Presentation is loading. Please wait.

Presentation is loading. Please wait.

Top of Content Box Line Subtitle Line Title Line Ruslans Barbasins| Territory Manager – CIS, Central Asia, Caucasus Leading The World Into Connected Security.

Similar presentations


Presentation on theme: "Top of Content Box Line Subtitle Line Title Line Ruslans Barbasins| Territory Manager – CIS, Central Asia, Caucasus Leading The World Into Connected Security."— Presentation transcript:

1 Top of Content Box Line Subtitle Line Title Line Ruslans Barbasins| Territory Manager – CIS, Central Asia, Caucasus Leading The World Into Connected Security

2 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 2 History of Defining Architecture –Inventor of the world’s most widely used computing architecture –Defining countless standards used in everyday lives ranging from USB, WiFi, to IoT –Top 10 Most Influential Brands in the World Largest Dedicated Security Provider –Broadest security product coverage in the industry –Complete portfolio focused upon security –Leadership position in 6 of 8 Gartner Security Magic Quadrants Delivering a Next Generation Security Architecture –Defining innovative industry approaches for collaborative and adaptive security –Introducing security integrations which are sustainable and broadly reaching –Developing capabilities for new security paradigms in areas such as Software Defined Datacenter, Cloud, and IoT

3 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 3 Challenges Faced by Security Professionals Source: McAfee Survey at Black Hat USA 2013 False Positives 20% Detection 35% Other 3% Damage Repair 9% Timely Response 11% Protection 22%

4 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 4 Advanced Targeted Attacks—The Reality Sources: Verizon 2013 Data Breach Investigations Report. Securosis Malware Analysis Quant Metrics Model CONTAINMENT ATTACK COMPROMISE DISCOVERY COMPROMISE TO DISCOVERYDISCOVERY TO CONTAINMENT ADVANCED TARGETED ATTACKS Weeks 64% Days 11% Years 4% Months 12% Minutes 2% Weeks 14% Months 23% Days 42% Hours 19% $8,769 / Incident $3,840,988 / Year 1.2 incidents / Day Hours 9%

5 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 5 Targeted attacks against Point-of-Sale (POS) systems Memory parsing/scraping malware Extracts full magnetic stripe data out of memory Not detected by traditional A/V Not detected for a significant amount of time Substantial damage – 40 million credit cards where ex-filtrated in the TARGET compromise Estimated $652 million loss in market cap after Target breach Containment took long (VISA) Recent Notable Advanced Targeted Attacks

6 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 6 Firewall Endpoint Protection Gateway Security Network IPSCompliance Data Protection MobilitySIEM. 6 TIME Building Security By Silo Technology Acquisition Process Has Delivered Security Chaos

7 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 7 Security Posture TCO CapEx + OpEx Point Products Layered Tools Building Security By Silo Creating a False Sense of Security TIME Lessons Learned Well-funded organizations do not equal well-defended organizations Maintaining compliance will not result in protection Massive alerting in a sea of noise cannot receive action Defenses operating in silos are setup to fail Parity Advancement

8 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 8 Security Posture TCO CapEx + OpEx Building Security By Silo Delivering Operationally Effective Security TIME Parity Advancement Layered Tools Point Products Connected Architecture

9 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 9 Adaptive Threat Prevention in Real-Time From Encounter to Containment in Milliseconds

10 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 10 Asset Threat Identity Activity BPM Risk Data Location Data Exchange Layer An innovative, real-time, bi-directional communications fabric providing with product integration simplicity. Security components operate as one to immediately share relevant data between endpoint, gateway, and other security products enabling security intelligence and adaptive security. THE SECURITY CONNECTED FRAMEWORK ADAPTIVE SECURITY ARCHITECTURE

11 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 11 Attacks Are Targeted. Security Defenses Must Be Tailor-made.

12 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 12 ? LOCAL THREAT INTELLIGENCE ORGANIZATIONAL INTELLIGENCE McAfee NGFW McAfee Email Gateway McAfee NSP Add the power of knowledge Other Data Sources Future McAfee Global Threat Intelligence 3 rd Party Feeds McAfee Endpoint Client McAfee Web Gateway McAfee Threat Intelligence Exchange Optimizing Security for Your Organization Personalized Threat Intelligence Assemble, override, augment and tune the intelligence source information GLOBAL THREAT INTELLIGENCE Administrator Organizational Knowledge

13 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 13 McAfee VSE Threat Intelligence Module McAfee VSE Threat Intelligence Module McAfee ePO McAfee ATD Threat Intelligence Exchange Adapt and Immunize — From Encounter to Containment in Milliseconds McAfee Global Threat Intelligence 3 rd Party Feeds Data Exchange Layer McAfee TIE Server

14 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 14 McAfee ESM McAfee VSE Threat Intelligence Module McAfee VSE Threat Intelligence Module McAfee ePO McAfee ATD McAfee Web Gateway McAfee Email Gateway McAfee NGFW McAfee NSP Instant Protection Across the Enterprise 14 Data Exchange Layer McAfee Global Threat Intelligence 3 rd Party Feeds Gateways block access based on endpoint convictions Security components operate as one to immediately share relevant data between endpoint, gateway, and other security products Proactively and efficiently protect your organization as soon as a threat is revealed McAfee TIE Server

15 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 15 McAfee ESM McAfee VSE Threat Intelligence Module McAfee VSE Threat Intelligence Module McAfee ePO McAfee ATD McAfee Web Gateway McAfee Email Gateway McAfee NGFW McAfee NSP Threat Intelligence Exchange Adapt and Immunize—From Encounter to Containment in Milliseconds 15 Data Exchange Layer McAfee Global Threat Intelligence 3 rd Party Feeds Endpoints are protected based on gateway convictions McAfee TIE Server

16 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 16 Threat Intelligence Exchange Lowers TCO and Improves Your ROI Integration simplicity through McAfee’s data exchange layer Enables unmatched operation effectiveness and agility Reduces implementation and operational costs Extends existing McAfee security detection, prevention, and analytics technology investments

17 Ruslans Barbasins Phone: +353 214672532 Ruslans_Barbasins@mcafee.com დიდი მადლობა ! Thank you!


Download ppt "Top of Content Box Line Subtitle Line Title Line Ruslans Barbasins| Territory Manager – CIS, Central Asia, Caucasus Leading The World Into Connected Security."

Similar presentations


Ads by Google