SlideShare une entreprise Scribd logo
1  sur  37
www.cloudcomputingchina.org
Harnessing the Cloud with
Security as a Service
Marc Olesen
Senior Vice President and General Manager, Software-as-a-Service
“Organizations worldwide lost
 approximately $1 trillion in intellectual
 property last year due to cybercrime.”
                       − McAfee Labs
“Two years from now,
 Spam will be solved”
    − Bill Gates, January 2004
More Sophisticated & Complex




        • ICBC, most popular bank in China
        • The phishing site’s domain name: “1”CBC
More Sophisticated and Complex
Economic Pressures

  Worldwide IT Spending Declining
  Worldwide IT Spending Declining
Opposing Forces




       Do More!   Spend less!
A New Direction

• SaaS is a priority for 74% of Chinese
  firms with 29% planning to pilot SaaS
  projects in the next 12 months.
Source: Forrester


• SaaS is forecasted to grow at five times
  the rate of software applications through
  2013.                                         Cloud Computing
Source: Gartner

• In 2008, SaaS deployments grew 33%
  in Enterprises.
Source: Forrester


• Over next five years, Security-as-a-        Do More! Spend less!
  Service market will grow by twenty-five
  percent.
  Source: IDC
SaaS Benefits Growing Businesses of Any Size

               Small Businesses
               • Enterprise-grade security w/out complexity
               • Simple to deploy and maintenance free

               Medium Businesses
               • Highly scalable and flexible for growth
               • Requires no major capital outlays

               Large Enterprises
               • Leverage core competencies
               • Flexible architecture & interlocked solutions
               • Lower and more predictable costs (TCO)
Unlike previous times, we
have an opportunity to address cloud
security challenges before the cloud
becomes ubiquitous
McAfee’s Cloud Strategy

  SECURITY   FROM   THE CLOUD


  SECURITY    IN    THE CLOUD


  SECURITY   FOR    THE CLOUD
McAfee Security-as-a-Service


              What is Security-as-a-Service?
          Security controls that are available by
          subscription and are managed and delivered
          via the internet by a software vendor.




                Why Security-as-a-Service?
 Greater Return on Investment      Less Risk
 •Faster time to value             • Focus on securing business,
 •Reduce total cost of ownership     not managing software
                                   • Unburden IT resources
Value of Security SaaS
    Reduce operational expenses

                                            On Premises Security                          Security SaaS

                                 Year 1            Year 2           Year 3      Year 1       Year 2        Year 3

SaaS subscription,
                                                                               $146,000     $146,000      $146,000
maintenance included

Perpetual license               $500,000             $0                  $0

Annual support (40%)             Included         $200,000         $200,000    Included     Included      Included

Management server
                                 $1,500              $0                 $0     Included     Included      Included
hardware

Management server
operating system/                 $270               $50                $50    Included     Included      Included
other hardware

Administration and
                                  $500               $0                  $0     $500           $0           $0
deployment

Ongoing server
                                    $0              $750                $750   Included     Included      Included
maintenance cost

Total                           $502,270          $200,800         $200,800    $146,500     $146,000      $146,000

Data provided for illustrative purposes only. Your results will vary.
Value of Security SaaS
    Reduce operational expenses

                                            On Premises Security                          Security SaaS

                                 Year 1            Year 2            Year 3     Year 1       Year 2        Year 3

SaaS subscription,
                                                                               $146,000     $146,000      $146,000
maintenance included

Perpetual license               $500,000             $0                  $0

        Summary
Annual support (40%)             Included          On Premises
                                                         $200,000
                                                  $200,000                     Included    SaaS
                                                                                           Included       Included

Management server
                                 $1,500              $0                 $0     Included     Included      Included
hardware
        3-year TCO
Management server
                                                          $903,870                        $438,500
operating system/                 $270               $50                $50    Included     Included      Included
other hardware
        SaaS Savings
Administration and
                                                                 −                          51%
                                  $500               $0                  $0     $500           $0           $0
deployment

Ongoing server
                                    $0              $750                $750   Included     Included      Included
maintenance cost

Total                           $502,270          $200,800         $200,800    $146,500     $146,000      $146,000

