SlideShare a Scribd company logo
1 of 14
Endpoint Protection as a
Service
Samuel H Winata
samuel_winata@mcafee.com
October 2017
1
The State of Enterprise
SecurityEmerging threats, manual processes and silos make breaches an unfortunate reality
2
70-90%
of malware samples detected
unique to organizations
they’re targeting
Ransomware creating
internal states of emerging
65%
of large organizations were
breached in the last 12 months
25%
experienced repeat incidents*
62%
of cases, attackers compromised
organizations within minutes**
On average, it takes
256 days
to identify a malicious attack
It takes an average of
8 days (64 hours)
for a security investigation
Organizations can be
38-100%
more effective if security teams
collaborate better
*UK Cyber Security Breach Survey, 2016 **Verizon Data Breach Report, 2015
Endpoint Customer Challenges
3
Detecting and
preventing
advanced threats
Accuracy
Causing manual
processes and
delaying responses
Complexity
Preventing deep
investigations to
aid in recovery
Visibility
Adding new
defenses in the
future increases
management
problems
Sustainabilit
y
What is Sentriciti EPaaS
The service ensures that the endpoints of security; the client devices,
are protected against advanced threats, keeping your network running
and corporate assets safe. With Datacomm “Endpoint as a Service”
solutions, you can protect your intellectual property, customer data,
and reputation.
You can also devote more IT resources to your core business.
Companies face attacks daily from competitors, criminals, and nation-
state entities who exploit all possible vulnerabilities to compromise
networks and access sensitive data. The real-time measurement and
monitoring of vulnerabilities and the threats is essential to stopping
these complex attacks. When combined with the ground breaking
machine-learning anti-virus the security of organizations endpoints is
dramatically increased.
4
Datacomm
Endpoint as a Services
5
Answer today’s needs
Integrated, Collaborative
Defenses
Contain and Unmask Advanced Threats A Sustainable, Extensible Framework
Remove security silos Stop zero-day threats Add new defenses easily
What Makes
Datacomm EPaaS
Different
6
True centralized
management
Extensible
endpoint security
framework
Actionable threat
forensics in
understandable
language
Integrated platform
that unites defenses
to work together
Advanced
capabilities like
machine learning
analysis of
sophisticated threats
7
What Feature
Datacomm EPaaS
Desktop and Server Anti Virus
Email (outlook) Server Anti Virus
Desktop Firewall
Endpoint URL + Web Filtering
Device Control
Multiplatform AV (Linux/Unix/Mac)
Application Control for Desktops
Dynamic Application Containment*
Real Protect*
8
• Detects Zero-Day Malware Pre-Execution
• Works in Presence of Block Protection as well as Offline
• Faster Response + Reduced need for human analysis
• Protect systems & data: 24x7 monitoring to alert you to threats before
damage is done
• Log management and retention for audit & compliance
• Reduce time to detection of breach
• Flexible support and pricing options
What Benefit
Datacomm EPaaS
Datacomm EPaaS Platform
A framework to simplify today, built with the future in mind
9
Security Management
McAfee ePO Agent Client UI
Threat
Prevention
Firewall Web
Control
Adaptive Threat
Protection
Kernel Mode Drivers – Network, File, Access Control, etc.Common Components – Logger, Scheduler, GTI, etc.
Datacomm EPaaS
Modules
10
ePO
Threat
Prevention
Web
Control
Firewall
Adaptive
Threat
Protection
Threat Prevention
On-Action Scan (OAS), On-Demand Scan
(ODS), Exploit Prevention, and Access
Protection
Firewall
Monitors network and Internet traffic
Web Control
Web filtering and browser protection
Adaptive Threat
Protection*
Dynamic Application Containment,
Real Protect
Datacomm EPaaS
Topology
11
Use Case
Download of a malicious file from the web
12
Client UI
TIE
Threat
Prevention
Web
Control
Firewall
ePO
• A file hash is sent from Web Control to
Threat Prevention, triggering an On-
Demand Scan (ODS)
• Malicious files are detected and
blocked before they have full access to
the system
• Forensics data is captured
(Source URL, file hash, etc.)
• Event data is shared with other
modules and ePO, and is visible in
client UI
Datacomm EPaaS
PackagesEssential and Advanced Threat Protection
13
Functionality
Essential
Threat Protection
Advanced
Threat Protection
Desktop and Server Anti Virus  
Email (outlook) Server Anti Virus  
Desktop Firewall  
Endpoint URL + Web Filtering  
Device Control  
Multiplatform AV (Linux/Unix/Mac)  
Application Control for Desktops  
Dynamic Application Containment*  
Real Protect*  
Price Agent Rp. XXX.000/month Rp. XXX.000/month
• Stronger zero-day threat detection using Static
and Dynamic machine learning analysis
• Thwarts spread of infections with Dynamic
Containment
• Easy, intuitive insights for corrective actions
• Centralized Management
• Delivers an architecture for the future
Advanced, Integrated Defenses;
Sustainable Framework for the Future
14
Summary
Learn more by visiting:
https://cloud.datacomm.co.id/services/endpoint-
protection

