McAfee Inc. Sagena Security Day 4; 2010-09.22 Zagreb

Transcription

McAfee Inc. – SagenaSecurity Day 4; 2010-09.22ZagrebSeptember 23, 2010

Have you ever heard ofMcAfee Inc.? – Company intro/ acquisitionsCybercrime updateValue of integration and GlobalThreat IntelligenceSolution overview22

Intel to Acquire McAfeeNEWS HIGHLIGHTS: Intel Corporation has entered into a definitive agreement to purchase of all ofMcAfee’s common stock for 48 per share in cash, valuing the deal atapproximately 7.68 billion. McAfee will operate as a wholly-owned independentsubsidiary, reporting into Intel’s Software and Services Group. Acquisition enables a combination of security software and hardware from onecompany to ultimately better protect consumers, corporations and governmentsas billions of devices - and the server and cloud networks that manage them - goonline. Intel elevates focus on security on par with energy-efficient performance andconnectivity. The acquisition augments Intel’s mobile wireless strategy, helpingto better assure customer and consumer security concerns as these billions ofdevices connect. Intel has made a number of software-related acquisitions of leaders in theirrespective industries that also rely on great silicon, including Wind River, Havokand3 now McAfee

McAfee: Securing the Digital WorldFounded 1987—The World’s Largest Dedicated Security Company- 83% of Fortune 100companies rely on McAfee- Single deployments inexcess of 5M desktops- 6,102 McAfeeemployees globally- More than 150M userdesktops protected- 445 patents, manymore pending- R&D in 26 countries4- Presence in 120 countries

Largest Dedicated Security & Compliance Vendor M 60017 consecutive quarters of double-digityear-over-year revenue growth 500 400 300 200 100 12010

McAfee’s Customers Represent Every Industry6

Trust Digital Now Part of McAfeeMcAfee AcquiresTrust DigitalAdvancing Mobile Security and Management7September 23, 2010

EnglMobileishNoSignInMcAfee to acquire tenCubeWaveSecure mobile security service.Adding WaveSecure’s locate, lock, backup and wipe technology to Trust Digital’senterprise mobility management andMcAfee’s mobile security technology,gives McAfee the capabilities it needs todeliver the industry’s most completenext generation mobility platform.8Language:

New Wave of Change Within the Enterprise“Agents of Change”iPhone―AndroidiPadThe desktop internet ramp was just a warm-up act for what we’reseeing happen on the mobile internet. The pace of mobileinnovation is ―unprecedented, I think, in world history.9Mary Meeker, Morgan Stanley – April 2010‖September 23, 2010

Today’s Business Challenge: Transformation ofEnterprise Mobility10The Old Problem:Mobile EmailThe New Problem:Enterprise Mobility 2.0Secure MobileMessagingSecure Mobile AppManagementSeptember 23, 2010

Mobile Enterprise App Evolution is Moving RapidlyEnterprise andLOB AppsBasicServicesCustomer FacingAppsWeb andSocial MediaTrust Digital Data Protection Compliance11 Self-Service Provisioning Security Policy ManagementSeptember 23, 2010

The Right Life Cycle for Mobile Device ManagementTrust Digital Enterprise MobilityManagement Life Cycle ManagementProvisioningSelf-service provisioning sets security policies,configures network connectivity, automaticallypersonalizes devices for users by configuring emailand other applications.IT OpsSupportComplianceMobileDeviceManagementSecurity & AuthenticationProvisioningEach device is issued a unique digital certificate tostrongly authenticate it to the enterprise network.Policy ManagementSecurity &AuthenticationSecurity policies and configuration updates are pushedin real-time to the device over-the-air including selectiveand remote wipe, if the device is lost or stolen.CompliancePolicyManagementDevices are automatically checked prior to networkaccess to ensure that only authorized, managed, andsecured devices access enterprise applications andservices.IT Operations SupportManage policies and devices and get reports throughtheir web browsers. Consoles access is role basedleveraging directory authentication and groups.12 Sept

Cybercrime Update

Unprecedented Malware GrowthQ4 threat report McAfee Labs had approx. 33.3 million pieces of malwareat the end of 2009, compared to approx. 16.3 million at the end of 2008.That's 104% increase, or a doubling of malware in a 0,00010,000,0005,000,0000Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec20082009Source: McAfee Labs

