ePolicy Orchestrator 4dot6Overview -...

31
September 21, 2012 McAfee ePolicy Orchestrator 4.6 The Foundation of McAfee Security Management Platform Name Title

Transcript of ePolicy Orchestrator 4dot6Overview -...

Page 1: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

September 21, 2012

McAfee ePolicy Orchestrator 4.6 The Foundation of McAfee Security Management Platform

Name Title

Presenter
Presentation Notes
Introducing ePo, ePolicy Orchestrator, the foundation of McAfee Security Management Platform
Page 2: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

2

Agenda

Current State of Security Management

Advantages of ePolicy Orchestrator

Overview of ePO 4.6

Demo

Presenter
Presentation Notes
Today’s agenda Review the current state of security management Show advantages of our centralized security management platform Give an overview of what is in the forthcoming new release (4.6) Provide a demo of the most common tasks in ePO Questions will be answered at the end but feel free to submit them during the webinar.
Page 3: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Today’s Security Landscape

Daily new malware threats 55,000 More Malware

Variations

Active new zombies per month 5M Attack Target

Users vs. Machines

New malicious website detected

30 Seconds

Malware is obfuscated 85%

Web 2.0 is the Catalyst!

Toolkits & Obfuscation

Of all threats are financially

motivated

90%

Presenter
Presentation Notes
Huge number of malware coming up daily Threats are now blended and use multiple ways in to get access to your systems: e.g. Spam email which points you to a malicious website where a trojan is then downloaded. New vulnerabilities are not only identified in Operating Systems but also now in popular applications like Adobe Acrobat. More and more, cybercriminals will write specific exploits that target these vulnerabilities as soon as they are identified (zero-day attacks) Today is no longer about getting to the users but gaining access to the computer Web 2.0 is one of the catalysts, with a new malicious website detected every 30 seconds! And 90% of these attacker are financially motivated!
Page 4: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

4

Cyber Crime Altering Threat Landscape

Password Stealers Malicious websites Email Attacks Autorun Malware

Value of Data on Black Market

$980–$4,900 Trojan to Steal Account Information

$490 Credit Card Number with Pin

$147 Birth Certificate

$78–$294 Billing Data

$147 Driver’s License

$98 Social Security Card

$6–$24 Credit Card Number

$6 PAyPal Account Logon and Password

End User = DATA

Cybercrime “Ecosystem”

Spammers Identity Thieves

BOT Herder

Malware Developer

Tool Developers

Vulnerability Discovers

Current Trends:

Botnets Zero-day exploits ‘Scareware’ Also Mac and Linux

Presenter
Presentation Notes
Current Trends in IT security landscape and what it means for the user and the organization. Source: McAfee Labs
Page 5: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

September 21, 2012 5

Proliferation of Security Products from Multiple Vendors

IPS

NAC

Vulnerability Manager

Encryption

Policy & Remediation

EndPoint Firewall Web

NUBA

eMail

Data

Security Landscape

McAfee TippingPoint

Sourcefire Juniper

Cisco IBM

Entrasys NitroSecurity

DeepNines StillSecure

Check Point Stonesoft

McAfee Cisco

Juniper Symantec

Aruba Sophos

Check Point TippingPoint

Entrasys StillSecure

Nortel

McAfee Symantec

CodeGreen Credant

Lumension Cisco

WebSense

Lumension NetIQ Rapid7 WhiteHat Acunetix SourceForge Nikto (freeware)

McAfee Symantec

IBM Microsoft

ConfigureSoft BigFix Oracle

ThirdBrigade (TrendMicro)

McAfee Mazu Cisco Lancope ArborNetwork

SkyRecon Microsoft G data Trust Port eScan BitDefender Avira Dr Web F-Port BullGuard Arcabit Risisng Software Clam VBA AVG

McAfee SecureWave winMagic SafeNet Wave Systems Mobile Aromr Microsoft IBM TrendMicro

McAfee Cisco Juniper Check Point Fortinet Stonesoft SonicWALL Watchguard NETSQ Astaro Phion HP

Cisco Trend ScanSafe Symantec Websense BlueCoat Aladin Finjan Mi5(Symantec) Facetime CP Secure

McAfee Barracuda TrendMicro Symantec Cisco Google SonicWALL WebSense BorderWare Microsoft ProofPoint

