140 likes | 289 Views
Trends in Network Security. Travis Abrams, DG Technology. Symptoms: Network Security Isn’t Adapting to Change. Symptoms Incident costs increasing Data center security under-performing Advanced Persistent Threats a concern Security policy hard to enforce Excessive IDS/IPS alerts
E N D
Trends in Network Security Travis Abrams, DG Technology
Symptoms:Network Security Isn’t Adapting to Change Symptoms Incident costs increasing Data center security under-performing Advanced Persistent Threats a concern Security policy hard to enforce Excessive IDS/IPS alerts Firewall rules hinder change management Frequent refresh of security hardware P P P P P P P
Changes Create Pressure Points, Complications Create Risk Projects Impacting Network Trends Affecting Outsource Hosting Virtualization Mobile Web SaaS Targeted and Advanced Persistent Threats (APTs) 200% 15% 32% 30% 49% (Reduce CapEx) (Better Quality) (Improve Productivity) (Reduce OpEx) (Agility) Consumerizationof IT Severe Economic Constraints
What are the Threats? Shady Rat
Conventional Approach to Network Security Ticket Oriented Resolution Protection Focused on Identifying Attack Packets How to get to resolution? File tickets. Wait. How to protect? Find attack packets on wire Configuration Focused on Features Multi-Vendor Strategies 1011011000100101110101 11100010101 How to implement policy? Rely on product features. Defense in Depth? Manage multiple silo’d products.
New Requirements for Optimized Network Security Ticket Oriented Resolution Proactive Management Protection Focused on Identifying Attack Packets Predictive Threat Protection Turn days of process into clicks Characterize future threats today Configuration Focused on Features Policy-Based Control Multi-Vendor Strategies Extensible Architecture Focus on real organization, people, applications, usage Integrated, collaborative, easily add new capabilities
The Power of Cloud Computing However, security remains the roadblock • Business agility • Cost efficiencies • Enhanced innovation • Improved IT services • Data loss • Authentication, Authorization and Audit • Information governance • Data control
PublicCloud Partners Cloud Vendors Applications Customers DataLoss DataLoss Email Authentication Web Intrusion Intrusion Enterprise Mobile Users Enterprise Users Private Cloud Applications
Consistent Security Across Cloud Traffic Channels User-to-Cloud App-to-Cloud • McAfee Identity Manager • Cloud SSO, Strong Auth, Provisioning • McAfee Services Gateway • App API & Web Service Security • McAfee ePO • Integrated monitoring for Cloud apps • McAfee DLP • To /From the Cloud-Data leak protection • McAfee Web Gateway • To the Cloud- web filtering • From the Cloud- AV & Malware • McAfee Global Threat Intelligence • Provides real-time URL and connection reputation
What It Takes to Make an Organization SafeGlobal Threat Intelligence Threat Reputation Network Activity Geo-location Ports / Protocol File Reputation Web Reputation Application Affiliations IP Address Domain URL Data Activity DNS Server Mail Activity Web Activity Sender Reputation GTI GTI Email Address Network IPS Web Gateway Mail Gateway Firewall Host AV 3rd Party Feed Host IPS 300M IPS attacks/mo. 300M IPS attacks/mo. 2B Botnet C&C IP Reputation Queries/mo. 20B Message Reputation Queries/mo. 2.5B Malware Reputation Queries/mo. 300M IPS Attacks/mo. Geo location feeds . 11 Security Connected
McAfee: World Class Network Security Solutions GLOBAL THREAT INTELLIGENCE RiskAdvisor NDLP Email Web ePO NAC Firewall NBA IPS SIA Network IPS: Top selling Firewall: Highest security NAC: Award winning NBA: Network visibility NDLP: Adv. control of data
McAfee’s Extensible Management PlatformIndustry Leadership to Drive Better Protection, Greater Compliance, and Lower TCO SIA Associate Partner SIA Technology Partner (McAfee Compatible)
Optimized Network Security:Solves Root Issues, Symptoms Disappear Results Incident costs decreasing Data center security outperforms @ lower cost Advanced Persistent Threat protection Policy in business terms, easy to enforce IPS alerts minimized, staff re-allocated Firewall rules streamline change management Long life reduces CapEx for security hardware P P P P P P P