SlideShare a Scribd company logo
1 of 11
Device-to-Cloud
Cybersecurity
Open, Proactiveand Intelligence-driven
Iftikhar Ali Iqbal, CISSP, CCSP, CISM
https://www.linkedin.com/in/iftikhariqbal/
Valid till Feb 2020
Portfolio Overview
OVERVIEW
SOLUTIONS
SERVICES
OPEN
ARCHITECTURE
BRIEF
McAfee – the device-to-cloud
cybersecurity company – is one of
the largest pureplay cybersecurity
companies in the world, with 30+
years of market leadership and
1,550+ patents worldwide.
CASB
Connect
OpenDXL
Portfolio Overview
An Integrated And Open Security SystemTogether, Is Far More Powerful Than Sum Of The Parts
SECURITY
OPERATIONS
DEVICE CLOUD
MANAGEMENT
THREAT INTELLIGENCE
ANALYTICS
AUTOMATION / ORCHESTRATION
NETWORK
STRATEGY
Threat Defense Lifecycle Portfolio Strategy
Portfolio Overview
CLOUDNETWORK
Cloud Workload
Protection
Mobile Threat Defense
Integrated EDR
Endpoint Protection
Secure Web Gateway
Intrusion Prevention
System
Cloud Workload
Protection
Cloud Access Security
Broker
Virtual Intrusion
Prevention System
Dedicated EDR Threat IntelligenceSIEM
INTLLIGENT SECURITY OPERATIONS
PERVASIVE DATA PROTECTIONEncryption
On-Premise
IaaS
SaaS*
*Some feature parity difference
PORTFOLIO
Advanced Persistent Threat (APT) Protection
DEVICE
Portfolio Overview
DEVICE CLOUDNETWORK
Cloud Workload
Protection
Mobile Threat Defense
Integrated EDR
Endpoint Protection
Secure Web Gateway
Intrusion Prevention
System
Cloud Workload
Protection
Cloud Access Security
Broker
Virtual Intrusion
Prevention System
PERVASIVE DATA PROTECTION
INTLLIGENT SECURITY OPERATIONS
Dedicated EDR Threat IntelligenceSIEM
Advanced Persistent Threat (APT) Protection
Encryption
OPEN
ARCHITECTURE
CASB
Connect
Portfolio Overview
DEVICE CLOUDNETWORK
PERVASIVE DATA PROTECTION
INTLLIGENT SECURITY OPERATIONS
INDUSTRY
ANALYSTS
Portfolio Overview
Solution
Services
DESIGN
ASSESSOPTIMIZE
UPGRADE
DEPLOYMIGRATE
Advance
d Cyber
Threat
Services
DATA
PROTECTION
INCIDENT
RESPONSE
SECURITY
OPERATIONS
THREAT
INTELLIGENCE
MCAFEE “as a Service”
EssentialSuccess Enhanced Success PremierSuccessProduct Training Security Training
SERVICES
Portfolio Overview
Security Training
DEVICE CLOUDNETWORK
PERVASIVE DATA PROTECTION
INTLLIGENT SECURITY OPERATIONS
SOLUTIONS SERVICESOPEN ARCHITECTURE
CASB
Connect
OpenDXL
SUMMARY
THANK YOU
Portfolio Overview
MVISION
MVISIO
NMulti Vendor InSights &Intelligence Open eNvironments
MVISION ePO
A dramatically simple cloud-based
SaaS management service.
MVISION Endpoint
Advanced augmented defense for
Windows 10 with a unified
management experience.
MVISION Cloud
Cloud-Native Data and Application
Security Across SaaS, IaaS, and
PaaS.
MVISION EDR
Powerful threat detection, investigation,
and response – simplified.
MVISION Mobile
Centrally manage and defend IOS and
Android just like any other device.
MVISION Insights
Intelligence at scale and actionable, with
detailed threat assessments .
Portfolio Overview
UNIFIED CLOUD
EDGE