McAfee Symantec

TrendMicro Sophos

Kaspersky Panda

Microsoft Eset

CA F-secure

eEye Digital Prevx

Check Point IBM

Landesk BigFix

McAfee Barracuda

ContentKeeper CA

Webroot Clearswift

8e6 (Marshal) Cymphonix

Check Point Sophos Credant

PGP GuardianEdge

Symantec Information

Security Corp. iAnyWhere

Solutions BeCrypt

Tumbleweed SoloBreaker Verdasys Oakley Fidelis BorderWare IBM WinMagic RSA Vericept

InfoExpress Insightx Impulse Point Forescout Bradford Consentry Trustwave

Top Layer Radware Snort HP McAfee

IBM Microsoft

nCircle Qualys Nessus

Presenter
Presentation Notes
More tools required to protect your IT infrastructure may mean having to look for point products from multiple vendors
Page 6: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

6

Security Landscape

Leads to Proliferation of Security Management Consoles and Reporting Tools

Anti-virus Management Tools 1

Network Access Control Management Tools

8

Anti-spyware Management Tools 2

Host Intrusion Prevention Management Tools

7

Desktop Firewall Management Tools 3

Data Protection (DLP, Encryption, etc.) Management Tools

6

Policy Auditing Management Tools 4

Web Security Management Tools 5

Presenter
Presentation Notes
The more point products and consoles you deploy the higher the costs and more complex it become. One product is a counter measure against viruses, another for spyware, web content, desktop firewall, encryptions, data loss prevention, desktop host intrusion prevention, compliance, network access control… This scattershot approach provides a short-term solution, but its complexities make it inefficient and ineffective as each solution requires an agent, a console, hardware, policy engine/database, update cycles, communication protocols, people, processes, knowledge, and support. This approach also prevents a holistic view of your environment and the ability to react quickly to threats. How can you enforce policy in a timely manner? What about the complexity of managing multiple vendors and contracts? According to Peter Firstbrook, security analyst for Gartner, he recommends, “wherever possible, consolidate endpoint protection vendors and purchase protection in solutions, rather than in discrete products”.
Page 7: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

7

Leads to Proliferation of Security Management Consoles and Reporting Tools

• Lack of automation, reporting from disparate systems: resource drain

Maintenance & Audit Fatigue

• Siloed processes and management tools: slows incident response times

Operational Complexity

• Lack of integration, no correlation of data: increases effort, time to diagnose issues

Low Visibility

Pain Points

Presenter
Presentation Notes
What do more consoles means in practice? It makes a tough job tougher – complexity hinders visibility and speed. Orchestrating security manually through multiple systems often means the job you ARE doing is not the job you would RATHER be doing. This costs time and money and frustrates IT personnel and management.
Page 8: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

8

Leads to Proliferation of Security Management Consoles and Reporting Tools

Problems

Security Gaps

Higher Costs

Presenter
Presentation Notes
This situation may lead to security gaps and will surely mean higher costs.
Page 9: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

9

McAfee ePolicy Orchestrator 4.6 ePolicy Orchestrator

McAfee ePolicy Orchestrator

• Automate solutions with open API

• Leverage ecosystem

• Connect to your IT infrastructure

• Streamline processes

• Speed incident responses

• Reduce audit fatigue

• Central point of reference

• Enterprise-wide visibility

• Reduce management complexity

• Distributed architecture supports deployments of any size

• Flexible reference architecture

Extensible Automated

Unified Enterprise-ready

Presenter
Presentation Notes
This slide shows what ePO does and what it means for you and the IT team.
Page 10: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

10

McAfee ePolicy Orchestrator Key Feature Overview

McAfee ePolicy Orchestor

• End-to-End Visibility – Unified point of reference across

security solutions • Personalized Command Center

– Tune work environment to optimize efficiencies

• Drag-and-Drop Dashboards and Actionable Reports

– Immediate insight to action slashes response times

• Role-based Access Control – Distribute administration and

information

• Rogue System Detection – Identify and manage all networked

assets to lower risk • Powerful Workflows

– Automate common routines, streamline processes across systems

• Enterprise-ready – Flexible, scalable architecture minimizes

CAPex and OPex • Extensible Framework

– Increase value of existing security assets, optimize for future needs

Presenter
Presentation Notes
Let’s now review the key features of ePO and find out how all of these attributes create a platform that provides visibility into enterprise-wide security posture, eliminates boundaries between security, processes and people to drive down costs and strengthen protection, creating a responsive, secure environment to support the business.
Page 11: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Confidential McAfee Internal Use Only September 21, 2012 11

