Presentation is loading. Please wait.

Presentation is loading. Please wait.

Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.

Similar presentations


Presentation on theme: "Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership."— Presentation transcript:

1 Taking Control of Cloud Security Travis Abrams

2 Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership on product feedback Technical Advisory Board member on product enhancements Software Vendor MEAS- Mainframe Event Acquisition System

3

4 The Cloud Brings New Challenges SECURITY Increasingly sophisticated malware Increased SSL- encrypted web traffic Advanced, persistent threats APPLICATION VISIBILITY More people & devices connecting to more applications outside traditional network, often without IT knowledge FLEXIBILITY Need to accommodate changing business conditions Protection needs to travel with the user and device rather than stay in the office 4

5 What's holding back the cloud?

6 What’s holding back the cloud?

7 Business agilityBusiness agility Cost efficienciesCost efficiencies Enhanced innovationEnhanced innovation Improved IT servicesImproved IT services The Power of Cloud Computing However, security remains the roadblock Data lossData loss Authentication, Authorization and AuditAuthentication, Authorization and Audit Information governanceInformation governance Data controlData control

8 Email Authentication Web Data Loss Intrusion Enterprise Mobile Users Enterprise Users Private Cloud Applications PartnersCloudVendorsApplicationsCustomers Public Cloud Cloud Channels

9 Security How can I block web-borne threats? What about outbound threats? What other tools should I be considering? 9

10 Identify all web applications, including shadow IT Enforce acceptable usage policy Control access with SSO and multi-factor authentication DLP Engine ‒ Full dictionaries ‒ Enforce data leakage policy File encryption ‒ Protect data on file-sharing sites Identify “phone-home” behavior Aggressive scanning of non-human initiated requests eP Anti-Malware Botnet Client DataLeakage Application Visibility Content Inspection SSLScanning Web Gateway Meets The Challenge 10 Signature-based AV Zero-day malware detection ‒ Dissect, emulate target platform environment ‒ Evaluate code behavior Scrutinize HTTPS traffic Identify malware and applications hidden in encrypted web session Reputation (GTI) Geo-location (GTI) URL categorization & filtering (GTI) Media & file analysis Outbound Traffic Inbound Traffic

11 WebAuthentication Email Enterprise Mobile Users Enterprise Users Private Cloud Applications Cloud Security Platform Global Threat Intelligence Unified Management, Policy and Reporting, ePO Integration PartnersCloudVendorsApplicationsCustomers Cloud Ecosystem Modules SaaS or Appliance Services GatewayIdentity Manager Web Security Data Loss Prevention Email Security McAfee Cloud Security Platform Modules

12 Malware Detection 12 McAfee Beats The Competition 1170 malware samples

13 McAfee Gateway Anti-Malware Engine Scanning 13 DISSECT ANALYZE EMULATE Unique McAfee technology Emulation provides real- time protection Most effective zero-day protection

14 Data Loss Prevention 14

15 Proactive Encryption 15 Encryption protects cloud-based files

16 Security Patent pending, outbound detection of botnet client phone-home behavior Understand difference between normal user and application-initiated requests Dynamically adjust proactive detection level 16 Block Infected Client Communications Malware Unsolicited download Normal responseReal user clicks link Normal Scanning Aggressive scanning blocks malware Normal response

17 Managing Cloud Environments

18

19

20 Application Visibility Application Discovery What applications are your users actually using? Application Controls Can you enforce security or manage application entitlements? Application Access Can you deliver user access and strong authentication? 20

21 TODAY’S REALITY: More than 80% of employees worldwide use SaaS applications without IT approval. –Frost & Sullivan: The Hidden Truth Behind Shadow IT www.mcafee.com/ShadowIT

22 McAfee ePO Integrated monitoring for Cloud apps McAfee Web Gateway To the Cloud- web filtering From the Cloud- AV & Malware McAfee DLP To /From the Cloud-Data leak protection McAfee Global Threat Intelligence Provides real-time URL and connection reputation McAfee Services Gateway App API & Web Service Security McAfee Identity Manager Cloud SSO, Strong Auth, Provisioning App-to-Cloud User-to-Cloud Consistent Security Across Cloud Traffic Channels

23 Application Discovery 23 What applications are on your network? How much bandwidth are they using? Who are the top users? Which are blocked? What applications are on your network? How much bandwidth are they using? Who are the top users? Which are blocked?

24 Web Application Controls 24 Enable/Disable specific applications Control entitlements, access, data sharing Apply policy based on application, user, group, risk, …

25 Application Controls 25 Customize block page with your logo, colors, instructions… Query for YouTube category in real-time Set policy by: Category, Author, Channel

26 Application Access 26 One Time Password Laptop Mobile Internal User SSO Launch Pad Single Sign On

27 The Offer 27 McAfee security experts will conduct a free content security risk assessment Deploy McAfee Web Gateway 30-day trial Transparently collect web traffic (including from your existing SWG vendor) and evaluate: Correct URL filtering/categorization Web traffic containing known and zero-day malware Acceptable usage policy enforcement –Provide you with a results report Risk Assessment Free Risk Assessment

28 Thank you! www.McAfee.com/webprotection


Download ppt "Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership."

Similar presentations


Ads by Google