SlideShare a Scribd company logo
McAfee Confidentiality Language
Securing Cloud Workloads
Larry Kovalsky – Director Federal Sales Engineering
The New McAfee
Strategic partnership with TGP
Intel is proud to partner with TPG to create one of the largest
independent, pure play cybersecurity companies in the world:
51% controlling
interest
49% retained
interest
How did we get here?
3
MAINFRAMES PCs
CLIENT/
SERVER INTERNET CLOUD
1970s
Pro – Efficient
Con – Slow to
Change
1980s
Pro – Quick to
change
Con – Expensive,
loss of control of
data
1990s
Pro – Quick to
change and
better data
control
Con – Expensive
to support
2000s
Pro – Quick to
change
Con – Tough to
support
Today
Pro – Efficient, quick to
change
Con – Paradigm shift
Persistent Goal: Efficient systems that respond to the business
“If you think you’ve seen this movie before, you are right. Cloud computing is based on the time-sharing model we leveraged years ago
before we could afford our own computers. The idea is to share computing power among many companies and people, thereby reducing
the cost of that computing power to those who leverage it. The value of time share and the core value of cloud computing are pretty much
the same, only the resources these days are much better and more cost effective.” – David Linthicum
Why the Push to the Cloud?
• Elasticity / Agility/ Self-Service / Ease of Provisioning / Deployment
• CapEx vs. OpEx
Capital Expense (CapEx) can be unpredictable and painful
Perception that that the cloud is more cost-effective
• Talent is expensive and hard to find
Cloud allows the delivery of IT Services without the labor and technology costs
associated with maintaining complex computer systems
Pros:
Challenges:
• Fundamental Change to Business Model/Cultural Change
• Acquisition/SLA Headaches
• Security Requirements
5
Source: AWS Security Best Practices Guide
Deployment Models
Public Cloud
• Elasticity
• Utility Pricing
• Leverage
Expertise
Community Cloud
• Meets shared concerns
Hybrid Cloud
• Meets shared
On-Premise/
Private Cloud
• Total Control
• Regulation
• Flexibility
Security Challenges in Hybrid Cloud
On-Prem DC/Private Cloud
1. Performance bottlenecks
1. Performance storms (esp. with all VDI instances updating DAT
at the same time)
2. Reduced VM Density – Fewer VMs allocated per hardware to account
for bottleneck
3. Network Visibility/SDDC/NFV ?
Public Cloud
1. Poor workload visibility, especially when LOB/Dev access and operate
Cloud directly. Security posture often falls short of best practices when
managed by personnel without IT Sec skills.
2. Expanded threat surface that extends beyond VMs into cloud platform
configuration (i.e. Security groups, Disk encryption, IAM)
3. Network Visibility?
Hybrid Cloud
1. Management Complexity - advent of many Cloud Platforms in the Hybrid DC makes it difficult to manage security using same
controls & policies
2. Security tools in Silos - Server security & Network security technologies operated by different personnel and there isn't much
threat sharing, leading to poor threat detection.
McAfee ePolicy Orchestrator (ePO) Cloud Workload
Discovery
8
Instant Visibility Into Security Posture
Public Cloud
Compute Network Storage
Virtual Machines
Templates
Tags
VPC/vNet
Firewall (Security
Groups)
Traffic
Block Storage
Volumes
Encryption Keys
`
Antivirus Host Firewall Intrusion
Prevention
Application
Whitelisting
Integrity
Monitoring
Encryption
Management
Machine
Learning
Application
Containment
ADD-ONS
DevOps-friendly Deployment
Advanced Memory Protection
McAfee Endpoint - Discovery to Complete Protection
9
Comprehensive cloud workload protection - For Windows and Linux
Choose the Right Security Profile
10
Adequate protection and compliance for all cloud workloads
Dev-Test
Workloads
Traditional
Workloads
Cloud-Native
Workloads
Compliance
Workloads
Firewall Must-Have Must-Have Must-Have Must-Have
Antivirus Good-to-Have Must-Have Good-to-Have Must-Have
Encryption Optional Must-Have Must-Have Must-Have
Application Control Optional Good-to-Have Must-Have Must-Have
File Integrity Mon Optional Optional Must-Have Must-Have
Host IPS Optional Optional Optional Must-Have
Flexible Options for Cloud Workload Security
11
Hybrid Solution Perpetual Licensing Usage Based Licensing
Server Security Suite Essentials Server Security Suite Advanced Public Cloud Server Security
McAfee ePO console McAfee ePO console McAfee ePO console
Cloud Workload Discovery for hybrid cloud
(VMware, OpenStack, AWS & Azure)
Cloud Workload Discovery for hybrid cloud
(VMware, OpenStack, AWS & Azure)
Cloud Workload Discovery for public cloud
(AWS & Azure)
Anti-malware (Optimized for VMs) Anti-malware (Optimized for VMs) Anti-malware