More Related Content

What's hot

Making Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyMaking Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyVeritas Technologies LLC
 
Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault
Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault
Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault Veritas Technologies LLC
 
A futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learningA futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learningVeritas Technologies LLC
 
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...Veritas Technologies LLC
 
Avoiding disaster recovery disasters
Avoiding disaster recovery disastersAvoiding disaster recovery disasters
Avoiding disaster recovery disastersAlexandra Matthiesen
 
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...Veritas Technologies LLC
 
O365 E3 + Veritas > O365 E5: Solve the Governance Conundrum
O365 E3 + Veritas > O365 E5: Solve the Governance ConundrumO365 E3 + Veritas > O365 E5: Solve the Governance Conundrum
O365 E3 + Veritas > O365 E5: Solve the Governance ConundrumVeritas Technologies LLC
 
Deep Dive: What's New in NetBackup Appliances 3.1
Deep Dive: What's New in NetBackup Appliances 3.1Deep Dive: What's New in NetBackup Appliances 3.1
Deep Dive: What's New in NetBackup Appliances 3.1Veritas Technologies LLC
 
Accelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data ManagementAccelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data ManagementVeritas Technologies LLC
 
Rethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloadsRethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloadsVeritas Technologies LLC
 
Modernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen AlahmadModernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen AlahmadVeritas Technologies LLC
 
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...Veritas Technologies LLC
 
Introducing Veritas Cloud Storage: massively scalable data management
Introducing Veritas Cloud Storage: massively scalable data managementIntroducing Veritas Cloud Storage: massively scalable data management
Introducing Veritas Cloud Storage: massively scalable data managementVeritas Technologies LLC
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloudJorge Sebastiao
 
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the CloudNetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the CloudVeritas Technologies LLC
 
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesDeep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesVeritas Technologies LLC
 
Stop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPointStop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPointVeritas Technologies LLC
 
Escape the veeam 'virtual only' data protection prison
Escape the veeam 'virtual only' data protection prisonEscape the veeam 'virtual only' data protection prison
Escape the veeam 'virtual only' data protection prisonVeritas Technologies LLC
 

What's hot (20)

Making Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyMaking Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE Easy
 
Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault
Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault
Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault
 
A futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learningA futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learning
 
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
 
Avoiding disaster recovery disasters
Avoiding disaster recovery disastersAvoiding disaster recovery disasters
Avoiding disaster recovery disasters
 
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
O365 E3 + Veritas > O365 E5: Solve the Governance Conundrum
O365 E3 + Veritas > O365 E5: Solve the Governance ConundrumO365 E3 + Veritas > O365 E5: Solve the Governance Conundrum
O365 E3 + Veritas > O365 E5: Solve the Governance Conundrum
 
Deep Dive: What's New in NetBackup Appliances 3.1
Deep Dive: What's New in NetBackup Appliances 3.1Deep Dive: What's New in NetBackup Appliances 3.1
Deep Dive: What's New in NetBackup Appliances 3.1
 
Accelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data ManagementAccelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data Management
 
Rethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloadsRethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloads
 
Modernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen AlahmadModernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen Alahmad
 
