SlideShare a Scribd company logo
1 of 24
Download to read offline
McAfee Email Protection for
Microsoft Office 365
Cloud University
Thomas Bryant | Technical Director - OCTO
McAfee Confidential
Agenda
• Executive Summary
• Customer Challenge
• Why McAfee
• Objections & Countering Competition
• Driving Sales
• Enablement & Getting Started
2
McAfee Confidential
SECURITY: THE THIRD PILLAR OF COMPUTING
POWER EFFICIENT
PERFORMANCE
INTERNET
CONNECTIVITY SECURITY
McAfee Confidential
Web Protection
Social Media
Protection
Email
Protection
Achieve Cyber
Readiness
Intelligence-Driven
Response
Protect Critical
Infrastructures
Counter
Stealth
Attacks
Exploding Data Continuous
Monitoring
Compliance
Reporting
Protect
Devices
Reporting
Real Time
Visibility
Targeted
Attacks
Identity
Protect IP
Identity
Protection
Enable the
Workforce
BYOD/
Mobile
App Protection
OS Protection
(Legacy, Win7/8,
Android, Mac)
Cloud
Virtualization
Servers/
Networks
Database
Security
Encryption
Identity and
Access Control
Data
Protection
Data Loss
Prevention
Next
Gen IPS
Next Gen Firewall
COMPREHENSIVE
MALWARE PROTECTION
NEXT GENERATION
ENDPOINT
SITUATIONAL AWARENESS
WEB AND
IDENTITY
DATA CENTER
TRANSFORMATION
NEXT
GENERATION
NETWORK
Intel Security – Big Picture of Security
McAfee Confidential
McAfee Global Threat Intelligence
Successful Threat Intelligence is Defined by Six Principles
June 17, 2015 5
Delivered via a complete suite of
security products
Uses a combination of
protection techniques,
where reputation is a must
Global research team
dedicated solely to GTI
Real-time, “in the cloud” threat collection
and intelligence distribution model
Spans the Internet
including millions of sensors
Across all key threat
vectors
file | web | email | network
McAfee Confidential
Why McAfee is Best Positioned to Deliver
GTI
The Most Robust Telemetry Data in the Market
June 17, 20156
• 2.5B Malware Reputation Queries/Month
• 20B Email Reputation Queries/Month
• 75B Web Reputation Queries/Month
• 2B IP Reputation Queries/Month
• 300M IPS Attacks/Month
• 100M Ntwk Conn Rep Queries/Month
• 100+ BILLION QUERIES
Queries
Nodes
• Malware: 40M Endpoints
• Email: 30M Nodes
• Web: 45M Endpoint and Gateway Users
• Intrusions: 4M Nodes
• 100+ MILLION NODES, 120 COUNTRIES
McAfee Confidential
Executive Summary
Migrating email
infrastructure to
Microsoft Office
365 due to better
TCO than hosting
email in-house.
Rapid movement
to O365. 77% of
Fortune 500 have
purchased. Triple-
digit growth in last
21 months.
Email Threats do
not go away with
the cloud. O365
faces same
threats as on
premise
solutions.
Stronger security
is required as
advanced
phishing threats
become more
complex.
Layer in McAfee
Email Protection
to protect against
phishing,
continued service
and reliable
security.
Dedicated security
focus. Integration
with O365 helps
customers realize
its benefits without
compromise on
security.
The
Market
The
Customer
The
Result
The
Issue
The
Solution
The
Provider
7
McAfee Confidential
Office 365 is the #1 deployed Cloud Application!
“77% of Fortune 500
companies have
purchased it in the
last 12 months”
“Office 365 posted
triple-digit growth for
21 consecutive
months”
“nearly 50 million
Office 365 monthly
active users”
Source: Okta, Microsoft
Office 365 is the
catalyst for cloud
consumption and
embracement
McAfee Confidential
Email is Driving the Evolution
9
Email is the Primary Capability Being Used or Planned with Office 365
0% 20% 40% 60% 80%
Email
File Sharing
Document Management
Instant Messaging
Team Sites
Online Meetings
…
Percentage of Respondents
McAfee Confidential
Customer Challenges
10
95% of all attacks on enterprise
networks result from spear phishing.
1 in 5 users will click on a link
within a phishing email.
of HR & Finance
clicked on at least
1 phishing email.
88%
1 in 3 organizations
will have a hybrid
deployment.
of all organizations identify service
availability as one of the top 3
technical concerns.
13%
McAfee Confidential
11
McAfee 2014 Phishing Quiz
75,000 business users100,000+ business users
McAfee Confidential
Why your customers need stronger email security
Solution Overview
12
AV-TEST.org – Feb 2015 Product Review Report
Microsoft System Center Endpoint Protection Microsoft
Intel
Security
Industry
Average
Protection against 0-day malware attacks, inclusive of
web and email-threats (Real-World Testing) - 208
samples used
76% 98% 95%
Detection of widespread and prevalent malware
discovered in the last 4 weeks (the AV-TEST reference
set) 12,207 samples used