Data provided for illustrative purposes only. Your results will vary.
Challenges


1. Fragmented market
2. Lack of focus, experience or expertise
3. All-or-nothing offerings
McAfee’s Unique Position


  Instant Access         Real-Time Protection            Peace of Mind




   DIVERSITY – Broadest Security-as-a-Service portfolio in the industry
   RELIABILITY – Real-time protection with Global Threat Intelligence
   FLEXIBILITY – Deployment options to fit your dynamic business




                          Security-as-a-Service
Broadest SaaS Portfolio in the Industry
Real-time Protection with Global Threat Intelligence



                                    Global Threat Intelligence™




              http://
                                                                                                    !
                            McAfee SaaS Management Console
                                        Email         Email         Website          PCI       Vulnerability
   Endpoint   Web       Email         Continuity    Archiving     Certification   Compliance   Assessment




                                Multi‐tenant , Scalable Service Platform
McAfee Delivers Flexible Security
Deployment options to fit your dynamic business


                         Security-as-a-Service




 Software                                         Appliance
Flexible Options for Email Protection & Compliance

               Hybrid Delivery / Layered Security




                              INBOUND



                             OUTBOUND




                                     Email Gateway
McAfee’s Cloud Strategy

  SECURITY   FROM   THE CLOUD


  SECURITY    IN    THE CLOUD


  SECURITY   FOR    THE CLOUD
Global Threat Intelligence



Spans the entire Internet                     Providing reputation
including millions of                           based capabilities
sensors



Across all threat                                   Dedicated GTI
vectors                                             research team




Real-time “in the cloud” threat     Complete suite of endpoint and
collection and distribution model      network research products


                                                                     22
The Protection Gap


                       1–24            4–8 2–8 4–8      1–24
                       Hrs             Hrs Hrs Hrs      Hrs




             t0               t1            t2           t3           t4
          Malware        Malware        Protection    Protection   Protection
         in the Wild    Discovered      Available    Downloaded    Deployed




                                   Protection Gap of
                              24–72 Hours
                              with Current Solutions
Compressing the Protection Gap



                       1–60          1    15 0     1–10
                       Min.          Sec. Min. Sec. Sec.




             t0               t1          t2               t3        t4
          Malware        Malware     Protection      Protection   Protection
         in the Wild    Discovered   Available      Downloaded    Deployed
Compressing the Protection Gap



                      ~15
                      Min.




            t0               t1        t2            t3           t4
         Malware        Malware     Protection    Protection   Protection
        in the Wild    Discovered   Available    Downloaded    Deployed
New Paradigm


                             0
                             Min.




         t0*         t0
      Protection   Malware
          Is        in the
      Deployed       Wild
Korean DDoS Attack
GTI Thwarting a DDoS Attack



  Deviation

    5000%
    4000%
    3000%
                                                                                               Reputation Class
    2000%
    1000%
       0%
              Deviation from average message count   Deviation from average connection count



                                                                     July 4th DDoS


                  July 4th 2009: 200,000 zombie Korean botnet
                      launches DDoS against US and South
                            Korean government sites
McAfee’s Cloud Strategy

  SECURITY   FROM   THE CLOUD


  SECURITY    IN    THE CLOUD


  SECURITY   FOR    THE CLOUD
What cloud END USERS want...



      Secure cloud infrastructure
      Providers implement current & future cloud standards
      Third-party certification
      Automation of auditing & security
      More transparency
Existing Standards for Cloud Providers
Information Certification is NOT enough


Must test for technology vulnerabilities

   • Daily third-party security validation
   • Updated with latest vulnerabilities
   • Quick remediation
   • Automate compliance
   • Easy-to-deploy and maintain
McAfee Cloud Secure Program


                                                                                TE
                                                                                   ST



                                     +
                                                                                     ED
                                                                                       25
                                                                                            -M
     Cloud Security Certification                  McAfee Cloud Secure                           AR




  •ISO/IEC   27001 & 27002               •   Over 15,000 vulnerabilities tested

  •SAS70    Type II                      •   Automated Security Audits
                                               •   Infrastructure
  •Gap   Analysis
                                               •   Network Perimeter
  •Readiness   Assessments                     •   Application
  •Certification   Planning              •   Remediation Management
  •Implementation     and Training       •   Intelligent Network Discovery
  •Annual   Renewal                            •   Discovery of hosts, services and devices