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
 
Introducing Veritas Cloud Storage: massively scalable data management
Introducing Veritas Cloud Storage: massively scalable data managementIntroducing Veritas Cloud Storage: massively scalable data management
Introducing Veritas Cloud Storage: massively scalable data management
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
 
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the CloudNetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
 
How to Stop Over Paying Your VMware Taxes
How to Stop Over Paying Your VMware TaxesHow to Stop Over Paying Your VMware Taxes
How to Stop Over Paying Your VMware Taxes
 
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesDeep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
 
Stop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPointStop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPoint
 
Escape the veeam 'virtual only' data protection prison
Escape the veeam 'virtual only' data protection prisonEscape the veeam 'virtual only' data protection prison
Escape the veeam 'virtual only' data protection prison
 

Similar to Endpoint Protection as a Service (EPaaS)

Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managmentDean Iacovelli
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networksCisco Canada
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking SectorSamvel Gevorgyan
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...PlatformSecurityManagement
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacionrubychavez
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetLumension
 
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approachCisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approachNetworkCollaborators
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMIftikhar Ali Iqbal
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAmazon Web Services
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?MenloSecurity
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 

Similar to Endpoint Protection as a Service (EPaaS) (20)

Information Security
Information SecurityInformation Security
Information Security
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
NetWitness
NetWitnessNetWitness
NetWitness
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networks
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacion
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
 
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approachCisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 

More from PT Datacomm Diangraha

Start Your Cloud Native Journey with Containerization
Start Your Cloud Native Journey with ContainerizationStart Your Cloud Native Journey with Containerization
Start Your Cloud Native Journey with ContainerizationPT Datacomm Diangraha
 
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...PT Datacomm Diangraha
 
Sutedjo - Digital Transformation for SAP
Sutedjo -  Digital Transformation for SAPSutedjo -  Digital Transformation for SAP
Sutedjo - Digital Transformation for SAPPT Datacomm Diangraha
 
Nam Khong - SAP on Cloud for Your Intelligent Enterprise
Nam Khong - SAP on Cloud for Your Intelligent EnterpriseNam Khong - SAP on Cloud for Your Intelligent Enterprise
Nam Khong - SAP on Cloud for Your Intelligent EnterprisePT Datacomm Diangraha
 
Micro services container - Nam Khong
Micro services container - Nam KhongMicro services container - Nam Khong
Micro services container - Nam KhongPT Datacomm Diangraha
 
Kubernetes Benefits - Sutedjo Tjahjadi
Kubernetes Benefits - Sutedjo TjahjadiKubernetes Benefits - Sutedjo Tjahjadi
Kubernetes Benefits - Sutedjo TjahjadiPT Datacomm Diangraha
 
OCP Datacomm RedHat - Kubernetes Launch
OCP Datacomm RedHat - Kubernetes LaunchOCP Datacomm RedHat - Kubernetes Launch
OCP Datacomm RedHat - Kubernetes LaunchPT Datacomm Diangraha
 
Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0 Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0 PT Datacomm Diangraha
 
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery:  Understanding Trend, Methodology, Solution, and StandardDisaster Recovery:  Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery: Understanding Trend, Methodology, Solution, and StandardPT Datacomm Diangraha
 

More from PT Datacomm Diangraha (20)

Openshift Workshop
Openshift Workshop Openshift Workshop
Openshift Workshop
 
Start Your Cloud Native Journey with Containerization
Start Your Cloud Native Journey with ContainerizationStart Your Cloud Native Journey with Containerization
Start Your Cloud Native Journey with Containerization
 
Disaster Recovery Cook Book
Disaster Recovery Cook BookDisaster Recovery Cook Book
Disaster Recovery Cook Book
 
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
 
Sutedjo - open banking may 27, 2021
Sutedjo - open banking may 27, 2021Sutedjo - open banking may 27, 2021
Sutedjo - open banking may 27, 2021
 
Darwin - PT IMI
Darwin - PT IMIDarwin - PT IMI
Darwin - PT IMI
 
Sutedjo - Introduction to Cloud
Sutedjo - Introduction to CloudSutedjo - Introduction to Cloud
Sutedjo - Introduction to Cloud
 
Aditya - Connecting Future
Aditya - Connecting FutureAditya - Connecting Future
Aditya - Connecting Future
 