More Related Content

What's hot

The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)Executive Leaders Network
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Cloudflare
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)Netwax Lab
 
Leveraging Campaigns to Untangle the Threat Group Ship of Theseus
Leveraging Campaigns to Untangle the Threat Group Ship of TheseusLeveraging Campaigns to Untangle the Threat Group Ship of Theseus
Leveraging Campaigns to Untangle the Threat Group Ship of TheseusAdam Pennington
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE - ATT&CKcon
 
Cyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptCyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptMohit Rampal
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptxaungyekhant1
 
HUAWEI CLOUD EI Development Practices
HUAWEI CLOUD EI Development PracticesHUAWEI CLOUD EI Development Practices
HUAWEI CLOUD EI Development PracticesHuawei Technologies
 
Citrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix
 
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...MITRE - ATT&CKcon
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 

What's hot (20)

The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
 
Leveraging Campaigns to Untangle the Threat Group Ship of Theseus
Leveraging Campaigns to Untangle the Threat Group Ship of TheseusLeveraging Campaigns to Untangle the Threat Group Ship of Theseus
Leveraging Campaigns to Untangle the Threat Group Ship of Theseus
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
 
Log Analysis
Log AnalysisLog Analysis
Log Analysis
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Cyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptCyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-ppt
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
HUAWEI CLOUD EI Development Practices
HUAWEI CLOUD EI Development PracticesHUAWEI CLOUD EI Development Practices
HUAWEI CLOUD EI Development Practices
 
Citrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix Netscaler Deployment Guide
Citrix Netscaler Deployment Guide
 
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 

Similar to Device-to-Cloud Cybersecurity Portfolio Overview

McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsCisco Security
 
Oracle Sparc Cloud
Oracle Sparc CloudOracle Sparc Cloud
Oracle Sparc CloudErnest Jones
 
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRockwell Automation
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesDell EMC World
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinarZscaler
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
F_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfF_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfjosbjs
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudAlert Logic
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised ComputingIOSR Journals
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour BrochureBlock Armour
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour BrochureFloyd DCosta
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud ApplicationsIBM Security
 

Similar to Device-to-Cloud Cybersecurity Portfolio Overview (20)

McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
Oracle Sparc Cloud
Oracle Sparc CloudOracle Sparc Cloud
Oracle Sparc Cloud
 
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I start
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
Cloud Architect Company in India
Cloud Architect Company in IndiaCloud Architect Company in India
Cloud Architect Company in India
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
F_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfF_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdf
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
 

More from Iftikhar Ali Iqbal

McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportIftikhar Ali Iqbal
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...Iftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookMcAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookIftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalMcAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalIftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingMcAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingIftikhar Ali Iqbal
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Iftikhar Ali Iqbal
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Iftikhar Ali Iqbal
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Iftikhar Ali Iqbal
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentIftikhar Ali Iqbal
 
Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)Iftikhar Ali Iqbal
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Iftikhar Ali Iqbal
 
Symantec Portfolio - Sales Play
Symantec Portfolio - Sales PlaySymantec Portfolio - Sales Play
Symantec Portfolio - Sales PlayIftikhar Ali Iqbal
 

More from Iftikhar Ali Iqbal (14)

McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookMcAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalMcAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
 
McAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingMcAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - Whitelisting
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept Document
 
Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
 
Symantec Portfolio - Sales Play
Symantec Portfolio - Sales PlaySymantec Portfolio - Sales Play
Symantec Portfolio - Sales Play
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Device-to-Cloud Cybersecurity Portfolio Overview

