McAfee Email Protection for
Microsoft Office 365
Cloud University
Thomas Bryant | Technical Director - OCTO
McAfee Confidential
Agenda
• Executive Summary
• Customer Challenge
• Why McAfee
• Objections & Countering Competition
• Driving Sales
• Enablement & Getting Started
2
McAfee Confidential
SECURITY: THE THIRD PILLAR OF COMPUTING
POWER EFFICIENT
PERFORMANCE
INTERNET
CONNECTIVITY SECURITY
McAfee Confidential
Web Protection
Social Media
Protection
Email
Protection
Achieve Cyber
Readiness
Intelligence-Driven
Response
Protect Critical
Infrastructures
Counter
Stealth
Attacks
Exploding Data Continuous
Monitoring
Compliance
Reporting
Protect
Devices
Reporting
Real Time
Visibility
Targeted
Attacks
Identity
Protect IP
Identity
Protection
Enable the
Workforce
BYOD/
Mobile
App Protection
OS Protection
(Legacy, Win7/8,
Android, Mac)
Cloud
Virtualization
Servers/
Networks
Database
Security
Encryption
Identity and
Access Control
Data
Protection
Data Loss
Prevention
Next
Gen IPS
Next Gen Firewall
COMPREHENSIVE
MALWARE PROTECTION
NEXT GENERATION
ENDPOINT
SITUATIONAL AWARENESS
WEB AND
IDENTITY
DATA CENTER
TRANSFORMATION
NEXT
GENERATION
NETWORK
Intel Security – Big Picture of Security
McAfee Confidential
McAfee Global Threat Intelligence
Successful Threat Intelligence is Defined by Six Principles
June 17, 2015 5
Delivered via a complete suite of
security products
Uses a combination of
protection techniques,
where reputation is a must
Global research team
dedicated solely to GTI
Real-time, “in the cloud” threat collection
and intelligence distribution model
Spans the Internet
including millions of sensors
Across all key threat
vectors
file | web | email | network
McAfee Confidential
Why McAfee is Best Positioned to Deliver
GTI
The Most Robust Telemetry Data in the Market
June 17, 20156
• 2.5B Malware Reputation Queries/Month
• 20B Email Reputation Queries/Month
• 75B Web Reputation Queries/Month
• 2B IP Reputation Queries/Month
• 300M IPS Attacks/Month
• 100M Ntwk Conn Rep Queries/Month
• 100+ BILLION QUERIES
Queries
Nodes
• Malware: 40M Endpoints
• Email: 30M Nodes
• Web: 45M Endpoint and Gateway Users
• Intrusions: 4M Nodes
• 100+ MILLION NODES, 120 COUNTRIES
McAfee Confidential
Executive Summary
Migrating email
infrastructure to
Microsoft Office
365 due to better
TCO than hosting
email in-house.
Rapid movement
to O365. 77% of
Fortune 500 have
purchased. Triple-
digit growth in last
21 months.
Email Threats do
not go away with
the cloud. O365
faces same
threats as on
premise
solutions.
Stronger security
is required as
advanced
phishing threats
become more
complex.
Layer in McAfee
Email Protection
to protect against
phishing,
continued service
and reliable
security.
Dedicated security
focus. Integration
with O365 helps
customers realize
its benefits without
compromise on
security.
The
Market
The
Customer
The
Result
The
Issue
The
Solution
The
Provider
7
McAfee Confidential
Office 365 is the #1 deployed Cloud Application!
“77% of Fortune 500
companies have
purchased it in the
last 12 months”
“Office 365 posted
triple-digit growth for
21 consecutive
months”
“nearly 50 million
Office 365 monthly
active users”
Source: Okta, Microsoft
Office 365 is the
catalyst for cloud
consumption and
embracement
McAfee Confidential
Email is Driving the Evolution
9
Email is the Primary Capability Being Used or Planned with Office 365
0% 20% 40% 60% 80%
Email
File Sharing
Document Management
Instant Messaging
Team Sites
Online Meetings
…
Percentage of Respondents
McAfee Confidential
Customer Challenges
10
95% of all attacks on enterprise
networks result from spear phishing.
1 in 5 users will click on a link
within a phishing email.
of HR & Finance
clicked on at least
1 phishing email.
88%
1 in 3 organizations
will have a hybrid
deployment.
of all organizations identify service
availability as one of the top 3
technical concerns.