Device Proliferation Continues82%Users who checkwork email at home 1Hundreds ofmillionsThumb drivesshipped annuallyFrom23% to 40%in 2010Employees using companyprovided mobile devices 157%Device proliferation,coupled with the blurringof lines between work andhome and business andsocial communications,can put organizations atrisk. Security policies andprocedures that engageemployees to think aboutnot only their PCs buttheir storage devices andother mobile devices iscritical.U.S. workers use socialmedia for business 21 Source:Osterman Research,North America figures2 Source:IDC

Today’s Cybercrime LandscapeMore MalwareVariationsNew maliciousSeconds website detected90%Web 2.0is the Catalyst!Of all threatsare financiallymotivated304MActive new zombiesper monthAttack TargetUsers vs. Machinesnew malware10,000DailythreatsToolkits &Obfuscation85%Malware isobfuscated

Malicious Advertising Malvertizing Space sold to ad networks Multiple layers of redirection Previously served:–fake Anti-virus–exploits1818SeptTitleSeptember 23, 2010

A Closer Look at poisoned Web search results andtopical newsThis year’s most poisoned search topics: Haiti earthquake20,00015,000 Chile earthquake/Hawaii tsunamiwarning Toyota recall Apple iPad10,0005,000 2010 NCAA bracket/March Madness0 Tiger Woods apology Sea World orca attack Olympic luge tragedy Groundhog Day19 U.S.Health Care Reform BillJanFeb2010MarUnique Malicious Domains in Q1 2010

Unique Fake Anti-Virus alert Samples DiscoveredDuring a 10-day span, we saw 45,000new Fake Alert samples in our database.Number of samples in our 100,0000Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q120082009For many products, only the namechanges. This trick maximizes thechances of catching victims and reducesthe amount of work for the developers.2010http://www.youtube.com/watch?v Pos58sONgco&feature related

McAfee Resources for you McAfee free resources available to businesses,government– McAfee Threat Resource Center (blog, at center/default.asp McAfee Support Notification Service (SNS) SubscriptionPreference Center http://my.mcafee.com/content/SNS Subscription Center provides valuable product information via email to help youmaximize the functionality and protection capabilities of yourMcAfee product includes: virus/malware outbreaks; DAT filefalse-positives; product vulnerabilities; and critical remediationupdates. updates, upgrades, patches, EOS/EOL, releasenotices; operational issues (password resets, portal issues;etc.).Award NominatedSecurity Blog McAfee free resources available to consumers– McAfee Security Advice Centerhttp://home.mcafee.com/securityadvice)– H-Commerce documentary serieshttp://www.stophcommerce.com– McAfee Facebook nalsSecurity Podcast

Today’s IT Security Product LandscapeJuniperCiscoIBMEntrasysCheck PointSophosCredantGuardianEdge eTippingPointSnortHPStillSecureCheck PointStonesoftTop tCiscoWebSenseSkyReconMicrosoftG dataTrust tecConfigureSoftMcAfeeCiscoJuniperCheck ntecCiscoEndpointWebCA23 Micro)BarracudaCACheck tec)FacetimeCP eMicrosoftProofPointMcAfeeSymantecBit9 Parity SuiteCoretrace BouncerLumension App ControlSignaCert EnterpriseMicrosoft ApplockerFirewalleMailHPTripwirenCircle FIMWhiteListingSophosAppsenseLan DeskSavant ProtectionOpswareIBM/Tivoli ConfigEMC Config SolutionBMC Bladelogic

Today’s IT Security Product AfeeEndpointFirewallWebeMail24WhiteListing

McAfee Security Leadership Across the BoardChallengersLeadersSystem SecurityNetwork IPSNetwork IPSWeb SecurityNetwork DLPAbility to ExecuteEmail securityIntegratedMobile Data ProtectionWeb SecuritySystem SecurityEmail SecurityFirewallNetwork DLPFirewallMobile Data ProtectionNiche PlayersSource: Gartner25VisionariesCompleteness of Vision

Security Management Platform: ePOREAL TIMETHREAT anagementWebPlatformIPSSIAIntegrates withIT Operations Platforms