Editor's Notes

  1. McAfee is one of the largest pure-play cybersecurity companies in the world. Through 30 years, we’ve grown and evolved with the market, both through organic and inorganic means. And, during that time, we’ve listened to customers to understand where their environments are headed and how to drive successful security outcomes. Today, we’re pleased to reintroduce McAfee – the device-to-cloud cybersecurity company – to you: A company focused on protecting data and stopping threats… …within the architectural control points of modernized cybersecurity environments – the device and cloud, with Security Operations providing continuous analytics, management, automation and orchestration… …and via an open, proactive, intelligence-driven approach.
  2. Since McAfee spun out in 2017 to create a pureplay cybersecurity company, they have sort of created a new brand. McAfee brands itself as a device-to-cloud cybersecurity company. With 30+ years of experience, it provides security SOLUTIONS to control device, network and cloud points. It strongly believes that no one person, product or organization can secure the digital world – not even McAfee. That’s why their approach has ben deliberately different, by providing an OPEN ARCHITECTURE McAfee partners with other vendors (partners and competitors alike) to deliver customer’s a cohesive solution to a problem – the adversaries that plot against the collective digital freedom + orchestrate security components so that they to work together and present a unified, coordinated defense. Apart from having the right solution, it is equally important to have sound security decisions around design, deployment, maintenance, risk management and education SERVICES. For this reason, McAfee provides and integrated approach to professional and solution services, training and technical support with personalized management. Cybersecurity has now become more of a team sport, because the job is too much and too important to fly solo. No single vendor can solve all your cybersecurity challenges. You need to have all your security technologies—regardless of vendor—working together. McAfee’s tagline, “TOGETHER IS POWER” is just not a marketing call but it is an embodiment of McAfee’s own technologies working together, multivendor solutions to play well together and most importantly people (all of us) working as one team.
  3. McAfee believes that the whole system, together, is far more powerful than sum of the parts. McAfee provides highly adaptive environments that detect a threat once and immediately protect all nodes—giving customers a proactive security posture. The Threat Defense Lifecycle is McAfee’s key design principle Siloed defensive technologies fail to share threat intelligence automatically. In contrast, proactive environments detect a threat once and immediately protect all other nodes from it. McAfee uses the threat defense lifecycle (protect/detect/correct/adapt) as a design principle in our portfolio roadmaps: Protect - The goal of this Protect stage is two-part: to stop the most pervasive attack vectors while disrupting never before-seen techniques and payloads, and to derive insights that can strengthen countermeasures and inform investigators of unfolding activities. Detect – Detect covers advanced monitoring to identify anomalous, outlier behavior to perceive low-threshold attacks that would otherwise go unnoticed. As you uncover evidence, your system should share findings to enrich decision-making throughout your security infrastructure. Correct – Correction facilitates triage and prioritization for fluid investigation and rapid remediation. As you learn, your solution should apply insights immediately throughout a collaborative infrastructure. McAfee’s Portfolio Strategy is one that brings an integrated, open system from device to the cloud. Our strategy is about putting controls on devices and in the cloud, and then bringing it all together at the SOC, which has different layers to it: core management, threat intelligence, analytics. Then, we believe automation and orchestration is how you bring it all together over the long term. We will continue to cloudify products to put their control in the cloud. For example, our networking is cloud-focused in the future. We have to think of the network and the cloud becoming the same thing. That doesn't mean the network is going away, but one unique focus of ours is orienting more of our capabilities to help customers protect themselves there. We have more work, more investments to make. Our ability to continue to make investments in areas that will help us better compete, with this strategy, is what the future will be about for us. Customers and the market are saying this is the right place to be headed, so it’s a good time to take step back and ask…how do we go faster? Execution is key in making McAfee the device-to-cloud