76% 100% 97%
Protection Score 0.0/6.0 5.0/6.0
McAfee Confidential
Email - 0.32%
File, 4%
Web, 12%
IP/Connection,
84%
If GTI were limited to what Email Vendors see
…Email and file data is all
we would see.
That’s not enough to provide
comprehensive protection.
Email
Gateway
Web Gateway
Advanced
Malware
Network IPSEndpoint AV 3rd Party Feeds Firewall
McAfee Confidential
Different technology,
different outcomes
McAfee Confidential
ClickProtect for Embedded URL Protection
15
Customizable Templates Reinforces Awareness
Enterprise Web Security
http://www.funshion.com
McAfee GTI® Web Reputation:
Unverified
McAfee GTI® Web Category:
Entertainment, Streaming Media
Unmasks URL
Safe Preview
Is that your destination site?
95%
74%
58%
25%
Zero Day Protection
Rate (GAM)
Source: AVTest.org
McAfee Confidential
Solution Overview
16
How it works
Recipient
O365 Exchange OnlineMcAfee
Email Protection
Sender’s
Email Server
Sender
Not shown: Email Continuity enables customers to log into emails via web interface in the event of an outage
Change in MXRecords routes mail accordingly to and from McAfee Email Protection
McAfee Confidential
Email Continuity Ensures Hosted Mailbox Uptime
• 60 days of rolling storage
• Web-based access to email during
outage
• Post-outage email activity release
and synchronization
17
Automatic service engagement when outage is detected
McAfee Confidential
Solution Overview
Targeted Attack Protection
• Phishing and malware protection
• Detects real-time URL malware threats with ClickProtect
• Customizable warning pages
• Built-in DLP technology
Faster and Reliable Protection
• Breadth of cloud intelligence sources
• Threat response times
• Email continuity
• Spam/Graymail filtering
Flexibility
• Advanced security for Exchange Online, Hybrid & Onsite
• Deploy any way you want, when you want
• Hybrid deployment options with single mgmt & reporting console
The value proposition
18
McAfee Confidential
19
I don’t need additional security
Targeted phishing is the biggest problem. It is echoed by analysts & customers
alike. See a 10 minute demo to learn about latest phishing tactics on how advanced
protection can help. Take the free Phishing quiz and help educate your
employees.
I’m trying to reduce my TCO, not increase it
Office 365 is a fantastic productivity solution; but MSFT is not known as a top
security vendor. The cost to strengthen security is insignificant compared to the
potential exposure and cost.
Service unavailability was cited as one of the 3 technical concerns by users of
Office 365. Email Continuity, a feature of Email Protection, takes this concern away
and further, enables your users to access email through a web-based interface,
while Office 365 service is being restored.
Nobody will be looking to target my organization.
Effort to reward is quite attractive, and you should also consider partners you work
with. Consider CryptoLocker, or the Target Breach, which was initiated from 3rd
party vendor much smaller than size of Target Stores.
Top Customer Objections
McAfee Confidential
20
Working Together
McAfee Confidential
Delivery Flexibility
June 17, 2015 21
Marketplace
• Fully Integrated into Ingram’s Marketplace
• Monthly for SaaS Email, Email Encryption,
Archiving, Web and Endpoint Security
Reseller Model • Monthly and Annual SKUs for SaaS Email, Email
Encryption, Archiving, Web, and Endpoint Security
• You Bill We Support
MSP model • Monthly SKUs for SaaS Email, Email Encryption,
Archiving, Web, and Endpoint Security
• You Bill, You Support
McAfee Confidential
Email Protection for Office 365 Enablement Tools
www.mcafee.com/O365
Grab & Go Campaign Kit Webinar Replay
Phishing Quiz Customer Facing Landing Page
http://bit.ly/O365Replay
• Conversation Guide
• Email Content
• Phishing Quiz
• ClickProtect Video
• Osterman White Paper
• Customer Presentation
Help customers discover
how skilled they are at
detecting malicious
phishing attempts amid
common work-related
emails
Send customers here for
even more assets and
information around
strengthening their
security with Intel Security
McAfee Confidential
Contact your Account Team today
• Intel Security/McAfee Specialist
• Lindsay Oprandi
• lindsay.oprandi@ingrammicro.com
• Call (800) 456-8000, Ext 66617
Ingram Services US Sales Team Contact:
Cloud.Security@ingrammicro.com
• Call (800) 705-7057, option 2
Ingram Services Canada Sales Team Contact:
Cloud.Security@ingrammicro.ca
• Call (877) 755-5002, option 1
Cloud university intel security

