Top of Content Box Line Subtitle Line Title Line Ruslans Barbasins| Territory Manager – CIS, Central Asia, Caucasus Leading The World Into Connected Security.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Palo Alto Networks Jay Flanyak Channel Business Manager
Security Life Cycle for Advanced Threats
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Next Generation Monitoring in Cisco Security Cloud Leon De Jager and Nitin.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business.
Joshua Senzer, CISSP Sr. Systems Engineer – North East Channel
Top of Content Box Line Subtitle Line Title Line Right Margin Line Wearables: Panacea or Pandora’s Box – A Security Perspective Gary Davis | Chief Consumer.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Unified Logs and Reporting for Hybrid Centralized Management
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
The Changing World of Endpoint Protection
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Module 12: Managing Comprehensive Line-of-business Products.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
2015 Security Conference Dave Gill Intel Security.
2015 Security Conference Ash Patel Intel Security.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Sky Advanced Threat Prevention
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Panel: Engineering Discipline in Cyber Security Steve Orrin, Chief Technologist, Intel Federal, Intel Coporation.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
McAfee Threat Intelligence Exchange
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
ClearswiftCorporate Overview Copyright © Clearswift About Clearswift HQ in the UK with offices in Australia, Germany, Japan, Spain and USA.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Why SIEM – Why Security Intelligence??
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Juniper Software-Defined Secure Network
The Need for Efficiency
The Need for Efficiency
Jon Peppler, Menlo Security Channels
Virtualization & Security real solutions
بهترین راهکار را انتخاب کنید...
Securing Your Digital Transformation
Strong Security for Your Weak Link:
The Need for Efficiency
Securing the Threats of Tomorrow, Today.
Powerful Partnerships with Industry Leaders
MAZARS’ CONSULTING PRACTICE
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

Top of Content Box Line Subtitle Line Title Line Ruslans Barbasins| Territory Manager – CIS, Central Asia, Caucasus Leading The World Into Connected Security

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 2 History of Defining Architecture –Inventor of the world’s most widely used computing architecture –Defining countless standards used in everyday lives ranging from USB, WiFi, to IoT –Top 10 Most Influential Brands in the World Largest Dedicated Security Provider –Broadest security product coverage in the industry –Complete portfolio focused upon security –Leadership position in 6 of 8 Gartner Security Magic Quadrants Delivering a Next Generation Security Architecture –Defining innovative industry approaches for collaborative and adaptive security –Introducing security integrations which are sustainable and broadly reaching –Developing capabilities for new security paradigms in areas such as Software Defined Datacenter, Cloud, and IoT

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 3 Challenges Faced by Security Professionals Source: McAfee Survey at Black Hat USA 2013 False Positives 20% Detection 35% Other 3% Damage Repair 9% Timely Response 11% Protection 22%

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 4 Advanced Targeted Attacks—The Reality Sources: Verizon 2013 Data Breach Investigations Report. Securosis Malware Analysis Quant Metrics Model CONTAINMENT ATTACK COMPROMISE DISCOVERY COMPROMISE TO DISCOVERYDISCOVERY TO CONTAINMENT ADVANCED TARGETED ATTACKS Weeks 64% Days 11% Years 4% Months 12% Minutes 2% Weeks 14% Months 23% Days 42% Hours 19% $8,769 / Incident $3,840,988 / Year 1.2 incidents / Day Hours 9%

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 5 Targeted attacks against Point-of-Sale (POS) systems Memory parsing/scraping malware Extracts full magnetic stripe data out of memory Not detected by traditional A/V Not detected for a significant amount of time Substantial damage – 40 million credit cards where ex-filtrated in the TARGET compromise Estimated $652 million loss in market cap after Target breach Containment took long (VISA) Recent Notable Advanced Targeted Attacks

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 6 Firewall Endpoint Protection Gateway Security Network IPSCompliance Data Protection MobilitySIEM. 6 TIME Building Security By Silo Technology Acquisition Process Has Delivered Security Chaos

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 7 Security Posture TCO CapEx + OpEx Point Products Layered Tools Building Security By Silo Creating a False Sense of Security TIME Lessons Learned Well-funded organizations do not equal well-defended organizations Maintaining compliance will not result in protection Massive alerting in a sea of noise cannot receive action Defenses operating in silos are setup to fail Parity Advancement

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 8 Security Posture TCO CapEx + OpEx Building Security By Silo Delivering Operationally Effective Security TIME Parity Advancement Layered Tools Point Products Connected Architecture

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 9 Adaptive Threat Prevention in Real-Time From Encounter to Containment in Milliseconds

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 10 Asset Threat Identity Activity BPM Risk Data Location Data Exchange Layer An innovative, real-time, bi-directional communications fabric providing with product integration simplicity. Security components operate as one to immediately share relevant data between endpoint, gateway, and other security products enabling security intelligence and adaptive security. THE SECURITY CONNECTED FRAMEWORK ADAPTIVE SECURITY ARCHITECTURE

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 11 Attacks Are Targeted. Security Defenses Must Be Tailor-made.

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 12 ? LOCAL THREAT INTELLIGENCE ORGANIZATIONAL INTELLIGENCE McAfee NGFW McAfee Gateway McAfee NSP Add the power of knowledge Other Data Sources Future McAfee Global Threat Intelligence 3 rd Party Feeds McAfee Endpoint Client McAfee Web Gateway McAfee Threat Intelligence Exchange Optimizing Security for Your Organization Personalized Threat Intelligence Assemble, override, augment and tune the intelligence source information GLOBAL THREAT INTELLIGENCE Administrator Organizational Knowledge

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 13 McAfee VSE Threat Intelligence Module McAfee VSE Threat Intelligence Module McAfee ePO McAfee ATD Threat Intelligence Exchange Adapt and Immunize — From Encounter to Containment in Milliseconds McAfee Global Threat Intelligence 3 rd Party Feeds Data Exchange Layer McAfee TIE Server

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 14 McAfee ESM McAfee VSE Threat Intelligence Module McAfee VSE Threat Intelligence Module McAfee ePO McAfee ATD McAfee Web Gateway McAfee Gateway McAfee NGFW McAfee NSP Instant Protection Across the Enterprise 14 Data Exchange Layer McAfee Global Threat Intelligence 3 rd Party Feeds Gateways block access based on endpoint convictions Security components operate as one to immediately share relevant data between endpoint, gateway, and other security products Proactively and efficiently protect your organization as soon as a threat is revealed McAfee TIE Server

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 15 McAfee ESM McAfee VSE Threat Intelligence Module McAfee VSE Threat Intelligence Module McAfee ePO McAfee ATD McAfee Web Gateway McAfee Gateway McAfee NGFW McAfee NSP Threat Intelligence Exchange Adapt and Immunize—From Encounter to Containment in Milliseconds 15 Data Exchange Layer McAfee Global Threat Intelligence 3 rd Party Feeds Endpoints are protected based on gateway convictions McAfee TIE Server

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Confidential 16 Threat Intelligence Exchange Lowers TCO and Improves Your ROI Integration simplicity through McAfee’s data exchange layer Enables unmatched operation effectiveness and agility Reduces implementation and operational costs Extends existing McAfee security detection, prevention, and analytics technology investments

Ruslans Barbasins Phone: დიდი მადლობა ! Thank you!