Complex Network Security Concepts

Alex de Graaf
Director, Pre-Sales
McAfee, Emerging Markets EMEA
Infiltration/Exfiltration – Our Latest
Challenge

"Targeted malware can often bypass
existing protection technologies, and...
Advanced Threat Architecture

Infiltration

Back Door

Phishing or
web driveby. Email
has
attached
malware or
link to
malw...
McAfee Infiltration Architecture

Web

NSP

EMail
NSP

Deep
Defender

McAfee
Advanced
Threat
Defense
Malware Protection Rates
McAfee Network Security Platform
100%

99%

99%

99%

100%

96%

94%

80%

80%

60%

60%

40%

40...
Day Zero Protection Rate
McAfee Web Gateway vs. Competitors
2012

2013
100%

100%

91%

95%

90%

90%
80%

80%

74%

70%

...
McAfee Has Acquired ValidEdge
Sandboxing Technology

McAfee Advanced Threat Defense
AV + GTI + GAM

+ Sandboxing

Typical ...
McAfee Advanced Threat Defense
Unique and Differentiated
HEAL
McAfee Global
Threat Intelligence
DETECT

ANALYZE

Automated...
McAfee Exfiltration Architecture

Web

NSP

EMail
NSP
HDLP

McAfee DLP
Policy
Manager
Here’s How it Looks in Motion:
Comprehensive Malware Protection

McAfee Security Installed

McAfee Web
Protection

McAfee ...
Comprehensive Malware Protection
First Layer of Defense:
Global Visibility and
Situational Awareness
Comprehensive Malware Protection
Second Layer of Defense:
McAfee Advanced Threat Defense

McAfee
Advanced Threat
Defense
Comprehensive Malware Protection
Third Layer of Defense:
Network Threat Protection
NSP
Web
NSP

NSP
Comprehensive Malware Protection
Fourth Layer of Defense:
Comprehensive Endpoint
Threat Defense
Comprehensive Malware Protection
Fifth layer of defense:
Real Time Endpoint Awareness
Comprehensive Malware Protection
Sixth Layer of Defense:
Heal Endpoints
Comprehensive Malware Protection
Seventh Layer of Defense:
Global Threat Intelligence

GTI
MID_Complex_Network_Security_Alex_de_Graaf_EN
Upcoming SlideShare
Loading in …5
×

MID_Complex_Network_Security_Alex_de_Graaf_EN

820 views

Published on

Презентация доклада Алекса де Граафа, директора по продажам компании McAfee.
Доклад проходил на конференции McAfee&Intel DAY 15 октября в Киеве.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
820
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
27
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

MID_Complex_Network_Security_Alex_de_Graaf_EN

  1. 1. Complex Network Security Concepts Alex de Graaf Director, Pre-Sales McAfee, Emerging Markets EMEA
  2. 2. Infiltration/Exfiltration – Our Latest Challenge "Targeted malware can often bypass existing protection technologies, and the resulting data breaches are not detected until a long time has passed and significant data exfiltration has occurred.” Gartner, December 2012
  3. 3. Advanced Threat Architecture Infiltration Back Door Phishing or web driveby. Email has attached malware or link to malware Malware install remote access toolkits Recon Malware obtains credentials to key systems and identifies valuable data Data Gathering Data is acquired and staged for exfiltration Exfiltration Data is exfiltrated as encrypted files via http/s, FTP., DNS
  4. 4. McAfee Infiltration Architecture Web NSP EMail NSP Deep Defender McAfee Advanced Threat Defense
  5. 5. Malware Protection Rates McAfee Network Security Platform 100% 99% 99% 99% 100% 96% 94% 80% 80% 60% 60% 40% 40% 20% 20% 0% 0% Prevalent Malware Rogue Software Source: AV-Test.org February, 2013 Backdoors Bots Combined Malware
  6. 6. Day Zero Protection Rate McAfee Web Gateway vs. Competitors 2012 2013 100% 100% 91% 95% 90% 90% 80% 80% 74% 70% 70% 58% 60% 60% 50% 50% 40% 40% 30% 30% 25% 20% 20% 10% 10% 0% 0% Cisco Websense Source: AV-Test.org, January, 2013 Blue Coat McAfee McAfee
  7. 7. McAfee Has Acquired ValidEdge Sandboxing Technology McAfee Advanced Threat Defense AV + GTI + GAM + Sandboxing Typical malware block rate 95% Target malware block rate 99%+
  8. 8. McAfee Advanced Threat Defense Unique and Differentiated HEAL McAfee Global Threat Intelligence DETECT ANALYZE Automated Host Cleaning (ePO) Malware Fingerprint Query (Real Time ePO) SWF WINDOWS EXE Efficient AV Signatures PDF GTI Reputation MS OFFICE DOCUMENTS Static Code Analysis Target-Specific Sandboxing JPEG Real-Time Analysis and Reports MORE BLACKLIST AND SIGNATURE UPDATE Instant File Access Control NSP Gateways GTI McAfee ePO
  9. 9. McAfee Exfiltration Architecture Web NSP EMail NSP HDLP McAfee DLP Policy Manager
  10. 10. Here’s How it Looks in Motion: Comprehensive Malware Protection McAfee Security Installed McAfee Web Protection McAfee Network Security Platform McAfee Security for Microsoft Exchange McAfee Email Protection McAfee MOVE AV McAfee Advanced Threat Defense McAfee Enterprise Security Manager McAfee ePO McAfee Application Control McAfee Deep Defender
  11. 11. Comprehensive Malware Protection First Layer of Defense: Global Visibility and Situational Awareness
  12. 12. Comprehensive Malware Protection Second Layer of Defense: McAfee Advanced Threat Defense McAfee Advanced Threat Defense
  13. 13. Comprehensive Malware Protection Third Layer of Defense: Network Threat Protection NSP Web NSP NSP
  14. 14. Comprehensive Malware Protection Fourth Layer of Defense: Comprehensive Endpoint Threat Defense
  15. 15. Comprehensive Malware Protection Fifth layer of defense: Real Time Endpoint Awareness
  16. 16. Comprehensive Malware Protection Sixth Layer of Defense: Heal Endpoints
  17. 17. Comprehensive Malware Protection Seventh Layer of Defense: Global Threat Intelligence GTI

×