End-to-End Visibility

• Single version of the truth across systems, networks, compliance solutions

• Delivers real-time threat intelligence from McAfee Labs for contextual risk assessment

• Unified command center – Create, enforce, manage policies and workflows – Centralized reporting for endpoint, data, network, risk

management

• Access from anywhere – Web-based UI

• System of record

Achieve immediate insight into enterprise security and compliance postures

Presenter
Presentation Notes
True end-to-end visibility means reliable and real-time information about your IT security. The integration with McAfee labs via the Global Threat Intelligence network also provide contextual risk assessment. Since ePO is web based, it can be accessed from anywhere in your organization Simply put, a single system of record means integrity of data.
Page 12: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Confidential McAfee Internal Use Only September 21, 2012 12

Personalized Command Center

• Personalize views, navigation and action bar • Drag-and-drop controls to place most used

within easy reach • Create query groups and related workflows

based on your priorities automate common tasks

Tune your work environment to best suit your needs

Presenter
Presentation Notes
ePO’s powerful dashboards are fully customizable in intuitive ways such as drag-and-drop and logical grouping.
Page 13: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Confidential McAfee Internal Use Only September 21, 2012 13

Role-based Access Control

• Distribute administrative tasks and information by role

• Roles defined by permission sets – Permission sets for functionality such as

Reporting, Automation, Configuration

– Upon login, user is presented only with the features that they have permission to access; everything else is hidden

• Increase management confidence in security posture and cut reporting time

– Create role-based dashboards for executive users

Permission sets determine what users can see and do to facilitate efficiencies

Presenter
Presentation Notes
Role-based Access Control allows more people within an organization to take advantage of the information in ePO while at the same time get access only to the data and functions they need to do their job. So, for example, executive users can be given a specific login and have access only to a dashboard that shows high-level summary type data. Permission Sets defines roles within ePO. These sets allow users with the same permissions to managed as a group. ePO can also leverage AD user groups to assign those permission  to specific users within an Active directory group. System administrators that used to spend several hours per day creating reports for executives, can now simply create dashboards and assign those dashboards to executive users. When the user logs in, they are presented only with the tools that they have permission to access; everything else is hidden.
Page 14: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Confidential McAfee Internal Use Only September 21, 2012 14

Drillable Dashboards and Actionable Reports

• Dashboards provide at-a-glance understanding of security posture

– Dashboards display complex information quickly – Correlated threat intelligence provides risk

assessments – Drill to detail – Drag-and-drop editing – Share with others

• Actionable Information – Execute tasks directly from a dashboard or report

(update now task button) – Kick off workflows based on predefined reporting

thresholds

• Generate reports on-demand, on a schedule or with an event

– Schedule and email html, xml, csv, or pdf reports – Multiple queries within a single report – Parameter-based reports – develop on-demand

reports with user-driven filters

Dramatically slash incident response times

Presenter
Presentation Notes
Dashboards allow to dramatically cut response times as users will see just the information they need. However, should they need to get more details, each components of the dashboard can be clicked to drill down to the information behind the chart. Scheduled and on-demand reports complete the powerful capabilities of ePO.
Page 15: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Confidential McAfee Internal Use Only September 21, 2012 15

Rogue System Detection

• Identifies rogue systems connecting to network

• Rogue sensors strategically deployed to detect rogue systems

• Detect all systems connecting to your network such as

– PC, routers, printers

• Provides system of record to identify assets

Identify assets to bring under control and to mitigate risk

Presenter
Presentation Notes
Rouge System Detection means the ability to find and identify systems connecting to the network that are not yet managed by ePO.
Page 16: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Confidential McAfee Internal Use Only September 21, 2012 16

Powerful Automations & Workflows

• Automatic response system works with existing infrastructure

• ‘Tag’ assets and policies to take future actions based on tags

– Example - As new Exchange servers come into the system tree run task to deploy GroupShield protection

