McAfee Vision

0 views
1,537 views

Published on

Michael Fey, Senior Vice President, Advanced Technology and Field Engineering, McAfee

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
0
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
89
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Initially Intel and McAfee have agreedto collaborate in five distinct areas:Next generation endpoint security: McAfee will continue to develop our traditional endpoint security, but will add an additional layer to go beyond the operating system and take advantage of hardware features such as the hardware hypervisor to make systems more secure. Secure Embedded Devices: McAfee will work with Wind River and use McAfee technologies such as white listing, integrity monitoring, change control, management and GTI and combine those with Wind River’s embedded operating system that is used in a plethora of devices such as ATM machines. This is one of the most advanced projects between Intel and McAfee, first announced at RSA in February 2011.Secure Mobile Devices, such as handheld devices: McAfee and Intel will collaborate in areas such as a secure OS, identity management, secure applications and creating a root of trust for the devices.Probably the newest area of collaboration is cloud security: We’re working to build an identity and trust management platform for devices, users, applications and combine that with McAfee Global Threat Intelligence (GTI).Last, but not least, McAfee is working to activate features that exist in silicon today but that are commonly dormant.
  • Exploit Seeker, Boot DAT; Process Profiler; Trust Content; Secure Container
  • Go DeepLower in stack. In the silicon. Beyond the OS. Etc. Intel integrations at endpointSalute what we’re doing with Intel (and the future possibilities that result)Reference DeCesare’s “Intel Solves Problems”How Intel Helps: Help us go wider, deeper, and via funding/might… Strategic intent.
  • Go DeepLower in stack. In the silicon. Beyond the OS. Etc. Intel integrations at endpointSalute what we’re doing with Intel (and the future possibilities that result)Reference DeCesare’s “Intel Solves Problems”How Intel Helps: Help us go wider, deeper, and via funding/might… Strategic intent.
  • Go DeepLower in stack. In the silicon. Beyond the OS. Etc. Intel integrations at endpointSalute what we’re doing with Intel (and the future possibilities that result)Reference DeCesare’s “Intel Solves Problems”How Intel Helps: Help us go wider, deeper, and via funding/might… Strategic intent.
  • Go DeepLower in stack. In the silicon. Beyond the OS. Etc. Intel integrations at endpointSalute what we’re doing with Intel (and the future possibilities that result)Reference DeCesare’s “Intel Solves Problems”How Intel Helps: Help us go wider, deeper, and via funding/might… Strategic intent.
  • Go DeepLower in stack. In the silicon. Beyond the OS. Etc. Intel integrations at endpointSalute what we’re doing with Intel (and the future possibilities that result)Reference DeCesare’s “Intel Solves Problems”How Intel Helps: Help us go wider, deeper, and via funding/might… Strategic intent.
  • Get rid of everything except for laptop and servers embedded, - add infrastruturre and users.Blow up laptops and show all functions as part of pc and laptop - like email, usb, virtual and explain how protection on these have to evolve. Talk about intel and reputation.Blow up servers – show database, voip, san, DHCP, sharepoint, Embedded Devices – show POS, atm, Medical devices, Scada, Printers, and how whitelisting approach is needed and change controlInfrastructure – blow up to show routing switching, wireless, datacenter, Blow up users – show smart phone, tablet, apps, social networking – need to show reputation, web proxy, identity protection – BYOPC
