SlideShare a Scribd company logo
1 of 31
McAFEE AND McAFEE PARTNER USE
McAfee MVISION
Security Management
Simplify. Accelerate. Orchestrate.
Jorge Ernesto Sánchez Andrade | SE Perú & Bolivia
2McAFEE AND McAFEE PARTNER USE
New strategic charter and turning point for the McAfee portfolio focuses on making
our products simpler to deploy and use, and even more interoperable with third-party
solutions and multiple platforms
https://www.mcafee.com/enterprise/en-us/solutions/mvision.html
3McAFEE AND McAFEE PARTNER USE
Cloud-Native
Insight-Driven
Open Architecture
The first cloud-based product family that protects
data and stops threats across devices, networks,
clouds (IaaS, PaaS, and SaaS), and on-premises
environments.
#ProtectionPeru2019
4McAFEE AND McAFEE PARTNER USE
Simple
Modern SaaS infrastructure, streamlined workspaces
and consolidated policies
Flexible
Incorporate existing investments
including native and 3rd-party controls
Comprehensive
Defend your diverse ecosystem and
drill-down into contextual insights
Fast
Accomplish more with less effort through tactical
automation and AI guidance
Clarity to act. Simplicity to execute.
Devices Cloud
Clarity to act
Control where it matters most
SOC
Simplicity to execute
5McAFEE AND McAFEE PARTNER USE
MVISION ePO
A dramatically simple cloud-based SaaS
management service.
MVISION Endpoint
Advanced augmented defense for Windows 10
with a unified management experience.
MVISION EDR
Powerful threat detection, investigation, and
response – simplified.
MVISION Cloud
Cloud-Native Data and Application Security
Across SaaS, IaaS, and PaaS.
MVISION Mobile
Centrally manage and defend IOS and Android just
like any other device.
6McAFEE AND McAFEE PARTNER USE
DRAMATICALLY SIMPLE
• Zero Deployment
• Up in minutes, migrate in days
• Continuous updates
• Enhanced customer
experience
• New security posture
dashboard
COMPREHENSIVE DEVICE SECURITY
• Concentrate on
critical security
• McAfee Device Security
• McAfee MVISION Endpoint or ENS
• Augment Windows
Defender
#ProtectionPeru2019
7McAFEE AND McAFEE PARTNER USE
Over 74% of F100 using ePO with over 60M nodes
Proven advanced security management
OPEN EXTENSIBLE PLATFORMAUTOMATED RESPONSE AND
REMEDIATION
INTEGRATED PANE OF
GLASS
McAfee MVISION ePO
7McAFEE AND McAFEE PARTNER USE
Cloud Deployment Options
#ProtectionPeru2019
8McAFEE AND McAFEE PARTNER USE
Easy to Use, Intuitive Management Dashboard
Easily navigate to urgent
needs
Get details on threats, your security
posture, processes, devices and actions
taken
9McAFEE AND McAFEE PARTNER USE
Single
Management ExperienceMcAfee Advanced Protection
Machine learning
Fileless defense
Rollback
Windows 10
Anti-Malware, Exploit
Guard and Firewall
+ THEIRS
Why McAfee MVISION Endpoint?
I need to augment my Microsoft investment, but I don’t want additional security consoles.
Fast, simple deployment | No additional complexity | Superior security posture
OURS = YOURS
10McAFEE AND McAFEE PARTNER USE
The Benefits of Native Security
Why adoption is increasing
Signature-based defenses within the Operating System offload the need for a
solution to protect against known threats
As part of an existing investment, time and money can be
saved by leveraging them
The impact to networks and bandwidth can be
reduced with less frequent updates
Minimal impact to users and productivity
11McAFEE AND McAFEE PARTNER USE
A Way to Effectively Leverage Native Security is Missing
No converged management for native
and advanced defenses
Multiple products,
vendors, management tools
and software bloat
Limited to no options for integrating third
parties
Manual maintenance
and patching
How many hours a week would you save with consolidated management?
#ProtectionPeru2019
12McAFEE AND McAFEE PARTNER USE
What can MVISION Endpoint do for you?
Centralize management
across your entire environment
Speed up remediation with a
simplified, contextual user interface
Leverage your existing investment,
improve your TCO
Save time with simplified, cohesive
policy management
Low impact, balanced performance for your users
13McAFEE AND McAFEE PARTNER USE
Centralized Management
McAfee
Advanced
Protection
Traditional
Native
Security
Windows Defender*
McAfee MVISION Endpoint
Reduced Complexity = Reduced TCO
Always Up-to-date Security
Regular Automatic updates
Single Threat Protection Policy
Optimized, Rationalized and Unified
Simplified UX
Fewer Clicks, Outcome visibility
Lightweight security
Up to 75% Smaller footprint
On-Prem | On AWS | Multi-tenant SaaS
Lightweight Common Agent
Antivirus Firewall Exploit Guard
Machine
Learning
Reputation/Script
Scanning
Credential Theft
Prevention
Remediation
14McAFEE AND McAFEE PARTNER USE
McAfee enables organizations to accelerate their
business by giving them total control over their data
in the cloud
Gain complete visibility into data, context, and user
behavior across all cloud services, users, and devices
Take real-time action to enforce policies across cloud
services and apply persistent data protection
Remediate security threats by eliminating security
misconfigurations and correcting high-risk user
activities.
15McAFEE AND McAFEE PARTNER USE
Network security fails to protect data in the cloud & mobile era
