SlideShare a Scribd company logo
Strategy Cloud and
Security as a Service
Hans-Peter Bauer
Vice President Central and Eastern Europe
The very technologies that empower us to create and to build
         also empower those who would disrupt and destroy
                                                  - U.S. President Barack Obama




       Organizations worldwide lost approximately $1 trillion in
           intellectual property last year due to cybercrime
                                                  - McAfee Labs
2
Unprecedented Malware Growth
                                Virus and Bots    PUP     Trojan
3,200,000
3,000,000
2,800,000
2,600,000
2,400,000
2,200,000
2,000,000
1,800,000
1,600,000
1,400,000
1,200,000
1,000,000
800,000
600,000
400,000
200,000


                                                   2008
                                                 2009
                            Malware Growth (Main Variations)
3
3                                                          September 24, 2010
3
      Source: McAfee Labs
In today’s environment, Cloud computing
is not just for scaling your business,
but also protecting it
87.5% customers surveyed
 cited “security concerns” as
  the key challenge/issue to
adopting Cloud-based services
            - IDC, 2009
Maturity Model of Enterprise Security



                                                             Optimized
                                                            spend ~4%
      RISK                                                      with
                                                            very low risk




                                     Compliant/Proactive
                                       spend ~8% of IT
                                      budget on security

                                        Medium risk

OPTIMIZATION
                 Reactive
              spend ~3% of IT
             budget on security
                 High risk

  6
                                  Why has it been so challenging to reduce risk?
  6
Relentlessly Securing the Digital World:
     Today and Tomorrow




        Securing the           Virtual           Securing
    Consumerization of IT     Tsunami           the Cloud




7
McAfee’s Cloud Strategy

  SECURITY   FROM   THE CLOUD


  SECURITY    IN    THE CLOUD


  SECURITY   FOR    THE CLOUD
McAfee’s Unique Position


  Instant Access          Real-Time Protection            Peace of Mind




   DIVERSITY – Broadest Security-as-a-Service portfolio in the industry
   RELIABILITY – Real-time protection with Global Threat Intelligence
   FLEXIBILITY – Deployment options to fit your dynamic business




                          Security-as-a-Service
Broadest SaaS Portfolio in the Industry
Real-time Protection with Global Threat Intelligence



                                    Global Threat Intelligence™




              http://
                                                                                                    !
                            McAfee SaaS Management Console
                                        Email         Email         Website          PCI       Vulnerability
   Endpoint   Web       Email         Continuity    Archiving     Certification   Compliance   Assessment




                                Multi-tenant , Scalable Service Platform
Global Threat Intelligence (GTI)
                                          Dedicated
                                      GTI research team



Complete suite of                                                                          Across all threat vectors
endpoint and network                                                                       Network/IPS Signatures │ Malware
                                                  GLOBAL                                   Vulnerability Management │ Spam
research technologies                             THREAT                                   Outbound Web Protection
                                               INTELLIGENCE




Real-time “in the cloud”                                                                   Providing reputation
threat collection and                                                                      based capabilities
distribution model
                               Spans the entire Internet
                             including millions of sensors

                                               Risk
                      Endpoint    Encrypt.                  Email         Firewall
                                               Mgmt
            ePO
                            White
                                         DLP          Web           IPS              SIA
                            Listing
                                                                              September 24, 2010
 11
 1
McAfee Delivers Flexible Security
Deployment options to fit your dynamic business


                         Security-as-a-Service




 Software                                         Appliance
Strategy Cloud and Security as a Service

More Related Content

PPTX
Security As A Service
PPTX
Security as a Service Model for Cloud Environment
PPTX
Security As A Service In Cloud(SECaaS)
PDF
Secaa s cat_10_network_security_implementation_guidance
PDF
Cloud Security Governance
PDF
Security as a Service with Microsoft Presented by Razor Technology
PDF
IT Security As A Service
PPTX
The Cloud & I, The CISO challenges with Cloud Computing
Security As A Service
Security as a Service Model for Cloud Environment
Security As A Service In Cloud(SECaaS)
Secaa s cat_10_network_security_implementation_guidance
Cloud Security Governance
Security as a Service with Microsoft Presented by Razor Technology
IT Security As A Service
The Cloud & I, The CISO challenges with Cloud Computing

What's hot (20)

