Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System

Similar documents
McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.

McAfee epolicy Orchestrator * Deep Command *

Hardware + Software Solutions for The Best in Client Management & Security. Malcolm Hay Intel Technology Manager

Endpoint protection for physical and virtual desktops

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Choosing Between Whitelisting and Blacklisting Endpoint Security Software for Fixed Function Devices

Data Protection McAfee s Endpoint and Network Data Loss Prevention

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Endpoint protection for physical and virtual desktops

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

McAfee/Intel Security Workshop

Unprecedented Malware Growth

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology

Protecting the un-protectable Addressing Virtualisation Security Challenges

Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.

How To Get A New Computer For Your Business

Symantec Endpoint Protection

McAfee - Overview. Anthony Albisser

McAfee Server Security

Intel Trusted Platforms Overview

Industrial Security for Process Automation

User Guide. SUSIAccess. Remote Device Management

Security Information & Event Management (SIEM)

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Enterprise-Ready Security for Business Clients with Intel Processors

Unified Security, ATP and more

Data Center Connector for vsphere 3.0.0

EndUser Protection. Peter Skondro. Sophos

Windows Operating Systems. Basic Security

Patch Management SoftwareTechnical Specs

Kaseya IT Automation Framework

Modular Network Security. Tyler Carter, McAfee Network Security

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Symantec Endpoint Protection Integration Component 7.5 Release Notes

IT Networking and Security

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Do you know what makes NetSupport Manager so unique?

Proactive Rootkit Protection Comparison Test

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Secure Cloud Computing

What is a Managed Service Provider (MSP)? What is the best solution for an MSP?

The Key to Secure Online Financial Transactions

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

Software Token Security & Provisioning: Innovation Galore!

Are you prepared to be next? Invensys Cyber Security

Technology Blueprint. Essential Protection for PCs. Match your endpoint protection with today s risks

Reducing the cost and complexity of endpoint management

Increasing Situational Awareness and Multi-zone Protection of Industrial and Utility Infrastructure

PC Solutions That Mean Business

McAfee Network Security Platform

System Area Manager. Remote Management

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

Symantec Endpoint Security Management Solutions Presentation and Demo for:

CCEVS Approved Assurance Continuity Maintenance Report

City of Coral Gables

Ovation Security Center Data Sheet

Cisco Advanced Malware Protection

What is Really Needed to Secure the Internet of Things?

Cyber Security Solutions:

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

Integrated Protection for Systems. João Batista Territory Manager

McAfee SaaS Endpoint Protection Suite

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

Leading The World Into Connected Security. Paolo Florian Sales Engineer

Compulink Advantage Online TM

Increasing Situational Awareness and Multi-zone Protection of Utility Infrastructure

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, Kaseya Catalog Kaseya Copyright All rights reserved.

Intel Management Engine BIOS Extension (Intel MEBX) User s Guide

Chris Boykin VP of Professional Services

Managing Digital Signage Over 3G Using Intel Active Management Technology (Intel AMT)

Symantec Endpoint Protection

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Anti-exploit tools: The next wave of enterprise security

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group

Loophole+ with Ethical Hacking and Penetration Testing

5 Steps to Advanced Threat Protection

How To Get A Client Side Virtualization Solution For Your Financial Services Business

Transcription:

Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System Dipl.-Inform. Rolf Haas Principal Security Engineer, S+,CISSP

Intel and McAfee Joined Security Vision BETTER SECURITY SOLUTIONS & PRODUCTS POWER EFFICIENT PERFORMANCE INTERNET SECURITY CONNECTIVITY SECURITY

Stealth Techniques New Industry Problem Rootkits are designed to hide themself below the OS (just lately a new type in BIOS) Target only very special IP which makes them difficult to detect Use weakest link to get into the organization Social Engineering Embedded Devices Current Solutions only provide protection within the OS

The Motivation has changed... Targeted Attacks, Stealth techniques, Rootkits, etc SLAMMER Virus ZEUS Trojan STUXNET Targeted Attack Cyber Crime AURORA/ Shady Rat Advanced Persitent Threat Hacking for Fun Organized Crime Physical Harm State-Sponsored Cyber Espionage

DEVICES CONNECTED DEVICES

AEROSPACE DIGITAL SIGNAGE INDUSTRIAL ENTERPRISE RESIDENTIAL TEST & PC SECURITY GATEWAY IP SERVICES MEASUREMENT TRANSPORTATION ATM POINT OF SALE MOBILE KIOSK MANUFACTURING MEDICAL DEVICE PRINTER USB MILITARY MEDICAL IMAGING NETWORK APPLIANCES WIRELESS INFRASTRUCTURE IP CAMERAS IN-VEHICLE INFOTAINMENT ROBOTICS GAMING ROUTING & SWITCHING ENTERPRISE VOIP ENERGY & UTILITIES CONTROL HOME AUTOMATION

