISP A ISP B

19 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Built-in VPN Secure Remote Access Native IPsec VPN and SSL VPN connectivity Strong encryption protects sensitive corporate data and communications Outlook web access (OWA) and intranet access via customizable SSL VPN Portal 19 Corporate HQ Client-based IPsec VPN access Clientless access through secure portal Remote SSL VPN Portal Login: _____ SSL VPN Portal Login: _____ McAfee NGFW

20 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Differentiators 20 Unified Software Core Strong Centralized Management High Availability Advanced Evasion Prevention Security Connected

21 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee NGFW Security Connected Ecosystem McAfee ePO (Endpoint Management) McAfee ESM (SIEM) McAfee Advanced Threat Defense 21 McAfee GTI Reputation in the Cloud Integrates network, endpoint and global threat information for superior protection McAfee Next Generation Firewall & SMC

22 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Security Connected Ecosystem 22 McAfee ePO (Endpoint Management) McAfee ePO Integration IP addresses Ports Login credentials, etc. Discover and take action on dangerous or malicious endpoint behaviors Direct links to endpoint log events 22

23 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Security Connected Ecosystem 23 McAfee ESM (SIEM) McAfee ESM (SIEM) Integration Quickly respond to alerts and unusual patterns on your network 23 Alerts based on deviations Sum events and track averages Unusual user behavior Suspicious network activity spikes Anomalous communication patterns } ID Anomalies } 23

24 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Security Connected Ecosystem 24 McAfee ATD Integration McAfee Advanced Threat Defense Deep analysis of suspect files exposes zero-day and advanced threats 24

25 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Security Connected Ecosystem 25 McAfee GTI Integration McAfee GTI Reputation in the Cloud Respond to real-time global threat information including insights from McAfee Labs McAfee NGFW uses file reputation services from GTI 25 File reputation URL reputation Web categorization Message reputation IP reputation Certification reputation

26 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. logs 26 McAfee SIEM New File McAfee Advanced Threat Defense McAfee Next Generation Firewall McAfee Global Threat Intelligence (GTI) Malware Warning! McAfee ePolicy Orchestrator AV Scan Less Time to Find, Freeze and Fix advanced threats FIND FREEZE FIX Security Connected Ecosystem How it Works

27 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. One harmonized appliance family protects investments with hardware modularity and simple licensing McAfee Next Generation Firewall Appliances 27 Same appliance adaptable for multiple use-cases Modular hardware Scale from branch office to data center deployments Rugged designs for demanding environments Highly Flexible Deployment 1000 Series 1400 Series 3200 Series 5200 Series 300 Series 4G 20G 60G 120G McAfee SMC

28 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Third Party Recognition “Long legacy with HIGH AVAILABILITY” “Early focus on ANTI-EVASION” RECOMMENDED by NSS Labs VALIDATED for real world quality, protection and performance 28

29 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Next Generation Firewall Benefits The best protection for your business and digital assets Adapts easily to your security needs Scales effortlessly with your growing business Optimizes productivity of employees and customers Lowers TCO for both security and network infrastructure 29

30 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. 30

31 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Flexible Product for Different Needs 31 ADVANCED THREAT PROTECTION HIGH AVAILABILITY CONTEXT AWARE SECURITY CENTRALIZATION OF OPERATIONS SITUATIONAL AWARENESS & FORENSICS INVESTMENT PROTECTION RESOURCE OPTIMIZATION FLEXIBLE & QoS AWARE VPN MULTI-TENANCY McAFEE NGFW CAPABILITIES DATACENTERS & CLOUD SERVICES BUSINESS CONTINUITY & APPLICATIONS MISSION CRITICAL NETWORKS MULTI-TENANT BUSINESESS SITE-TO-SITE CONNECTIVITY SCOPE OF PROTECTION


Download ppt "Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle."

Similar presentations


Ads by Google