McAfee Endpoint Protection Products



Similar documents
Unprecedented Malware Growth

Endpoint protection for physical and virtual desktops

Hope is not a strategy. Jérôme Bei

The User is Evolving. July 12, 2011

Endpoint protection for physical and virtual desktops

How To Buy Nitro Security

Data Protection McAfee s Endpoint and Network Data Loss Prevention

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

McAfee Server Security

Integrated Protection for Systems. João Batista Territory Manager

Network Security. Intertech Associates, Inc.

INTRODUCING isheriff CLOUD SECURITY

Symantec Protection Suite Small Business Edition

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Secure Your Mobile Workplace

Devising a Server Protection Strategy with Trend Micro

Modular Network Security. Tyler Carter, McAfee Network Security

Network Control Meets Endpoint Security

isheriff CLOUD SECURITY

McAfee Tackles the Complexities of Endpoint Security

Security Information & Event Management (SIEM)

Devising a Server Protection Strategy with Trend Micro

Symantec Protection Suite Small Business Edition

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

INFORMATION PROTECTED

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Security and control: The smarter approach to malware and compliance

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time

Proven LANDesk Solutions

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

for businesses with more than 25 seats

IBM Endpoint Manager for Core Protection

Protecting the un-protectable Addressing Virtualisation Security Challenges

Symantec Protection Suite Small Business Edition

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Chief Security Strategist Symantec Public Sector

Endpoint Buyers Guide

Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Tough Times. Tough Choices.

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison

The ForeScout Difference

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

Features Business Perspective.

Unified Threat Management, Managed Security, and the Cloud Services Model

Deep Security Vulnerability Protection Summary

Cyber Security Solutions:

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Mucho Big Data y La Seguridad para cuándo?

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

overview Enterprise Security Solutions

Endpoint Security for DeltaV Systems

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

Symantec Client Management Suite 8.0

Small Business Protection Guide. Don t Leave Your Business at Risk Protect it Completely

McAfee Enterprise Mobility

Small and Midsize Business Protection Guide

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Symantec Endpoint Protection

Netzwerkvirtualisierung? Aber mit Sicherheit!

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Check Point Positions

Symantec Endpoint Protection

Secure Virtualization in the Federal Government

ForeScout MDM Enterprise

IBM Endpoint Manager Product Introduction and Overview

AgriLife Information Technology IT General Session January 2010

Did you know your security solution can help with PCI compliance too?

BitDefender Client Security Workstation Security and Management

Symantec Endpoint Protection

McAfee - Overview. Anthony Albisser

Agile Business, Flexible Choices

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Total Protection for Compliance: Unified IT Policy Auditing

Patch Management SoftwareTechnical Specs

Malware and Other Malicious Threats

SourceFireNext-Generation IPS

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Leading The World Into Connected Security. Paolo Florian Sales Engineer

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Fine Tuning Desktop Security Presented by J Abernethy & Josh Quinn

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Symantec Endpoint Protection

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure

Sophos (Schweiz) AG May 2012

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

STPIC/Admin/002/ / Date: Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

Managed Security Services Portfolio

Endpoint Security - Market Quadrant 2015

VESZPROG ANTI-MALWARE TEST BATTERY

VALTX ABSOLUTE SECURITY

V1.4. Spambrella Continuity SaaS. August 2

Next Gen Firewall and UTM Buyers Guide

Transcription:

McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc.

Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough McAfee EMM Overview & walkthrough 2

Threats Are Targeting You Spam volume down ~50%, but mobile threats up 46% (Q4 2010, McAfee Labs) An average of 4 million new zombies created per month 1 New attacks on Adobe vulnerabilities outnumber those on Microsoft products 100:1 (Q4 2010, McAfee Labs) Email is the main carrier of malware and phishing scams 1 Source: 1 McAfee, 2 Javelin Strategy & Research 3

