Published on

Презентация доклада Алекса де Граафа, директора по продажам компании McAfee.
Доклад проходил на конференции McAfee&Intel DAY 15 октября в Киеве.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. Complex Network Security Concepts Alex de Graaf Director, Pre-Sales McAfee, Emerging Markets EMEA
  2. 2. Infiltration/Exfiltration – Our Latest Challenge "Targeted malware can often bypass existing protection technologies, and the resulting data breaches are not detected until a long time has passed and significant data exfiltration has occurred.” Gartner, December 2012
  3. 3. Advanced Threat Architecture Infiltration Back Door Phishing or web driveby. Email has attached malware or link to malware Malware install remote access toolkits Recon Malware obtains credentials to key systems and identifies valuable data Data Gathering Data is acquired and staged for exfiltration Exfiltration Data is exfiltrated as encrypted files via http/s, FTP., DNS
  4. 4. McAfee Infiltration Architecture Web NSP EMail NSP Deep Defender McAfee Advanced Threat Defense
  5. 5. Malware Protection Rates McAfee Network Security Platform 100% 99% 99% 99% 100% 96% 94% 80% 80% 60% 60% 40% 40% 20% 20% 0% 0% Prevalent Malware Rogue Software Source: AV-Test.org February, 2013 Backdoors Bots Combined Malware
  6. 6. Day Zero Protection Rate McAfee Web Gateway vs. Competitors 2012 2013 100% 100% 91% 95% 90% 90% 80% 80% 74% 70% 70% 58% 60% 60% 50% 50% 40% 40% 30% 30% 25% 20% 20% 10% 10% 0% 0% Cisco Websense Source: AV-Test.org, January, 2013 Blue Coat McAfee McAfee
  7. 7. McAfee Has Acquired ValidEdge Sandboxing Technology McAfee Advanced Threat Defense AV + GTI + GAM + Sandboxing Typical malware block rate 95% Target malware block rate 99%+
  8. 8. McAfee Advanced Threat Defense Unique and Differentiated HEAL McAfee Global Threat Intelligence DETECT ANALYZE Automated Host Cleaning (ePO) Malware Fingerprint Query (Real Time ePO) SWF WINDOWS EXE Efficient AV Signatures PDF GTI Reputation MS OFFICE DOCUMENTS Static Code Analysis Target-Specific Sandboxing JPEG Real-Time Analysis and Reports MORE BLACKLIST AND SIGNATURE UPDATE Instant File Access Control NSP Gateways GTI McAfee ePO
  9. 9. McAfee Exfiltration Architecture Web NSP EMail NSP HDLP McAfee DLP Policy Manager
  10. 10. Here’s How it Looks in Motion: Comprehensive Malware Protection McAfee Security Installed McAfee Web Protection McAfee Network Security Platform McAfee Security for Microsoft Exchange McAfee Email Protection McAfee MOVE AV McAfee Advanced Threat Defense McAfee Enterprise Security Manager McAfee ePO McAfee Application Control McAfee Deep Defender
  11. 11. Comprehensive Malware Protection First Layer of Defense: Global Visibility and Situational Awareness
  12. 12. Comprehensive Malware Protection Second Layer of Defense: McAfee Advanced Threat Defense McAfee Advanced Threat Defense
  13. 13. Comprehensive Malware Protection Third Layer of Defense: Network Threat Protection NSP Web NSP NSP
  14. 14. Comprehensive Malware Protection Fourth Layer of Defense: Comprehensive Endpoint Threat Defense
  15. 15. Comprehensive Malware Protection Fifth layer of defense: Real Time Endpoint Awareness
  16. 16. Comprehensive Malware Protection Sixth Layer of Defense: Heal Endpoints
  17. 17. Comprehensive Malware Protection Seventh Layer of Defense: Global Threat Intelligence GTI
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.