You Are Not Alone In Fighting CyberattacksMcAfee LabsMore than 350 researchers across 30 countries.Millions of sensors across the globe.All dedicated to protecting you from the latest threats.Malware 50,000 pieces of malware identified each day 4 billion queries to Global Threat Intelligence cloud a monthVulnerability Analysis Protection from vulnerabilities averaged 80 daysahead of exploit in 2008 72% of Microsoft vulnerabilities in 2008 protectedat the endpoint without a host IPS-signature updateEmail Security 20 billion mail reputation queries each month More than 10 billion messages analyzed each monthNetwork Security 100 million IP and port reputation queries each month 10 million intrusion prevention system alerts monitoredand analyzed dailyWeb Security 75 billion web reputation queries each month One new malicious web server identified every 60 seconds More than 32 million websites rated across 96 categories More than 5 million new zombies discovered monthly More than 200 million downloads analyzed daily

Global Threat Intelligence (GTI)DedicatedGTI research teamComplete suite ofendpoint and networkresearch technologiesAcross all threat vectorsNetwork/IPS Signatures MalwareVulnerability Management SpamOutbound Web ProtectionGLOBALTHREATINTELLIGENCEReal-time ―in the cloud‖threat collection anddistribution modelProviding reputationbased capabilitiesSpans the entire Internetincluding millions of teListing28DLPWebIPSSIASeptember 23, 2010

McAfee’s Extensible Management PlatformSecurity Innovation Alliance (SIA) Delivers a Rich Security EcosystemAuthenticationand EncryptionSIAePOSecurity Event andLog ManagementTheft and ForensicsOther Security,IT & ServicesRisk and ComplianceApplication andDatabase SecuritySIAAssociate PartnerTechnology Partner(McAfee Compatible)30September 23, 2010

McAfee Wants to be Your Trusted Security isting31RiskMgmtDLPWebIPSSIA

Product Detail SlidesSeptember 23, 2010

Endpoint crypt.EmailFirewallePOWhiteListingProven and robust technology McAfee protects over 60 millionendpoints in the world’s largestenterprises Forrester and Gartner leader forfour straight years33DLPWebIPSSIAProactive and real-timemalware detectionSingle, integrated managementfor diverse environments Protects against zero-daymalware True Host IPS security makes―Patch Tuesday‖ a non-event Controls endpoints (Windows, Linuxand Mac), mobile phones, virtualmachines, storage and servers withcommon policies under a singlemanagement console

Comparison – Old vs New suitesMore Bang for the Buck – Across the Board!SAVSAV EPSEPS AVD TEE TEN TEA EPAePOAnti-virusEmail serverDesktop firewallQ4’10SiteAdvisor Ent PlusAnti-spywareHost IPSNACPolicy AuditorDevice controlWeb filteringEndpoint EncryptionMixed-platform34OLDNEWTEBTPE

Competition – Endpoint security suitesMcAfeeSymantec(EnterpriseEdition Suite)(EnterpriseEdition Suite)Real-time Anti-malwareprotection (Windows,Mac, Mobile & Linux) Email server (Antivirus/Anti-spam) Desktop firewallHost IPSWeb protection (SAE Plus)Web filtering - HostNetwork Access ControlPolicy Auditing(Compliance)Device ControlEndpoint EncryptionHybrid on/off-premise35TrendMicro(Ent sec.)SophosKasperskyMicrosoft(Endpoint& Data ste)(EnterpriseSpacesecurity)(ForefrontClient Security) Optional Managed OnlyOptionalOptional Optional Win 7bitlocker

Application mtEncrypt.EmailFirewallePOWhiteListingDLP Ensures only authorized applications run onendpoint and servers Comprehensive code coverage protectsagainst unauthorized specialty scripts Dynamic trust model avoids labor manualtracking Protects applications from being tamperedwith while running for extra security3636WebIPSSIA Automated inventory supports multipleconfigurations for different business needs Extremely small footprint enables securityto fixed-function devices Extends the lifespan of legacy systems andreduces the need to patch these systems Works within complex and disconnectednetworks requiring no DAT updatesSeptember 23, 2010