13%
McAfee Confidential
11
McAfee 2014 Phishing Quiz
75,000 business users100,000+ business users
McAfee Confidential
Why your customers need stronger email security
Solution Overview
12
AV-TEST.org – Feb 2015 Product Review Report
Microsoft System Center Endpoint Protection Microsoft
Intel
Security
Industry
Average
Protection against 0-day malware attacks, inclusive of
web and email-threats (Real-World Testing) - 208
samples used
76% 98% 95%
Detection of widespread and prevalent malware
discovered in the last 4 weeks (the AV-TEST reference
set) 12,207 samples used
76% 100% 97%
Protection Score 0.0/6.0 5.0/6.0
McAfee Confidential
Email - 0.32%
File, 4%
Web, 12%
IP/Connection,
84%
If GTI were limited to what Email Vendors see
…Email and file data is all
we would see.
That’s not enough to provide
comprehensive protection.
Email
Gateway
Web Gateway
Advanced
Malware
Network IPSEndpoint AV 3rd Party Feeds Firewall
McAfee Confidential
Different technology,
different outcomes
McAfee Confidential
ClickProtect for Embedded URL Protection
15
Customizable Templates Reinforces Awareness
Enterprise Web Security
http://www.funshion.com
McAfee GTI® Web Reputation:
Unverified
McAfee GTI® Web Category:
Entertainment, Streaming Media
Unmasks URL
Safe Preview
Is that your destination site?
95%
74%
58%
25%
Zero Day Protection
Rate (GAM)
Source: AVTest.org
McAfee Confidential
Solution Overview
16
How it works
Recipient
O365 Exchange OnlineMcAfee
Email Protection
Sender’s
Email Server
Sender
Not shown: Email Continuity enables customers to log into emails via web interface in the event of an outage
Change in MXRecords routes mail accordingly to and from McAfee Email Protection
McAfee Confidential
Email Continuity Ensures Hosted Mailbox Uptime
• 60 days of rolling storage
• Web-based access to email during
outage
• Post-outage email activity release
and synchronization
17
Automatic service engagement when outage is detected
McAfee Confidential
Solution Overview
Targeted Attack Protection
• Phishing and malware protection
• Detects real-time URL malware threats with ClickProtect
• Customizable warning pages
• Built-in DLP technology
Faster and Reliable Protection
• Breadth of cloud intelligence sources
• Threat response times
• Email continuity
• Spam/Graymail filtering
Flexibility
• Advanced security for Exchange Online, Hybrid & Onsite
• Deploy any way you want, when you want
• Hybrid deployment options with single mgmt & reporting console
The value proposition
18
McAfee Confidential
19
I don’t need additional security
Targeted phishing is the biggest problem. It is echoed by analysts & customers
alike. See a 10 minute demo to learn about latest phishing tactics on how advanced
protection can help. Take the free Phishing quiz and help educate your
employees.
I’m trying to reduce my TCO, not increase it
Office 365 is a fantastic productivity solution; but MSFT is not known as a top
security vendor. The cost to strengthen security is insignificant compared to the
potential exposure and cost.
Service unavailability was cited as one of the 3 technical concerns by users of
Office 365. Email Continuity, a feature of Email Protection, takes this concern away
and further, enables your users to access email through a web-based interface,
while Office 365 service is being restored.
Nobody will be looking to target my organization.
Effort to reward is quite attractive, and you should also consider partners you work
with. Consider CryptoLocker, or the Target Breach, which was initiated from 3rd
party vendor much smaller than size of Target Stores.
Top Customer Objections
McAfee Confidential
20
Working Together
McAfee Confidential
Delivery Flexibility
June 17, 2015 21
Marketplace
• Fully Integrated into Ingram’s Marketplace
• Monthly for SaaS Email, Email Encryption,
Archiving, Web and Endpoint Security
Reseller Model • Monthly and Annual SKUs for SaaS Email, Email
Encryption, Archiving, Web, and Endpoint Security
• You Bill We Support
MSP model • Monthly SKUs for SaaS Email, Email Encryption,
Archiving, Web, and Endpoint Security
• You Bill, You Support
McAfee Confidential
Email Protection for Office 365 Enablement Tools
www.mcafee.com/O365
Grab & Go Campaign Kit Webinar Replay
Phishing Quiz Customer Facing Landing Page
http://bit.ly/O365Replay
• Conversation Guide
• Email Content
• Phishing Quiz
• ClickProtect Video
• Osterman White Paper
• Customer Presentation
Help customers discover
how skilled they are at
detecting malicious
phishing attempts amid
common work-related
emails
Send customers here for
even more assets and
information around
strengthening their
security with Intel Security
McAfee Confidential
Contact your Account Team today
• Intel Security/McAfee Specialist
• Lindsay Oprandi
• lindsay.oprandi@ingrammicro.com
• Call (800) 456-8000, Ext 66617
Ingram Services US Sales Team Contact:
Cloud.Security@ingrammicro.com
• Call (800) 705-7057, option 2
Ingram Services Canada Sales Team Contact:
Cloud.Security@ingrammicro.ca
• Call (877) 755-5002, option 1
Cloud university intel security

Cloud university intel security

  • 1.