Data created natively in
cloud is invisible to network
security
Data uploaded to cloud from
mobile is invisible to network
security
50% of cloud traffic is cloud-to-
cloud and invisible to network
security
16McAFEE AND McAFEE PARTNER USE
McAfee MVISION Cloud Architecture
Ground Link
Sky Gateway
Email Mode
Sky Gateway
Universal Mode
Lightning Link
Sky Link
17McAFEE AND McAFEE PARTNER USE
Enforce data loss prevention (DLP) policies
across data in the cloud
Prevent unauthorized sharing of sensitive data
with the wrong people
Block sync/download of corporate data to
personal devices
Detect compromised accounts, insider threats,
and malware
Encrypt cloud data with encryption keys that
only you control
Audit and tighten the security settings of cloud
services
Understand cloud services in use and their risk
profile
18McAFEE AND McAFEE PARTNER USE
Detection engine uses machine learning and behavioral analysis to provide real-time, on-device
protection against both known and unknown threats
Device Attacks Network Attacks Application Attacks
19McAFEE AND McAFEE PARTNER USE
Our Digital Life
Personal Life Work Life
20McAFEE AND McAFEE PARTNER USE
Mobile Threats are Real
In 2017, Apple and Google released record number of security patches1
Two-thirds of mobile devices are running vulnerable operating systems2
10% of devices have experienced “man-in-the-middle” attacks3
By 2019, mobile malware will amount to 1/3 of total malware2
1 CVE.Mitre.org. CVEDetails.com: Android and iOS CVEs
2 Zimperium Global Threat Intelligence, 3Q 2017
3 Market Guide for Mobile Threat Defense Solutions, Gartner, 22 August 2017, ID: G00314969
21McAFEE AND McAFEE PARTNER USE
MVISION Mobile Protection
Proactive Threat Detection
Automated Risk & Vulnerability
Assessment
DEVICE
OS Exploit Detection
Device Forensics
USB Exploit Detection
Vulnerability & Risk
APPLICATION
Malware Detection
App Risk Analysis
App Privacy Analysis
App Forensic Reports
NETWORK
Reconnaissance Scans
Man-in-the-Middle Attacks
SSL Decryption / Stripping
Rogue Access Points
Unsecured WiFi
Proactive warning of previously
attacked networks
22McAFEE AND McAFEE PARTNER USE
MVISION Mobile Solution Overview
MVISION Mobile Console
MVISION ePolicy Orchestrator
MVISION Mobile AppMDM/EMM Console
23McAFEE AND McAFEE PARTNER USE
MVISION Mobile ePO Integration
Compliance Reporting
• Mobile Threat Data
• Threat Event Details
• Most Attacked Networks
• Risk Management
• Device Information
• OS Distribution
• MVISION Version
• Vulnerable OS
• Upgradeable OS
• Non-Upgradeable OS
24McAFEE AND McAFEE PARTNER USE
Do more with existing staff by reducing the expertise and effort
needed to perform investigations
Detect& act on advanced threats faster to stop breaches and
improve security posture
Respond with speed using one console, single-click containment and
ecosystem integration
25McAFEE AND McAFEE PARTNER USE
What is MVISION EDR?
McAfee Active Response
Endpoint visibility and data
collection
Suspicious behavior
detection
Fast search
Robust response
McAfee Investigator
Dynamic Investigation
Guides
Automated Analysis
Enterprise-wide data
collection
Enhancements
Simplified, cloud-centric
architecture
Extended data collection
and retention
MITRE ATT&CK™
framework driven
identification and mapping
MVISION EDR
Powerful threat detection,
investigation, and response
- simplified
26McAFEE AND McAFEE PARTNER USE
27McAFEE AND McAFEE PARTNER USE
Detect Threats and Act Faster
 Detection based on and mapped to the MITRE ATT&CK™
framework
 Faster, consistent process to determine phase of a threat, associated
risk, and response priority
 Alert ranking speeds triage by helping analysts understand risk
severity
 Data visualization helps analysts quickly understand why an alert was
raised and determine next steps: dismiss, respond, investigate.
 Behavior-based
 File-based and fileless threats
 Prevalence
 Rapid adoption of new analytics engines and techniques
Response
MVISION EDR
Endpoint
Continuous
monitoring
28McAFEE AND McAFEE PARTNER USE
McAfee’s Approach to EDR
Faster resolution with higher fidelity
Respond
Validate
High Confidence
Gather Data / Assess / Scope
Dynamic, Guided
Investigation
Alert
Analytics
Data/Context
Data
Hunting
29McAFEE AND McAFEE PARTNER USE
Do More with Existing Staff
Expert system dynamically guides investigation
Surface Findings
Automatically gather, summarize, and
visualize evidence from multiple sources.
Automatically ask and answer questions
to prove or disprove the hypotheses.
Dynamically adjust to case at hand,
combine different strategies and data.
Explore many hypotheses in parallel for
maximum speed and accuracy.
Faster resolution with higher fidelity
30McAFEE AND McAFEE PARTNER USE
Respond with Speed
Increase efficiency with a single workspace for entire the
process: detection-investigation-response
Quickly take action at scale with a clear understanding of the threat
Integration optimizes security operationsworkflow
#ProtectionPeru2019
McAfee, the McAfee logo, ePolicy Orchestrator and ePO are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries.
Other marks and brands may be claimed as the property of others.
Copyright © 2018 McAfee, LLC.
#ProtectionPeru2019