                                         •   Daily Scan and Audit Report
McAfee’s Cloud Strategy

  SECURITY   FROM   THE CLOUD


  SECURITY    IN    THE CLOUD


  SECURITY   FOR    THE CLOUD
In today’s environment, Cloud computing
is not just for scaling your business,
but also protecting it
www.cloudcomputingchina.org

Contenu connexe

Tendances

AWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - KeynoteAWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - KeynoteAmazon Web Services
 
AWS re:Inforce 2021 re:Cap 1
AWS re:Inforce 2021 re:Cap 1 AWS re:Inforce 2021 re:Cap 1
AWS re:Inforce 2021 re:Cap 1 Hayato Kiriyama
 
White Paper: Yardi ASP Hosting Services
White Paper: Yardi ASP Hosting ServicesWhite Paper: Yardi ASP Hosting Services
White Paper: Yardi ASP Hosting Serviceswebhostingguy
 
SIOS Private Cloud
SIOS Private CloudSIOS Private Cloud
SIOS Private CloudJim Kaskade
 
Meeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassageMeeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassageCloudPassage
 
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudPublic, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudOpSource
 
Build Resilient Private Cloud
Build Resilient Private CloudBuild Resilient Private Cloud
Build Resilient Private CloudSymantec APJ
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
DDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS ShieldDDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS ShieldAmazon Web Services
 
Ottawa e-NFV Session
Ottawa e-NFV Session Ottawa e-NFV Session
Ottawa e-NFV Session Cisco Canada
 
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018   Cisco dna - deeper diveCisco Connect Halifax 2018   Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper diveCisco Canada
 
A Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident ResolutionA Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident ResolutionAmazon Web Services
 
Feeding your Storage-Thirsty Cloud
Feeding your Storage-Thirsty CloudFeeding your Storage-Thirsty Cloud
Feeding your Storage-Thirsty CloudJeannette Grand
 
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Connect Halifax 2018   Cisco dna - network intuitiveCisco Connect Halifax 2018   Cisco dna - network intuitive
Cisco Connect Halifax 2018 Cisco dna - network intuitiveCisco Canada
 
Cisco connect winnipeg 2018 a look at network assurance in dna center
Cisco connect winnipeg 2018   a look at network assurance in dna centerCisco connect winnipeg 2018   a look at network assurance in dna center
Cisco connect winnipeg 2018 a look at network assurance in dna centerCisco Canada
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
 
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Skybox Security
 
SAXOTECH Managed Hosting
SAXOTECH Managed HostingSAXOTECH Managed Hosting
SAXOTECH Managed Hostingwebhostingguy
 
[Cisco Connect 2018 - Vietnam] Cisco connect 2018 sanjay - cisco sda v1.0-h...
[Cisco Connect 2018 - Vietnam] Cisco connect 2018   sanjay - cisco sda v1.0-h...[Cisco Connect 2018 - Vietnam] Cisco connect 2018   sanjay - cisco sda v1.0-h...
[Cisco Connect 2018 - Vietnam] Cisco connect 2018 sanjay - cisco sda v1.0-h...Nur Shiqim Chok
 

Tendances (20)

AWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - KeynoteAWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - Keynote
 
AWS re:Inforce 2021 re:Cap 1
AWS re:Inforce 2021 re:Cap 1 AWS re:Inforce 2021 re:Cap 1
AWS re:Inforce 2021 re:Cap 1
 
White Paper: Yardi ASP Hosting Services
White Paper: Yardi ASP Hosting ServicesWhite Paper: Yardi ASP Hosting Services
White Paper: Yardi ASP Hosting Services
 
SIOS Private Cloud
SIOS Private CloudSIOS Private Cloud
SIOS Private Cloud
 
Meeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassageMeeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassage
 
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudPublic, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
 
Build Resilient Private Cloud
Build Resilient Private CloudBuild Resilient Private Cloud
Build Resilient Private Cloud
 
Teknoforce
TeknoforceTeknoforce
Teknoforce
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
DDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS ShieldDDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS Shield
 
Ottawa e-NFV Session
Ottawa e-NFV Session Ottawa e-NFV Session
Ottawa e-NFV Session
 
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018   Cisco dna - deeper diveCisco Connect Halifax 2018   Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper dive
 
A Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident ResolutionA Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
 
Feeding your Storage-Thirsty Cloud
Feeding your Storage-Thirsty CloudFeeding your Storage-Thirsty Cloud
Feeding your Storage-Thirsty Cloud
 
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Connect Halifax 2018   Cisco dna - network intuitiveCisco Connect Halifax 2018   Cisco dna - network intuitive
Cisco Connect Halifax 2018 Cisco dna - network intuitive
 
Cisco connect winnipeg 2018 a look at network assurance in dna center
Cisco connect winnipeg 2018   a look at network assurance in dna centerCisco connect winnipeg 2018   a look at network assurance in dna center
Cisco connect winnipeg 2018 a look at network assurance in dna center
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
 
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
 
SAXOTECH Managed Hosting
SAXOTECH Managed HostingSAXOTECH Managed Hosting
SAXOTECH Managed Hosting
 
[Cisco Connect 2018 - Vietnam] Cisco connect 2018 sanjay - cisco sda v1.0-h...
[Cisco Connect 2018 - Vietnam] Cisco connect 2018   sanjay - cisco sda v1.0-h...[Cisco Connect 2018 - Vietnam] Cisco connect 2018   sanjay - cisco sda v1.0-h...
[Cisco Connect 2018 - Vietnam] Cisco connect 2018 sanjay - cisco sda v1.0-h...
 

En vedette

As Theatre To Do List
As Theatre To Do ListAs Theatre To Do List
As Theatre To Do Listchrisabbott76
 
Tendencias y problemas en Grandes Corporaciones
Tendencias y problemas en Grandes CorporacionesTendencias y problemas en Grandes Corporaciones
Tendencias y problemas en Grandes CorporacionesGuillermo Paredes
 
Výpočet tahových napětí ve WOLFRAMALPHA
Výpočet tahových napětí ve WOLFRAMALPHAVýpočet tahových napětí ve WOLFRAMALPHA
Výpočet tahových napětí ve WOLFRAMALPHALibor Jakubčík
 
Vazebné síly u nosníku na 2 podporách ve WOLFRAMALPHA
Vazebné síly u nosníku na 2 podporách ve WOLFRAMALPHAVazebné síly u nosníku na 2 podporách ve WOLFRAMALPHA
Vazebné síly u nosníku na 2 podporách ve WOLFRAMALPHALibor Jakubčík
 
24 Degrees Website & Photography
24 Degrees Website & Photography24 Degrees Website & Photography
24 Degrees Website & PhotographyJonathanalikhan
 
Helping businesses to solve a wicked problem: Getting profits from CX design
Helping businesses to solve a wicked problem: Getting profits from CX designHelping businesses to solve a wicked problem: Getting profits from CX design
Helping businesses to solve a wicked problem: Getting profits from CX designPeter Bogaards
 
CCCC china unicom xiongyan tang
CCCC china unicom xiongyan tangCCCC china unicom xiongyan tang
CCCC china unicom xiongyan tangCloud Congress
 
Share2012 - Innovation Games for SharePoint Requirements Gathering
Share2012 - Innovation Games for SharePoint Requirements GatheringShare2012 - Innovation Games for SharePoint Requirements Gathering
Share2012 - Innovation Games for SharePoint Requirements Gathering21apps
 
Slide presentasi skripsi
Slide presentasi skripsiSlide presentasi skripsi
Slide presentasi skripsiDion Webiaswara
 
New (re-)search paradigms through a Social Portal for Open Access Repositori...
New (re-)search paradigms through a Social Portal for  Open Access Repositori...New (re-)search paradigms through a Social Portal for  Open Access Repositori...
New (re-)search paradigms through a Social Portal for Open Access Repositori...Anastasios (Tasos) Koutoumanos
 

En vedette (20)

Wa 10
Wa 10Wa 10
Wa 10
 
Cloud 9 Intro
Cloud 9 IntroCloud 9 Intro
Cloud 9 Intro
 
As Theatre To Do List
As Theatre To Do ListAs Theatre To Do List
As Theatre To Do List
 
Tendencias y problemas en Grandes Corporaciones
Tendencias y problemas en Grandes CorporacionesTendencias y problemas en Grandes Corporaciones
Tendencias y problemas en Grandes Corporaciones
 
