0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
25 Ansichten22 Seiten
McAfee Endpoint Security Educational Tools - customer facing Why do we need more than anti-virus? Explain Customers the need for a Defense in Depth approach [here] McAfee ePolicy Orchestrator (ePO) - real-time for ePO - enables real-time monitoring of ePO policies. Gartner Endpoint Protection Buyer's Guide - Why not choose Microsoft?
McAfee Endpoint Security Educational Tools - customer facing Why do we need more than anti-virus? Explain Customers the need for a Defense in Depth approach [here] McAfee ePolicy Orchestrator (ePO) - real-time for ePO - enables real-time monitoring of ePO policies. Gartner Endpoint Protection Buyer's Guide - Why not choose Microsoft?
McAfee Endpoint Security Educational Tools - customer facing Why do we need more than anti-virus? Explain Customers the need for a Defense in Depth approach [here] McAfee ePolicy Orchestrator (ePO) - real-time for ePO - enables real-time monitoring of ePO policies. Gartner Endpoint Protection Buyer's Guide - Why not choose Microsoft?
McAfee VirusScan Enterprise [here] McAfee VirusScan for Server/Storage [here] McAfee Deep Defender [here] McAfee HIPS [here] McAfee Application Control [here] McAfee Change Control [here] McAfee MOVE AV [here] McAfee Drive Encryption [here] McAfee Endpoint Encryption for File/Folder [here] McAfee Virtual Patching for Databases [here] McAfee Database Activity Monitoring [here] McAfee Vulnerability Scan for Databases [here] McAfee ePolicy Orchestrator (ePO) [here] McAfee Real-Time for ePO [here] McAfee ePO Deep Command [here] McAfee Global Threat Intelligence (GTI) [here]
McAfee Complete Endpoint Security All you need to know in one place McAfee Endpoint Security Educational Tools Customer facing Why do we need more than AntiVirus? Explain Customers the Need for an Defense in Depth approach... Anatomy of Every Attack 4 Phases Concept [here] Aberdeen Group WP: Endpoint Security: Anti-Virus Alone is Not Enough [here] McAfee Solution Brief: The Evolving Landscape of Desktop Security [here] The Paradigm Shift Why do we need hardware assited Security [here] Root out Rootkits An inside look at Deep Defender [here] Fighting Rootkits Blueprint Level 3 [here] Whitepaper HIPS in a Day Which value can we deliver in one day [here] Gartner Endpoint Protection Buyers Guide [here]
Why not choose Microsoft? IT-Harvest WP: VALUE AND COST ANALYSIS of Microsoft Endpoint Protection Versus Best of Breed Solutions [here] Email Template for customer considering Microsoft Forefront [here] The Best Way to protect Windows 8 [here]
Detection Rates NSS Test Lab Exploit Report [here] NSS Test Lab Exploit Evasion Report [here] AV-Test.org Rootkit Protection Report [here]
Where to find Release Notes, Admin Guides, Best Practice Guides? Technical Product Documentation [here] McAfee Products Endpoint Protection (EPS) Endpoint Advanced (EPA) Complete Enterprise (CEE>1000) Complete Business (CEB<1000) McAfee ePolicy Orchestrator (ePO - Security Management Platform) Anti-Virus / Antispyware (Windows for Desktop and Server) Anti-Virus Multiplatform (MAC / Linux / Unix for Desktop only) NEW NEW Anti-Virus for Storage Servers (NAP) Anti-Virus for SharePoint Deep Defender (Desktop and Server) NEW NEW NEW Desktop Firewall Host IPS (Desktop) Access Protection & Application Blocking (build-in VSE and HIPS) Application Control (Desktop) NEW NEW Safe Search (SiteAdvisor Enterprise incl. Web Filter Endpoint) Security for Email Servers (Microsoft Exchange and Lotus Domino) Device Control Full Disk Encryption (Windows / MAC) Endpoint Encryption for File & Folder NEW EMM & Secure Container (Android) & VirusScan Mobile (Android) NEW NEW NEW Real-Time for ePO NEW NEW NEW NEW NEW ePO Deep Command Discovery Risk Advisor NEW NEW Complete Endpoint Protection Suites McAfee Products Security Suite for Server Security Suite for Server Hypervisor Edition Security Suite for Virtual Infrastructure Security Suite for Databases McAfee ePolicy Orchestrator (ePO - Security Management Platform) McAfee VirusScan Enterprise McAfee VirusScan Enterprise Linux (Desktop) McAfee VirusScan Enterprise Linux (Server) McAfee Application Control (Desktop) McAfee Application Control (Server)
Reduce management, license and infrastructure cost Reduce urgency of patching Streamlining event management and escalations Streamlining compliance reporting / analytics / trending
A single platform to secure Desktops to Datacenters Security technology that protects from Chip to Cloud Context awareness across Data, Devices and Applications Single, integrated management console and single client agent (reduce TCO) Proactive and real-time malware detection and True behavioral host based IPS Proven and robust technology protects 150 Mio. Endpoints
Symantec [here] Trend [here] Sophos [here] Microsoft [here] Kaspersky [here] Reduce management, license and infrastructure cost Reduce urgency of patching Streamlining event management and escalations Streamlining compliance reporting / analytics / trending
Version: 9.0 Supported OS: [here]
Product Page Endpoint Suite FAQ Sales Play Sales Play Competitve
Datasheet Complete Enterprise Datashet Complete Business Endpoint Presentation McAfee Website NSS Labs Test Report AV-Test.org Rootkit Test Gartner Buyers Guide Free Trial CEE Suite Complete Endpoint Protection Suites USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Endpoint security against constantly evolving threats without complex management Reduce time and IT costs as economic factors that limit IT personnel. View, report, and enforce policies on all users in the environment without maintaining multiple management consoles Apply same security to mobile users
Always on guard endpoint security Real-time protection from the Cloud Best-In-Class availability - McAfee SaaS infrastructure provides 99.98% availability, ensures reliability, and reduces the need for additional security management software, hardware, support, or dedicated IT staff
Symantec has separate management console not integrated with their existing Hosted Email protection Trend does not offer integration with email, web, or vulnerability management protection. Trend has three offerings in three consoles
How much time is spent per week on your security? How well do your existing tools let you report on your risk exposure? How much onsite hardware and software do you have to manage security? What process do you have to ensure protection to all users?
