Intel and McAfee Collaborating for a more secure digital...
Transcript of Intel and McAfee Collaborating for a more secure digital...
Intel and McAfee Collaborating for a more
secure digital world
Intel’s Vision
This decade we will create
and extend computing technology
to connect and enrich the lives
of every person on earth
Security is Fundamental for computing
Energy efficient performance enables new user experiences
• Engaging visual environments
• New ways to explore, interact, and share
• Increasing mobility with extended battery life
Pervasive connectivity makes new computing scenarios possible
• Connecting users to data, media, and other users
• anytime, anywhere, from any device
Security delivers a more worry free environment
• User confidence in connections, content, and applications
• Consistent experience across the compute continuum
The user is at the center of the experience
Why Did Intel Choose McAfee?
Broad Industry
Partner Ecosystem
Broad
Solutions Portfolio
McAfee Labs and
GTI (Cloud)
World Class
Management
Platform
Key Trends Impacting Enterprises The Perfect Storm
CONSUMERIZATION
OF IT
ESCALATING
THREAT LANDSCAPE
PUBLIC AND
PRIVATE CLOUD
EXPLOSION OF
INTERNET/DEVICES
NEW APPLICATIONS
LANDSCAPE
SERVERS PC
LAPTOP
DATABASE
USB
SMART
PHONE
ROUTING/
SWITCHING
CLOUD
VIRTUAL
ENVIRONMENT
SAN
VOIP
TABLET
EMBEDDED
DEVICES
WIRELESS
APPS
1 BILLION DEVICES
50 BILLION CONNECTED
DEVICES
The Expanding Attack Surface
Advancing toward worry-free computing
•Consistent user experience
•Across the compute continuum
•Leading security software and
services
•Security built-in the hardware Great Platforms
With hardware-based security
features and trust built-in
Consistent Experience Of Intel security features
across devices
Leading Software & Services From Intel, McAfee*, Wind River*,
and the ecosystem
Driving Security from the Hardware, Up
• Start secure: Hardware protection built into
start-up processes to ensure system
integrity
• Run secure : Hardware enforced and
maintained isolated execution environments
• Powerfully secure – Hardware acceleration
for security processing that enables
effortless safety
Apps, Browsers, and OS
Security Acceleration
•Encrypted wake
•Secure sleep states
•Protected and measured Boot
Isolated execution environments
Advancing toward a more worry free computing
experience
Recovery
Costs growing
Productivity impacts
Helping to get you back in action even after attack
by malware
Anti-Malware
Proliferation
Sophistication
Advancing to where Malware finds
nowhere to run or hide
Identity
Losses growing
Growing password lists
Driving towards keeping your identity
safe and trusted
Data
Data theft
Laptop theft
Helping Data and assets stay where they
belong
Key Intel Security Features
Anti-Malware
Advancing to where Malware finds
nowhere to run or hide
Intel TXT & TXT-SX
Intel OS Guard (SMEP)
McAfee DeepSAFE
Identity
Driving towards keeping your identity
safe and trusted
Intel IPT with OTP
NFC-TAP and Interact
Intel IPT with PTD
Intel IPT with PKI
Recovery
Helping to get you back in action even after attack
by malware
Intel AMT
McAfee Deep Command
Independent FW Update
Granite City
Data
Helping Data and assets stay where they
belong
Intel AES-NI
Intel Anti-Theft Technology
Intel Secure Key
The McAfee Cause
McAfee lives for the challenge of protecting and liberating our customers
by staying ahead of the bad guys in our relentless, obsessive search for safe
Threats are Everywhere — so is McAfee
Addressing Security Threats Across Multiple Devices
and Segments
Global Enterprise Home Office / SMB
ENDPOINT NETWORK
McAfee Strategy: Security Connected Cloud, Endpoint and Network
Centralized Management
Risk and
Compliance
Open
Platform
Comprehensive coverage for your business • Mitigates risk
• Drives compliance
• Improves operational efficiencies
Integrated framework • Centralized security
• Integrates multiple products and services
End-to-End security • Secure the endpoints; mobile and fixed
• Secure the network
• Secure the cloud
Up to date threat intelligence with GTI
Cloud- based Global Threat Intelligence
delivers up-to-the-moment threat information
across your various security layers
Securing the Enterprise Broadest Integrated Portfolio
SECURITY MANAGEMENT
Security Operations Mgmt Policy Auditing & Management Vulnerability Management Risk Management Compliance Management
High Assurance Firewall Network Intrusion Prevention Network Access Control Network Behavior Analysis
NETWORK SECURITY
INFORMATION SECURITY
Email Security Web Security Data Loss Prevention Encryption Identity & Access Management API and Web Services Security
PARTNER COMMUNITY
McAfee Connected
Global Strategic Alliance Partners
Security Innovation Alliance