[pdf] Le Rivoluzioni Settecentesche
[pdf] Le Rivoluzioni Settecentesche[pdf] Le Rivoluzioni Settecentesche
[pdf] Le Rivoluzioni Settecentesche
 
Výpočet tahových napětí ve WOLFRAMALPHA
Výpočet tahových napětí ve WOLFRAMALPHAVýpočet tahových napětí ve WOLFRAMALPHA
Výpočet tahových napětí ve WOLFRAMALPHA
 
Vazebné síly u nosníku na 2 podporách ve WOLFRAMALPHA
Vazebné síly u nosníku na 2 podporách ve WOLFRAMALPHAVazebné síly u nosníku na 2 podporách ve WOLFRAMALPHA
Vazebné síly u nosníku na 2 podporách ve WOLFRAMALPHA
 
Wa 11
Wa 11Wa 11
Wa 11
 
24 Degrees Website & Photography
24 Degrees Website & Photography24 Degrees Website & Photography
24 Degrees Website & Photography
 
Chronology For Ui
Chronology For  UiChronology For  Ui
Chronology For Ui
 
Helping businesses to solve a wicked problem: Getting profits from CX design
Helping businesses to solve a wicked problem: Getting profits from CX designHelping businesses to solve a wicked problem: Getting profits from CX design
Helping businesses to solve a wicked problem: Getting profits from CX design
 
Wa 1
Wa 1Wa 1
Wa 1
 
Oer growers agri-moodle
Oer growers agri-moodleOer growers agri-moodle
Oer growers agri-moodle
 
Wa 8
Wa 8Wa 8
Wa 8
 
CCCC china unicom xiongyan tang
CCCC china unicom xiongyan tangCCCC china unicom xiongyan tang
CCCC china unicom xiongyan tang
 
Svary ukázky
Svary ukázkySvary ukázky
Svary ukázky
 
The agriMoodle Hub for sharing course descriptions
The agriMoodle Hub for sharing course descriptionsThe agriMoodle Hub for sharing course descriptions
The agriMoodle Hub for sharing course descriptions
 
Share2012 - Innovation Games for SharePoint Requirements Gathering
Share2012 - Innovation Games for SharePoint Requirements GatheringShare2012 - Innovation Games for SharePoint Requirements Gathering
Share2012 - Innovation Games for SharePoint Requirements Gathering
 
Slide presentasi skripsi
Slide presentasi skripsiSlide presentasi skripsi
Slide presentasi skripsi
 
New (re-)search paradigms through a Social Portal for Open Access Repositori...
New (re-)search paradigms through a Social Portal for  Open Access Repositori...New (re-)search paradigms through a Social Portal for  Open Access Repositori...
New (re-)search paradigms through a Social Portal for Open Access Repositori...
 

Similaire à CCCC McAfee Marc Olesen

Is it Time to Move Your Enterprise to the Cloud
Is it Time to Move Your Enterprise to the CloudIs it Time to Move Your Enterprise to the Cloud
Is it Time to Move Your Enterprise to the CloudProformative, Inc.
 
The Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated IndustriesThe Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated Industriesdirkbeth
 
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...VMworld
 
Private cloud for_partners
Private cloud for_partnersPrivate cloud for_partners
Private cloud for_partnerssolarisyougood
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
VMware: Súčasnosť a trendy v cloud computingu
VMware: Súčasnosť a trendy v cloud computinguVMware: Súčasnosť a trendy v cloud computingu
VMware: Súčasnosť a trendy v cloud computinguASBIS SK
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
NetOne Draft Presentation (2)
NetOne Draft Presentation (2)NetOne Draft Presentation (2)
NetOne Draft Presentation (2)Carl Terrantroy
 
ThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital WorkshopThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital WorkshopThousandEyes
 
Enhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for PartnersEnhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for PartnersThousandEyes
 
Accelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelAccelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelOpen Data Center Alliance
 
Perfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudPerfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudStanton Jones
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Cynthia Hsieh
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Moshe Ferber
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionLumension
 
Open Group Conference Csi V5.1
Open Group Conference Csi V5.1Open Group Conference Csi V5.1
Open Group Conference Csi V5.1Enrico Boverino
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for EnterprisesAmazon Web Services
 