PDF
Security As A Service
PPTX
Intel SaaS Security Playbook
PPTX
Cloud security for banks - the central bank of Israel regulations for cloud s...
PPTX
cloud security ppt
PPTX
Security concerns with SaaS layer of cloud computing
PPTX
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
PPTX
Surviving the lions den - how to sell SaaS services to security oriented cust...
PDF
IBM Security SaaS IaaS and PaaS
PPSX
The security of SAAS and private cloud
PPTX
The Zero Trust Model of Information Security
PPTX
Sophos Wireless Protection Overview
PPTX
Aligning Risk with Growth - Cloud Security for startups
PPTX
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
PDF
Cloud Security Demystified
PDF
Cloud Security & Cloud Encryption Explained
PPT
Security as as Service: Case Study of F-Secure
PPTX
Where to Store the Cloud Encryption Keys - InterOp 2012
PDF
Cloud security
PDF
Cloud Security - Kloudlearn
PPTX
Rik Ferguson
Security As A Service
Intel SaaS Security Playbook
Cloud security for banks - the central bank of Israel regulations for cloud s...
cloud security ppt
Security concerns with SaaS layer of cloud computing
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
Surviving the lions den - how to sell SaaS services to security oriented cust...
IBM Security SaaS IaaS and PaaS
The security of SAAS and private cloud
The Zero Trust Model of Information Security
Sophos Wireless Protection Overview
Aligning Risk with Growth - Cloud Security for startups
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cloud Security Demystified
Cloud Security & Cloud Encryption Explained
Security as as Service: Case Study of F-Secure
Where to Store the Cloud Encryption Keys - InterOp 2012
Cloud security
Cloud Security - Kloudlearn
Rik Ferguson
Ad

Viewers also liked (20)

PPTX
Cloud security ppt
PPT
Security As A Service
PPT
Cloud security
PPTX
Confidentiality as a service –usable security for the cloud
PDF
Cloud security
KEY
Cloud Security Alliance - Cloud Summit Keynote
PDF
The intersection of Traditional IT and New-Generation IT
PDF
Next Generation Cloud: Rise of the Unikernel V3 (UPDATED)
PDF
2016 -11-18 OpenSCAP Workshop Coursebook
PDF
2014-04-28 cloud security frameworks and enforcement
PDF
Evolving to a New Generation Network based on IP, SDN, NFV & Cloud
PDF
Cloud Security Checklist and Planning Guide Summary
PDF
Fundamentals On Building A Reliable Cloud Infrastructure For Your SaaS Business
PDF
The New Economics of Cloud Security
PPTX
Cloud computing and Cloud security fundamentals
PDF
Disrupting Telecom: the Evolution of NFV - by Sean Chen @ IEEE Mobile Cloud 2015
PDF
Next Generation Cloud Adoption - Beyond just cheaper & faster – transformati...
PDF
Cloud adoption in utility industry 2016
PPTX
Migrating Traditional Apps from On-Premises to the Hybrid Cloud
PPTX
Cloud computing security issues and challenges
Cloud security ppt
Security As A Service
Cloud security
Confidentiality as a service –usable security for the cloud
Cloud security
Cloud Security Alliance - Cloud Summit Keynote
The intersection of Traditional IT and New-Generation IT
Next Generation Cloud: Rise of the Unikernel V3 (UPDATED)
2016 -11-18 OpenSCAP Workshop Coursebook
2014-04-28 cloud security frameworks and enforcement
Evolving to a New Generation Network based on IP, SDN, NFV & Cloud
Cloud Security Checklist and Planning Guide Summary
Fundamentals On Building A Reliable Cloud Infrastructure For Your SaaS Business
The New Economics of Cloud Security
Cloud computing and Cloud security fundamentals
Disrupting Telecom: the Evolution of NFV - by Sean Chen @ IEEE Mobile Cloud 2015
Next Generation Cloud Adoption - Beyond just cheaper & faster – transformati...
Cloud adoption in utility industry 2016
Migrating Traditional Apps from On-Premises to the Hybrid Cloud
Cloud computing security issues and challenges
Ad

Similar to Strategy Cloud and Security as a Service (20)