    McAfee Email Protectionfor Microsoft Office 365 Cloud University Thomas Bryant | Technical Director - OCTO
  • 2.
    McAfee Confidential Agenda • ExecutiveSummary • Customer Challenge • Why McAfee • Objections & Countering Competition • Driving Sales • Enablement & Getting Started 2
  • 3.
    McAfee Confidential SECURITY: THETHIRD PILLAR OF COMPUTING POWER EFFICIENT PERFORMANCE INTERNET CONNECTIVITY SECURITY
  • 4.
    McAfee Confidential Web Protection SocialMedia Protection Email Protection Achieve Cyber Readiness Intelligence-Driven Response Protect Critical Infrastructures Counter Stealth Attacks Exploding Data Continuous Monitoring Compliance Reporting Protect Devices Reporting Real Time Visibility Targeted Attacks Identity Protect IP Identity Protection Enable the Workforce BYOD/ Mobile App Protection OS Protection (Legacy, Win7/8, Android, Mac) Cloud Virtualization Servers/ Networks Database Security Encryption Identity and Access Control Data Protection Data Loss Prevention Next Gen IPS Next Gen Firewall COMPREHENSIVE MALWARE PROTECTION NEXT GENERATION ENDPOINT SITUATIONAL AWARENESS WEB AND IDENTITY DATA CENTER TRANSFORMATION NEXT GENERATION NETWORK Intel Security – Big Picture of Security
  • 5.
    McAfee Confidential McAfee GlobalThreat Intelligence Successful Threat Intelligence is Defined by Six Principles June 17, 2015 5 Delivered via a complete suite of security products Uses a combination of protection techniques, where reputation is a must Global research team dedicated solely to GTI Real-time, “in the cloud” threat collection and intelligence distribution model Spans the Internet including millions of sensors Across all key threat vectors file | web | email | network
  • 6.
    McAfee Confidential Why McAfeeis Best Positioned to Deliver GTI The Most Robust Telemetry Data in the Market June 17, 20156 • 2.5B Malware Reputation Queries/Month • 20B Email Reputation Queries/Month • 75B Web Reputation Queries/Month • 2B IP Reputation Queries/Month • 300M IPS Attacks/Month • 100M Ntwk Conn Rep Queries/Month • 100+ BILLION QUERIES Queries Nodes • Malware: 40M Endpoints • Email: 30M Nodes • Web: 45M Endpoint and Gateway Users • Intrusions: 4M Nodes • 100+ MILLION NODES, 120 COUNTRIES
  • 7.
    McAfee Confidential Executive Summary Migratingemail infrastructure to Microsoft Office 365 due to better TCO than hosting email in-house. Rapid movement to O365. 77% of Fortune 500 have purchased. Triple- digit growth in last 21 months. Email Threats do not go away with the cloud. O365 faces same threats as on premise solutions. Stronger security is required as advanced phishing threats become more complex. Layer in McAfee Email Protection to protect against phishing, continued service and reliable security. Dedicated security focus. Integration with O365 helps customers realize its benefits without compromise on security. The Market The Customer The Result The Issue The Solution The Provider 7
  • 8.
    McAfee Confidential Office 365is the #1 deployed Cloud Application! “77% of Fortune 500 companies have purchased it in the last 12 months” “Office 365 posted triple-digit growth for 21 consecutive months” “nearly 50 million Office 365 monthly active users” Source: Okta, Microsoft Office 365 is the catalyst for cloud consumption and embracement
  • 9.
    McAfee Confidential Email isDriving the Evolution 9 Email is the Primary Capability Being Used or Planned with Office 365 0% 20% 40% 60% 80% Email File Sharing Document Management Instant Messaging Team Sites Online Meetings … Percentage of Respondents
  • 10.
    McAfee Confidential Customer Challenges 10 95%of all attacks on enterprise networks result from spear phishing. 1 in 5 users will click on a link within a phishing email. of HR & Finance clicked on at least 1 phishing email. 88% 1 in 3 organizations will have a hybrid deployment. of all organizations identify service availability as one of the top 3 technical concerns. 13%
  • 11.
    McAfee Confidential 11 McAfee 2014Phishing Quiz 75,000 business users100,000+ business users
  • 12.