Firewall Firewall Firewall
Host Intrusion Prevention Host Intrusion Prevention Host Intrusion Prevention
Application Whitelisting Application Whitelisting
File Integrity Monitoring File Integrity Monitoring
12
McAfee Network Intrusion Prevention
Signature-less Technologies
Analyze
Sandboxing
Static Code Analysis
Sandboxing
Dynamic Analysis
Analyze
Unpacking
Disassembly of Code
Calculate Latent Code
Familial Resemblance
Run Time
DLLs
Network
Operations
File
Operations
Process
Operations
Delayed
Execution
Emulation and
Deep File Analysis
GAM (Browser)
JavaScript
Adobe PDF
Adobe Flash
2017 IPS
Magic Quadrant 10+ years “Recommended” from NSS Labs 5+ years
• Delivered with
CloudFormation
Template
• Ansible/Chef/Puppet
Built in Security
• Automatic client
based load balancer
• Integrated with
AutoScale
Load Balanced
• Inline IPS/IDS
• Security Group
• CloudTrail/VPC logs
Built for the Cloud
• Ready for
Orchestration
• Live Update of
Sensors & Agents
• Flexible License
Low OpEx/CapEX
• Micro-segmentation
across heterogeneous
cloud
• App Fencing
Virtual Overlay Network Single Console
• Single NSM to manage
appliance, OpenStack,
VMware & AWS
• Manage from AWS or
On-Prem
• Monitor user access
across cloud
McAfee Virtual Network Security Platform (vNSP)
Security for Public and Private Cloud
Availability
Zone #1
Security Group
McAfee
Virtual Network
Sensor
Network Security Platform
VPC
Peering
Internet
Gateway
Internet
Elastic Load
Balancing
VPC Flow-logs
Cloudtrail
Amazon
Inspector
Availability
Zone #2
McAfee
Virtual Network
Sensor
Admin
Network
Security
Manager
McAfee
Virtual Network
Sensor
NS Series
Sensor
On-Premises
Customer Gateway
VPN
Network
Security
Manager
Cloud Workload
Discovery
Controller
Network Security Platform
Security Group
North-South Traffic
East-West Traffic
McAfee ePO
Centralized Data Governance
Verify API availability
Cover Endpoints, Networks, and Cloud Environments
DLP Endpoint
Encryption
Endpoint Data Protection
Network Data Protection
Data Repositories
DLP Discover/DLP
Monitor
Firewall
DLP Prevent Email & Web Gateway
InternetDLP Monitor Switch
Security’s Perfect Storm
The ultimate challenge facing practitioners
Threats continue to rise
while mobility and
cloud erode our control
Increasing Complexity
Comprehension and
response cannot
happen fast enough
Time Imperative Resource Constraints
There’s not enough
people or $$$ to throw
at the problem
Growing need to resolve more threats, faster and with fewer resources
Open Ecosystem – But How?
Proprietary Integrations create Complexity and point of Failure
Result
• Proprietary Integrations
• Version and Use Case Depended
• Point of Failure
• Complex n x (n-1)
API-BASED INTEGRATIONS
Open Ecosystem – Data Exchange Layer (DXL)
Standardize integration and communication to break down operational silos
Result
• Proprietary Integrations
• Version and Use Case Depended
• Point of Failure
• Complex n x (n-1)
Result
• Standardized Communication
• Real Time Information Exchange
• API and Version independent
• Open (SIA Partner)
• Open DXL (Github)
API-BASED INTEGRATIONS COLLABORATIVE “OPEN” ECOSYSTEM
(DXL)
Shared Intelligence: Threat Intelligence Exchange
Enhances Security with adaptive threat prevention
Centralized Visibility
and Control
Incident response knowledgebase
Local prevalence intelligence
Integrated
Sensor Module
Execution-time reputation
inspection and protection
Open, Connected Ecosystem
Network, gateway, endpoint, and
cloud-based countermeasures
and intelligence
Data Exchange
Layer
Ultra-fast persistent
bidirectional
messaging fabric
TIE
Server
McAfee
Security
Solutions
3rd Party
Partners
Threat
Intelligence
Feeds
TIE Consumers
McAfee, the McAfee logo and [insert <other relevant McAfee Names>] are trademarks or registered trademarks of McAfee LLC or its subsidiaries in the U.S. and/or other countries.
Other names and brands may be claimed as the property of others.
Copyright © 2017 McAfee LLC.
20

More Related Content

PPTX
stackArmor Security MicroSummit - Next Generation Firewalls for AWS
PPTX
Application Centric DevOps
PDF
Introduction to IAC and Terraform
PPTX
The Elephant in the Cloud: Bring True Cloud Economics to Hadoop/BigInsights
PPTX
Introduction to Cloudify for OpenStack users
PPT
GoGrid/AppZero: "Moving Windows Server Applications to the Cloud in 3 Easy St...
PDF
From Docker Straight to AWS
PPTX
AWS EKS Security Best Practices
stackArmor Security MicroSummit - Next Generation Firewalls for AWS
Application Centric DevOps
Introduction to IAC and Terraform
The Elephant in the Cloud: Bring True Cloud Economics to Hadoop/BigInsights
Introduction to Cloudify for OpenStack users
GoGrid/AppZero: "Moving Windows Server Applications to the Cloud in 3 Easy St...