cybersecurity company of choice in the industry. McAfee works along with other cybersecurity vendors as part of the McAfee Security Innovation Alliance (SIA). The McAfee Security Innovation Alliance (SIA) provides customers with integrated security solutions that allow them to resolve more threats faster with fewer resources. Through the SIA program, we help accelerate the development of interoperable security products, simplify the integration of these products with complex customer environments, and provide a truly integrated, connected security ecosystem to maximize the value of existing customer security investments. McAfee’s approach is different. We have a clear vision of where cybersecurity is headed and how we can add value to customers by: preventing data loss and leakage and stopping threats doing so from device to cloud with an open, proactive intelligence-driven approach. We bring our customers massive scale that accompanies a 30-year history and significant footprint that serves the largest governments and companies and consumers alike.
  4. McAfee’s offering is dividing into point products for DEVICE, NETWORK & CLOUD with some solutions being pervasive across these architectural points such as DATA SECURITY and then bringing it all together at the SOC. With McAfee’s DEVICE security solution, organizations can combat emerging and unknown threats. This collective endpoint defenses include various antimalware techniques, including machine learning and application containment; application and device whitelisting solutions, on-device threat detection and protection for iOS and Android mobile devices and optimized security for server workloads across virtual and cloud environments. McAfee also provides an integrated endpoint detection and response solutions that provides investigation capabilities across endpoint and server environments. The NETWORK security offerings include signature matching and layered signature-less technologies to discover and block sophisticated threats via network intrusion prevention system solutions; and secure web gateway solutions to detect and protect from web-borne attacks and controlling web traffic. These solutions are available as hardware and virtual appliances that support deployments on both on-prem and IaaS environments. A SaaS based offering is also available for secure web gateway/proxy. Since modern IT architectures have been rapidly evolving, the CLOUD has become a new anchor for enterprise data centers and data in general. For some award-winning solution such as McAfee IPS, they are cloud-ready and available as virtual instances to provide the same level protection on your IaaS environments as for the on-prem data center. You can even protect your server and container workloads with agent-based security solutions. Most importantly, with the proliferation of BYOD and easy-to-get cloud-native solutions, whether they are Shadow or Sanctioned, requires security solutions which are cloud-native and insight driven. Traditional security solutions do not have the visibility and control to monitor and protect these cloud resources. With the Cloud Access Security Broker (CASB) solution, you get data visibility, data loss prevention, access control and advanced threat protection features for your SaaS, PaaS and IaaS environments. McAfee’s CASB solution is part of a dedicated portfolio of security solutions build in and for the cloud called McAfee MVISION. These also include endpoint security solutions which are cloud based. As mentioned before, few of McAfee’s solution are extraterritorial, meaning they work across control points. From a threat perspective, McAfee’s advanced persistent threat (APT) protection provides malware analysis including sandboxing an machine learning to increase zero-day threat detection. The intelligence form these detections could then be shared across other point solutions such as McAfee’s endpoint security and network security solution and to solutions of other cybersecurity vendors who work on open standards and platforms. Moving towards the other side of security is having the visibility and control on an organizations most important asset today, DATA. Data is everywhere—in the cloud, on your network, at employees’ home offices, and on mobile devices—the risk is in the unknown. The uncertainty of where your data resides, who has access to it, and what they are doing with it, can feel like you’re flying blind. In particular, Mobile devices and cloud services shift data far off your network, making it difficult to know exactly where your critical information has landed. Cloud services may store data in locations without formal tracking to manage its movement.  