    McAfee Confidential Why yourcustomers need stronger email security Solution Overview 12 AV-TEST.org – Feb 2015 Product Review Report Microsoft System Center Endpoint Protection Microsoft Intel Security Industry Average Protection against 0-day malware attacks, inclusive of web and email-threats (Real-World Testing) - 208 samples used 76% 98% 95% Detection of widespread and prevalent malware discovered in the last 4 weeks (the AV-TEST reference set) 12,207 samples used 76% 100% 97% Protection Score 0.0/6.0 5.0/6.0
  • 13.
    McAfee Confidential Email -0.32% File, 4% Web, 12% IP/Connection, 84% If GTI were limited to what Email Vendors see …Email and file data is all we would see. That’s not enough to provide comprehensive protection. Email Gateway Web Gateway Advanced Malware Network IPSEndpoint AV 3rd Party Feeds Firewall
  • 14.
  • 15.
    McAfee Confidential ClickProtect forEmbedded URL Protection 15 Customizable Templates Reinforces Awareness Enterprise Web Security http://www.funshion.com McAfee GTI® Web Reputation: Unverified McAfee GTI® Web Category: Entertainment, Streaming Media Unmasks URL Safe Preview Is that your destination site? 95% 74% 58% 25% Zero Day Protection Rate (GAM) Source: AVTest.org
  • 16.
    McAfee Confidential Solution Overview 16 Howit works Recipient O365 Exchange OnlineMcAfee Email Protection Sender’s Email Server Sender Not shown: Email Continuity enables customers to log into emails via web interface in the event of an outage Change in MXRecords routes mail accordingly to and from McAfee Email Protection
  • 17.
    McAfee Confidential Email ContinuityEnsures Hosted Mailbox Uptime • 60 days of rolling storage • Web-based access to email during outage • Post-outage email activity release and synchronization 17 Automatic service engagement when outage is detected
  • 18.
    McAfee Confidential Solution Overview TargetedAttack Protection • Phishing and malware protection • Detects real-time URL malware threats with ClickProtect • Customizable warning pages • Built-in DLP technology Faster and Reliable Protection • Breadth of cloud intelligence sources • Threat response times • Email continuity • Spam/Graymail filtering Flexibility • Advanced security for Exchange Online, Hybrid & Onsite • Deploy any way you want, when you want • Hybrid deployment options with single mgmt & reporting console The value proposition 18
  • 19.
    McAfee Confidential 19 I don’tneed additional security Targeted phishing is the biggest problem. It is echoed by analysts & customers alike. See a 10 minute demo to learn about latest phishing tactics on how advanced protection can help. Take the free Phishing quiz and help educate your employees. I’m trying to reduce my TCO, not increase it Office 365 is a fantastic productivity solution; but MSFT is not known as a top security vendor. The cost to strengthen security is insignificant compared to the potential exposure and cost. Service unavailability was cited as one of the 3 technical concerns by users of Office 365. Email Continuity, a feature of Email Protection, takes this concern away and further, enables your users to access email through a web-based interface, while Office 365 service is being restored. Nobody will be looking to target my organization. Effort to reward is quite attractive, and you should also consider partners you work with. Consider CryptoLocker, or the Target Breach, which was initiated from 3rd party vendor much smaller than size of Target Stores. Top Customer Objections
  • 20.
  • 21.
    McAfee Confidential Delivery Flexibility June17, 2015 21 Marketplace • Fully Integrated into Ingram’s Marketplace • Monthly for SaaS Email, Email Encryption, Archiving, Web and Endpoint Security Reseller Model • Monthly and Annual SKUs for SaaS Email, Email Encryption, Archiving, Web, and Endpoint Security • You Bill We Support MSP model • Monthly SKUs for SaaS Email, Email Encryption, Archiving, Web, and Endpoint Security • You Bill, You Support
  • 22.
    McAfee Confidential Email Protectionfor Office 365 Enablement Tools www.mcafee.com/O365 Grab & Go Campaign Kit Webinar Replay Phishing Quiz Customer Facing Landing Page http://bit.ly/O365Replay • Conversation Guide • Email Content • Phishing Quiz • ClickProtect Video • Osterman White Paper • Customer Presentation Help customers discover how skilled they are at detecting malicious phishing attempts amid common work-related emails Send customers here for even more assets and information around strengthening their security with Intel Security
  • 23.
    McAfee Confidential Contact yourAccount Team today • Intel Security/McAfee Specialist • Lindsay Oprandi • lindsay.oprandi@ingrammicro.com • Call (800) 456-8000, Ext 66617 Ingram Services US Sales Team Contact: Cloud.Security@ingrammicro.com • Call (800) 705-7057, option 2 Ingram Services Canada Sales Team Contact: Cloud.Security@ingrammicro.ca • Call (877) 755-5002, option 1