• Create tickets within HP OpenView and BMC Remedy ticketing systems

– Make security processes a transparent part of IT operations

• Connect to external systems and customize workflows with ePO Web API

– Supports business logic

Streamline workflows to eliminate security gaps and achieve efficiencies

MALWARE ATTACK

Report Sent to Team through phone and

issue is created

Issue sent to 3rd party help desk

Patch update sent; ePO and help desk synched in system

Event Trigger Report Help Desk Resolved

Presenter
Presentation Notes
ePO’s architecture is extensible. Tags can be used to identify particular systems and to automate security processes by assigning tag-bound tasks. ePO use its Automatic Response feature to send email alerts, SNMP traps, execute an external commands, run schedule server tasks or generate issues for ticketing .  This capability is used to automatically respond to all events that occur within the ePO solution platform.  Administrators can leverage this features to integrate with existing customer infrastructure systems and to optimize alerting and workflow activities within an organization. For example, ePO 4.5 allows events from ePO to automatically create tickets within HP Openview Service Desk and BMC Remedy ticketing systems.  This integration allows customers to optimize workflow within their organization so that issue ticket management can be synchronized across both platforms.
Page 17: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Confidential McAfee Internal Use Only September 21, 2012 17

Enterprise-class Scalability

• Dramatically improve scalability

• Improve security policy and DAT coverage for remote and roaming endpoints solutions

• Policy sharing and usage reporting across servers

Multi-tiered, distributed architecture elegantly scales

ePO Server ePO DB Web Console

McAfee Network Security

McAfee Update Servers

Agent Handler

Distributed Repository

Super Agents Distributed Repository

Notifications Ticketing Systems

Presenter
Presentation Notes
The ePO architecture is fully scalable. This slide provides an overview of its components. Core components: The ePO 4.5 core platform components are comprised of the ePO application server, database server, web console and the McAfee Update servers.  The ePO application server and database server can run on single or multiple servers, either physical or virtual.  This architecture supports clustering for high availability infrastructure requirements.  ePO users access the application using their Internet Browser and there are no requirements for client-side software installation to manage the platform.  ePO receives all security, compliance and threat content from the Mcafee update infrastructure.  This content is generated and distributed to our servers by McAfee labs leveraging our collective Global Threat Intelligence infrastructure. Distribution Components: ePO 4.5 uses agent handlers and distributed repositories to load balance agent communication, deploy software and distribute McAfee security content to the endpoints.  Agent handlers act as channel for McAfee agents installed on the endpoints to be able to communicate with the core components.  Agent handlers are installed on physical or virtual servers that can be load balanced using software, hardware or ePO agent handler grouping.  They can also be used to mange remote systems that may not have a connection with your organization’s internal network.  Agent handlers allow customers to scale from hundreds to hundreds of thousands of endpoints.  Distributed repositories use UNC shares, FTP and HTTP services to distribute software and content updates to your endpoints.  They can be hosted on existing servers in your environment to further reduce operational costs.    ePO centrally manages all the configuration parameters and replication scheduling for all of the distribution components. Agent Components: The McAfee Agent is the component that is installed at the endpoint to allow ePO to manage all McAfee security and compliance endpoint solutions.  Supported on Microsoft, Linux, Solaris, MAC and HP-UX platforms, it allows our customers to manage security and compliance on multiple operating system platforms through a single management solution. McAfee Network security and Compliance solutions also plug into the ePO platform.  ePO leverages information across multiple vectors to reduce the time required to identify, fix and report on security and compliance events within an organization. 
Page 18: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Extensible Framework McAfee’s Open Platform for Security Risk Management

SIA Associate Partner SIA Technology Partner (McAfee Compatible)

Presenter
Presentation Notes
ePO is a comprehensive platform for any organization to build their security posture around.  This is powerfully demonstrated by the thousands of customers both large and small who rely on ePO on a daily basis to optimize their own security posture.  However, McAfee didn’t stop with the idea of consolidating McAfee products into the centralized management and monitoring capabilities.  We also built ePO as an open framework, thus allowing 3rd party vendors to build their products to integrate tightly with ePO allowing the customer to significantly extend their existing ePO investment.  There are dozens of 3rd party vendors who have demonstrated the strength of ePO as a platform by building their products to be managed and monitored directly into the ePO console.  This type of integration further eliminates “console fatigue”, helps reduce the blind spots that the organization can face by having to manually correlate data regarding their risk posture, and ultimately increases the value the organization will see from their security infrastructure.  The full list of SIA partners is available under request.
Page 19: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

19

McAfee ePO Users Manage More with Less

Simple. Flexible. Efficient.

MSI International, survey of 488 ePO & non-ePO users

• ePO users manage more – 30% more endpoints – Using 50% less hardware

• Spend less time managing security

– 38% less time on security reporting – 41% less time on developing security policies – 31% less time repairing endpoints after an infection

Presenter
Presentation Notes
This is information gathered from a recent study with MSI international of almost 500 ePO and non ePO users to measure efficiencies. ePo will enable your organization to be scalable, cost-efficient and agile.
Page 20: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Confidential McAfee Internal Use Only September 21, 2012 Title of presentation 20

McAfee Strengthens Protection, Achieves Cost Efficiencies for the Agile Business

“We are extremely confident with ePO and all the threat protection managed by it. Using McAfee, our clients have not had a single outage by a security incident in that area in seven years.”