Key Trend: Malware Growth Continues McAfee Labs identifies approximately 55,000 pieces of new malware each day 60,000,000 50,000,000 40,000,000 30,000,000 20,000,000 10,000,000 - Jan 09 Feb 09 Mar 09 Apr 09 May 09 June 09 Jul 09 Aug 09 Sep 09 Oct 09 Nov 09 Dec 09 Jan 10 Feb 10 Mar 10 Apr 10 May 10 Jun 10 Jul 10 Aug 10 Sep 10 Oct 10 Nov 10 Dec 10 Total Malware Samples in the McAfee Labs Database The growth in the number of new malware samples found continued in Q4 growing 15% over Q3. 4

Are These Impacting You? Technology explosion bringing unknown threats Win 7 OS Refresh Reduced IT Budget Virtualization Projects Security Audit brings new requirements Company Acquisition or Divestiture New management New IT strategy New Regulatory Compliance Needs 5

Today s Dilemma IT Need Reduce Cost Achieve Compliance Improve Security Business Need Increase Agility Reduce Cost Innovate 6

A Better Way What if Operational management costs were reduced? Security infrastructure costs could be cut? Patching new vulnerabilities was less urgent? Event management and escalations were streamlined? Compliance was a natural result of your security investment? 7 7

McAfee Helps You Achieve an Optimized Security Architecture Branch Office Enterprise Headquarters Network Security Platform (IPS) VM FW ASW /AS HIPS SA NAC Win2k Linux MAC Server Web Audit NIPS Application Servers HIPS DLP ENC PA ENC DLP Guest Win2k Linux MAC Server DLP 8

McAfee Helps You Achieve an Optimized Security Architecture ASW /AS SA Security FW DLP HIPS ENC NAC PA Data Protection 9

McAfee Helps You Achieve an Optimized Security Architecture Security Data Protection Network Security Innovation Alliance (SIA) McAfee epolicy Orchestrator 10

McAfee Helps You Achieve an Optimized Security Architecture Sustained Compliance Network Security Innovation Alliance (SIA) epo 11

Protect the HIPS FW NAC DC ENC Email Sustained Compliance Web PA AC Network Security Innovation Alliance (SIA) epo 12

Protect the HIPS FW NAC DC ENC Email Anti-Malware Protection Stops known and unknown malware, spyware, rootkits, key-loggers and more Over 99% detection rate Proactive, real-time Artemis technology Web PA AC Windows, Macintosh and Linux supported Broad protection across endpoints, servers and mobile devices 13

Protect the HIPS FW NAC DC ENC Email Host Intrusion Prevention for Desktop with Integrated Firewall Protects against unknown malware and zero-day vulnerabilities Delivered zero-day protection for ~90% Microsoft vulnerabilities from 06 to 10 Web PA AC Reduces patching urgency Integrated firewall changes protection based on location (i.e. coffee shop vs. office) 14

Protect the HIPS FW NAC DC ENC Email Web PA AC Network Access Control (for Managed s) Ensure endpoint compliance prior to and after network access Prevent users from disabling security tools For unmanaged (guest) endpoints, integrates with McAfee NAC Appliance and NAC Add-on to Network Security Platform 15

Protect the HIPS FW NAC DC ENC Email Web PA AC Device Control Protects against accidental/malicious data leaks and unauthorized device usage Removable drives, thumb drives Real time prevention 16

Protect the HIPS FW NAC DC ENC Email Web PA AC Encryption Encrypts confidential information: Full-disk File and folder Mobile device and Smart Phone Removable Media USB devices Helps meet regulatory compliance if laptop is lost 17

Protect the Email Security Automated malware filtering at the email server HIPS FW NAC Attachment scanning DC ENC Email Anti-spam filtering Web PA AC Leverages proactive Artemis technology to stop new and emerging threats 18

Protect the HIPS FW NAC DC ENC Email Web Security Warn and block employees before they interact with dangerous websites Granular user-based policy and reporting on web usage Web PA AC Monitor, control and block web content Reduce liability and increase employee productivity 19

Protect the Policy Auditing Automates data collection for IT audit reports DC Web HIPS FW ENC PA NAC Email AC Simplifies compliance with best practice policy templates Integrated with McAfee Remediation Manager for endpoint remediation 20