ENDPOINT SECURITY
Malware Protection
Device Encryption
Application Whitelisting
Desktop Firewall
Device Control
Email Protection
Network Access Control
Endpoint Web Protection
Host Intrusion Protection
Mobile Device Management
Server & Database Protection
Smartphone and Tablet Protection
Virtual Machine and VDI Protection
Hardware Assisted Security
Embedded Device Protection
15
Relentless Pursuit of Safe
McAfee Labs
• 400 researches across 30 countries
• Millions of sensors across globe
• All dedicated to protecting you from latest threats
Malware
• 50,000 pieces identified each day
Vulnerability Analysis
• Vulnerability protection avg. 22-days before exploit
Email Security
• 20 billion mail reputation queries each month
Network Security
• 100 million IP & port reputation queries each month
Web Security
• 75 billion web reputation queries each month
Global Threat Intelligence
What it takes to make your organization safe
1. GTI-enabled products query the
Global Threat Intelligence cloud
2. GTI cross-correlates across threat
databases and renders a response
3. GTI replies with a reputation score and
the product takes policy-based action
McAfee: Broad Mobile Portfolio
User Security Enterprise Security
Product
Strategy
Product
Portfolio
Integrated Solutions Centralized Platform
Device Agnostic Multiple device types/OS, PC + Mobile
Competitive Products Narrow feature gap, Key differentiators
Complete Suite Device, Data, Applications
Protection Detection, GTI for Apps
Product Differentiation Unique features
Performance Energy efficiency, User experience
Partner Enablement Ease of deployment, Monetization
Cloud Security Platform: Intel and McAfee
Mobile
Users
Private Cloud
Applications
Enterprise
Users
Enterprise
• Data loss prevention through content scanning
• Zero hour blended threat protection
• Flexible deployment options
Security
• Safe access to web applications from anywhere
• Deep content inspection for hidden malware
• Flexible deployment options
Web
Security
• Protection for data at rest, in use & in motion
• Capture technology ensures accurate policies
• Protection on and off corporate network
DLP
• Application protection and controls
• Performance acceleration
• Authentication and authorization
API &
Web Services
• Provisioning and single sign-on for cloud apps
• Elevated security with strong authentication
• Application access monitoring and auditing
Identity
Management
• Intel® TXT and Virtualization Technology
• Intel® Identity Management Technology
• McAfee® DeepSAFE Technology
Platform
Technologies
Content Security
Bundle
Trusted
Platform
User & Intelligent Devices
Secure the Devices Identity & access management,
platform integrity
1
Public/Private Clouds (Servers, Network, Storage)
Public
Private
Secure Cloud Datacenters Infrastructure & VM integrity, seamless
federation, audit/compliance
2
Enhancing End to End Cloud Security Build Foundation of Integrity: From Client to Cloud
Secure the Connections Apps, data in flight, traffic
3
Consistency, common user experiences, common tools
4
I/O Memory Network Display
CPU
Security Engine Hardware Security Features
Virtual Machine
Security Platform
Operating System
Applications
AV HIPS New
Products
Beyond the OS Security Architecture
Global Threat Intelligence
Next-gen Anti-malware Protection
+ Self Protecting Agents
Secure the OS
Security Engine
Silicon Security
Security Hardware Features
Mitigate the escalating threat landscape Security technology required at every level of the stack
Anti-Malware Data Identity Recovery
Hardware Enhanced Security
What We Are Setting Out to Achieve with
Hardware-Enhanced Security, Software & Services
• Expanding GTI
• Identity and Trust Management
• App to App Security
• Dynamic Whitelisting
• Endpoint Reputation
CLOUD-BASED
SECURITY INTELLIGENCE
• Power Efficient Green IT/Security
• Policy Enforcement
• Maximum Productivity
• Total Visibility
HOLISTIC SECURITY
MANAGEMENT
• Secure Code Execution
• Active Management Technology/vPro
• Anti-theft
• One Time Password
ACTIVATESILICON
FEATURES
DEEP, CONNECTED, AND AWARE SECURITY TECHNOLOGY...
SPANNING MULTIPLE DEVICES
FIXED FUNCTION
EMBEDDED DEVICES
SMARTPHONES
& TABLETS LAPTOPS/
DESKTOPS
SERVERS &
DATA CENTERS
• Application Whitelisting
• Integrity Monitor
• Change Control
• Device Management
• Expanding GTI
• Hardware Root of Trust
• OS Security
• App Sandboxing
• App Validation
• Beyond the OS
• Accelerated encryption
• Tokenization
• Anti-theft
• Incorruptible/recoverable
• Beyond the OS
• Out of Band Management
• Out of Band Recovery
• Remote Security
Management
23
Imagine a world…..
…..a more worry free digital world
My digital life, whenever I want it,
where ever I want it, secured.