McAfee’s data loss prevention solution works in conjunction with its CASB solution, providing you a single framework for your data leakage prevention program with unified policy management, response and reporting. Whether you want to discover sensitive information on endpoints, data repositories (on-network or cloud) or you would like to enforce policies such as blocking a print from the endpoint or revoking collaboration rights from SaaS applications or block downloads of sensitive files to a personal/unmanaged device, McAfee’s pervasive data protection strategy is end-to-end and can extend this ability to enforce custom cloud applications as well. With all these different solutions in place and others in the environment there would be a shear growth of volume in security data. In order to find the right signal from the noise, any organization and specially Enterprise-level customer would eventually look into SECURITY OPERATIONS. McAfee’s portfolio of SecOps solutions include a modular and scalable SIEM solution which is build for big data and analytics. It collects, enriches, and shares data at any scale, rapidly turning events into insights, and quickly investigating and acting on identified threats. You can combine local and global threat intelligence to not only enrich McAfee’s SIEM solution but other solutions which are part of the open fabric. McAfee’s SEIM does not need to be passive, SecOps team can integrate with McAfee and non-McAfee solutions to provide response capabilities. For SecOps teams requiring a dedicated EDR solution, McAfee’s solution provides AI-guided threat investigations so SecOps can reduce alert noise and prioritize threats, this works with both McAfee and other SIEM and endpoint security solutions. All these products and solutions come in various form factors. You can deploy them on-premise or IaaS and for some solutions McAfee provides a total SaaS based platform so you do not need to deploy the infrastructure. For example, McAfee’s management platform, ePolicy Orchestrator (ePO) provides the capability to deploy, manage policies and reports for endpoint security, mobile threat defense, integrated EDR, device & data encryption, DLP and more all from a single console and single agent. You can deploy the same management solution on IaaS; with AWS a solution template is already available, on Azure for now it has to be done manually OR if the customer requires they can go complete SaaS.
  5. One of the elements you will see the resonates again and again is that McAfee’s belief in having an open architecture for cybersecurity. They are constantly evolving to become the leading open platform cybersecurity company in the market. With solutions from both complementary and competing third-party vendors to build integrations that are useful and just as feature rich as the integrations between our own solutions. Since 2008, McAfee Security Innovation Alliance has been working with independent software vendors (ISVs) to build integrations that reduce the number of management consoles, provide streamlined workflows, and automate tasks. They have expanded on this open ecosystem approach by building the OpenDXL (Open Data Exchange Layer). Although anyone can learn and create integrations for their own environment, when a vendor partner’s with McAfee, it is rigorously lab-tested and certified McAfee Security Innovation Alliance partner solutions are integrated with our solutions for unified workflows and centralized management. Currently there are more than 150+ vendors who have integrations available with the McAfee line of products. For example: The Attivo BOTsink solution can be integrated with the McAfee’s IPS. BOTsink adds insight McAfee NSP providing detailed forensic information on attacker methods, malicious domains, and provides snort signatures based on botnet behavior that can be used to block infected systems from exfiltrating valuable company data or other malicious intent. Although, McAfee DLP does provide a manual data classification feature, with the integration of TITUS Classification solutions with McAfee Data Loss Prevention reduces the risk of data loss by capturing users’ knowledge about the sensitivity and context of the data being transmitted, so organizations don’t have to solely rely on automated content scans. McAfee Enterprise Security Manager captures and aggregates the activities of both TITUS Classification and McAfee Data Loss Prevention for situational analysis and corresponding actions so-required. McAfee Data Exchange Layer transmits user actions with sensitive information as well as TITUS policy violations to McAfee Enterprise Security Manager in real-time, allowing for analysis and immediate policy modification to prevent insider threats. With McAfee ePolicy Orchestrator organizations can easily manage deployments of TITUS Classification to the client. Cisco Email Security Appliance interoperates with McAfee Advanced Threat Defense to identify and forward unknown email attachments to McAfee Advanced Threat Defense for in-depth analysis and identification of potential zero-day