More Related Content

What's hot

Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud ComputingKeet Sugathadasa
 
#ALSummit: Alert Logic & AWS - AWS Security Services
#ALSummit: Alert Logic & AWS - AWS Security Services#ALSummit: Alert Logic & AWS - AWS Security Services
#ALSummit: Alert Logic & AWS - AWS Security ServicesAlert Logic
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overviewAllessandra Negri
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to HeroKasun Rajapakse
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWSAlert Logic
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsCloudPassage
 
Best-Practices-Web-Usability
Best-Practices-Web-UsabilityBest-Practices-Web-Usability
Best-Practices-Web-UsabilityLarry Wilson
 
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...Alert Logic
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOpsAlert Logic
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsAlert Logic
 
Cloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloudPassage
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectCloudPassage
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudCloudPassage
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Syed Sabhi Haider
 

What's hot (19)

Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
#ALSummit: Alert Logic & AWS - AWS Security Services
#ALSummit: Alert Logic & AWS - AWS Security Services#ALSummit: Alert Logic & AWS - AWS Security Services
#ALSummit: Alert Logic & AWS - AWS Security Services
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overview
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to Hero
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOps
 
Best-Practices-Web-Usability
Best-Practices-Web-UsabilityBest-Practices-Web-Usability
Best-Practices-Web-Usability
 
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
Cloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO Successful
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure Effect
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the Cloud
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 

Similar to Cloud university intel security

Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosJenniferMete1
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...Mithi SkyConnect
 
Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks Symantec
 
E book Elevate Your Email To The Cloud
E book Elevate Your Email To The CloudE book Elevate Your Email To The Cloud
E book Elevate Your Email To The CloudDefCom Technology
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attackClaranet UK
 
Microsoft365 from a Hacker's Perspective
Microsoft365 from a Hacker's PerspectiveMicrosoft365 from a Hacker's Perspective
Microsoft365 from a Hacker's PerspectiveBenedek Menesi
 
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxMicrosoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxARIV4
 
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...jeffgellman
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Symantec Brasil
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecuritySymantec
 