Protect the HIPS FW NAC DC ENC Email Application Control (Whitelisting) Ensures only trusted applications run on endpoints and servers Dynamic whitelisting reduces cost of ownership No database, rules or updates needed Web PA AC Proactive protection against zero-day threats Comprehensive code coverage that prevents exploits from running 21

Protect the HIPS FW NAC DC ENC Email Web PA AC epo Single Integrated Management Single agent, single console Web-based console for access from anywhere Open architecture Manages all endpoint solutions Lower operational costs with improved visibility and efficiency 22

and Network Interlock DC Web HIPS FW ENC PA NAC Email AC Network NIPS NAC VW DLP FW Web Email UTM NUBA Reduced compliance and operating costs Integrated network and endpoint products Simplified administration Reduced errors epo epo 23

McAfee Integrated Security Platform Network Security Anti-Virus/Anti-Spyware Intrusion Prevention Email Server & Anti-Spam epo Network Access Control Desktop Firewall Next Generation Firewall Device Control Content Security Web site Malware Web site reputation Host IPS NAC Policy Auditing Macintosh UNIX/Linux Encryption Encrypted USB McAfee Agent Single Agent Single Console Agent deployment Policy/Configuration Updates Alerts Correlation Reporting E-mail Gateway Web Gateway DLP Gateway Cloud-based Protection Cloud-based Email & Web Cloud-based Message Archiving Web site Certification Risk and Compliance Vulnerability Management Risk Advisor Host DLP AWL/Change Control Application Control Policy Auditing & Reporting Mobile Device Security 24

Optimized Security in Action McAfee Risk Advisor 25 To run this demo, you must have the CARMA_demo.swf file in the presentation directory. Left click on the image to start/stop

Cost Savings Through Planned Patching McAfee @ McAfee Security and Patching Milestones 80 2005 2006 2007 2008 2009 Hours, People, Cycles 70 60 50 40 30 20 10 FTE dedicated to patching reduced from 27 to 0.3 Saved $5.5M over 3 years 5 1 0 Antivirus, Network Security Platform, and Vulnerability Manager Host IPS installed Patching process and policy refinements due to Host IPS Optimized/ stable Number of Patch Cycles Number of People Assigned to Patch Operations Average Hours per Cycle Total FTE 26 ~ 5,000 Desktops and Laptops, 700 Servers; in 31 countries

Total Protection Lowers Operational Cost Spend Less Time Managing Security 38% less time on security reporting 41% less time developing security policies 30% more endpoints 50% less hardware Manage More Nodes with Less Hardware Use Less Admins More Efficiently Admins save about 6 hours per week 38% less time to manage security 27 MSI International, survey of 488 epo and non-epo users Insight Express, survey of 387 epo and non-epo customers users

Top Reasons to Upgrade to Total Protection Solutions 1 2 3 4 Save Money By consolidating your security solutions with one vendor, you can gain additional protection at a lower cost. Deploy Quickly Because it s integrated with McAfee epo, you can manage it easily from one centralized console. Protect from every angle Total Protection for provides advanced protection: integrated anti-spyware, zero-day intrusion prevention, and flexible network access control. Save Time Every Day Integration with epo means you can add increased protection fast. 5 Leverage the leader McAfee has been an endpoint security leader in the Gartner Magic Quadrant for four years and was selected best endpoint security solution by SC Magazine for 2009. 28

McAfee Suites Protection Tier Total Protection for Enterprise Edition Suite Total Protection for Secure Business Protection Advanced Suite McAfee Protection Suite McAfee Total Protection for Server McAfee Protection for Mac Single management console Real-time malware protection Desktop firewall Desktop host IPS Website security Email server anti-virus & anti-spam Host URL filtering Device control Full disk encryption Email & web gateway anti-malware Network access control (NAC) Desktop policy auditing Multi-platform anti-virus (Linux, Mac, Mobile) Application & change control

Why McAfee Total Protection for Lowest Operating Cost Single integrated management console Proactive real-time malware detection World-class research and support Industry leader 30

Questions?