Your SlideShare is downloading. ×
0
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

MID_Security_Connected_Jan_van_Vliet_EN

391

Published on

Презентация доклада Ян ван Влита, вице-президента McAfee. …

Презентация доклада Ян ван Влита, вице-президента McAfee.
Доклад проходил на конференции McAfee&Intel DAY 15 октября в Киеве.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
391
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
17
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. McAfee Delivers Intelligent Security Based on the Security Connected Platform Jan van Vliet Vice President Emerging markets EMEA McAfee 15 September 2013 McAfee Confidential—Internal Use Only
  • 2. IT Forces Impacting Security DATA CENTER TRANSFORMATION SITUATIONAL AWARENESS NEXT GENERATION NETWORK COMPREHENSIVE MALWARE PROTECTION NEXT GENERATION ENDPOINT WEB AND IDENTITY McAfee Confidential—Internal Use Only
  • 3. Inherent Complexity Virtualization DATA CENTER TRANSFORMATION Continuous Monitoring Cloud Servers / Networks Exploding Data Database Security Real Time Visibility SITUATIONAL AWARENESS Compliance Reporting Encryption Identity and Access Control NEXT GENERATION NETWORK Data Protection Data Loss Protection BYOD / Mobile Enable the Workforce App Protection Achieve Cyber Readiness Protect Devices Reporting OS Protection (Legacy, Win 7/8, Android, Mac) Counter Stealth Attacks Intelligence-Driven Response Identity NEXT GENERATION ENDPOINT Protect IP Next Gen IPS Social Media Protection Email Protection Web Protection WEB AND IDENTITY COMPREHENSIVE MALWARE PROTECTION Protect Critical Infrastructures Targeted Attacks Identity Protection McAfee Confidential—Internal Use Only
  • 4. Compounded by Business Constraints Virtualization DATA CENTER TRANSFORMATION DECREASED / FLAT BUDGETS Continuous Monitoring Cloud Servers / Networks Exploding Data Database Security LIMITED OR UNTRAINED RESOURCES Real Time Visibility SITUATIONAL AWARENESS Compliance Reporting Encryption Identity and Access Control NEXT GENERATION NETWORK Data Protection Data Loss Protection BYOD / Mobile CHANGING BUSINESS DEMANDS Enable the Workforce App Protection Achieve Cyber Readiness Protect Devices Protect IP Reporting OS Protection (Legacy, Win 7/8, Android, Mac) Counter Stealth Attacks Intelligence-Driven Response Identity NEXT GENERATION ENDPOINT UNPLANNED COMPLIANCE & REPORTING REQUIREMENTS Next Gen IPS Social Media Protection Email Protection Web Protection WEB AND IDENTITY COMPREHENSIVE MALWARE PROTECTION Protect Critical Infrastructures Targeted Attacks Identity Protection McAfee Confidential—Internal Use Only
  • 5. The Security Dilemma… CAN? McAfee Confidential—Internal Use Only
  • 6. How to Optimize Your Investment HOW? CAN? McAfee Confidential—Internal Use Only
  • 7. The Drive to Optimize The Maturity Model of Enterprise Security REACTIVE (~3% of IT Budget on Security) COMPLIANT/PROACTIVE (~8% of IT Budget on Security) OPTIMIZED (~4% of IT Budget on Security) TCO (CapEx +) Security Posture SECURITY OPTIMIZATION McAfee Confidential—Internal Use Only
  • 8. Security Connected Delivering an Optimized Security Capability INTEGRATED & INTELLIGENT SOLUTIONS REAL TIME SITUATIONAL AWARENESS & RESPONSE 101010101010101010101010101010101010101010101010101 10101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 1 0 1 0 1 0 1 0 1 0 110 1 0 0 01 011 1 0 1 00 0 10 11 001 0 1 1 10 1 00 011 011 1 0 1 00 0 10 1 0 001 0 11 0 1 1 10 0 0 1 11 0 01 1 0 0 01 1 0 0 0 1 11 0 1 1 10 0101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010 McAfee Confidential—Internal Use Only
  • 9. Why McAfee? Most Comprehensive Security Portfolio / Most Complete Vision Network IPS SIEM Mobile Data Protection Email Security Web Security Endpoint Protection Vulnerability Mgmt Data Loss Protection Enterprise Firewall Mobile Device Mgmt User Authentication Leader Visionary Data is Copyrighted to Gartner Group Magic Quadrant in terms of Leader, Visionary, Challenger and Niche Players Challenger Niche McAfee Confidential—Internal Use Only
  • 10. Breadth and Depth for Security Integrated Solutions Deliver DATA CENTER TRANSFORMATION • Cloud Protection • Virtual Machine Protection • Application Control • Change Control • Database Security NEXT GENERATION NETWORK • Next Gen Firewall • Advanced Malware Protection • Intrusion Prevention System NEXT GENERATION ENDPOINT WEB AND IDENTITY • • • • Application Control HW Enhanced Security Device Control Host IPS/Firewall • Web Security • Email Security • VDI Protection • Endpoint Encryption • Mobile Protection • Identity & Authentication • Data Loss Prevention COMPREHENSIVE MALWARE PROTECTION • Network Protection • HW Enhanced Security • Web & Email Protection • SIEM Integration • Layered Endpoint Security • Mobile Protection REAL TIME SITUATIONAL AWARENESS • SIEM • Real Time Visibility • Vulnerability Management • Centralized Management • Policy Auditing & Management McAfee Confidential—Internal Use Only
  • 11. Partners and An Open, Full-Featured Platform Integrated Solutions Deliver Management z 11 October 17, 2013 McAfee Confidential—Internal Use Only
  • 12. All Solutions Informed by Global Threat Intelligence (GTI) Integrated Solutions Deliver Threat Reputation Network Activity Affiliations Geo-Location Ports/Protocol IP Address Application Domain Data Activity Web Reputation URL Web Activity Network IPS Firewall 300M IPS attacks/mo. 300M IPS attacks/mo. Web Gateway 2B Botnet C&C IP Reputation Queries/mo. Sender Reputation Mail Activity Email Address Mail Gateway 20B Message Reputation Queries/mo. File Reputation DNS Server Host AV 2.5B Malware Reputation . Queries/mo. Host IPS 300M IPS Attacks/mo. 3rd Party Feed Geo-Location feeds McAfee Confidential—Internal Use Only
  • 13. Security Connected Platform Vision ANALYTICS THREAT INTELLIGENCE COUNTERMEASURES AND INTEGRATION SECURITY MANAGEMENT CONTEXT AND ORCHESTRATION McAfee Confidential—Internal Use Only
  • 14. Critical Infrastructures Are at Stake McAfee Confidential—Internal Use Only

×