  • Attacks and attackers are benefiting from:Specialization (carders, malware creators, botnet herders, document forgers, etc.)Just like Samuel Slater (Father of the Industrial Revolution) in moving from making 50 widgets a day to 500 widgets a day, attacks and attackers have become industrialized by leveraging: Automation to discover and compromise targets- often via GoogleScalability – Conficker controlled almost 6.5 million systems across 230 countries with 28 Terabits of bandwidth – in comparison (Amazon only has about 160,000 systems and 500 Gbps of bandwidth and Google only has about 500,000 systems and 1,500 Gbps of bandwidth)Additional note: This may be a good place to state that as we move from 1 Billion connected to 50 billion connected we are moving from 4.5 Billion IP v4 to over 340 Undecillion (340 Trillion-Trillion-Trillion) in IP v6Storyboard:Start with icons from the “Today” list and give a sense of them being relatively secure. Target reticule (something similar to the image in yellow box above, but maybe “computer terminal” green instead of black) passes over icons, but it is evident that targeted icons are still somewhat secure. As we switch to the “tomorrow” side of things, we see the number of icons increase dramatically as the “Tomorrow” icons start popping in. Reticule passes over the icons to be talked about. As reticule settles on target, a callout box expands from the reticule to have a couple bullet points highlighting the situationToday:Laptops/Desktops (Mac and PC)ServersVirtualized environmentsFinancial systemsATMSCADARetail / Point of SaleMedical DevicesEnterprise InfrastructureTomorrow: (main area and sub points)Mobile: expanded uses to include payment, replacing your wallet ala Near Field Communication (NFC), house/car keys, point of sale device (paypal mobile, Square), family positioning device (GPS for keeping track of where your family members are)Medical devices: devices implanted in the body and monitored/managed remotely. insulin pump, pace maker, artificial organs/limbsCloud: increased amount of activity pushed to the cloud, accessed by tablets/phones/ultrabooks. Allowing people access to high powered applications while on the goCars: Hackable areas include GPS, entertainment system, diagnostics and early warning sensors, traffic avoidance systems, cars as mobile hotspotsMilitary: satellites, armored vehicles (Stryker Armored Fighting Vehicle), battle field gear (think heads up displays in soldiers’ helmets, tracking systems), Mobile Mesh Networks (http://www.meshdynamics.com/military-mesh-networks.html)Embedded Home: Smart TVs (people purchasing something via TV they see in a show while watching), fridge that places an order for milk when carton is almost empty, work email fed to your alarm clock, embedded screen in table/counter provides latest news, display on fridge shows weather and kids’ schedules for the dayPublic services: declining budget and mounting deficit push to a more automated government, putting sensitive information accessible from the internet. Passport information, Social Security, ID Cards, Driver License information, Tax records, etc…Emergency Services: Police/Fire/Ambulance services moving to more automated response and location systems to improve response time. Social Networks: Facebook, twitter, google+ all become more linked into more goods and services online. Payment and authentication systems are channeled through social networks, making them a much juicier target. Take down the social network and you begin to own a person’s identity
  • Help wanted ad… sample help wanted ad with verbiage from a Hadware design job… could be a Monster.com posting…“Some of your duties will include, but are not limited to: Logic design on circuit boards and FPGAs Signal integrity analysis Analog design may be required.Working with projects from start to finish with specifications, simulation, debug and implementation. Successful candidates for this position will have: Knowledge of digital design for both circuit board and FPGAs.Knowledge of Verilog, analog design and signal integrity knowledge is a plus.  Education: Bachelor Degree in Electrical Engineering
  • Help wanted ad… sample help wanted ad with verbiage from a Hadware design job… could be a Monster.com posting…“Some of your duties will include, but are not limited to: Logic design on circuit boards and FPGAs Signal integrity analysis Analog design may be required.Working with projects from start to finish with specifications, simulation, debug and implementation. Successful candidates for this position will have: Knowledge of digital design for both circuit board and FPGAs.Knowledge of Verilog, analog design and signal integrity knowledge is a plus.  Education: Bachelor Degree in Electrical Engineering