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...Mithi SkyConnect
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceVignesh Ganesan I Microsoft MVP
 
Video - FortiMail and FortiMail Cloud - April 2021.pptx
Video - FortiMail and FortiMail Cloud - April 2021.pptxVideo - FortiMail and FortiMail Cloud - April 2021.pptx
Video - FortiMail and FortiMail Cloud - April 2021.pptxEsminGadalaKattnMart
 
Office 365 advanced threat protection
Office 365 advanced threat protectionOffice 365 advanced threat protection
Office 365 advanced threat protectionSoHo Dragon
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayINSPIRIT BRASIL
 

Similar to Cloud university intel security (20)

Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von Baggenstos
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
 
Back to Front Vision for Mithi's Collaboration Environment
Back to Front Vision for Mithi's Collaboration Environment Back to Front Vision for Mithi's Collaboration Environment
Back to Front Vision for Mithi's Collaboration Environment
 
Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks
 
Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
 
E book Elevate Your Email To The Cloud
E book Elevate Your Email To The CloudE book Elevate Your Email To The Cloud
E book Elevate Your Email To The Cloud
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 
Microsoft365 from a Hacker's Perspective
Microsoft365 from a Hacker's PerspectiveMicrosoft365 from a Hacker's Perspective
Microsoft365 from a Hacker's Perspective
 
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxMicrosoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
 
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
SPC18 - Getting Started with Office 365 Advanced Threat Protection for ShareP...
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
Video - FortiMail and FortiMail Cloud - April 2021.pptx
Video - FortiMail and FortiMail Cloud - April 2021.pptxVideo - FortiMail and FortiMail Cloud - April 2021.pptx
Video - FortiMail and FortiMail Cloud - April 2021.pptx
 
Office 365 advanced threat protection
Office 365 advanced threat protectionOffice 365 advanced threat protection
Office 365 advanced threat protection
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Community IT - Single Sign On
Community IT - Single Sign OnCommunity IT - Single Sign On
Community IT - Single Sign On
 
Solution Brief
Solution BriefSolution Brief
Solution Brief
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web Gateway
 

More from Ingram Micro Cloud

Comp tia cloud foundations managing your customer's clouds
Comp tia cloud foundations   managing your customer's cloudsComp tia cloud foundations   managing your customer's clouds
Comp tia cloud foundations managing your customer's cloudsIngram Micro Cloud
 
Century link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation finalCentury link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation finalIngram Micro Cloud
 
SoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for PartnersSoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for PartnersIngram Micro Cloud
 
Roundtable: Office 365 Advisor to CSP Conversion
Roundtable: Office 365 Advisor to CSP ConversionRoundtable: Office 365 Advisor to CSP Conversion
Roundtable: Office 365 Advisor to CSP ConversionIngram Micro Cloud
 
Marketing Transformation: Marketing Today Becomes Sales Tomorrow
Marketing Transformation: Marketing Today Becomes Sales TomorrowMarketing Transformation: Marketing Today Becomes Sales Tomorrow
Marketing Transformation: Marketing Today Becomes Sales TomorrowIngram Micro Cloud
 
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud ServicesSales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud ServicesIngram Micro Cloud
 
2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes MainstreamIngram Micro Cloud
 
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data CentersCSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data CentersIngram Micro Cloud
 
CSEU - Enabling Your Channel Business with Social
CSEU - Enabling Your Channel Business with SocialCSEU - Enabling Your Channel Business with Social
CSEU - Enabling Your Channel Business with SocialIngram Micro Cloud
 
CSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial TransformationCSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial TransformationIngram Micro Cloud
 
CSEU - Building Your Cloud Business
CSEU - Building Your Cloud BusinessCSEU - Building Your Cloud Business
CSEU - Building Your Cloud BusinessIngram Micro Cloud
 