Encrypt.EmailFirewallePOWhiteListing3737DLPWeb Comply with data breach laws by ensuring thatevery endpoint is encrypted Persistent encryption follows data wherever it ismoved or copied Comprehensive device support for softwarebased as well as solid-state drives Single agent between endpoint encryption andendpoint security provides effortlessdeploymentIPSSIA Secures desktops, laptops, smartphones, portable storage and removablemedia with common policies and singlemanagement console Integrated file and folder encryption sodata is protected at all times Gartner rates McAfee as the leader inMobile Data Protection

Data Loss Encrypt.EmailFirewallePOWhiteListing3838DLPWeb Complete protection for data atrest, in use, and in motion Discover at-risk data by scanning datarepositories, servers and endpoints Enforces protection to eliminate abuse Line of business managers can managebreaches without involving IT Identify and resolve problems in minutes,not weeksIPSSIA Implementing policies is as easy aschecking a box based on pre-definedtemplates Capture technology and real-timeclassification reduces false positives Protection extends to mobile workers onor off the network Appliance form-factor removes need forexpensive servers and databases

Risk & Compliance Encrypt.EmailFirewallePOWhiteListingDLP Provide real-time insight into current risks bycorrelating threats to vulnerabilities and deployedcountermeasures Direct security and resource investments wherethey’ll have the greatest impact Spend less budget on operations, whiledemonstrating more control in audits and reviews Automate assessments for compliance with securityand regulatory policies39WebIPSSIA Automate risk management by preventing unwanted orunauthorized changes Minimize impact from drift by providing controls to enforcepolicy and security configurations for endpoints and servers Preserve system integrity and availability without impactingperformance Achieve continuous compliance by enforcing centralizedmanagement of configurations on servers and endpointsSeptember 23, 2010

Web crypt.EmailFirewallePOWhiteListingDLPWebIPS Enables productive use of Web 2.0Leadership:applications without jeopardizing corporate Gartner MQ: Leadershipsecurityquadrant 3 years running High performance: robust, enterprise Forrester Wave: Leaderclass proxy cache including AAA proxy, SSL AV-Test.Org: #1 ratedscanning, URL filtering, reputation filtering,gateway anti-malwareanti-malware and reporting in one appliancesolution Flexible deployment options include IDC: #1 in web appliancehardened appliances, virtual appliances,market sharesoftware-as-a-service, blades, and hybridSIASaaS

Email crypt.EmailFirewallePOWhiteListingDLPWebIPS Leadership: Comprehensive email security toprotect against inbound email-borne Gartner Magic Quadrant:threats and outbound data lossLeadership quadrant 4consecutive years Over 99% spam detection accuracy Forrester Wave: Leader Solutions for companies of all sizes SC Magazine: Best Email Integrated encryptionSecurity Solution 2009 Flexible deployment options include Virus Bulletin: Platinum Awardappliances, virtualization, software-asa-service, blades, and hybridSIASaaS

Network Intrusion Prevention System (IPS)McAfee Network Security crypt.EmailFirewallePOWhiteListingDLPWebIPS True network-class intrusion Seamless integration withprevention to enforce network, system network access control, internaland user security policiesfirewalls, behavioral detection Scalable IPS performance from Proven protection frombranch office up to 10-Gigabit ethernet encrypted attacks, botnets,DDoS, trojans, zero day attacks Complete integration with McAfeeand malwareePO , Global Threat Intelligence,Vulnerability Manager and Host Gartner & Forrester: ―Leader‖Intrusion Preventionrated IPS vendor/solutionSIA

Firew all McAfee Enterprise IPS Comprehensive layer 7 policy controls Only firewall with Commondesigned for today’s Web 2.0 enabledCriteria EAL4 certificationapplications Hardened operating system Strong network protection via industrythat features typeleading IPS, anti-virus, and URL filteringenforcement creates thestrongest firewall available Reputation-based filtering provides thebest pro-active protection in the industry Only firewall that has never Scalable and flexible deployment options been breached and has anfor the smallest and largest environments unrivaled US CERT advisoryrecordSIA

Thanks for your attention!Árpád Tóth – Country ManagerAdriatics&HungaryEmail:arpad toth@mcafee.comAny Questions?

The Right Life Cycle for Mobile Device Management Sept emb er 12 Trust Digital Enterprise Mobility Management Life Cycle Management Provisioning Self-service provisioning sets security policies,