PDF
“8th National Biennial Conference on Medical Informatics 2012”
PDF
Cloud Security: Perception Vs. Reality
PPTX
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
PPT
Microsoft Forefront - Secure Endpoint Solution Presentation
PPT
Trend micro - Your journey to the cloud, where are you
PPTX
Smart, Data-Centric Security for the Post-PC Era
PDF
SYMCAnnual
PDF
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PDF
Isc2conferancepremay15final
PPTX
Trend Micro - is your cloud secure
PDF
Cybersecurity infographic
PDF
Day 3 p2 - security
PDF
Day 3 p2 - security
PDF
CCCC McAfee Marc Olesen
PPTX
Cloud security and security architecture
PDF
Intel Cloud Summit: Greg Brown McAfee
PPTX
Endpoint Protection
PDF
Data security in cloud
PPTX
Cloud computing security john abrena - chicago tour
“8th National Biennial Conference on Medical Informatics 2012”
Cloud Security: Perception Vs. Reality
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Microsoft Forefront - Secure Endpoint Solution Presentation
Trend micro - Your journey to the cloud, where are you
Smart, Data-Centric Security for the Post-PC Era
SYMCAnnual
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Isc2conferancepremay15final
Trend Micro - is your cloud secure
Cybersecurity infographic
Day 3 p2 - security
Day 3 p2 - security
CCCC McAfee Marc Olesen
Cloud security and security architecture
Intel Cloud Summit: Greg Brown McAfee
Endpoint Protection
Data security in cloud
Cloud computing security john abrena - chicago tour

More from Aberla (20)

PDF
Mobile Banking 2011: Clairmail
PDF
Mobile Banking 2011: DAB
PDF
Mobile Banking 2011: Sparkasse
PDF
Mobile Banking 2011: Credit Suisse
PDF
Mobile Banking 2011: Danske Bank
PDF
Mobile Banking 2011: Postfinance
PDF
ESeconf2011 - Haug Thomas: "Sauberer Code mit Metriken"
PDF
ESEconf2011 - Cruywagen Leon: "Cool ways to work smarter in the cloud"
PDF
ESEconf2011 - Wichmann Klaus-Peter: "Kennen Sie die Leistungsfähigkeit Ihres ...
PPTX
ESEconf2011 - Hanin Makram: "Embedding Performance into Continuous Integratio...
PPTX
ESEconf2011 - Lorenz Oliver: "'Agil heisst nicht beliebit' - Scrum als wirksa...
PDF
ESEconf2011 - Schilling Rüdiger: "Generative Konzepte für den Plattform-Zoo -...
PPTX
ESEconf2011 - Freixa Vidal Roger: "Oracle's Java Strategy"
PDF
ESEconf2011 - Westphal Ralf: "Slice me nice - Produktiv, schnell, zufrieden"
PPTX
ESEconf2011 - Caine Matthew: "Creating an Environment of Teamwork, Quality, I...
PDF
ESEconf2011 - Schwaber Ken: "Scrum: Necessary but not sufficient for agility"
PDF
ESEconf2011 - Kaiser Traian: "How to measure productivity in software develop...
PPTX
ESEconf2011 - Haas Thomas & Jenni Joscha: "Ein Softwareprojekt zum Festpreis ...
PDF
ESEconf2011 - Buschmann Frank: "What architects need to know"
ODP
ESEconf2011 - Arrenbrecht Peter: "Literate Testing: Stimmige API's machen meh...
Mobile Banking 2011: Clairmail
Mobile Banking 2011: DAB
Mobile Banking 2011: Sparkasse
Mobile Banking 2011: Credit Suisse
Mobile Banking 2011: Danske Bank
Mobile Banking 2011: Postfinance
ESeconf2011 - Haug Thomas: "Sauberer Code mit Metriken"
ESEconf2011 - Cruywagen Leon: "Cool ways to work smarter in the cloud"
ESEconf2011 - Wichmann Klaus-Peter: "Kennen Sie die Leistungsfähigkeit Ihres ...
ESEconf2011 - Hanin Makram: "Embedding Performance into Continuous Integratio...
ESEconf2011 - Lorenz Oliver: "'Agil heisst nicht beliebit' - Scrum als wirksa...
ESEconf2011 - Schilling Rüdiger: "Generative Konzepte für den Plattform-Zoo -...
ESEconf2011 - Freixa Vidal Roger: "Oracle's Java Strategy"
ESEconf2011 - Westphal Ralf: "Slice me nice - Produktiv, schnell, zufrieden"
ESEconf2011 - Caine Matthew: "Creating an Environment of Teamwork, Quality, I...
ESEconf2011 - Schwaber Ken: "Scrum: Necessary but not sufficient for agility"
ESEconf2011 - Kaiser Traian: "How to measure productivity in software develop...
ESEconf2011 - Haas Thomas & Jenni Joscha: "Ein Softwareprojekt zum Festpreis ...
ESEconf2011 - Buschmann Frank: "What architects need to know"
ESEconf2011 - Arrenbrecht Peter: "Literate Testing: Stimmige API's machen meh...