From Docker Straight to AWS
AWS EKS Security Best Practices

What's hot (9)

PDF
DevOps on AWS: A Practical Introduction
PDF
What A No Compromises Hybrid Cloud Looks Like
PPTX
Strengthening Operations with Splunk and AWS CloudTrail
PDF
Understanding the New Enterprise Multi-Cloud Backbone for DevOps Engineers
PPTX
Shift Left - How to improve your security with checkov before it’s going to p...
PPTX
Automating your OpenStack environment with Chef, Puppet and Cloudify
PDF
Azure Sphere
PPTX
How Autodesk Leverages Splunk as an Assurance Platform on AWS
PDF
PaaS: An Introduction
DevOps on AWS: A Practical Introduction
What A No Compromises Hybrid Cloud Looks Like
Strengthening Operations with Splunk and AWS CloudTrail
Understanding the New Enterprise Multi-Cloud Backbone for DevOps Engineers
Shift Left - How to improve your security with checkov before it’s going to p...
Automating your OpenStack environment with Chef, Puppet and Cloudify
Azure Sphere
How Autodesk Leverages Splunk as an Assurance Platform on AWS
PaaS: An Introduction
Ad

Similar to stackArmor - Security MicroSummit - McAfee (20)

PPTX
Why Cloud Management Makes Sense
PPTX
Greg Dixon - 2011 ScanSource POS & Barcoding Partner Conference
PPT
Cloud Computing 2010 - EMC - Bruno Melandri
PPTX
VMware - Flash-as-a-Service - Achieve Flash Performance with Cloud Economics
PDF
Building Cloud capability for startups
PPTX
Cloud Computing for Small & Medium Businesses
PDF
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
PPTX
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
PDF
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
PDF
System Security on Cloud
PPT
Cloud Computing Introduction
PPT
Celera Networks on Cloud Computing
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PPTX
Ohio LinuxFest: Crash Course in Open Source Cloud Computing
PPT
Cloudcamp- The World Wide Cloud
PPTX
Rik Ferguson
PDF
Accelerate Digital Transformation with IBM Cloud Private
PPTX
HCI ECOCAST
PPTX
Live Cloudera Cybersecurity Solution Demo
PPTX
Building a Hybrid Cloud The Real Deal
Why Cloud Management Makes Sense
Greg Dixon - 2011 ScanSource POS & Barcoding Partner Conference
Cloud Computing 2010 - EMC - Bruno Melandri
VMware - Flash-as-a-Service - Achieve Flash Performance with Cloud Economics
Building Cloud capability for startups
Cloud Computing for Small & Medium Businesses
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
System Security on Cloud
Cloud Computing Introduction
Celera Networks on Cloud Computing
Effectively and Securely Using the Cloud Computing Paradigm
Ohio LinuxFest: Crash Course in Open Source Cloud Computing
Cloudcamp- The World Wide Cloud
Rik Ferguson
Accelerate Digital Transformation with IBM Cloud Private
HCI ECOCAST
Live Cloudera Cybersecurity Solution Demo
Building a Hybrid Cloud The Real Deal
Ad

More from Gaurav "GP" Pal (18)

PPTX
stackArmor - FedRAMP and 800-171 compliant cloud solutions
PPTX
stackArmor - FedRAMP and 800-171 compliant cloud solutions
PDF
stackArmor MicroSummit - Niksun Network Monitoring - DPI
PPTX
stackArmor Security MicroSummit - AWS Security with Splunk
PDF
Magento Hosting on AWS
PDF
Rapid deployment of Sitecore on AWS
PDF
Secured Hosting of PCI DSS Compliant Web Applications on AWS
PDF
Implementing Secure DevOps on Public Cloud Platforms
PDF
FGMC - Managed Data Platform - CloudDC Meetup
PPTX
stackArmor presentation for DevOpsDC ver 4
PDF
AWS Frederick Meetup 07192016
PPTX
DevOps for ETL processing at scale with MongoDB, Solr, AWS and Chef
PPTX
Hosting Tableau on AWS
PDF
AWS Security Best Practices, SaaS and Compliance
PDF
Big Data - Accountability Solutions for Public Sector Programs
PDF
2013 11-06 adopting aws at scale - lessons from the trenches
PDF
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suro
PPTX
Enterprise transformation with cloud computing Jan 2014
stackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor Security MicroSummit - AWS Security with Splunk
Magento Hosting on AWS
Rapid deployment of Sitecore on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWS
Implementing Secure DevOps on Public Cloud Platforms
FGMC - Managed Data Platform - CloudDC Meetup
stackArmor presentation for DevOpsDC ver 4
AWS Frederick Meetup 07192016
DevOps for ETL processing at scale with MongoDB, Solr, AWS and Chef
Hosting Tableau on AWS
AWS Security Best Practices, SaaS and Compliance
Big Data - Accountability Solutions for Public Sector Programs
2013 11-06 adopting aws at scale - lessons from the trenches
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suro
Enterprise transformation with cloud computing Jan 2014

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Cloud computing and distributed systems.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
cuic standard and advanced reporting.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Modernizing your data center with Dell and AMD
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Network Security Unit 5.pdf for BCA BBA.