More Related Content

What's hot

Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportIftikhar Ali Iqbal
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDRAPIsecure_ Official
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture DesignPriyanka Aash
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Qradar - Reports.pdf
Qradar - Reports.pdfQradar - Reports.pdf
Qradar - Reports.pdfPencilData
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsOWASP Delhi
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfParishSummer
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)Iftikhar Ali Iqbal
 

What's hot (20)

Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
mobile application security
mobile application securitymobile application security
mobile application security
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Cloudflare
CloudflareCloudflare
Cloudflare
 
Qradar - Reports.pdf
Qradar - Reports.pdfQradar - Reports.pdf
Qradar - Reports.pdf
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
 

Similar to Cloud Security Strategy by McAfee

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overviewsferinga
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overviewsferinga
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aIgor Pandzic
 
seqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqriteseo
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxfrancis578223
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
ds-threat-intelligence-exchange
ds-threat-intelligence-exchangeds-threat-intelligence-exchange
ds-threat-intelligence-exchangeRobert D. Diaz
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CloudIDSummit
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudInsight
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate BrochureQualys
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqriteseo
 
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...Amazon Web Services
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide Lauren Bell
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudAlert Logic
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudAlert Logic
 

Similar to Cloud Security Strategy by McAfee (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01a
 
seqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdf
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
ds-threat-intelligence-exchange
ds-threat-intelligence-exchangeds-threat-intelligence-exchange
ds-threat-intelligence-exchange
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public Cloud
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
 

More from Cristian Garcia G.

Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyCristian Garcia G.
 
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCiberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCristian Garcia G.
 
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadReducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadCristian Garcia G.
 
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Cristian Garcia G.
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACristian Garcia G.
 
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Cristian Garcia G.
 
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterProtección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterCristian Garcia G.
 
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoLa Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoCristian Garcia G.
 
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Cristian Garcia G.
 
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cristian Garcia G.
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoCristian Garcia G.
 
La crisis de identidad que se avecina
La crisis de identidad que se avecinaLa crisis de identidad que se avecina
La crisis de identidad que se avecinaCristian Garcia G.
 
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoSimplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoCristian Garcia G.
 
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Cristian Garcia G.
 
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCStay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCCristian Garcia G.
 
La evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteLa evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteCristian Garcia G.
 
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Cristian Garcia G.
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Cristian Garcia G.
 

More from Cristian Garcia G. (20)

Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously Easy
 
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCiberseguridad Alineada al Negocio
Ciberseguridad Alineada al Negocio
 
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadReducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridad
 
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
Symantec Enterprise Cloud
Symantec Enterprise CloudSymantec Enterprise Cloud
Symantec Enterprise Cloud
 
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
 
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterProtección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-Datacenter
 
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoLa Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
 
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
 
Gestión de la Exposición
Gestión de la ExposiciónGestión de la Exposición
Gestión de la Exposición
 
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
 
La crisis de identidad que se avecina
La crisis de identidad que se avecinaLa crisis de identidad que se avecina
La crisis de identidad que se avecina
 
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoSimplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
 
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
 
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCStay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
 
La evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteLa evolución de IBM Qradar Suite
La evolución de IBM Qradar Suite
 
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Cloud Security Strategy by McAfee

