Presentation is loading. Please wait.

Presentation is loading. Please wait.

2015 Security Conference Dave Gill Intel Security.

Similar presentations


Presentation on theme: "2015 Security Conference Dave Gill Intel Security."— Presentation transcript:

1 2015 Security Conference Dave Gill Intel Security

2 Top of Content Box Line Subtitle Line Title Line Dave Gill Channel Account Manager 07799 666 197 Leading The World Into Connected Security ~ Logicalis Security Conference 2015

3 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 3 Firewall Endpoint Protection Gateway Security Network IPSCompliance Data Protection MobilitySIEM. 3 TIME Building Security By Silo Technology Acquisition Process Has Delivered Security Chaos

4 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 4 Security Posture TCO CapEx + OpEx Point Products Layered Tools Building Security By Silo Creating a False Sense of Security TIME Lessons Learned Well-funded organizations do not equal well-defended organizations Maintaining compliance will not result in protection Massive alerting in a sea of noise cannot receive action Defenses operating in silos are setup to fail Parity Advancement

5 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 5 Security Posture TCO CapEx + OpEx Building Security By Silo Delivering Operationally Effective Security TIME Parity Advancement Layered Tools Point Products Connected Architecture

6 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 6 History of Defining Architecture –Inventor of the world’s most widely used computing architecture –Defining countless standards used in everyday lives ranging from USB, WiFi, to IoT –Top 10 Most Influential Brands in the World Largest Dedicated Security Provider –Broadest security product coverage in the industry –Complete portfolio focused upon security –Leadership position in 6 of 8 Gartner Security Magic Quadrants Delivering a Next Generation Security Architecture –Defining innovative industry approaches for collaborative and adaptive security –Introducing security integrations which are sustainable and broadly reaching –Developing capabilities for new security paradigms in areas such as Software Defined Datacenter, Cloud, and IoT

7 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 7 Consolidating Architectures Challenge: Operational Complexity Console Sprawl Need: Easier Deployment Broader Adoption Deliverables: Console Consolidation Fewer Agents Value: Easier Policy Management Reduced Computing Resources Endpoint Intrusion Prevention Web Gateway Advanced Malware SIEM DLP Firewall Mail Gateway Compliance McAfee Security Connected Evolution Achieving A Connected Ecosystem

8 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 8 McAfee Security Connected Evolution Achieving A Connected Ecosystem Consolidating Architectures Challenge: Operational Complexity Console Sprawl Need: Easier Deployment Broader Adoption Deliverables: Console Consolidation Fewer Agents Value: Easier policy management Reduced computing resources Firewall Intrusion Prevention Web Gateway DLPMail Gateway Achieving Return on Investment Challenge: Reduce Budgets Greater Operational Expense Reduced Staffing Need : Self Provisioning Reduced Infrastructure Overhead Deliverables: Virtual / Cloud Security Fewer Appliances Reduced Vendor Footprint Value : Significantly Reduced TCO Simplified Operational Experience Endpoint Advanced Malware SIEMCompliance

9 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 9 Firewall Mail Gateway Intrusion Prevention Web Gateway DLP Endpoint Advanced Malware McAfee Security Connected Evolution Achieving A Connected Ecosystem Achieving Return on Investment Challenge: Reduce Budgets Greater Operational Expense Reduced Staffing Need : Self Provisioning Reduced Infrastructure Deliverables: Virtual / Cloud Security Fewer Appliances Reduced vendor footprint Value: Significantly reduced TCO Simplified operational experience Connected Services Framework Challenge: Siloed Technology Failures Complex Attacks Need: Coordinated Response Adaptive Security Environment Deliverables: Data Exchange Framework Standardized Integration Model Value: Sustainable Integrations Adaptive Protection Models SIEMCompliance

10 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 10 A Connected Services Architecture Is Not… A Single Vendor Solution A Monolithic Architecture The Continuous Addition of New Technologies A New Environment Requiring More Resources to Maintain Massive Rip/Replace of Security Infrastructure McAfee Security Connected Evolution Debunking Common Obstacles

11 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 11 20012014 020304050607080910111213 Consistently Creating Operational Effectiveness Innovating the Security Connected Concept Consolidated Agent Reduced endpoint agent footprint to a single agent Increased hardware lifespan by reducing host footprint/load

12 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 12 20012014 020304050607080910111213 Consolidated Agent Consolidated endpoint console management to a single interface via ePO Significantly reduced administrative burden Single Console Consistently Creating Operational Effectiveness Innovating the Security Connected Concept

13 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 13 20012014 020304050607080910111213 Consolidated Agent Single Console Network/ Vulnerability Management Network/Endpoint Integration Delivered endpoint contextual information within network alerting Created relevance and actionability within the network security environment Consistently Creating Operational Effectiveness Innovating the Security Connected Concept

14 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 14 20012014 020304050607080910111213 Consolidated Agent Single Console Network/ Vulnerability Management Network/Endpoint Integration Security Innovation Alliance Global Threat Intelligence Endpoint/Vulnerability Management Hybrid Web Protection Shared cross-vector threat information across product-sets Delivered actionable intelligence to provide adaptive protection Consistently Creating Operational Effectiveness Innovating the Security Connected Concept

15 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 15 20012014 020304050607080910111213 Consolidated Agent Single Console Network/ Vulnerability Management Network/Endpoint Integration Security Innovation Alliance Global Threat Intelligence Endpoint/Vulnerability Management Hybrid Web Protection Host/ Network DLP Consolidation Endpoint/ Web Gateway Integration One Time Password/ Web Gateway Integration Advanced Threat Defense Click to Protect Threat Intelligence Exchange Delivers new architecture for products to share threat data Introduces realtime adaptive threat protection Enables an organization’s security posture to instantly self-improve Consistently Creating Operational Effectiveness Innovating the Security Connected Concept

16 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 16 Endpoint SecurityNetwork Security Deep Security Icons Context and Orchestration Security Management Analytics Threat Intelligence The McAfee Security Connected Platform. 16 McAfee Confidential

17 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 17 Endpoint SecurityNetwork Security Deep Security Icons Context and Orchestration Security Management Analytics Threat Intelligence The McAfee Security Connected Platform. 17 McAfee Confidential

18 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 18 Complete Protection From Endpoint to Network NGFW SIEM TIE Server Endpoint Enabling a Next Generation Architecture SIA Partners / 3 rd Parties NSP Web / Mail Gateway ATD DLP. McAfee Confidential 18

19 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 19 Security Management Countermeasures Threat Intelligence Analytics Context and Orchestration Complete Platform to Deliver Integrated Protection OPTIMIZED PERFORMANCE FOR ACTIONABLE DECISION-MAKING ADAPTIVE INTELLIGENCE PROVIDES STRONGER PROTECTION BROAD DEFENSIVE COVERAGE FROM ENDPOINT TO NETWORK SIMPLIFIED MANAGEMENT EXPERIENCE REDUCES EFFORT AND COST INTEGRATED DATA EXCHANGE DELIVERS COHESIVE DEFENSE

20 Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 20 SIA Associate Partner SIA Technology Partner (McAfee Compatible) McAfee’s Extensible Platform for Security Risk Management Industry Leadership to Drive Better Protection, Greater Compliance, and Lower TCO

21 21

22


Download ppt "2015 Security Conference Dave Gill Intel Security."

Similar presentations


Ads by Google