The Rise and Fall of 3GPP – Time for a Sabbatical?
NewMind AI Monthly Chronicles - July 2025
Encapsulation_ Review paper, used for researhc scholars
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Cloud computing and distributed systems.
“AI and Expert System Decision Support & Business Intelligence Systems”
Per capita expenditure prediction using model stacking based on satellite ima...
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Modernizing your data center with Dell and AMD
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A Presentation on Artificial Intelligence
Diabetes mellitus diagnosis method based random forest with bat algorithm
Network Security Unit 5.pdf for BCA BBA.

stackArmor - Security MicroSummit - McAfee

  • 1. McAfee Confidentiality Language Securing Cloud Workloads Larry Kovalsky – Director Federal Sales Engineering
  • 2. The New McAfee Strategic partnership with TGP Intel is proud to partner with TPG to create one of the largest independent, pure play cybersecurity companies in the world: 51% controlling interest 49% retained interest
  • 3. How did we get here? 3 MAINFRAMES PCs CLIENT/ SERVER INTERNET CLOUD 1970s Pro – Efficient Con – Slow to Change 1980s Pro – Quick to change Con – Expensive, loss of control of data 1990s Pro – Quick to change and better data control Con – Expensive to support 2000s Pro – Quick to change Con – Tough to support Today Pro – Efficient, quick to change Con – Paradigm shift Persistent Goal: Efficient systems that respond to the business “If you think you’ve seen this movie before, you are right. Cloud computing is based on the time-sharing model we leveraged years ago before we could afford our own computers. The idea is to share computing power among many companies and people, thereby reducing the cost of that computing power to those who leverage it. The value of time share and the core value of cloud computing are pretty much the same, only the resources these days are much better and more cost effective.” – David Linthicum
  • 4. Why the Push to the Cloud? • Elasticity / Agility/ Self-Service / Ease of Provisioning / Deployment • CapEx vs. OpEx Capital Expense (CapEx) can be unpredictable and painful Perception that that the cloud is more cost-effective • Talent is expensive and hard to find Cloud allows the delivery of IT Services without the labor and technology costs associated with maintaining complex computer systems Pros: Challenges: • Fundamental Change to Business Model/Cultural Change • Acquisition/SLA Headaches • Security Requirements
  • 5. 5 Source: AWS Security Best Practices Guide
  • 6. Deployment Models Public Cloud • Elasticity • Utility Pricing • Leverage Expertise Community Cloud • Meets shared concerns Hybrid Cloud • Meets shared On-Premise/ Private Cloud • Total Control • Regulation • Flexibility
  • 7. Security Challenges in Hybrid Cloud On-Prem DC/Private Cloud 1. Performance bottlenecks 1. Performance storms (esp. with all VDI instances updating DAT at the same time) 2. Reduced VM Density – Fewer VMs allocated per hardware to account for bottleneck 3. Network Visibility/SDDC/NFV ? Public Cloud 1. Poor workload visibility, especially when LOB/Dev access and operate Cloud directly. Security posture often falls short of best practices when managed by personnel without IT Sec skills. 2. Expanded threat surface that extends beyond VMs into cloud platform configuration (i.e. Security groups, Disk encryption, IAM) 3. Network Visibility? Hybrid Cloud 1. Management Complexity - advent of many Cloud Platforms in the Hybrid DC makes it difficult to manage security using same controls & policies 2. Security tools in Silos - Server security & Network security technologies operated by different personnel and there isn't much threat sharing, leading to poor threat detection.