OF MODERN AUTOMOBILES

lines of code in an average automobile

MEDICAL DEVICES

Malware Tsunami 60.000 Threats plus 50 Billion Devices =??? 2000 2001 2002 2003 2004 2005 2006 2007

McAfee and Intel The Strategic Initiatives Next Generation Endpoint Security Secure Embedded Devices Secure Mobile Devices Cloud Security Platform Activate Silicon Features Security Platform Beyond the OS Expanding Global Threat Intelligence (GTI) Application Whitelisting Integrity Monitor Change Control Device Management Expanding GTI Hardware Root of Trust OS Security App Sandboxing App Validation Management Expanding GTI Identity and Trust Management Application to Application Security Expanding GTI Power Management Embedded Encryption Out of Band Management Out of Band Recovery Anti-Theft Deep Defender using Intel VT-x Application Whitelisting Support for Windriver OS epo Deep Command using Intel AMT Intel AES-NI Intel Anti-Theft SaaS with Ultrabooks

Intel vpro Technology: More than just Manageability Intel vpro Technology Intel Active Management Technology Intel Anti-Theft Technology Intel Trusted Execution Technology Intel Virtualization Technology Intel vpro Technology Support Intel s latest hardware based management, security, and virtualization Ideal for customers who have defined a long-term cross client strategy Available on both Desktop and Notebook PCs

McAfee DEEP DEFENDER NEXT GENERATION ENDPOINT SECURITY USING INTEL VT-X Announced at Intel Developer Forum (IDF) September, 13th 2011

Introducing McAfee Deep Defender Endpoint Security Beyond the Operating System Industry s first hardware-assisted security technology Text Uses McAfee DeepSAFE technology Applications AV DLP Deep Command Deep Defender Real-time kernel memory protection Operating System Virtual Machine Protection from previously hidden threats beyond the OS for enhanced security McAfee DeepSAFE CPU Intel Core VT-x Security Engine Managed by epo + GTI integrated I/O Memory Disk Network Display

McAfee Deep Defender Stopping Stealthy Rootkits beyond the OS DeepSAFE Technology by McAfee & Intel A new vantage point on security Operates beyond the OS Threats cannot hide DeepSAFE Intel i3/i5/i7 CPU (BIOS VT-x Enabled) OS Loader DeepSAFE Loader/Agent Boot Driver Rootkit Boot Driver Driver AV Driver Rootkit Driver Driver Deep Defender Agent Application Application Malware Application Malware DeepSAFE Loaded Here Beyond the OS Boot Drivers Other Drivers Services and Applications

McAfee epo DEEP COMMAND ENHANCED SECURITY MANAGEMENT USING INTEL AMT Announced at Intel Developer Forum (IDF) September, 13th 2011

McAfee epo Deep Command Requirements epo Deep Command utilizes Active Management Technology built into the following Intel platforms: Intel Core i5 vpro Intel Core i7 vpro McAfee Agent 4.5 or higher Supports Intel vpro AMT versions 4.2, 5.2, 6.1.2,7.0, and 7.1.4 No language localization needed Tested to operate on English, Korean, Traditional Chinese, Japanese German and Spanish operating systems

McAfee epo Deep Command Next Generation Security Management Deep Command utilizes Intel vpro Technology for local and remote management beyond the operating system AMT-enabled Desktop running McAfee Agent and Security Software Apps McAfee Security McAfee Agent OS Preboot Intel AMT

Identifying vpro AMT-Enabled Endpoints Deep Command Discovery & Reporting (FREE)

McAfee epo Deep Command Security Use Cases Deploy updated security ahead of an attack if endpoints are powered off (DAT files or ODS) Remote remediate Compromised systems or system failures force physical access to the endpoint, e.g. Endpoint Encryption for PC Disaster Recovery Repair Policy or system misconfigurations that cause connectivity issues Green IT by maintaining security & compliance regulations (Average Cost Per Kilowatt $0.097 25k nodes annual cost savings $400,000)

Endpoint Encryption Traditional Wake On LAN Approach Computer is powered up and waiting in the PreBoot Login disconnected McAfee Agent Endpoint Encryption Network Card Management console sends Wake Up impulse to the machine

Secure Wake & Patch Reset User Passwords Remote Remediation Location aware Preboot Endpoint Encryption epo Deep Command Management Computer epo Deep is Command powered up has and unlocked Endpoint Encryption PreBoot securely will ask and epo the Deep Computer Command can boot for up unlock Windows key McAfee Agent Endpoint Encryption Intel Network vpro Card AMT epo Deep Command sends Wake Up Request to the Computer