Similaire à CCCC McAfee Marc Olesen (20)

Is it Time to Move Your Enterprise to the Cloud
Is it Time to Move Your Enterprise to the CloudIs it Time to Move Your Enterprise to the Cloud
Is it Time to Move Your Enterprise to the Cloud
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
The Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated IndustriesThe Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated Industries
 
Alta 3-2013
Alta 3-2013Alta 3-2013
Alta 3-2013
 
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
 
Private cloud for_partners
Private cloud for_partnersPrivate cloud for_partners
Private cloud for_partners
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
VMware: Súčasnosť a trendy v cloud computingu
VMware: Súčasnosť a trendy v cloud computinguVMware: Súčasnosť a trendy v cloud computingu
VMware: Súčasnosť a trendy v cloud computingu
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
NetOne Draft Presentation (2)
NetOne Draft Presentation (2)NetOne Draft Presentation (2)
NetOne Draft Presentation (2)
 
ThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital WorkshopThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital Workshop
 
Enhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for PartnersEnhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for Partners
 
Clouds: Beyond Compute and Storage
Clouds: Beyond Compute and StorageClouds: Beyond Compute and Storage
Clouds: Beyond Compute and Storage
 
Accelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelAccelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, Intel
 
Perfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudPerfect Storm: HR in the Cloud
Perfect Storm: HR in the Cloud
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
Open Group Conference Csi V5.1
Open Group Conference Csi V5.1Open Group Conference Csi V5.1
Open Group Conference Csi V5.1
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 

Plus de Cloud Congress

CCCC SuccessFactors Tom Fisher
CCCC SuccessFactors Tom FisherCCCC SuccessFactors Tom Fisher
CCCC SuccessFactors Tom FisherCloud Congress
 
CCCC Nokia Siemens Networks Amir Lahat
CCCC Nokia Siemens Networks Amir LahatCCCC Nokia Siemens Networks Amir Lahat
CCCC Nokia Siemens Networks Amir LahatCloud Congress
 
CCCC Neustar Lenny Rachitsky
CCCC Neustar Lenny RachitskyCCCC Neustar Lenny Rachitsky
CCCC Neustar Lenny RachitskyCloud Congress
 
CCCC NetApp Wallace Fung
CCCC NetApp Wallace FungCCCC NetApp Wallace Fung
CCCC NetApp Wallace FungCloud Congress
 
Cccc net app_wallacefung
Cccc net app_wallacefungCccc net app_wallacefung
Cccc net app_wallacefungCloud Congress
 
CCCC ChinaTravelSky Gang Hu
CCCC ChinaTravelSky Gang HuCCCC ChinaTravelSky Gang Hu
CCCC ChinaTravelSky Gang HuCloud Congress
 
CCCC China Telecom Jun Wan
CCCC China Telecom Jun WanCCCC China Telecom Jun Wan
CCCC China Telecom Jun WanCloud Congress
 
CCCC China Export-import Bank Yunshen Wang
CCCC China Export-import Bank Yunshen WangCCCC China Export-import Bank Yunshen Wang
CCCC China Export-import Bank Yunshen WangCloud Congress
 
CCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCloud Congress
 
CCCC Amazon Simone Brunozzi
CCCC Amazon Simone BrunozziCCCC Amazon Simone Brunozzi
CCCC Amazon Simone BrunozziCloud Congress
 

Plus de Cloud Congress (10)

CCCC SuccessFactors Tom Fisher
CCCC SuccessFactors Tom FisherCCCC SuccessFactors Tom Fisher
CCCC SuccessFactors Tom Fisher
 
CCCC Nokia Siemens Networks Amir Lahat
CCCC Nokia Siemens Networks Amir LahatCCCC Nokia Siemens Networks Amir Lahat
CCCC Nokia Siemens Networks Amir Lahat
 
CCCC Neustar Lenny Rachitsky
CCCC Neustar Lenny RachitskyCCCC Neustar Lenny Rachitsky
CCCC Neustar Lenny Rachitsky
 
CCCC NetApp Wallace Fung
CCCC NetApp Wallace FungCCCC NetApp Wallace Fung
CCCC NetApp Wallace Fung
 
Cccc net app_wallacefung
Cccc net app_wallacefungCccc net app_wallacefung
Cccc net app_wallacefung
 