  • 8. McAfee ePolicy Orchestrator (ePO) Cloud Workload Discovery 8 Instant Visibility Into Security Posture Public Cloud Compute Network Storage Virtual Machines Templates Tags VPC/vNet Firewall (Security Groups) Traffic Block Storage Volumes Encryption Keys
  • 9. ` Antivirus Host Firewall Intrusion Prevention Application Whitelisting Integrity Monitoring Encryption Management Machine Learning Application Containment ADD-ONS DevOps-friendly Deployment Advanced Memory Protection McAfee Endpoint - Discovery to Complete Protection 9 Comprehensive cloud workload protection - For Windows and Linux
  • 10. Choose the Right Security Profile 10 Adequate protection and compliance for all cloud workloads Dev-Test Workloads Traditional Workloads Cloud-Native Workloads Compliance Workloads Firewall Must-Have Must-Have Must-Have Must-Have Antivirus Good-to-Have Must-Have Good-to-Have Must-Have Encryption Optional Must-Have Must-Have Must-Have Application Control Optional Good-to-Have Must-Have Must-Have File Integrity Mon Optional Optional Must-Have Must-Have Host IPS Optional Optional Optional Must-Have
  • 11. Flexible Options for Cloud Workload Security 11 Hybrid Solution Perpetual Licensing Usage Based Licensing Server Security Suite Essentials Server Security Suite Advanced Public Cloud Server Security McAfee ePO console McAfee ePO console McAfee ePO console Cloud Workload Discovery for hybrid cloud (VMware, OpenStack, AWS & Azure) Cloud Workload Discovery for hybrid cloud (VMware, OpenStack, AWS & Azure) Cloud Workload Discovery for public cloud (AWS & Azure) Anti-malware (Optimized for VMs) Anti-malware (Optimized for VMs) Anti-malware Firewall Firewall Firewall Host Intrusion Prevention Host Intrusion Prevention Host Intrusion Prevention Application Whitelisting Application Whitelisting File Integrity Monitoring File Integrity Monitoring
  • 12. 12 McAfee Network Intrusion Prevention Signature-less Technologies Analyze Sandboxing Static Code Analysis Sandboxing Dynamic Analysis Analyze Unpacking Disassembly of Code Calculate Latent Code Familial Resemblance Run Time DLLs Network Operations File Operations Process Operations Delayed Execution Emulation and Deep File Analysis GAM (Browser) JavaScript Adobe PDF Adobe Flash 2017 IPS Magic Quadrant 10+ years “Recommended” from NSS Labs 5+ years
  • 13. • Delivered with CloudFormation Template • Ansible/Chef/Puppet Built in Security • Automatic client based load balancer • Integrated with AutoScale Load Balanced • Inline IPS/IDS • Security Group • CloudTrail/VPC logs Built for the Cloud • Ready for Orchestration • Live Update of Sensors & Agents • Flexible License Low OpEx/CapEX • Micro-segmentation across heterogeneous cloud • App Fencing Virtual Overlay Network Single Console • Single NSM to manage appliance, OpenStack, VMware & AWS • Manage from AWS or On-Prem • Monitor user access across cloud McAfee Virtual Network Security Platform (vNSP) Security for Public and Private Cloud
  • 14. Availability Zone #1 Security Group McAfee Virtual Network Sensor Network Security Platform VPC Peering Internet Gateway Internet Elastic Load Balancing VPC Flow-logs Cloudtrail Amazon Inspector Availability Zone #2 McAfee Virtual Network Sensor Admin Network Security Manager McAfee Virtual Network Sensor NS Series Sensor On-Premises Customer Gateway VPN Network Security Manager Cloud Workload Discovery Controller Network Security Platform Security Group North-South Traffic East-West Traffic
  • 15. McAfee ePO Centralized Data Governance Verify API availability Cover Endpoints, Networks, and Cloud Environments DLP Endpoint Encryption Endpoint Data Protection Network Data Protection Data Repositories DLP Discover/DLP Monitor Firewall DLP Prevent Email & Web Gateway InternetDLP Monitor Switch
  • 16. Security’s Perfect Storm The ultimate challenge facing practitioners Threats continue to rise while mobility and cloud erode our control Increasing Complexity Comprehension and response cannot happen fast enough Time Imperative Resource Constraints There’s not enough people or $$$ to throw at the problem Growing need to resolve more threats, faster and with fewer resources
  • 17. Open Ecosystem – But How? Proprietary Integrations create Complexity and point of Failure Result • Proprietary Integrations • Version and Use Case Depended • Point of Failure • Complex n x (n-1) API-BASED INTEGRATIONS
  • 18. Open Ecosystem – Data Exchange Layer (DXL) Standardize integration and communication to break down operational silos Result • Proprietary Integrations • Version and Use Case Depended • Point of Failure • Complex n x (n-1) Result • Standardized Communication • Real Time Information Exchange • API and Version independent • Open (SIA Partner) • Open DXL (Github) API-BASED INTEGRATIONS COLLABORATIVE “OPEN” ECOSYSTEM (DXL)
  • 19. Shared Intelligence: Threat Intelligence Exchange Enhances Security with adaptive threat prevention Centralized Visibility and Control Incident response knowledgebase Local prevalence intelligence Integrated Sensor Module Execution-time reputation inspection and protection Open, Connected Ecosystem Network, gateway, endpoint, and cloud-based countermeasures and intelligence Data Exchange Layer Ultra-fast persistent bidirectional messaging fabric TIE Server McAfee Security Solutions 3rd Party Partners Threat Intelligence Feeds TIE Consumers
  • 20. McAfee, the McAfee logo and [insert <other relevant McAfee Names>] are trademarks or registered trademarks of McAfee LLC or its subsidiaries in the U.S. and/or other countries. Other names and brands may be claimed as the property of others. Copyright © 2017 McAfee LLC. 20

Editor's Notes

  • #3: What was Security Connected 3-4 years ago? Intel was extremely important for us New Strategy -> Customer Centric New organization PM/R&D New UX team
  • #4: Cloud computing is a new name for an old concept: the delivery of computing services from a remote location, analogous to the way electricity, water, and other utilities are provided to most customers. Cloud computing services are delivered through a network, usually the Internet. Some cloud services are adaptations of familiar applications, such as e-mail and word processing. Others are new applications that never existed as a local application, such as online maps and social networks. Since 2009, the federal government has been shifting its data storage needs to cloud-based services and away from agency-owned data centers. This shift is intended to reduce the total investment by the federal government in information technology (IT) (data centers), as well as realize other stated advantages of cloud adoption: efficiency, accessibility, collaboration, rapidity of innovation, reliability, and security
  • #6: When evaluating the security of a cloud solution, it is important for customers to understand and distinguish between: Security measures that the cloud service provider (AWS) implements and operates – "security of the cloud" Security measures that the customer implements and operates, related to the security of customer content and applications that make use of AWS services – "security in the cloud" While AWS manages security of the cloud, security in the cloud is the responsibility of the customer. Customers retain control of what security they choose to implement to protect their own content, platform, applications, systems and networks, no differently than they would for applications in an on-site datacenter.