threats. Cisco and McAfee have interconnected their platforms and ecosystems for comprehensive visibility, threat context sharing, and real-time security orchestration based on policies. Together, we lay the foundation for a universal, unified, and nimble infrastructure for threat detection and response. With this solution, DXL brokers bridge to Cisco pxGrid Controllers for bi-directional, one-to-many communication and shared services between these fabrics. Now, high-speed messaging and automated workflows can maximize the value of contextual, threat, network, and endpoint data by sharing it with any connected application. This ground-breaking integration links two ecosystems and leverages the open source OpenDXL initiative to help enterprises reduce friction, gaps, and delays that hinder effective security operations. Truly, together is power. This integration with IBM Resilient automatically searches McAfee TIE for reputation when IOCs and artifacts are tracked within the Resilient IRP, alerting the incident response team to significant IOCs. This ensures that security analysts can operationalize threat intelligence data in real time, allowing them to focus energy on investigation and response. Splunk Phantom integrates with McAfee Enterprise Security Manager and McAfee ePolicy Orchestrator (McAfee ePO) to make security operations smarter, faster, and stronger. Security events ingested from McAfee Enterprise Security Manager trigger the automated execution of playbooks on the Splunk Phantom platform. Phantom Playbooks automate workflows for threat investigation, indicator hunting, containment with McAfee ePO, remediation, and other scenarios. This idea has also been extended to the cloud, McAfee’s Cloud Access Security Broker (CASB) already provides integration with majority-known SaaS applications such as Microsoft Office 365, Teams, Google G Suite, Box, Salesforce etc but due to the adoption of cloud, applications other than productivity and CRMs are also embracing the cloud and are being embraced by the customer as well. So few months ago, McAfee introduced the McAfee’s CASB Connect. It enables any cloud service provider or partner to rapidly build API connectors to McAfee MVISION Cloud to empower enterprises to securely adopt any cloud service and enforce the same set of security policies across all cloud services. Furthermore, McAfee’s CASB also provides support for custom apps, who do not have APIs. The McAfee Security Innovation Alliance program is a direct reflection of McAfee’s belief that “Together is Power,” and they make sure we work with our partners to create strong, successful product integrations to ensure that even stronger cybersecurity solutions are available for our customers.
  6. https://www.mcafee.com/enterprise/en-us/about/awards.html DEVICE AV Comparitives: https://www.av-comparatives.org/awards/mcafee/ AV Test: https://www.av-test.org/en/antivirus/business-windows-client/windows-10/april-2019/mcafee-endpoint-security-10.6-191515/ Cybersecurity Excellence Awards: https://cybersecurity-excellence-awards.com/candidates/mcafee-endpoint-security/ https://cybersecurity-excellence-awards.com/candidates/mcafee-mvision-endpoint/ https://cybersecurity-excellence-awards.com/candidates/mcafee-mvision-mobile/ SC Magazine: https://www.scmagazine.com/review/mcafee-mvision-endpoint-1905/ Frost & Sullivan: Best Practice Award, 2017. https://www.mcafee.com/enterprise/en-us/assets/product-reviews/prv-frost-sullivan-award.pdf CRN: Tech Innovators Awards, Finalist 2018. https://www.crn.com/rankings-and-lists/ti2018-details.htm?c=203 The Radicati Group: Endpoint Security – Market Quadrant, 2018 – Top Player Gartner Peer Insights: Customers Choice, 2018. https://www.gartner.com/reviews/market/endpoint-protection-platforms/vendor/mcafee/product/endpoint-security-ens NETWORK Gartner: Magic Quadrant, IPS, 2018 – Leaders NSS Labs: Data Center Intrusion Prevention Systems, 2018 – Recommended The Radicati Group: Corporate Web Security, 2019 – Top Player The Radicati Group: Advanced Persistent Threat (APT) Protection, 2019 – Top Player Gartner Peer Insights: Customers Choice, 2019. https://www.gartner.com/reviews/market/secure-web-gateways/vendor/mcafee/product/mcafee-web-gateway-appliance CLOUD Cybersecurity Excellence Awards: Cloud Security, 2019 – Leaders Frost & Sullivan: Best Practice Award, 2018, CASB. https://www.prnewswire.com/in/news-releases/mcafee-commended-by-frost--sullivan-for-helping-companies-securely-adopt-cloud-solutions-with-mcafee-skyhigh-security-cloud-695142231.html Garner: Magic Quadrant, CASB, 2018 – Leaders Forrester: The Forrester Wave, CSG, 2019 – Leaders IDC: MarketScape, CSG, 2017 – Leaders Kuppingercole Analyts: Leadership Compass, CASB, 2018 – Overall Leader, Innovation Leader, Market Leader The Radicati Group: CASB, 2018 – Top Player Gartner Peer Insights: Customers Choice, 