IDC Keynote: The Seven Transformations IT Solution Providers Must Confront
IDC Keynote: The Seven Transformations IT Solution Providers Must ConfrontIDC Keynote: The Seven Transformations IT Solution Providers Must Confront
IDC Keynote: The Seven Transformations IT Solution Providers Must ConfrontIngram Micro Cloud
 
Cloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape OpportunityCloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape OpportunityIngram Micro Cloud
 
Cloud University: Ingram Micro
Cloud University: Ingram MicroCloud University: Ingram Micro
Cloud University: Ingram MicroIngram Micro Cloud
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityIngram Micro Cloud
 

More from Ingram Micro Cloud (20)

Microsoft
MicrosoftMicrosoft
Microsoft
 
Imc master
Imc masterImc master
Imc master
 
Ibm
IbmIbm
Ibm
 
Comp tia cloud foundations managing your customer's clouds
Comp tia cloud foundations   managing your customer's cloudsComp tia cloud foundations   managing your customer's clouds
Comp tia cloud foundations managing your customer's clouds
 
Century link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation finalCentury link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation final
 
SoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for PartnersSoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for Partners
 
Clouds Over Holland
Clouds Over HollandClouds Over Holland
Clouds Over Holland
 
Roundtable: Office 365 Advisor to CSP Conversion
Roundtable: Office 365 Advisor to CSP ConversionRoundtable: Office 365 Advisor to CSP Conversion
Roundtable: Office 365 Advisor to CSP Conversion
 
Marketing Transformation: Marketing Today Becomes Sales Tomorrow
Marketing Transformation: Marketing Today Becomes Sales TomorrowMarketing Transformation: Marketing Today Becomes Sales Tomorrow
Marketing Transformation: Marketing Today Becomes Sales Tomorrow
 
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud ServicesSales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
 
2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream
 
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data CentersCSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
 
CSEU - Enabling Your Channel Business with Social
CSEU - Enabling Your Channel Business with SocialCSEU - Enabling Your Channel Business with Social
CSEU - Enabling Your Channel Business with Social
 
CSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial TransformationCSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial Transformation
 
CSEU - Building Your Cloud Business
CSEU - Building Your Cloud BusinessCSEU - Building Your Cloud Business
CSEU - Building Your Cloud Business
 
IDC Keynote: The Seven Transformations IT Solution Providers Must Confront
IDC Keynote: The Seven Transformations IT Solution Providers Must ConfrontIDC Keynote: The Seven Transformations IT Solution Providers Must Confront
IDC Keynote: The Seven Transformations IT Solution Providers Must Confront
 
Cloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape OpportunityCloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape Opportunity
 
Cloud University: Ingram Micro
Cloud University: Ingram MicroCloud University: Ingram Micro
Cloud University: Ingram Micro
 
Cloud University: IDC
Cloud University: IDCCloud University: IDC
Cloud University: IDC
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
 