  • #7: Public cloud is a multi-tenant environment where customers pay and use shared resources. Customers have seemingly endless pool of resources available that can be procured through web user interface or application programming interface. The customers only pay for the resources they use, allowing to scale resources up or down to meet fluctuating demand. Customers leverage cloud provider’s expertise in managing infrastructure, tools or applications. This frees-up customer resources to focus on running their business. Customers do need to rely on vendor to meet security, availability and performance SLAs. Public cloud services may be free or offered on a pay-per-usage model. Private cloud is hosted by the customer organization themselves to support their business units. It allows customers to control the type and configuration of hardware procured. The customers have complete control over security aspects of the cloud deployment. They also have greater flexibility in enforcing compliance related requirements around data ownership and privacy. The disadvantages include reduced flexibility in scaling computing resources and no cost sharing option due to single ownership. Community cloud is a multi-tenant environment that is targeted to a limited set of organizations (such as banks or investment firms). The organizations come together to share computing resources and reap benefits. The organizations typically have similar security, privacy, performance and compliance requirements. The community generally restricts participants from the same industry or with similar needs. Hybrid Cloud Enterprises typically use hybrid cloud option, which is a combination of above three cloud deployment options viz. public cloud, private cloud and community cloud satisfying the unique needs of each enterprise. A best practice is to use public cloud as much as possible to get all benefits of cloud computing like rapid elasticity and cost sharing but leverage the private cloud where security and privacy needs are too high.
  • #8: Time: 5 Mins
  • #9: Insights into weak security controls for cloud workloads, unsafe firewall settings, unencrypted volumes and indicators of compromise such as suspicious traffic lead to faster detection while McAfee ePolicy Orchestrator (McAfee ePO) or DevOps tools enable quick remediation.  So why do customers buy our server and cloud workload security? Because it solves the key challenges that I mentioned at the beginning of my presentation: Instantly discover all servers and cloud workloads and then apply proper security policies Comprehensive protection including dynamic whitelisting which protects from unknown threats and change control to meet regulatory compliance needs. Performance-optimized server security across physical, virtualized and cloud deployments. End-to-end visibility and security across all deployments More details --------- Instant Discovery and Control Provide Datacenter Connectors to import virtual machines from VMware vSphere & OpenStack Cloud Workload Discovery for AWS and Microsoft Azure offer full visibility into infrastructure, workloads, traffic and threats Security posture assessment of AWS security groups to identify unsafe firewall, encryption and anti-malware settings Encryption of Amazon EBS McAfee ePO provides end-to-end visibility and security across all deployments Comprehensive Protection Unique combination of intrusion prevention, blacklisting, white listing, and change control Optional local reputation intelligence and sandbox testing Cloud Workload Discovery offers visibility, assessment and remediation for compute, storage, and network.  It provides 3 main capabilities - #1 Discovery of weak security controls for VMware, OpenStack, AWS and Microsoft Azure, #2 Platform Security Audit including firewall and encryption settings for AWS and Microsoft Azure, #3 Traffic & Network threat Visibility for AWS. These insights lead to faster detection while McAfee ePO or DevOps tools enable quick remediation. Instant discovery and control discover and monitor workloads and threats for continuous and consistent protection Comprehensive protection from advanced threats with whitelisting and change control to comply with laws and regulations
  • #10: Elements in our suites work together to deliver comprehensive security and protect against memory buffer overflow attacks on Windows 32- and 64- bit systems. ENS Threat Prevention for cloud servers ENS Firewall for Linux and Windows—prevents malware from entering and propagating cloud servers Host-Based Intrusion Protection—safeguards against complex security threats Application Control—dynamic whitelisting with lower operational overhead than legacy techniques Integrity Monitoring (Change Control)—continuous detection of system-level changes across distributed and remote locations Data Protection—ensuring cloud volumes are encrypted. Optional add-ons: McAfee Threat Intelligence Exchange—shares local reputation intelligence across security solutions for layered security protection and to instantly identify and combat the ever-increasing unique malware samples. McAfee Advanced Threat Defense—analyzes the behavior of unknwn applications in a sandbox and automatically immunizes infected endpoints. We partner with Rapid7 for vulnerability management. Rapid7’s Nexpose solution discovers and prioritizes vulnerabilities and confirms when exposures are fixed. Suites are designed to provide comprehensive security across both Windows and Linux environments. We also make sure that our software is deployable and configurable using DevOps-friendly tools including Puppet Labs, Chef, and OpsWorks. Seamlessly integrating with the tools you already use makes it easier and less costly to achieve comprehensive cloud security.