CCCC ChinaTravelSky Gang Hu
CCCC ChinaTravelSky Gang HuCCCC ChinaTravelSky Gang Hu
CCCC ChinaTravelSky Gang Hu
 
CCCC China Telecom Jun Wan
CCCC China Telecom Jun WanCCCC China Telecom Jun Wan
CCCC China Telecom Jun Wan
 
CCCC China Export-import Bank Yunshen Wang
CCCC China Export-import Bank Yunshen WangCCCC China Export-import Bank Yunshen Wang
CCCC China Export-import Bank Yunshen Wang
 
CCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas Ilyadis
 
CCCC Amazon Simone Brunozzi
CCCC Amazon Simone BrunozziCCCC Amazon Simone Brunozzi
CCCC Amazon Simone Brunozzi
 

Dernier

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

CCCC McAfee Marc Olesen

  • 2. Harnessing the Cloud with Security as a Service Marc Olesen Senior Vice President and General Manager, Software-as-a-Service
  • 3. “Organizations worldwide lost approximately $1 trillion in intellectual property last year due to cybercrime.” − McAfee Labs
  • 4. “Two years from now, Spam will be solved” − Bill Gates, January 2004
  • 5. More Sophisticated & Complex • ICBC, most popular bank in China • The phishing site’s domain name: “1”CBC
  • 7. Economic Pressures Worldwide IT Spending Declining Worldwide IT Spending Declining
  • 8. Opposing Forces Do More! Spend less!
  • 9. A New Direction • SaaS is a priority for 74% of Chinese firms with 29% planning to pilot SaaS projects in the next 12 months. Source: Forrester • SaaS is forecasted to grow at five times the rate of software applications through 2013. Cloud Computing Source: Gartner • In 2008, SaaS deployments grew 33% in Enterprises. Source: Forrester • Over next five years, Security-as-a- Do More! Spend less! Service market will grow by twenty-five percent. Source: IDC
  • 10. SaaS Benefits Growing Businesses of Any Size Small Businesses • Enterprise-grade security w/out complexity • Simple to deploy and maintenance free Medium Businesses • Highly scalable and flexible for growth • Requires no major capital outlays Large Enterprises • Leverage core competencies • Flexible architecture & interlocked solutions • Lower and more predictable costs (TCO)
  • 11. Unlike previous times, we have an opportunity to address cloud security challenges before the cloud becomes ubiquitous
  • 12. McAfee’s Cloud Strategy SECURITY FROM THE CLOUD SECURITY IN THE CLOUD SECURITY FOR THE CLOUD
  • 13. McAfee Security-as-a-Service What is Security-as-a-Service? Security controls that are available by subscription and are managed and delivered via the internet by a software vendor. Why Security-as-a-Service? Greater Return on Investment Less Risk •Faster time to value • Focus on securing business, •Reduce total cost of ownership not managing software • Unburden IT resources
  • 14. Value of Security SaaS Reduce operational expenses On Premises Security Security SaaS Year 1 Year 2 Year 3 Year 1 Year 2 Year 3 SaaS subscription, $146,000 $146,000 $146,000 maintenance included Perpetual license $500,000 $0 $0 Annual support (40%) Included $200,000 $200,000 Included Included Included Management server $1,500 $0 $0 Included Included Included hardware Management server operating system/ $270 $50 $50 Included Included Included other hardware Administration and $500 $0 $0 $500 $0 $0 deployment Ongoing server $0 $750 $750 Included Included Included maintenance cost Total $502,270 $200,800 $200,800 $146,500 $146,000 $146,000 Data provided for illustrative purposes only. Your results will vary.
  • 15. Value of Security SaaS Reduce operational expenses On Premises Security Security SaaS Year 1 Year 2 Year 3 Year 1 Year 2 Year 3 SaaS subscription, $146,000 $146,000 $146,000 maintenance included Perpetual license $500,000 $0 $0 Summary Annual support (40%) Included On Premises $200,000 $200,000 Included SaaS Included Included Management server $1,500 $0 $0 Included Included Included hardware 3-year TCO Management server $903,870 $438,500 operating system/ $270 $50 $50 Included Included Included other hardware SaaS Savings Administration and − 51% $500 $0 $0 $500 $0 $0 deployment Ongoing server $0 $750 $750 Included Included Included maintenance cost Total $502,270 $200,800 $200,800 $146,500 $146,000 $146,000 Data provided for illustrative purposes only. Your results will vary.