Cloud university intel security

  • 1. McAfee Email Protection for Microsoft Office 365 Cloud University Thomas Bryant | Technical Director - OCTO
  • 2. McAfee Confidential Agenda • Executive Summary • Customer Challenge • Why McAfee • Objections & Countering Competition • Driving Sales • Enablement & Getting Started 2
  • 3. McAfee Confidential SECURITY: THE THIRD PILLAR OF COMPUTING POWER EFFICIENT PERFORMANCE INTERNET CONNECTIVITY SECURITY
  • 4. McAfee Confidential Web Protection Social Media Protection Email Protection Achieve Cyber Readiness Intelligence-Driven Response Protect Critical Infrastructures Counter Stealth Attacks Exploding Data Continuous Monitoring Compliance Reporting Protect Devices Reporting Real Time Visibility Targeted Attacks Identity Protect IP Identity Protection Enable the Workforce BYOD/ Mobile App Protection OS Protection (Legacy, Win7/8, Android, Mac) Cloud Virtualization Servers/ Networks Database Security Encryption Identity and Access Control Data Protection Data Loss Prevention Next Gen IPS Next Gen Firewall COMPREHENSIVE MALWARE PROTECTION NEXT GENERATION ENDPOINT SITUATIONAL AWARENESS WEB AND IDENTITY DATA CENTER TRANSFORMATION NEXT GENERATION NETWORK Intel Security – Big Picture of Security
  • 5. McAfee Confidential McAfee Global Threat Intelligence Successful Threat Intelligence is Defined by Six Principles June 17, 2015 5 Delivered via a complete suite of security products Uses a combination of protection techniques, where reputation is a must Global research team dedicated solely to GTI Real-time, “in the cloud” threat collection and intelligence distribution model Spans the Internet including millions of sensors Across all key threat vectors file | web | email | network
  • 6. McAfee Confidential Why McAfee is Best Positioned to Deliver GTI The Most Robust Telemetry Data in the Market June 17, 20156 • 2.5B Malware Reputation Queries/Month • 20B Email Reputation Queries/Month • 75B Web Reputation Queries/Month • 2B IP Reputation Queries/Month • 300M IPS Attacks/Month • 100M Ntwk Conn Rep Queries/Month • 100+ BILLION QUERIES Queries Nodes • Malware: 40M Endpoints • Email: 30M Nodes • Web: 45M Endpoint and Gateway Users • Intrusions: 4M Nodes • 100+ MILLION NODES, 120 COUNTRIES
  • 7. McAfee Confidential Executive Summary Migrating email infrastructure to Microsoft Office 365 due to better TCO than hosting email in-house. Rapid movement to O365. 77% of Fortune 500 have purchased. Triple- digit growth in last 21 months. Email Threats do not go away with the cloud. O365 faces same threats as on premise solutions. Stronger security is required as advanced phishing threats become more complex. Layer in McAfee Email Protection to protect against phishing, continued service and reliable security. Dedicated security focus. Integration with O365 helps customers realize its benefits without compromise on security. The Market The Customer The Result The Issue The Solution The Provider 7
  • 8. McAfee Confidential Office 365 is the #1 deployed Cloud Application! “77% of Fortune 500 companies have purchased it in the last 12 months” “Office 365 posted triple-digit growth for 21 consecutive months” “nearly 50 million Office 365 monthly active users” Source: Okta, Microsoft Office 365 is the catalyst for cloud consumption and embracement
  • 9. McAfee Confidential Email is Driving the Evolution 9 Email is the Primary Capability Being Used or Planned with Office 365 0% 20% 40% 60% 80% Email File Sharing Document Management Instant Messaging Team Sites Online Meetings … Percentage of Respondents
  • 10. McAfee Confidential Customer Challenges 10 95% of all attacks on enterprise networks result from spear phishing. 1 in 5 users will click on a link within a phishing email. of HR & Finance clicked on at least 1 phishing email. 88% 1 in 3 organizations will have a hybrid deployment. of all organizations identify service availability as one of the top 3 technical concerns. 13%
  • 11. McAfee Confidential 11 McAfee 2014 Phishing Quiz 75,000 business users100,000+ business users
  • 12. McAfee Confidential Why your customers need stronger email security Solution Overview 12 AV-TEST.org – Feb 2015 Product Review Report Microsoft System Center Endpoint Protection Microsoft Intel Security Industry Average Protection against 0-day malware attacks, inclusive of web and email-threats (Real-World Testing) - 208 samples used 76% 98% 95% Detection of widespread and prevalent malware discovered in the last 4 weeks (the AV-TEST reference set) 12,207 samples used 76% 100% 97% Protection Score 0.0/6.0 5.0/6.0
