Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Security for Today’s Threat Landscape Kat Pelak 1.
What's new in Threat Management Gateway (TMG) 2010 Ronald Beekelaar
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
© 2009 WatchGuard Technologies WatchGuard XCS Extensible Content Security Superior Security with Lowest TCO.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
LittleOrange Internet Security an Endpoint Security Appliance.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Norman SecureSurf Protect your users when surfing the Internet.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
ContentKeeper Electronic Mail Template Concepts Presented by Date.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Director of Research, SANS Institute
Unify and Simplify: Security Management
McAfee Web Protection Protect Your Enterprise Against Web Threats.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Paul Stich CEO Mobile App Risk Management – Over 5 million mobile apps – Small customer – 300 employees = 13,800 apps – Enterprise customer – 100K employees.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
The Changing World of Endpoint Protection
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Complete Cloud Security
© Intapp, Inc. 1 Cloud Strategies for Law Firms: Enabling Lawyer Productivity, Maintaining Firm Control.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Blue Coat Cloud Continuum
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Taking Control of Cloud Security
Cloud App Security vs. O365 Advanced Security Management
Barracuda Web Security Flex
Threat Management Gateway
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Complete Cloud Security
Check Point Connectra NGX R60
Securing the Threats of Tomorrow, Today.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
Presentation transcript:

Taking Control of Cloud Security Travis Abrams

Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership on product feedback Technical Advisory Board member on product enhancements Software Vendor MEAS- Mainframe Event Acquisition System

The Cloud Brings New Challenges SECURITY Increasingly sophisticated malware Increased SSL- encrypted web traffic Advanced, persistent threats APPLICATION VISIBILITY More people & devices connecting to more applications outside traditional network, often without IT knowledge FLEXIBILITY Need to accommodate changing business conditions Protection needs to travel with the user and device rather than stay in the office 4

What's holding back the cloud?

What’s holding back the cloud?

Business agilityBusiness agility Cost efficienciesCost efficiencies Enhanced innovationEnhanced innovation Improved IT servicesImproved IT services The Power of Cloud Computing However, security remains the roadblock Data lossData loss Authentication, Authorization and AuditAuthentication, Authorization and Audit Information governanceInformation governance Data controlData control

Authentication Web Data Loss Intrusion Enterprise Mobile Users Enterprise Users Private Cloud Applications PartnersCloudVendorsApplicationsCustomers Public Cloud Cloud Channels

Security How can I block web-borne threats? What about outbound threats? What other tools should I be considering? 9

Identify all web applications, including shadow IT Enforce acceptable usage policy Control access with SSO and multi-factor authentication DLP Engine ‒ Full dictionaries ‒ Enforce data leakage policy File encryption ‒ Protect data on file-sharing sites Identify “phone-home” behavior Aggressive scanning of non-human initiated requests eP Anti-Malware Botnet Client DataLeakage Application Visibility Content Inspection SSLScanning Web Gateway Meets The Challenge 10 Signature-based AV Zero-day malware detection ‒ Dissect, emulate target platform environment ‒ Evaluate code behavior Scrutinize HTTPS traffic Identify malware and applications hidden in encrypted web session Reputation (GTI) Geo-location (GTI) URL categorization & filtering (GTI) Media & file analysis Outbound Traffic Inbound Traffic

WebAuthentication Enterprise Mobile Users Enterprise Users Private Cloud Applications Cloud Security Platform Global Threat Intelligence Unified Management, Policy and Reporting, ePO Integration PartnersCloudVendorsApplicationsCustomers Cloud Ecosystem Modules SaaS or Appliance Services GatewayIdentity Manager Web Security Data Loss Prevention Security McAfee Cloud Security Platform Modules

Malware Detection 12 McAfee Beats The Competition 1170 malware samples

McAfee Gateway Anti-Malware Engine Scanning 13 DISSECT ANALYZE EMULATE Unique McAfee technology Emulation provides real- time protection Most effective zero-day protection

Data Loss Prevention 14

Proactive Encryption 15 Encryption protects cloud-based files

Security Patent pending, outbound detection of botnet client phone-home behavior Understand difference between normal user and application-initiated requests Dynamically adjust proactive detection level 16 Block Infected Client Communications Malware Unsolicited download Normal responseReal user clicks link Normal Scanning Aggressive scanning blocks malware Normal response

Managing Cloud Environments

Application Visibility Application Discovery What applications are your users actually using? Application Controls Can you enforce security or manage application entitlements? Application Access Can you deliver user access and strong authentication? 20

TODAY’S REALITY: More than 80% of employees worldwide use SaaS applications without IT approval. –Frost & Sullivan: The Hidden Truth Behind Shadow IT

McAfee ePO Integrated monitoring for Cloud apps McAfee Web Gateway To the Cloud- web filtering From the Cloud- AV & Malware McAfee DLP To /From the Cloud-Data leak protection McAfee Global Threat Intelligence Provides real-time URL and connection reputation McAfee Services Gateway App API & Web Service Security McAfee Identity Manager Cloud SSO, Strong Auth, Provisioning App-to-Cloud User-to-Cloud Consistent Security Across Cloud Traffic Channels

Application Discovery 23 What applications are on your network? How much bandwidth are they using? Who are the top users? Which are blocked? What applications are on your network? How much bandwidth are they using? Who are the top users? Which are blocked?

Web Application Controls 24 Enable/Disable specific applications Control entitlements, access, data sharing Apply policy based on application, user, group, risk, …

Application Controls 25 Customize block page with your logo, colors, instructions… Query for YouTube category in real-time Set policy by: Category, Author, Channel

Application Access 26 One Time Password Laptop Mobile Internal User SSO Launch Pad Single Sign On

The Offer 27 McAfee security experts will conduct a free content security risk assessment Deploy McAfee Web Gateway 30-day trial Transparently collect web traffic (including from your existing SWG vendor) and evaluate: Correct URL filtering/categorization Web traffic containing known and zero-day malware Acceptable usage policy enforcement –Provide you with a results report Risk Assessment Free Risk Assessment

Thank you!