2019. https://www.gartner.com/reviews/market/cloud-access-security-brokers/vendor/mcafee/product/mcafee-mvision-cloud https://www.scmagazine.com/home/security-news/company-news/the-winners-of-the-2019-sc-awards-honored-in-the-u-s/ PERVASIVE DATA PROTECTION Please note that Gartner Magic Quadrant for Enterprise DLP has been retiered. The Radicati Group: DLP, 2018 – Top Player Gartner Peer Insights: Customers Choice, 2018. https://www.gartner.com/reviews/market/enterprise-data-loss-prevention/vendor/mcafee/product/mcafee-dlp Intelligent Security Operations Gartner: Magic Quadrant, SIEM, 2018 – Leaders SC - https://www.mcafee.com/enterprise/en-us/assets/product-reviews/prv-sc-magazine-esm-5-star-rating.pdf https://www.scmagazine.com/review/mcafee-enterprise-security-manager-3/
  7. The McAfee Customer Success Group (McAfee CSG) encompasses three groups, united as one—technical support, consulting services, and education services—all focused on proactively ensuring you achieve your desired security outcomes through your deployment and use of McAfee solutions. Our mission is simple: we are dedicated to helping you successfully deploy and use McAfee solutions, manage your operational risk and see a sustained value over time. From deployment services and proactive account management to self-help resources, communities, and on-call expert assistance, the McAfee Customer Success Group delivers the people, processes, tools, and technology to ensure that you achieve the security outcomes you want. Technical Support McAfee Business Support – 24/7 Support by Phone and online Service Portal McAfee Enterprise Support – Direct access to expert Technical Support Engineers and an assigned Support Account Manager Our Customer Success Plans transform traditional technical support by providing a comprehensive roadmap combining solution and Foundstone services, education/training, and technical support with personalized management and tools. Plan your security strategy, maintain your solutions, manage your operational risk, and see a sustained value over time with a plan that enables you to successfully deploy, manage, and optimize McAfee products and solutions, turning your security into a business driver. All Customer Success Plans provide direct access to expert Technical Support Engineers for technical issue resolution. Consulting Services   With today’s security teams needing day-to-day security management and maintenance, they don’t have the bandwidth to learn every aspect of a product and how it can help their organization handle cyberthreats and attacks more effectively and efficiently. This lack of resources and time puts enterprises at greater risk, potentially resulting in a weakened security posture, financial loss, and negative impact on company reputation. To help you use our products effectively and achieve your security goals, McAfee offers a broad-based consulting services portfolio consisting of two distinct practice areas: McAfee Solution Services and McAfee Advanced Cyber Threat Services.   McAfee Solution Services are a group of product-related services which help ensure your security products are effectively deployed, integrated, assessed, and optimized in alignment with your security strategy.   McAfee Advanced Cyber Threat Services are a group of strategic, hands-on security services which help you design strong security programs and enforceable policies for your enterprise. Education Services   Like many enterprises, you struggle to keep pace with the increasing volume of rapidly evolving threats. Limited time and a skills shortage make it difficult to optimize your current McAfee solutions and adopt others that you need to further your security goals and desired outcomes. The McAfee Education Services portfolio provides flexible, cutting-edge training options delivered by our seasoned security experts. We help accelerate, improve, support, and boost your IT administration and security capabilities. A fully trained staff makes for a more secure organization. Product Training   To gain maximum value from your McAfee solutions, you need expertly trained staff to configure and manage your McAfee solutions more efficiently, and optimally safeguard your critical data. You also need your staff on-site, doing their job. Now, you can have both. McAfee offers a wide range of hands-on product training courses to help you design, set up, configure, and manage your McAfee solutions. Delivered in classrooms and online, our courses help you make the most of your product investment.   Security Training   Security training courses focus on building security software and applications, assessing vulnerabilities, and gaining critical computer forensics skills to help your IT professionals become proficient in developing best practices for implementing your security strategy. Security training is only offered through instructor-led training in private classrooms.