McAfee - Overview. Anthony Albisser



Similar documents
Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Security Information & Event Management (SIEM)

Modular Network Security. Tyler Carter, McAfee Network Security

Leading The World Into Connected Security. Paolo Florian Sales Engineer

Protecting the un-protectable Addressing Virtualisation Security Challenges

McAfee Security Architectures for the Public Sector

Data Protection McAfee s Endpoint and Network Data Loss Prevention

How To Buy Nitro Security

McAfee Network Security Platform

On and off premises technologies Which is best for you?

Discover Security That s Highly Intelligent.

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Endpoint protection for physical and virtual desktops

Q1 Labs Corporate Overview

#ITtrends #ITTRENDS SYMANTEC VISION

SourceFireNext-Generation IPS

How To Build Security By Silo

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Решения HP по информационной безопасности

McAfee Endpoint Protection Products

Check Point Positions

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce

McAfee Network Security Platform Administration Course

How To Get A Cloud Service For A Small Business

Security strategies to stay off the Børsen front page

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Sophos Acquires Cyberoam

Devising a Server Protection Strategy with Trend Micro

Unprecedented Malware Growth

Devising a Server Protection Strategy with Trend Micro

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

IT Security. Muscat 15+ ABOUT US IN A GLANCE

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Symantec Endpoint Protection

The User is Evolving. July 12, 2011

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Endpoint protection for physical and virtual desktops

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

McAfee Server Security

Protect Breakout: Connected Security for a Connected World

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

6 Things To Think About Before Implementing BYOD

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

IBM Security X-Force Threat Intelligence

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

IBM Security IBM Corporation IBM Corporation

Secure Your Mobile Workplace

The Hillstone and Trend Micro Joint Solution

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Secure Your Success. Intel Security Partner Program

Top 10 Reasons Enterprises are Moving Security to the Cloud

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

Malware and Other Malicious Threats

Securing the endpoint and your data

GOOD PRACTICE GUIDE 13 (GPG13)

Zscaler Internet Security Frequently Asked Questions

Jort Kollerie SonicWALL

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Securing and Optimizing the Next Generation Branch Office

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Guideline on Safe BYOD Management

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Unified Threat Management, Managed Security, and the Cloud Services Model

Symantec Endpoint Protection Analyzer Report

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

What is Security Intelligence?

VMware Integrated Partner Solutions for Networking and Security

Whose IP Is It Anyways: Tales of IP Reputation Failures

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

Endpoint web control overview guide. Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Secure Cloud Computing

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Transcription:

McAfee - Overview Anthony Albisser Channel Account Manager

About McAfee Founded in 1987, McAfee is now the world s largest dedicated security company (acquired by Intel in 2011) Global research for real-time threat intelligence Integrated solutions and services Compliance processes built into solutions Single management platform for optimized security

McAfee Facts 125 million McAfee users 180+ million mobile devices shipped with McAfee 5 million single largest McAfee deployment 10 Gartner Magic Quadrants that feature McAfee 480 McAfee patents, more pending 110+ McAfee Security Innovation Alliance partners 7,154 McAfee employees globally* 120 countries that make up the McAfee global footprint US$2.2+ billion annual revenue *As of 31 March 2013

The McAfee Approach to Security Intel + McAfee Strategy BETTER SECURITY SOLUTIONS AND PRODUCTS Power Efficient Performance Internet Connectivity Security Next Generation Endpoint Security Secure Embedded Devices Secure Mobile Devices Cloud Security Platform Active Silicon Features Security is the Third Pillar of Computing 4 30 September 2013

The McAfee Approach to Security Security Connected Architecture NETWORK SECURITY Next Generation Firewall Intrusion Prevention Access Control Network User Behaviour Analysis INFORMATION SECURITY Email Security Web Security Data Loss Prevention Encryption SECURITY MANAGEMENT Security Operations Console Policy Auditing & Management Vulnerability Management Risk Management Compliance SIEM ENDPOINT SECURITY Malware Protection Device Encryption Application Whitelisting Desktop Firewall Device Control Email Protection Network Access Control Endpoint Web Protection Host Intrusion Protection Server and Database Protection On Chip (Silicon-Based) Security Smartphone and Tablet Protection Virtual Machine and VDI Protection Embedded Device Protection PARTNER COMMUNITY Security Innovation Alliance (SIA) McAfee Connected Global Strategic Alliance Partners 5 McAfee Confidential Internal Use Only

Why McAfee? Most Comprehensive e e Security Portfolio o o / Most Complete Vision Network IPS SIEM Mobile Data Protection Email Security Web Security Endpoint Protection Vulnerability Mgmt Data Loss Prevention Enterprise Firewall Mobile Device Mgmt User Authentication Leader Visionary Challenger Niche Data is Copyrighted to Gartner Group Magic Quadrant in terms of Leader, Visionary, Challenger and Niche Players

Partners and An Open, Full-Featured Platform Management z 7 June 25, 2014

All Solutions Informed by Global Threat Intelligence g ((GTI)) Threat p Reputation Network Activity Affiliations Geo-Location Ports/Protocol IP Address Application Domain Data Activity Web Reputation File Reputation Sender Reputation DNS Server URL Mail Activity Web Activity Email Address N Network k IPS 300M IPS attacks/m o. Firewall Web Gateway 300M IPS 2B Botnet C&C attacks/m IP Reputation o. Queries/mo. Mail Gateway g 20B Message Reputation Queries/mo. Host AV 2.5B Malware. Reputation Queries/mo. Host IPS 300M IPS Attacks/m o. 3rd Party Feed GeoLocation feeds

Why McAfee? Richest Profitability Programme in Industry Enhanced Deal Registration Margin Enhancement Additional 25% off MSRP on new business Additional 10% off MSRP on suite upgrades Discounts on top of standard channel discount Deal Protection ti With registered and approved deals, special pricing and margin enhancement are exclusively yours Lost deal fee in rare occurrence that you don t get deal but McAfee does Fast Responses Average response time of 48 hours for deals less than US$50k

Why McAfee? Dedicated to Rewarding Partners Earn Points from Sales Redeem for merchandise, travel or debit cards Sales reps p and engineers g can p participate p Periodic Partner promotions, bonuses, and benefits

Become A Partner Today www.mcafee.com/de/partners.aspx