  • 13. McAfee Confidential Email - 0.32% File, 4% Web, 12% IP/Connection, 84% If GTI were limited to what Email Vendors see …Email and file data is all we would see. That’s not enough to provide comprehensive protection. Email Gateway Web Gateway Advanced Malware Network IPSEndpoint AV 3rd Party Feeds Firewall
  • 15. McAfee Confidential ClickProtect for Embedded URL Protection 15 Customizable Templates Reinforces Awareness Enterprise Web Security http://www.funshion.com McAfee GTI® Web Reputation: Unverified McAfee GTI® Web Category: Entertainment, Streaming Media Unmasks URL Safe Preview Is that your destination site? 95% 74% 58% 25% Zero Day Protection Rate (GAM) Source: AVTest.org
  • 16. McAfee Confidential Solution Overview 16 How it works Recipient O365 Exchange OnlineMcAfee Email Protection Sender’s Email Server Sender Not shown: Email Continuity enables customers to log into emails via web interface in the event of an outage Change in MXRecords routes mail accordingly to and from McAfee Email Protection
  • 17. McAfee Confidential Email Continuity Ensures Hosted Mailbox Uptime • 60 days of rolling storage • Web-based access to email during outage • Post-outage email activity release and synchronization 17 Automatic service engagement when outage is detected
  • 18. McAfee Confidential Solution Overview Targeted Attack Protection • Phishing and malware protection • Detects real-time URL malware threats with ClickProtect • Customizable warning pages • Built-in DLP technology Faster and Reliable Protection • Breadth of cloud intelligence sources • Threat response times • Email continuity • Spam/Graymail filtering Flexibility • Advanced security for Exchange Online, Hybrid & Onsite • Deploy any way you want, when you want • Hybrid deployment options with single mgmt & reporting console The value proposition 18
  • 19. McAfee Confidential 19 I don’t need additional security Targeted phishing is the biggest problem. It is echoed by analysts & customers alike. See a 10 minute demo to learn about latest phishing tactics on how advanced protection can help. Take the free Phishing quiz and help educate your employees. I’m trying to reduce my TCO, not increase it Office 365 is a fantastic productivity solution; but MSFT is not known as a top security vendor. The cost to strengthen security is insignificant compared to the potential exposure and cost. Service unavailability was cited as one of the 3 technical concerns by users of Office 365. Email Continuity, a feature of Email Protection, takes this concern away and further, enables your users to access email through a web-based interface, while Office 365 service is being restored. Nobody will be looking to target my organization. Effort to reward is quite attractive, and you should also consider partners you work with. Consider CryptoLocker, or the Target Breach, which was initiated from 3rd party vendor much smaller than size of Target Stores. Top Customer Objections
  • 21. McAfee Confidential Delivery Flexibility June 17, 2015 21 Marketplace • Fully Integrated into Ingram’s Marketplace • Monthly for SaaS Email, Email Encryption, Archiving, Web and Endpoint Security Reseller Model • Monthly and Annual SKUs for SaaS Email, Email Encryption, Archiving, Web, and Endpoint Security • You Bill We Support MSP model • Monthly SKUs for SaaS Email, Email Encryption, Archiving, Web, and Endpoint Security • You Bill, You Support
  • 22. McAfee Confidential Email Protection for Office 365 Enablement Tools www.mcafee.com/O365 Grab & Go Campaign Kit Webinar Replay Phishing Quiz Customer Facing Landing Page http://bit.ly/O365Replay • Conversation Guide • Email Content • Phishing Quiz • ClickProtect Video • Osterman White Paper • Customer Presentation Help customers discover how skilled they are at detecting malicious phishing attempts amid common work-related emails Send customers here for even more assets and information around strengthening their security with Intel Security
  • 23. McAfee Confidential Contact your Account Team today • Intel Security/McAfee Specialist • Lindsay Oprandi • lindsay.oprandi@ingrammicro.com • Call (800) 456-8000, Ext 66617 Ingram Services US Sales Team Contact: Cloud.Security@ingrammicro.com • Call (800) 705-7057, option 2 Ingram Services Canada Sales Team Contact: Cloud.Security@ingrammicro.ca • Call (877) 755-5002, option 1