  • 1. McAFEE AND McAFEE PARTNER USE McAfee MVISION Security Management Simplify. Accelerate. Orchestrate. Jorge Ernesto Sánchez Andrade | SE Perú & Bolivia
  • 2. 2McAFEE AND McAFEE PARTNER USE New strategic charter and turning point for the McAfee portfolio focuses on making our products simpler to deploy and use, and even more interoperable with third-party solutions and multiple platforms https://www.mcafee.com/enterprise/en-us/solutions/mvision.html
  • 3. 3McAFEE AND McAFEE PARTNER USE Cloud-Native Insight-Driven Open Architecture The first cloud-based product family that protects data and stops threats across devices, networks, clouds (IaaS, PaaS, and SaaS), and on-premises environments. #ProtectionPeru2019
  • 4. 4McAFEE AND McAFEE PARTNER USE Simple Modern SaaS infrastructure, streamlined workspaces and consolidated policies Flexible Incorporate existing investments including native and 3rd-party controls Comprehensive Defend your diverse ecosystem and drill-down into contextual insights Fast Accomplish more with less effort through tactical automation and AI guidance Clarity to act. Simplicity to execute. Devices Cloud Clarity to act Control where it matters most SOC Simplicity to execute
  • 5. 5McAFEE AND McAFEE PARTNER USE MVISION ePO A dramatically simple cloud-based SaaS management service. MVISION Endpoint Advanced augmented defense for Windows 10 with a unified management experience. MVISION EDR Powerful threat detection, investigation, and response – simplified. MVISION Cloud Cloud-Native Data and Application Security Across SaaS, IaaS, and PaaS. MVISION Mobile Centrally manage and defend IOS and Android just like any other device.
  • 6. 6McAFEE AND McAFEE PARTNER USE DRAMATICALLY SIMPLE • Zero Deployment • Up in minutes, migrate in days • Continuous updates • Enhanced customer experience • New security posture dashboard COMPREHENSIVE DEVICE SECURITY • Concentrate on critical security • McAfee Device Security • McAfee MVISION Endpoint or ENS • Augment Windows Defender #ProtectionPeru2019
  • 7. 7McAFEE AND McAFEE PARTNER USE Over 74% of F100 using ePO with over 60M nodes Proven advanced security management OPEN EXTENSIBLE PLATFORMAUTOMATED RESPONSE AND REMEDIATION INTEGRATED PANE OF GLASS McAfee MVISION ePO 7McAFEE AND McAFEE PARTNER USE Cloud Deployment Options #ProtectionPeru2019
  • 8. 8McAFEE AND McAFEE PARTNER USE Easy to Use, Intuitive Management Dashboard Easily navigate to urgent needs Get details on threats, your security posture, processes, devices and actions taken
  • 9. 9McAFEE AND McAFEE PARTNER USE Single Management ExperienceMcAfee Advanced Protection Machine learning Fileless defense Rollback Windows 10 Anti-Malware, Exploit Guard and Firewall + THEIRS Why McAfee MVISION Endpoint? I need to augment my Microsoft investment, but I don’t want additional security consoles. Fast, simple deployment | No additional complexity | Superior security posture OURS = YOURS
  • 10. 10McAFEE AND McAFEE PARTNER USE The Benefits of Native Security Why adoption is increasing Signature-based defenses within the Operating System offload the need for a solution to protect against known threats As part of an existing investment, time and money can be saved by leveraging them The impact to networks and bandwidth can be reduced with less frequent updates Minimal impact to users and productivity
  • 11. 11McAFEE AND McAFEE PARTNER USE A Way to Effectively Leverage Native Security is Missing No converged management for native and advanced defenses Multiple products, vendors, management tools and software bloat Limited to no options for integrating third parties Manual maintenance and patching How many hours a week would you save with consolidated management? #ProtectionPeru2019
  • 12. 12McAFEE AND McAFEE PARTNER USE What can MVISION Endpoint do for you? Centralize management across your entire environment Speed up remediation with a simplified, contextual user interface Leverage your existing investment, improve your TCO Save time with simplified, cohesive policy management Low impact, balanced performance for your users
  • 13. 13McAFEE AND McAFEE PARTNER USE Centralized Management McAfee Advanced Protection Traditional Native Security Windows Defender* McAfee MVISION Endpoint Reduced Complexity = Reduced TCO Always Up-to-date Security Regular Automatic updates Single Threat Protection Policy Optimized, Rationalized and Unified Simplified UX Fewer Clicks, Outcome visibility Lightweight security Up to 75% Smaller footprint On-Prem | On AWS | Multi-tenant SaaS Lightweight Common Agent Antivirus Firewall Exploit Guard Machine Learning Reputation/Script Scanning Credential Theft Prevention Remediation
  • 14. 14McAFEE AND McAFEE PARTNER USE McAfee enables organizations to accelerate their business by giving them total control over their data in the cloud Gain complete visibility into data, context, and user behavior across all cloud services, users, and devices Take real-time action to enforce policies across cloud services and apply persistent data protection Remediate security threats by eliminating security misconfigurations and correcting high-risk user activities.