  • Attacks and attackers are benefiting from:Specialization (carders, malware creators, botnet herders, document forgers, etc.)Just like Samuel Slater (Father of the Industrial Revolution) in moving from making 50 widgets a day to 500 widgets a day, attacks and attackers have become industrialized by leveraging: Automation to discover and compromise targets- often via GoogleScalability – Conficker controlled almost 6.5 million systems across 230 countries with 28 Terabits of bandwidth – in comparison (Amazon only has about 160,000 systems and 500 Gbps of bandwidth and Google only has about 500,000 systems and 1,500 Gbps of bandwidth)Additional note: This may be a good place to state that as we move from 1 Billion connected to 50 billion connected we are moving from 4.5 Billion IP v4 to over 340 Undecillion (340 Trillion-Trillion-Trillion) in IP v6Storyboard:Start with icons from the “Today” list and give a sense of them being relatively secure. Target reticule (something similar to the image in yellow box above, but maybe “computer terminal” green instead of black) passes over icons, but it is evident that targeted icons are still somewhat secure. As we switch to the “tomorrow” side of things, we see the number of icons increase dramatically as the “Tomorrow” icons start popping in. Reticule passes over the icons to be talked about. As reticule settles on target, a callout box expands from the reticule to have a couple bullet points highlighting the situationToday:Laptops/Desktops (Mac and PC)ServersVirtualized environmentsFinancial systemsATMSCADARetail / Point of SaleMedical DevicesEnterprise InfrastructureTomorrow: (main area and sub points)Mobile: expanded uses to include payment, replacing your wallet ala Near Field Communication (NFC), house/car keys, point of sale device (paypal mobile, Square), family positioning device (GPS for keeping track of where your family members are)Medical devices: devices implanted in the body and monitored/managed remotely. insulin pump, pace maker, artificial organs/limbsCloud: increased amount of activity pushed to the cloud, accessed by tablets/phones/ultrabooks. Allowing people access to high powered applications while on the goCars: Hackable areas include GPS, entertainment system, diagnostics and early warning sensors, traffic avoidance systems, cars as mobile hotspotsMilitary: satellites, armored vehicles (Stryker Armored Fighting Vehicle), battle field gear (think heads up displays in soldiers’ helmets, tracking systems), Mobile Mesh Networks (http://www.meshdynamics.com/military-mesh-networks.html)Embedded Home: Smart TVs (people purchasing something via TV they see in a show while watching), fridge that places an order for milk when carton is almost empty, work email fed to your alarm clock, embedded screen in table/counter provides latest news, display on fridge shows weather and kids’ schedules for the dayPublic services: declining budget and mounting deficit push to a more automated government, putting sensitive information accessible from the internet. Passport information, Social Security, ID Cards, Driver License information, Tax records, etc…Emergency Services: Police/Fire/Ambulance services moving to more automated response and location systems to improve response time. Social Networks: Facebook, twitter, google+ all become more linked into more goods and services online. Payment and authentication systems are channeled through social networks, making them a much juicier target. Take down the social network and you begin to own a person’s identity
  • Help wanted ad… sample help wanted ad with verbiage from a Hadware design job… could be a Monster.com posting…“Some of your duties will include, but are not limited to: Logic design on circuit boards and FPGAs Signal integrity analysis Analog design may be required.Working with projects from start to finish with specifications, simulation, debug and implementation. Successful candidates for this position will have: Knowledge of digital design for both circuit board and FPGAs.Knowledge of Verilog, analog design and signal integrity knowledge is a plus.  Education: Bachelor Degree in Electrical Engineering
  • Help wanted ad… sample help wanted ad with verbiage from a Hadware design job… could be a Monster.com posting…“Some of your duties will include, but are not limited to: Logic design on circuit boards and FPGAs Signal integrity analysis Analog design may be required.Working with projects from start to finish with specifications, simulation, debug and implementation. Successful candidates for this position will have: Knowledge of digital design for both circuit board and FPGAs.Knowledge of Verilog, analog design and signal integrity knowledge is a plus.  Education: Bachelor Degree in Electrical Engineering