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Cloud computing and distributed systems.
PDF
Electronic commerce courselecture one. Pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
cuic standard and advanced reporting.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
A Presentation on Artificial Intelligence
PDF
Approach and Philosophy of On baking technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
The AUB Centre for AI in Media Proposal.docx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Cloud computing and distributed systems.
Electronic commerce courselecture one. Pdf
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Reach Out and Touch Someone: Haptics and Empathic Computing
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
cuic standard and advanced reporting.pdf
MYSQL Presentation for SQL database connectivity
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
A Presentation on Artificial Intelligence
Approach and Philosophy of On baking technology
20250228 LYD VKU AI Blended-Learning.pptx
Empathic Computing: Creating Shared Understanding
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf

Strategy Cloud and Security as a Service

  • 1. Strategy Cloud and Security as a Service Hans-Peter Bauer Vice President Central and Eastern Europe
  • 2. The very technologies that empower us to create and to build also empower those who would disrupt and destroy - U.S. President Barack Obama Organizations worldwide lost approximately $1 trillion in intellectual property last year due to cybercrime - McAfee Labs 2
  • 3. Unprecedented Malware Growth Virus and Bots PUP Trojan 3,200,000 3,000,000 2,800,000 2,600,000 2,400,000 2,200,000 2,000,000 1,800,000 1,600,000 1,400,000 1,200,000 1,000,000 800,000 600,000 400,000 200,000 2008 2009 Malware Growth (Main Variations) 3 3 September 24, 2010 3 Source: McAfee Labs
  • 4. In today’s environment, Cloud computing is not just for scaling your business, but also protecting it
  • 5. 87.5% customers surveyed cited “security concerns” as the key challenge/issue to adopting Cloud-based services - IDC, 2009
  • 6. Maturity Model of Enterprise Security Optimized spend ~4% RISK with very low risk Compliant/Proactive spend ~8% of IT budget on security Medium risk OPTIMIZATION Reactive spend ~3% of IT budget on security High risk 6 Why has it been so challenging to reduce risk? 6
  • 7. Relentlessly Securing the Digital World: Today and Tomorrow Securing the Virtual Securing Consumerization of IT Tsunami the Cloud 7
  • 8. McAfee’s Cloud Strategy SECURITY FROM THE CLOUD SECURITY IN THE CLOUD SECURITY FOR THE CLOUD
  • 9. McAfee’s Unique Position Instant Access Real-Time Protection Peace of Mind DIVERSITY – Broadest Security-as-a-Service portfolio in the industry RELIABILITY – Real-time protection with Global Threat Intelligence FLEXIBILITY – Deployment options to fit your dynamic business Security-as-a-Service
  • 10. Broadest SaaS Portfolio in the Industry Real-time Protection with Global Threat Intelligence Global Threat Intelligence™ http:// ! McAfee SaaS Management Console Email Email Website PCI Vulnerability Endpoint Web Email Continuity Archiving Certification Compliance Assessment Multi-tenant , Scalable Service Platform
  • 11. Global Threat Intelligence (GTI) Dedicated GTI research team Complete suite of Across all threat vectors endpoint and network Network/IPS Signatures │ Malware GLOBAL Vulnerability Management │ Spam research technologies THREAT Outbound Web Protection INTELLIGENCE Real-time “in the cloud” Providing reputation threat collection and based capabilities distribution model Spans the entire Internet including millions of sensors Risk Endpoint Encrypt. Email Firewall Mgmt ePO White DLP Web IPS SIA Listing September 24, 2010 11 1
  • 12. McAfee Delivers Flexible Security Deployment options to fit your dynamic business Security-as-a-Service Software Appliance