Martin Reindl, Business Unit Leader System Security, Atos Origin Germany

Presenter
Presentation Notes
Some comments from some of our customers about ePO.
Page 21: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Confidential McAfee Internal Use Only September 21, 2012 Title of presentation 21

McAfee Strengthens Protection, Achieves Cost Efficiencies for the Agile Business

“With McAfee, I can provide better, more comprehensive protection for the Agency — and spend less time doing so. Best of all, I have much greater peace of mind.”

Rogelio Garcia, Systems Administrator, Agencia de Defensa de Competencia de Andalucia

Presenter
Presentation Notes
Some comments from some of our customers about ePO.
Page 22: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Confidential McAfee Internal Use Only September 21, 2012 Title of presentation 22

McAfee Strengthens Protection, Achieves Cost Efficiencies for the Agile Business

“McAfee best meets our need for central managing, and we agreed with their future views on anti-virus technologies and policies. We knew we could evolve easily with McAfee over time.”

Kjell Larsson, Technical Product Manager for Security and Access, TeliaSonera AB

Presenter
Presentation Notes
Some comments from some of our customers about ePO.
Page 23: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Confidential McAfee Internal Use Only September 21, 2012 Title of presentation 23

McAfee Strengthens Protection, Achieves Cost Efficiencies for the Agile Business

“I want to have more control in managing security as Draka expands globally, and ePO will play a very important role in that evolution.”

Aad Oudeman, Global Infrastructure Shared Services Manager, Draka Holding

Presenter
Presentation Notes
Some comments from some of our customers about ePO.
Page 24: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Q&A Session

24

Page 25: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

September 21, 2012

Customer Success

Page 26: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Maximum Protection with Minimal IT Resources at the Agencia de Defensa de la Competencia de Andalucia

26

Industry Government

Environment MS Windows 2003 environment with 23 desktops and five servers

McAfee Products Deployed Total Protection for Secure Business with ePolicy Orchestrator® (ePO®)

Challenges • Poor performance and inadequate administration tools for previous antivirus system

• Exposure to security threats through memory devices plugged into USB ports

Optimized Solution Summary • Time spent checking and updating systems reduced from one day to two minutes

• Prevents malware or other threats from entering the system via a USB device

• Saves money compared to multiple point security solutions; device control alone would have cost almost as much as the entire McAfee solution

• Blocks users’ access to harmful websites

“With McAfee, I can provide better, more comprehensive protection for the Agency— and spend less time doing so. Best of all, I have much greater peace of mind.” Rogelio Garcia, Systems Administrator, Agencia de Defensa de Competencia de Andalucia

Page 27: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Customer Success: TeliaSonera AB

“McAfee best meets our need for central managing, and we agreed with their future views on anti-virus technologies and policies. We knew we could evolve easily with McAfee over time.” Kjell Larsson, Technical Product Manager for Security and Access, TeliaSonera AB

•Challenge – Protect endpoints with a common, integrated security solution – Avoid system-wide outbreaks that could paralyze their customer service desk – Maintain control of and visibility into company’s network

•McAfee VirusScan Enterprise, AntiSpyware, Host Intrusion Prevention, and EPO

– Provides protection of its 23,000 desktops and 3,500 servers against malicious attacks

– Minimizes risk of malware intrusion on the desktops and laptops – Reduces time managing security via consolidated console

Page 28: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Customer Success: Draka Holding

“I want to have more control in managing security as Draka expands globally, and ePO will play a

very important role in that evolution.” Aad Oudeman, Global Infrastructure Shared Services Manager, Draka Holding • Challenge

– Global centralization of IT services forced 6th largest worldwide cable provider to update its security solutions for 9,000 employees in 29 countries

– Limited IT staff burdened the management of IT and security for 80 worldwide sites

• McAfee ToPS for Endpoint Simplifies Global Security Standardization – Enforces 24x7 centrally managed protection for 80 sites worldwide – Automates distribution of patches and software upgrades in minutes – Enables customization of new policies, rules and network access at local sites – Ensures IT services standardization and compliance in every country – Reduces administrative time for worldwide IT staff by intelligently monitoring

security

Page 29: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Customer Success: Scania AB