  • #11: Cloud security can be complicated because there are a lot of different cloud workloads with unique risk profiles and security requirements. Cloud Workload Discovery’s policy-driven assessment makes it easy to determine exactly what security controls these diverse workloads require versus what they actually have to ensure adequate protection and compliance. Once you've discovered security risks, you can move to complete protection in just a few clicks. Cloud Workload Discovery’s integration with McAfee ePO™ management console gives organizations effective control across all of their physical, virtual and cloud environments and across all critical security solutions. With this integration, security experts and administrators can use a single management platform to address threat alerts and enforce policies with simplified workflows, reducing the time to identify and resolve security issues. Cloud Workload Discovery offers visibility, assessment and remediation for compute, storage, and network.  It provides 3 main capabilities - #1 Discovery of weak security controls for VMware, OpenStack, AWS and Microsoft Azure, #2 Platform Security Audit including firewall and encryption settings for AWS and Microsoft Azure, #3 Traffic & Network threat Visibility for AWS. These insights lead to faster detection while McAfee ePO or DevOps tools enable quick remediation.
  • #13: Speaker Note: This slide addresses the technologies that find Attack Behavior, as explained in the approach to signature-less protection slide Emulation - GAM(Browser) No other vendor has this type of capability integrated inline on an IPS This engine, in real time, emulates real browser environments to give a quick test of a suspicious inbound web conent. This is similar to sandboxing, but uses much more lightweight ‘emulated’ environment (instead of real runtime environments) and analysis. This is one of the main reasons that Network Security Platform scored 99% block rate of malware with AV-Test. All without signatures. Deep File Analysis - JavaScript/Adobe PDF/Adobe Flash Other vendors do not do anything like this, and don’t even have an Adobe flash engine. Sourcefire, with the closest capability to this, allows operators to filter PDF files, automatically dropping any PDF file with JavaScript. This pre-supposes that all JavaScript in PDFs is bad, which is far from the truth Deep File Analysis are dedicated inspection engines that go deep on analysis of inbound files. They focus on the most common file formats attackers love to use to deliver malicious payloads: - Javascript hidden in Adobe PDF Malicious scripts hidden in Adobe flash These inspect engines use lightweight emulation and heuristic analysis to identify any malicious behaviour hidding in the files…before they detonate on the endpoint. Bad files can be blocked…all without signatures. Sandboxing – Dynamic Analysis (via Advanced Threat Defense) Many vendors claim sandboxing technologies, but not all are created equal. Dynamic Analysis is common across all, but when paired with Static Code below, McAfee differentiates The process of putting a file into a sandbox and letting it run and analyze is called Dynamic Anlaysis. Dynamic analysis is a safe way to analyze the behavior of a suspect file. No signatures are needed – conviction as malware is done solely on the basis of observed behavior. And while a good method for detecting malware, it’s only based on what the sandbox actually observes. So while good, it’s not good enough for today’s stealthy malware. Sandboxing – Static Code Analysis (via Advanced Threat Defense) No other vendor can claim this deep and comprehensive of analysis in a sandbox The addition of full static code analysis to sandboxing provides detailed malware classification information and broadens protection against highly camouflaged, evasive threats and allows identification of associated malware leveraging code re-use. Delayed or contingent execution paths, often not executed in a dynamic environment, can be detected through unpacking and full Together, static code and dynamic analysis provide a complete evaluation and detailed information such as behavior summary, malware severity, malware family associations, execution paths, and percentage of code executed during dynamic analysis.
  • #15: McAfee Virtual Probes
  • #16: Here is a quick look at the comprehensive layout of the DLP solution. Endpoint and Network Data Protection is what organizations have been using for quite a while. But now the real question is how to organizations extend these capabilities out to the cloud environment. McAfee does this with McAfee Cloud Data Protection. This is a cloud-based solution that allows an organization to leverage existing policies, and synchronize policies from the endpoint to the cloud, and leverage these same policies against sensitive data stored in cloud applications. This is McAfee’s new CASB technology. You can see McAfee DLP offers solution at every egress point whether its at the endpoint, in storage or on the network. Please note that McAfee DLP does NOT have to work with McAfee Email or Web Gateway, it can work with any email and web gateways.