  • 16. Challenges 1. Fragmented market 2. Lack of focus, experience or expertise 3. All-or-nothing offerings
  • 17. McAfee’s Unique Position Instant Access Real-Time Protection Peace of Mind DIVERSITY – Broadest Security-as-a-Service portfolio in the industry RELIABILITY – Real-time protection with Global Threat Intelligence FLEXIBILITY – Deployment options to fit your dynamic business Security-as-a-Service
  • 18. Broadest SaaS Portfolio in the Industry Real-time Protection with Global Threat Intelligence Global Threat Intelligence™ http:// ! McAfee SaaS Management Console Email  Email Website PCI  Vulnerability Endpoint Web Email Continuity Archiving Certification Compliance Assessment Multi‐tenant , Scalable Service Platform
  • 19. McAfee Delivers Flexible Security Deployment options to fit your dynamic business Security-as-a-Service Software Appliance
  • 20. Flexible Options for Email Protection & Compliance Hybrid Delivery / Layered Security INBOUND OUTBOUND Email Gateway
  • 21. McAfee’s Cloud Strategy SECURITY FROM THE CLOUD SECURITY IN THE CLOUD SECURITY FOR THE CLOUD
  • 22. Global Threat Intelligence Spans the entire Internet Providing reputation including millions of based capabilities sensors Across all threat Dedicated GTI vectors research team Real-time “in the cloud” threat Complete suite of endpoint and collection and distribution model network research products 22
  • 23. The Protection Gap 1–24 4–8 2–8 4–8 1–24 Hrs Hrs Hrs Hrs Hrs t0 t1 t2 t3 t4 Malware Malware Protection Protection Protection in the Wild Discovered Available Downloaded Deployed Protection Gap of 24–72 Hours with Current Solutions
  • 24. Compressing the Protection Gap 1–60 1 15 0 1–10 Min. Sec. Min. Sec. Sec. t0 t1 t2 t3 t4 Malware Malware Protection Protection Protection in the Wild Discovered Available Downloaded Deployed
  • 25. Compressing the Protection Gap ~15 Min. t0 t1 t2 t3 t4 Malware Malware Protection Protection Protection in the Wild Discovered Available Downloaded Deployed
  • 26. New Paradigm 0 Min. t0* t0 Protection Malware Is in the Deployed Wild
  • 27. Korean DDoS Attack GTI Thwarting a DDoS Attack Deviation 5000% 4000% 3000% Reputation Class 2000% 1000% 0% Deviation from average message count Deviation from average connection count July 4th DDoS July 4th 2009: 200,000 zombie Korean botnet launches DDoS against US and South Korean government sites
  • 28. McAfee’s Cloud Strategy SECURITY FROM THE CLOUD SECURITY IN THE CLOUD SECURITY FOR THE CLOUD
  • 29.
  • 30. What cloud END USERS want...  Secure cloud infrastructure  Providers implement current & future cloud standards  Third-party certification  Automation of auditing & security  More transparency
  • 31. Existing Standards for Cloud Providers
  • 32. Information Certification is NOT enough Must test for technology vulnerabilities • Daily third-party security validation • Updated with latest vulnerabilities • Quick remediation • Automate compliance • Easy-to-deploy and maintain
  • 33. McAfee Cloud Secure Program TE ST + ED 25 -M Cloud Security Certification McAfee Cloud Secure AR •ISO/IEC 27001 & 27002 • Over 15,000 vulnerabilities tested •SAS70 Type II • Automated Security Audits • Infrastructure •Gap Analysis • Network Perimeter •Readiness Assessments • Application •Certification Planning • Remediation Management •Implementation and Training • Intelligent Network Discovery •Annual Renewal • Discovery of hosts, services and devices • Daily Scan and Audit Report
  • 34. McAfee’s Cloud Strategy SECURITY FROM THE CLOUD SECURITY IN THE CLOUD SECURITY FOR THE CLOUD
  • 35. In today’s environment, Cloud computing is not just for scaling your business, but also protecting it
  • 36.