  • Arrows…Aggregate CCC layerInsert ProxyMcAfee’s GTI cloudCustomer’s GTI cloud (their address book)(ADD THESE BULLETS NEXT TO BUSINESS USER CLOUDPrivate zones and policiesDefense in Depth – Not vendor in depth. Relative Defense (customized for your enterprise and your situation)Behavior-based intelligence (policies) needs to be customized. And relative to zones. Open, with additional threat feeds…
  • Arrows…Aggregate CCC layerInsert ProxyMcAfee’s GTI cloudCustomer’s GTI cloud (their address book)(ADD THESE BULLETS NEXT TO BUSINESS USER CLOUDPrivate zones and policiesDefense in Depth – Not vendor in depth. Relative Defense (customized for your enterprise and your situation)Behavior-based intelligence (policies) needs to be customized. And relative to zones. Open, with additional threat feeds…
  • Arrows…Aggregate CCC layerInsert ProxyMcAfee’s GTI cloudCustomer’s GTI cloud (their address book)(ADD THESE BULLETS NEXT TO BUSINESS USER CLOUDPrivate zones and policiesDefense in Depth – Not vendor in depth. Relative Defense (customized for your enterprise and your situation)Behavior-based intelligence (policies) needs to be customized. And relative to zones. Open, with additional threat feeds…
  • Arrows…Aggregate CCC layerInsert ProxyMcAfee’s GTI cloudCustomer’s GTI cloud (their address book)(ADD THESE BULLETS NEXT TO BUSINESS USER CLOUDPrivate zones and policiesDefense in Depth – Not vendor in depth. Relative Defense (customized for your enterprise and your situation)Behavior-based intelligence (policies) needs to be customized. And relative to zones. Open, with additional threat feeds…
  • SIM, SEM, LogReal-time…Every second of every minute what’s coming up and going down on the user…based on role of user.Show events based on role of the user. At any moment in time, where are we, are we covered, are we under attack, CYA feature, etc. Continuous monitoring… Situational Awareness maps continuous monitoring to a given landscape. Use Case: e.g., RSA hack. Email sent in w/ spreadsheet attachment, filtered, HR rep thought it was legit, established C&C, … w/ Neutron we’ll see logs on router, on mail gateway, on spam filter, on execution, on user override, firewall rules, logs on outbound routers, final egress points… Control: If you include risk into the conversation then I can tell you why you have to have command and control feeds. You need the feeds telling the sim what they can do not just what they are seeing.“All of the other SIEMS on the market are first generation SIEMS while Nitro is a second generation SIEM, which means that we move from just collecting information for log management and compliance reporting towards actionable intelligence!” “First generation SIEMS are like first generation CAD systems where it took two hours to move a bolt two inches to the left. Everyone saw the promise, but nobody had the patience. Nitro can ‘move that bolt’ in two seconds.” Distance to Action shortened. McAfee’s command and control capability is key differentiator. Metrics. If we can give substantive, quantitative metrics it’ll help. Defending your measurement. Predict effectiveness of future spend. Create metric then measure over time for trend. Risk Advisor becomes… (metrics). RA sits on top of Neutron and ePO. “What if” possibilities with MRA. MRA vision app. Perhaps do demo… Control-aware situational awarenessAlso need to augment with contextSystem as center of security universe…Trust becomes more important. (e.g., RSA hack going after C tables for R token)Identity (e.g., from Intel)Encryption and tokenization and proxying the traffic. Local GTI
  • McAfee Vision

    1. 1. MICHAEL FEYSENIOR VICE PRESIDENT, ADVANCEDTECHNOLOGY AND FIELD ENGINEERING,MCAFEE
    2. 2. 1990–1995 1996–2000 File Infectors Multi-partite Macro viruses VBScript and W32 take Autho (COM and EXE) over, W16 & DOS dry up produ Threats Boot infectors Batch Joke PUPs emerge Boot & floppy threats decline Email worm take over W16 viruses PWS Trojans emerge Floppy disks Email P2P Local Area Networks Web Vectors Floppy disks AV advanced macro heur Local Area Networks Windows 95 100 millionInfluences on Internet Office 97 introduces tighter macro security Peer fame / Peer fame notoriety Personal challenge Revenge FinancialMotivation