Wiranto
WirantoWiranto
Wiranto
 
Sutedjo - Digital Transformation for SAP
Sutedjo -  Digital Transformation for SAPSutedjo -  Digital Transformation for SAP
Sutedjo - Digital Transformation for SAP
 
Nam Khong - SAP on Cloud for Your Intelligent Enterprise
Nam Khong - SAP on Cloud for Your Intelligent EnterpriseNam Khong - SAP on Cloud for Your Intelligent Enterprise
Nam Khong - SAP on Cloud for Your Intelligent Enterprise
 
Micro services container - Nam Khong
Micro services container - Nam KhongMicro services container - Nam Khong
Micro services container - Nam Khong
 
Kubernetes Benefits - Sutedjo Tjahjadi
Kubernetes Benefits - Sutedjo TjahjadiKubernetes Benefits - Sutedjo Tjahjadi
Kubernetes Benefits - Sutedjo Tjahjadi
 
OCP Datacomm RedHat - Kubernetes Launch
OCP Datacomm RedHat - Kubernetes LaunchOCP Datacomm RedHat - Kubernetes Launch
OCP Datacomm RedHat - Kubernetes Launch
 
Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0 Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0
 
Cloud technology for hospitality
Cloud technology for hospitalityCloud technology for hospitality
Cloud technology for hospitality
 
Why build sap on cloud
Why build sap on cloudWhy build sap on cloud
Why build sap on cloud
 
Sap migration to cloud
Sap migration to cloudSap migration to cloud
Sap migration to cloud
 
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery:  Understanding Trend, Methodology, Solution, and StandardDisaster Recovery:  Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
 
Hot Disaster Recovery Using Zerto
Hot Disaster Recovery Using ZertoHot Disaster Recovery Using Zerto
Hot Disaster Recovery Using Zerto
 

Recently uploaded

VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 

Recently uploaded (20)

VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 

Endpoint Protection as a Service (EPaaS)

