Esteban Próspero
-
Upload
clustercba -
Category
Technology
-
view
166 -
download
2
description
Transcript of Esteban Próspero
.
Esteban Javier Próspero | Director, Ingeniería
Seguridad ConectadaLa Nueva Generación de Protección para Empresas
@e_prospero
.
1. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013-2018. Feb. 20142. IDC, The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in Far East. Dec. 2012
81%crecimiento de tráfico de datos móviles en 2013 (1.5 exabytes/mes)1
50%de los datos que necesitan protección están protegidos hoy2
40 %de los datos estarán en el cloud en el 20202
La Complejidad de IT Corporativa crece día a día
.
3
Ataques Avanzados: alto impacto material
1. http://online.wsj.com/news/articles/SB100014240527023042556045794066941821325682. McAfee, “Net Losses: Estimating the Global Cost of Cybercrime,” June 20143. Ponemon Institute 2013 Cost of Cyber Crime study
VENTAS caída 46%1
COSTOS más US $61M1
IMPACTO MARCAINCALCULABLE
GANANCIAScaída 34%1
Costo anual del crimen cibernético: US $400.000
millones2
Costo promedio de ataques 2013:
US $11.6 millones3
Cantidad de ataques exitosos: 122 por semana por
empresa3
MULTAS POSIBLESUS $400M a
$1.1B1
Ejemplo de la cadena de retail TARGET*
.
Endpoint Security
Network Security
Deep Security
Context and Orchestration
Threat Intelligence
Analytics
Security Management
Plataforma de Seguridad Conectada de McAfee
. 4McAfee Confidential
.
5
EndpointEndpoint
McAfeeePO
Adaptive security improves anti-malware protection• Better analysis of the gray• Crowd-source reputations from your own environment• Manage risk tolerance across departments / system types
Actionable intelligence• Early awareness of first occurrence flags attacks as they
begin• Know who may be / was compromised when certificate or
file reputation changes
YES NO
McAfeeGlobal ThreatIntelligence
3rd PartyFeeds
Data Exchange Layer
McAfeeTIE Server
McAfeeATD
McAfeeESM
Threat Intelligence ExchangeAdapt and Immunize—From Encounter to Containment in Milliseconds
ePO : Policy OrchestratorESM : Enterprise Security ManagerATD : Advanced Threat DetectionTIE : Threat Information Exchange
.
6
EndpointEndpoint
McAfeeePO
McAfeeATD
McAfeeGlobal ThreatIntelligence
3rd PartyFeeds
Data Exchange Layer
McAfeeTIE Server
McAfeeESM
Web GatewayEmail GatewayNGFW NSP
Threat Intelligence ExchangeAdapt and Immunize—From Encounter to Containment in Milliseconds
ePO : Policy OrchestratorESM : Enterprise Security ManagerATD : Advanced Threat DetectionTIE : Threat Information Exchange
.
7
McAfeeESM
EndpointEndpoint
McAfeeePO
McAfeeATD
Web GatewayEmail GatewayNGFW NSP
Data Exchange Layer
McAfeeGlobal ThreatIntelligence
3rd PartyFeeds
Gateways block access based on endpoint convictions
Security components operate as one to immediately share relevant data between endpoint, gateway, and other security products
Proactively and efficiently protect your organization as soon as a threat is revealed
McAfeeTIE Server
Protección Instantánea en toda la Empresa
ePO : Policy OrchestratorESM : Enterprise Security ManagerATD : Advanced Threat DetectionTIE : Threat Information Exchange
.
Made in Cordoba desde hoy
TIE
DXL
ESM
SIEM: Enterprise Security Manager
Performance
Inteligencia
Situational awareness
Data Exchange Layer
Real-time
Comunicación bidireccional
Seguridad adaptativa
Threat Information Exchange
Visibilidad y control real time
Protección y respuesta integral
Seguridad adaptativa