  • 15. 15McAFEE AND McAFEE PARTNER USE Network security fails to protect data in the cloud & mobile era Data created natively in cloud is invisible to network security Data uploaded to cloud from mobile is invisible to network security 50% of cloud traffic is cloud-to- cloud and invisible to network security
  • 16. 16McAFEE AND McAFEE PARTNER USE McAfee MVISION Cloud Architecture Ground Link Sky Gateway Email Mode Sky Gateway Universal Mode Lightning Link Sky Link
  • 17. 17McAFEE AND McAFEE PARTNER USE Enforce data loss prevention (DLP) policies across data in the cloud Prevent unauthorized sharing of sensitive data with the wrong people Block sync/download of corporate data to personal devices Detect compromised accounts, insider threats, and malware Encrypt cloud data with encryption keys that only you control Audit and tighten the security settings of cloud services Understand cloud services in use and their risk profile
  • 18. 18McAFEE AND McAFEE PARTNER USE Detection engine uses machine learning and behavioral analysis to provide real-time, on-device protection against both known and unknown threats Device Attacks Network Attacks Application Attacks
  • 19. 19McAFEE AND McAFEE PARTNER USE Our Digital Life Personal Life Work Life
  • 20. 20McAFEE AND McAFEE PARTNER USE Mobile Threats are Real In 2017, Apple and Google released record number of security patches1 Two-thirds of mobile devices are running vulnerable operating systems2 10% of devices have experienced “man-in-the-middle” attacks3 By 2019, mobile malware will amount to 1/3 of total malware2 1 CVE.Mitre.org. CVEDetails.com: Android and iOS CVEs 2 Zimperium Global Threat Intelligence, 3Q 2017 3 Market Guide for Mobile Threat Defense Solutions, Gartner, 22 August 2017, ID: G00314969
  • 21. 21McAFEE AND McAFEE PARTNER USE MVISION Mobile Protection Proactive Threat Detection Automated Risk & Vulnerability Assessment DEVICE OS Exploit Detection Device Forensics USB Exploit Detection Vulnerability & Risk APPLICATION Malware Detection App Risk Analysis App Privacy Analysis App Forensic Reports NETWORK Reconnaissance Scans Man-in-the-Middle Attacks SSL Decryption / Stripping Rogue Access Points Unsecured WiFi Proactive warning of previously attacked networks
  • 22. 22McAFEE AND McAFEE PARTNER USE MVISION Mobile Solution Overview MVISION Mobile Console MVISION ePolicy Orchestrator MVISION Mobile AppMDM/EMM Console
  • 23. 23McAFEE AND McAFEE PARTNER USE MVISION Mobile ePO Integration Compliance Reporting • Mobile Threat Data • Threat Event Details • Most Attacked Networks • Risk Management • Device Information • OS Distribution • MVISION Version • Vulnerable OS • Upgradeable OS • Non-Upgradeable OS
  • 24. 24McAFEE AND McAFEE PARTNER USE Do more with existing staff by reducing the expertise and effort needed to perform investigations Detect& act on advanced threats faster to stop breaches and improve security posture Respond with speed using one console, single-click containment and ecosystem integration
  • 25. 25McAFEE AND McAFEE PARTNER USE What is MVISION EDR? McAfee Active Response Endpoint visibility and data collection Suspicious behavior detection Fast search Robust response McAfee Investigator Dynamic Investigation Guides Automated Analysis Enterprise-wide data collection Enhancements Simplified, cloud-centric architecture Extended data collection and retention MITRE ATT&CK™ framework driven identification and mapping MVISION EDR Powerful threat detection, investigation, and response - simplified
  • 26. 26McAFEE AND McAFEE PARTNER USE
  • 27. 27McAFEE AND McAFEE PARTNER USE Detect Threats and Act Faster  Detection based on and mapped to the MITRE ATT&CK™ framework  Faster, consistent process to determine phase of a threat, associated risk, and response priority  Alert ranking speeds triage by helping analysts understand risk severity  Data visualization helps analysts quickly understand why an alert was raised and determine next steps: dismiss, respond, investigate.  Behavior-based  File-based and fileless threats  Prevalence  Rapid adoption of new analytics engines and techniques Response MVISION EDR Endpoint Continuous monitoring
  • 28. 28McAFEE AND McAFEE PARTNER USE McAfee’s Approach to EDR Faster resolution with higher fidelity Respond Validate High Confidence Gather Data / Assess / Scope Dynamic, Guided Investigation Alert Analytics Data/Context Data Hunting
  • 29. 29McAFEE AND McAFEE PARTNER USE Do More with Existing Staff Expert system dynamically guides investigation Surface Findings Automatically gather, summarize, and visualize evidence from multiple sources. Automatically ask and answer questions to prove or disprove the hypotheses. Dynamically adjust to case at hand, combine different strategies and data. Explore many hypotheses in parallel for maximum speed and accuracy. Faster resolution with higher fidelity
  • 30. 30McAFEE AND McAFEE PARTNER USE Respond with Speed Increase efficiency with a single workspace for entire the process: detection-investigation-response Quickly take action at scale with a clear understanding of the threat Integration optimizes security operationsworkflow #ProtectionPeru2019
  • 31. McAfee, the McAfee logo, ePolicy Orchestrator and ePO are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. Copyright © 2018 McAfee, LLC. #ProtectionPeru2019