“We’ve stayed with McAfee for a few reasons. McAfee’s anti-virus coverage is very comprehensive, and McAfee’s industry reputation and solution knowledge are widespread.” Frederik Tomasson, IT Security Manager, Scania AB

•Challenge – Ensure overall Internet and desktop security for 35,000 employees worldwide – Manage specific user access policies across different countries – Increase security coverage without increasing administrative tasks or staff – Avoid downtime for employees during new anti-virus solution or upgrade rollouts

•McAfee Total Protection (ToPS) for Endpoint Strengthens Anti-virus Protection for Scania AB for the Long Haul

– Protects 15,000 endpoints against virus attacks – Saves 30% of IT manpower in managing anti-virus activities – Allows for customization of anti-virus usage policies within a distributed

organization – Simplifies and streamlines worldwide rollouts of upgrades, and new Internet and

desktop security solutions – Nearly zero downtime amongst users during upgrade rollouts

Page 30: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

Customer Success: Abtran

• Challenge

– Ensure security of thousands of credit card transactions daily – Meet PCI DSS and ISO 27002 standards – Protect client information coming in and out of 2 call centers, 2 data centers, 500 desktops, and 30

servers – Prevent potential data loss on laptops – Provide multiple layers of security risk management protection without negatively impacting IT

administrator’s time

• McAfee ToPS for Endpoint, Network Security Platform, Endpoint Encryption, Vulnerability Manager,

and Email Security Service—Helps Abtran Save Time while Meeting Compliance Regulations – Cuts time to produce weekly security reports from 3 to 4 hours to less than 2 minutes – McAfee ePO 4.0 saves IT support hours each week in administering and monitoring endpoint security – Guards Abtran from risks of financial loss, brand damage, public disclosure, or noncompliance – Management of multiple solutions made easy—by gaining full visibility in the enterprise while

consolidating data, all through a centralized console that is transparent to users

“Because McAfee provides centrally managed anti-virus protection, encryption, intrusion detection and prevention, vulnerability management, and more, it plays a key role in our road to compliance with PCI, ISO, and other information security standards and customer requirements.” Robert Ravenscroft, IS Security Manager, Abtran

Page 31: ePolicy Orchestrator 4dot6Overview - u.b5z.netu.b5z.net/i/u/10210123/f/PR_ePO_Customer_Overview.pdf · McAfee ePolicy Orchestrator 4.6 ... WebSense Lumension ... but its com\൰lexities

31

ePolicy Orchestrator

Large Enterprise (>10K) Mid-Sized Enterprise (1K-10K)

ePO Non ePO ePO Non ePO # of Security

Admin Servers

# of Security Administrators

Mean Hours per Week per Administrator Spent on IT

Security Operations

Total Full Time Employees (FTE)

2.1

7.9

3.9

0.8

7.2

15.8

9.5

3.7

5.3

15.3

10.3

4.0

10.7

27.1

16.2

10.9

387 survey interviews completed by Insight Express, dated June 2007 -- 176 ePO customers, 211 non-ePO -- Mid-sized avg 4,100 nodes, Larger avg 46,000 nodes

Footnote: Actual numeric values are based on the “means” calculated using the midpoints of the ranges used in the survey

Presenter
Presentation Notes
This slides supports and includes more details to slide 15 (ePO Delivers Operational Efficiencies & Business Benefits) regarding the Insight Express survey. Another huge BUSINESS benefit statement is captured on this slide: McAfee recently undertook in a blinded primary market research, engaging with Insight Express for the project. A total of 387 interviews were completed with IT decision makers in organizations with greater than 50 on-site employees. Sample size included large enterprises, with 10,000 nodes or more, and mid-sized enterprises with 1,000 to 9,999 nodes in the US and 500 to 9,999 nodes outside of the US. Out of the 387 survey interviews completed, 176 of the interviews were completed with ePO customers. The remaining 211 interviews were completed among non-ePO customers, who were surveyed in from Canada, Germany, the United Kingdom, and the United States. The type of customer personas interviewed included System Administrators, Senior IT Management, Network IT Management, Director of IT, CIO, CSO, CISO and IT Consultants. The findings shown on this table illustrate a very compelling message – which is that ePO optimizes customers’ security investment and delivers quantifiable operational efficiencies in their environment. ePO customers benefit from significantly fewer deployed servers, reduced number of total administrators spending less time per week administering and managing security products – all translating into measurably lower staff resources and operating cost.