  • 1. Endpoint Protection as a Service Samuel H Winata samuel_winata@mcafee.com October 2017 1
  • 2. The State of Enterprise SecurityEmerging threats, manual processes and silos make breaches an unfortunate reality 2 70-90% of malware samples detected unique to organizations they’re targeting Ransomware creating internal states of emerging 65% of large organizations were breached in the last 12 months 25% experienced repeat incidents* 62% of cases, attackers compromised organizations within minutes** On average, it takes 256 days to identify a malicious attack It takes an average of 8 days (64 hours) for a security investigation Organizations can be 38-100% more effective if security teams collaborate better *UK Cyber Security Breach Survey, 2016 **Verizon Data Breach Report, 2015
  • 3. Endpoint Customer Challenges 3 Detecting and preventing advanced threats Accuracy Causing manual processes and delaying responses Complexity Preventing deep investigations to aid in recovery Visibility Adding new defenses in the future increases management problems Sustainabilit y
  • 4. What is Sentriciti EPaaS The service ensures that the endpoints of security; the client devices, are protected against advanced threats, keeping your network running and corporate assets safe. With Datacomm “Endpoint as a Service” solutions, you can protect your intellectual property, customer data, and reputation. You can also devote more IT resources to your core business. Companies face attacks daily from competitors, criminals, and nation- state entities who exploit all possible vulnerabilities to compromise networks and access sensitive data. The real-time measurement and monitoring of vulnerabilities and the threats is essential to stopping these complex attacks. When combined with the ground breaking machine-learning anti-virus the security of organizations endpoints is dramatically increased. 4
  • 5. Datacomm Endpoint as a Services 5 Answer today’s needs Integrated, Collaborative Defenses Contain and Unmask Advanced Threats A Sustainable, Extensible Framework Remove security silos Stop zero-day threats Add new defenses easily
  • 6. What Makes Datacomm EPaaS Different 6 True centralized management Extensible endpoint security framework Actionable threat forensics in understandable language Integrated platform that unites defenses to work together Advanced capabilities like machine learning analysis of sophisticated threats
  • 7. 7 What Feature Datacomm EPaaS Desktop and Server Anti Virus Email (outlook) Server Anti Virus Desktop Firewall Endpoint URL + Web Filtering Device Control Multiplatform AV (Linux/Unix/Mac) Application Control for Desktops Dynamic Application Containment* Real Protect*
  • 8. 8 • Detects Zero-Day Malware Pre-Execution • Works in Presence of Block Protection as well as Offline • Faster Response + Reduced need for human analysis • Protect systems & data: 24x7 monitoring to alert you to threats before damage is done • Log management and retention for audit & compliance • Reduce time to detection of breach • Flexible support and pricing options What Benefit Datacomm EPaaS
  • 9. Datacomm EPaaS Platform A framework to simplify today, built with the future in mind 9 Security Management McAfee ePO Agent Client UI Threat Prevention Firewall Web Control Adaptive Threat Protection Kernel Mode Drivers – Network, File, Access Control, etc.Common Components – Logger, Scheduler, GTI, etc.
  • 10. Datacomm EPaaS Modules 10 ePO Threat Prevention Web Control Firewall Adaptive Threat Protection Threat Prevention On-Action Scan (OAS), On-Demand Scan (ODS), Exploit Prevention, and Access Protection Firewall Monitors network and Internet traffic Web Control Web filtering and browser protection Adaptive Threat Protection* Dynamic Application Containment, Real Protect
  • 12. Use Case Download of a malicious file from the web 12 Client UI TIE Threat Prevention Web Control Firewall ePO • A file hash is sent from Web Control to Threat Prevention, triggering an On- Demand Scan (ODS) • Malicious files are detected and blocked before they have full access to the system • Forensics data is captured (Source URL, file hash, etc.) • Event data is shared with other modules and ePO, and is visible in client UI
  • 13. Datacomm EPaaS PackagesEssential and Advanced Threat Protection 13 Functionality Essential Threat Protection Advanced Threat Protection Desktop and Server Anti Virus   Email (outlook) Server Anti Virus   Desktop Firewall   Endpoint URL + Web Filtering   Device Control   Multiplatform AV (Linux/Unix/Mac)   Application Control for Desktops   Dynamic Application Containment*   Real Protect*   Price Agent Rp. XXX.000/month Rp. XXX.000/month
  • 14. • Stronger zero-day threat detection using Static and Dynamic machine learning analysis • Thwarts spread of infections with Dynamic Containment • Easy, intuitive insights for corrective actions • Centralized Management • Delivers an architecture for the future Advanced, Integrated Defenses; Sustainable Framework for the Future 14 Summary Learn more by visiting: https://cloud.datacomm.co.id/services/endpoint- protection

Editor's Notes

  1. This is the first page. You can change the text into anything that suit your need.
  2. Serangan yang ditargetkan pada beberapa perusahaan masih merupakan bisnis besar bagi attacker. Attacker terus menjadi lebih canggih dan kolaboratif dalam menjebak target besar untuk keuntungan finansial. Kompleksitas terus meningkat seiring dengan organisasi IT dalam menanggapi ancaman lanjutan, seringkali dengan menambahkan solusi pada titik berbeda yang memerlukan banyak user interface, sehingga akan sulit dalam mengintergrasikan dalam menghadapi ancaman. Dan parahnya lagi ketika ancaman itu terjadi, proses investigasi pun akan lambat dan sulit hal ini dikarenakan masih manual dan sumberdaya yang terbatas.
  3. Pada dasarnya hampir setiap hari perusahaan menghadapi serangan dari pesaing, penjahat, dan entitas negara-bangsa yang memanfaatkan semua kemungkinan kerentanan untuk kompromi jaringan dan mengakses data sensitif. Datacomm Endpoint as a Services merupakan layanan untuk melindungi dan pemantauan secara real-time terhadap kerentanan dan ancaman yang sangat penting pada perangkat klien dari ancaman lanjutan, menjaga agar jaringan tetap berjalan serta menjaga agar aset perusahaan anda tetap aman. Datacomm Endpoint as a Services juga didukung dengan adanya machine-learning sehingga serangan kompleks yang sedang terjadi, dapat segera ditangani. Dengan adanya layanan tersebut anda dapat mengalihkan sumber daya tenaga TI untuk bisnis lainnya.