    3. 3. MALWAREGROWTH 2007 2008 2009 2010 2011 Source: McAfee Labs (2011 and 2016 are estimates)
    4. 4. 200720082009201020112016 2007 2008 2009 2010 2011 Source: McAfee Labs (2011 and 2016 are estimates)
    5. 5. McAfee Solution PlatformNETWORK SECURITY ENDPOINT SECURITY Next Generation Firewall Malware Protection Intrusion Prevention Device Encryption Access Control Application Whitelisting Network User Behavior Analysis Desktop Firewall Device Control Email Protection Network Access ControlINFORMATION SECURITY Endpoint Web Protection Email Security Host Intrusion Protection Web Security Data Loss Prevention Server & Database Protection Encryption On Chip (Silicon-Based) Security Smartphone and Tablet Protection Virtual Machine and VDI ProtectionSECURITY MANAGEMENT Embedded Device Protection Security Operations Console Policy Auditing & Management PARTNER COMMUNITY Vulnerability Management Risk Management Security Innovation Alliance (SIA) Compliance McAfee Connected SIEM Global Strategic Alliance Partners
    6. 6. McAfee/Intel Initiatives Next-Generation Secure Secure Cloud ActivateEndpoint Security Embedded Devices Mobile Devices Security Platform Silicon Features Security Platform Application Whitelisting Hardware Root of Trust Identity and Trust Power Management Integrity Monitor OS Security Management Beyond the OS Embedded Encryption Change Control App Sandboxing Application to ApplicationExpanding Global Threat Out of Band Management Security Intelligence (GTI) Device Management App Validation Out of Band Recovery Expanding GTI Expanding GTI Management Anti-Theft Expanding GTI
    7. 7. NEXT GEN ENDPOINT PROTECTION ENGINE BLACKLIST WHITELIST CONTEXT STATE OF DEEP DAT CLOUD MACHINE SAFE
    8. 8. ApplicationsAnti-Virus Data Loss Prevention Intrusion Prevention System Firewall Deep Defender Operating System DeepSAFE Central Processing Unit Input/Output Memory Disk Network Display
    9. 9. ApplicationsAnti-Virus Data Loss Prevention Intrusion Prevention System Firewall Deep Defender APPLICATION SPACE Operating System DeepSAFE DeepSAFE CRITICAL SYSTEM RESOURCES Central Processing Unit Memory I/O Disk Network Display Input/Output Memory Disk Network Display
    10. 10. APPLICATION SPACE CRITICAL SYSTEM RESOURCES APPLICATION SPACE Memory I/O DeepSAFE Disk CRITICAL SYSTEM RESOURCES Network Memory I/O Disk Network Display Display
    11. 11. APPLICATION SPACE CRITICAL SYSTEM RESOURCES Memory I/O Disk Network Display
    12. 12. APPLICATION SPACE CRITICAL SYSTEM RESOURCES X Memory X X I/O X X Disk Network Display
    13. 13. NEXT GEN ENDPOINT PROTECTION ENGINE WHITELIST DEEP CLOUD CONTEXTGTI BLACKLIST DAT STATE OF MACHINE SAFE EXPLOIT SECURE PROCESS TRUST BOOT SEEKER CONTAINERCONTEXT STATE OF BLACKLIST WHITELIST PROFILER CONTENTDEEPDAT DAT CLOUD MACHINE SAFE
    14. 14. SMART PHONE CLOUD USB EMAIL SAN LAPTOP TABLET ROUTING/PC SERVERS SWITCHING DATABASE VOIP WIRELESS INFRASTRUCTURE EMBEDDED DEVICES APPS THE EXPANDING ATTACK SURFACE
    15. 15. EMAIL SMART PHONE CLOUD USB EMAIL SAN TABLET LAPTOP USB ROUTING/PC LAPTOP SERVERS SWITCHING DATABASE WIRELESS INFRASTRUCTURE VOIP VIRTUAL EMBEDDED DEVICES APPS WEB THE EXPANDING ATTACK SURFACE
    16. 16. VOIP SharePoint SMART PHONE CLOUD USB DATABASE FINANCE EMAIL SAN LAPTOP TABLET SAN ROUTING/ LEGALPC SERVERS SWITCHING DATABASE WIRELESS INFRASTRUCTURE VOIP SERVERS SERVERS DNS AD/LDAP EMBEDDED DEVICES WEB DHCP APPS HR THE EXPANDING ATTACK SURFACE
    17. 17. POS SMART PHONE CLOUD USB EMAIL SAN LAPTOP ATM TABLET ROUTING/PC SERVERS SWITCHING DATABASE WIRELESS INFRASTRUCTURE VOIP MEDICAL DEVICES EMBEDDED DEVICES SCADA EMBEDDED DEVICES APPS PRINTERS THE EXPANDING ATTACK SURFACE
    18. 18. ROUTING/SWITCHINGSMART PHONE CLOUD USB EMAIL WIRELESS SAN LAPTOP TABLET ROUTING/PC CLOUD SERVERS SWITCHING DATABASE WIRELESS INFRASTRUCTURE VOIP FIREWALLS INFRASTRUCTURE EMBEDDED DEVICES DATA CENTERS APPS VDI THE EXPANDING ATTACK SURFACE
    19. 19. SMART PHONE TABLET APPS SOCIAL NETWORKING BYOPCTHE EXPANDING ATTACK SURFACE
    20. 20. GTI Network Web Mail 3rd Party Firewall Host AV Host IPS IPS Gateway Gateway Feed 300M IPS 300M IPS 2B Botnet 20B Message 2.5B Malware 300M IPS Geoattacks/mo. attacks/mo. C&C IP Reputation Reputation attacks/mo. Location Reputation queries/mo. queries/mo. Feeds queries/mo.
