Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
How to maintain business equality secured in network and cloud
1. (Re)introducing McAfee. The device-to-cloud cybersecurity company.
How to maintain business equally
secured in corporate network and cloud
• Adaptive Security Architecture
• CASB - Cloud Access Security Broker
Harri Hämäläinen | Territory Manager, Finland & Baltics
2. MCAFEE CONFIDENTIAL
Security’s Perfect Storm
The continued need for an efficient security framework
2
Time Imperative
Comprehension and response
cannot happen fast enough
Increasing Complexity
Threats continue to rise
while mobility and cloud
erode our control
Resource Constraints
There’s not enough people or
budget to throw at the problem
5. MCAFEE CONFIDENTIAL
Asset
Threat
Identity
Activity
BPM
Risk
Data
Location
Data Exchange Layer
An innovative, real-time, bi-directional
communications fabric providing with
product integration simplicity.
Security components operate as one to
immediately share relevant data between
endpoint, gateway, and other security
products enabling security intelligence
and adaptive security.
THE SECURITY CONNECTED FRAMEWORK
ADAPTIVE SECURITY ARCHITECTURE
6. MCAFEE CONFIDENTIAL
Data Exchange Layer
Make smarter decision, faster with unified components and streamlined communication
6
Result
Slow, heavy, and burdensome
Complex and expensive to maintain
Limited vendor participation
Fragmented visibility
Result
Fast, lightweight, and streamlined
Simplified and reduced TCO
Open vendor participation
Holistic visibility
Disjointed API-Based
Integrations
Collaborative Fabric-Based
Ecosystem (DXL)
9. MCAFEE CONFIDENTIAL
Cloud Access Security Broker
enables organizations to accelerate their
business by giving them total control over
their data in the cloud
10. MCAFEE CONFIDENTIAL
Where is your sensitive data today?
16%
31%
8%
7%
13%
11%
5%
5%
Salesforce
Office 365
Google Docs 2%
Slack 2%
AWS
Custom Apps
Box
ServiceNow
High-Risk Shadow
Med/Low-Risk
Shadow
17. Data and Workload Protection
Threat Detection and Response
Real-time Data Bus
Machine
Learning
Detect &
Response
Attack
Reconstruction
Entity Behavioral Analytics
Management & Orchestration
Security OperationsDevice Cloud
System level Data Protection
System level Threat Detection and
Response
Automation & Orchestration
(Proactive / Reactive)
Visibility and contextual control in
hybrid and multi-cloud environment
SaaS
IoT
Mobile
Traditional
Threats Data & Applications
Data Visibility Data Controls
Application
Controls
Public
IaaS/PaaSData
Visibility and contextual control
Data Protection
Threat Detection and Response
Private
IaaS/PaaS
19. Product Integrations Planned
Cybersecurity from the Device to the Cloud
Comprehensive Data Loss Prevention
Complete Visibility and Data Protection
Governance of Corporate Data to be
limited to Secure Corporate-Owned Devices
Advanced Threats and Adaptive Controls
from Devices to Cloud
End-Point DLP Cloud DLP
Web Gateway Shadow IT
Client Proxy
Contextual
Access
Control
GTI, DXL, ATD
Threat
Telemetry
20. The McAfee
Advantage: Open &
Proactive
McAfee ePolicy Orchestrator® (McAfee ePO™)
offers single pane-of-glass management
and unified workflows for partners in
McAfee® SIA ecosystem
Data Exchange Layer (DXL) provides
threat intelligence sharing in multivendor
environments over a common messaging
bus-now linked with Cisco pxGrid
Global Threat Intelligence (GTI) monitors
millions of worldwide sensors for threats
and automatically updates reputation
information via the cloud