  • #17: Three overarching challenges continue to drive security strategies: an expanding and increasingly complex attack surface growing time pressure fewer resources relative to the growth of the problem When we compound these factors with the already growing labor shortfall, there’s an urgent need for efficiency. We need to resolve more risk, faster and with fewer resources to scale to our growing security challen ------------- Increasing Complexity: With IoT there is exponential growth in data and devices: 200B connected devices by 2020 - Intel forecast ; 200B smart objects / 7.6B estimated population in 2020 = 26 smart objects per capita There is a strong trend towards “Shift to cloud”. This erodes visibility and control thus resulting into complexity. Security environment is becoming more fragmented. 70-90% of malware samples detected were unique to the organizations they were targeting. This creates a huge challenge for organizations. Time becomes extremely important in this complex situation It takes a large organization an average of 31 days at a cost of $20,000/day to clean up and remediate after a cyber-attack. Average total price tag for a data breach now approaching $640,000. (Ponemon 2014) In 60% of cases, attackers are able to compromise an organization within minutes. (2015 Verizon DBIR) Rising Security needs and growing product complexity, resulting in shortage of qualified security talent Staffing and skills shortages were the #1 impediment to effective incident response expressed by 66% of organizations surveyed by SANS Institute in mid-2015. (SANS Institute Incident Response survey, 2015) With 50+ security tools in use within many large companies, this fragmented, patchworked IT security environment leads to gaps in protection and decreased visibility resulting in increased time and manual processes associated with exploit-to-discovery-to-remediation. (Verizon DBIR 2014 & Intel Security) Increasing Complexity = Expanding attack surface: Billions of connected devices and a paradigm shift to the cloud, resulting in an increased number of threats Time imperative = Golden Hour of response: Increased attacker sophistication and rising cost of breaches, resulting an a need to detect and respond to threats faster Resource Constraints = Talent Shortage: Rising Security needs and growing product complexity, resulting in shortage of qualified security talent
  • #18: Most attempts at cross-technology data integration and unification to date have been disjointed and API-based. Around the industry, tactical alliances based on 1:1 integration models are typically negotiated between small vendors, and despite the efforts put forth – the integrations are brittle, expensive and overall visibility remains fragmented.   So far, McAfee has delivered the best ecosystem example with the Security Innovation Alliance program. More than 130 partners work with ePO and ESM APIs, but this effort takes significant work to implement and maintain. While we have the scope and commitment to succeed, we know that each product change requires testing and updates by vendors and customers. We have seen a better way. McAfee is building on its industry leadership and changing the model entirely with the delivery of the data exchange layer . This standardized integration and communication layer provides a collaborative “fabric” for all products—both from Intel Security and from partners who become DXL-ready—to share insights and communicate regardless of their underlying proprietary architecture. The collaborative fabric is an elegant  approach that dramatically simplifies and streamlines integrations, while encouraging open vendor participation. The increased speed, agility and scalability realized from the DXL-enabled fabric provides the foundation for holistic visibility across the IT landscape.    A primary benefit of this  new collaborative fabric (DXL) is central to the ability to improve the clarity (contextual awareness and visibility) within organizations.   The security management business unit now leverages DXL to connect advanced and contextual intelligence analytics in the McAfee Threat Intelligence Exchange with the aggregation, correlation, and data analytics horsepower of the McAfee Enterprise Security Manager to turn raw data into actionable intelligence.  
  • #19: Most attempts at cross-technology data integration and unification to date have been disjointed and API-based. Around the industry, tactical alliances based on 1:1 integration models are typically negotiated between small vendors, and despite the efforts put forth – the integrations are brittle, expensive and overall visibility remains fragmented.   So far, McAfee has delivered the best ecosystem example with the Security Innovation Alliance program. More than 130 partners work with ePO and ESM APIs, but this effort takes significant work to implement and maintain. While we have the scope and commitment to succeed, we know that each product change requires testing and updates by vendors and customers. We have seen a better way. McAfee is building on its industry leadership and changing the model entirely with the delivery of the data exchange layer . This standardized integration and communication layer provides a collaborative “fabric” for all products—both from Intel Security and from partners who become DXL-ready—to share insights and communicate regardless of their underlying proprietary architecture. The collaborative fabric is an elegant  approach that dramatically simplifies and streamlines integrations, while encouraging open vendor participation. The increased speed, agility and scalability realized from the DXL-enabled fabric provides the foundation for holistic visibility across the IT landscape.    A primary benefit of this  new collaborative fabric (DXL) is central to the ability to improve the clarity (contextual awareness and visibility) within organizations.   The security management business unit now leverages DXL to connect advanced and contextual intelligence analytics in the McAfee Threat Intelligence Exchange with the aggregation, correlation, and data analytics horsepower of the McAfee Enterprise Security Manager to turn raw data into actionable intelligence.  
  • #20: TIE is an optional module that is available which like ENS 10, uses our data exchange layer to communicate with your endpoint defenses. It is a combination of Intel and third party feeds that offers visibility across network, gateway endpoint and cloud-based countermeasures and threat intelligence. Accessing the latest information is easy thanks to its centralized visibility and control where incident response and local intelligence resources are available. TIE complements ENS 10 because it is able to be integrated easily with it and collaborate with the ENS 10 modules using it’s real time insights to inform actions against new and emerging threats