    21. 21. GTI Network Web Mail 3rd Party Firewall Host AV Host IPS IPS Gateway Gateway Feed 300M IPS 300M IPS 2B Botnet 20B Message 2.5B Malware 300M IPS Geoattacks/mo. attacks/mo. C&C IP Reputation Reputation attacks/mo. Location Reputation queries/mo. queries/mo. Feeds queries/mo.
    22. 22. GTI Additional Threat Feeds Relative Defense Behavior-based Intelligence Private Zones and Policies Enterprise NEXT GEN GTI PROXY COUNTERMEASURE COMMAND AND CONTROL
    23. 23. CLOUDPROTECTION Services Gateway Data Loss Web Email Prevention Gateway Gateway Data Loss Services Web Cloud Identity Email Prevention Gateway Gateway Gateway Gateway Cloud Identity Gateway
    24. 24. Oct 17 10:00:27, Oct 17 10:00:27, Application=smtp, Application=smtp, Event=Email Status, Event=Email Status, 10/17/2011 10:00:27, From=billf1223@gmail.com, From=billf1223@gmail.com, TRAFFIC, end, 10:00:27, 10/17/2011 66.55.23.4, size=25140, TRAFFIC, end, 66.55.23.4, size=25140, 192.168.46.15, MonitorSPAN source=(66.55.23.4), 192.168.46.15, Monitor source=(66.55.23.4), reputation=49, tls=1 SPAN Port, Tap Zone, Port, Tap Zone, reputation=49, tls=1 ethernet1/12, 83752, 1, ethernet1/12, 83752, 1, 59404, 25, tcp, allow, any 59404, 25, tcp, allow, 10/17/2011 10:02:52 PM, PM, any 10/17/2011 10:02:52OctOct 17 10:00:26, Src 17 10:00:26, Src Deleted (detection isnt 66.55.23.4, s_port 4523,66.55.23.4, s_port 4523, Deleted (detection isnt cleanable), W7MANGhost35 dst 192.168.46.15, servicedstsmtp, proto tcp, xlatesrc 192.168.46.15, service cleanable), W7MANGhost35 C:Programsmtp, proto tcp, xlatesrc C:Program FilesVMwareInfrastructure Virtual Infrastructure FilesVMwareInfrastructur Client4.1vmware-vmrc.exe, eVirtual Infrastructure C:UsersbrogersDesktop45 Client4.1vmware- 5_23_setup.exe Generic.dx!bbfq vmrc.exe, C:UsersbrogersDesktop4 55_23_setup.exe RESPOND Generic.dx!bbfq
    25. 25. SITUATIONAL AWARENESS AND RESPONSE Threat Intelligence Real-Time Command & Control High CorrelationPerformance SIEM Engine Database EVENT LOG AUDIT/COMP. 11 001 100 010011 100 10010001 100110 11 1 100 110100110 10 110 CONTEXT 100 1001 100110 100 001111010011 11 100 CONTENT COUNTER MEASURES
    26. 26. OPTION 1 REAL-TIME RISK ANALYSIS Critical User Has Administrator Access Privileges PrivilegesMCAFEE SIEM DASHBOARD System Has Endpoint Security Destination Reputation Controls (AV, FW, Hips) Major Requestor Coming From a Source Reputation Suspicious Location Warning System Has Vulnerabilities; Context System Is Finance Database Minor Payload Is Extract of Sensitive Info Content Financial Data
    27. 27. OPTION 2 Real-Time Risk Analysis Info Minor Warning Major CriticalMcAfee SIEM Dashboard Access Destination Source Privileges Reputation Reputation Context Content User Has System Has Requestor System Has Payload Is Administrator Endpoint Coming Vulnerabilities; Extract of Privileges Security from a System Is Sensitive Controls (AV, Suspicious Finance Financial FW, Hips) Location Database Data
    28. 28. McAfee Security Connected OPTIMIZED SECURITY DELIVERING BUSINESS VALUE McAfee Approach: • GTI-powered intelligence in depth • Centralized management platform • Extensible architecture • Broadest set of technologies • Flexible delivery options McAfee Delivers: • Lower operational costs • Enhanced overall security posture • Partnership with #1 name in Security

    ×