McAfee discovers approx. 120.000 new threats each day customer have the challenge to update all endpoints in time Traditional VSE is resource intensive and working signature based only Protect your organization more efficient against zero day attacks
Maximum defense against malware Proactive protection from attacks through Real-time scanning Centralized Management and integration with other endpoint technologies Low impact on performance with VSE 8.8 Enhanced security powered by McAfee Global Threat Intelligence
Symantec [here] Trend [here] Sophos [here] Microsoft [here] Kaspersky [here]
Does your current solution provide behavioral zero day protection? Is your current antimalware solution slowing your systems to a halt when doing on demand scans? Does your current solution report on other point products as well? How much time is spent managing your current AV solution?
Version: 8.8 Patch 3 Support Windows [here] Support Linux [here] Support MAC [here] Release Notes
Malware within Microsoft Excahnge and Lotus Domino mail servers, Microsoft Sharepoint and SAP NetWeaver applications may not be detected by file system scanner How to detect and protect hardware NetApp filers and Sun StorageTek NAS Malware detection on each client is less effiecient than central scanning
Provide scanning, cleaning, protection and assurance that mail systems and applications are clean and safe Protect storage hardware centrally Aviod the need to rely on endpoint protection only
Symantec Trend Kaspersky Sophos AVG
Are you looking to offer additional protection to mail systems, applications and storage? Are you looking to integrate management and reporting of this solutions into existing McAfee endpoint protection?
VirusScan for Storage [here] VirusScan for SAP [here] VirusScan for Sharepoint [here] VirusScan for Linux [here] VirusScan for Email [Lotus / Exchange]
Product Page Datasheet Storage Datasheet SAP Datasheet Sharepoint Datasheet Linux Datasheet Email
McAfee Website Free Trial Storage McAfee VirusScanning for Server/Storage
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Threats are changing to more sophisticated advanced persistent threats (APTs) - Companies today dont know they are infected with stealth malware Rootkits hide within the operating system (42 Rootkits in 2007; ~2 million in 2011) Detection relies on up-to-date protection, but APTs are often zero day attacks Removal requires extra tools/system rebuild Clean-up cost per endpoint ~ $500
Operates beyond the operating system Expose Hidden Threats Enhanced zero-day protection against Stealth techniques and rootkits Stop data Loss - detect malware early Provide a new vantage point on security - no place for stealth attacks to hide Lower costs - reduce downtime and clean-up costs Easy deployment and management Real-Time protection of MBR, BIOS and Kernel NO
All major competitors Symantec, Trend, Sophos, Kaspersky, CA, etc. rely on detection and removal by software running above the operating system or with standalone tools this approach results in the problem statement
Have you heard about the latest threats such as NightDragon, Suxnet and Shady Rat? Are you using Intel Core i3, i5 or i7 chips? How do you check for rootkits? Have you experienced rootkit infection? Has your AV product been able to remove the rootkit natively? How easy has removal been?
Product Page Sales Play Datasheet Presentation Whitepaper: Paradigm Shift AV Test Report Technical Product Documentation McAfee Website Free Trial Video Best Practice Guide
McAfee Deep Defender USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
VirusScan signatures alone is not good enough anymore Better Zero-Day protection Patching is costly, time consuming and difficult to achieve Unpatched systems introduce weaknesses that AntiVirus alone cannot mitigate Many high profile attacks rely on unpatched vulnerabilities Host firewalls are complex to configure, with risk of denying access to legitimate traffic
Gain behavioral protection against 95% of vulnerabilities with no configuration updates required (no signatures) Closes the threat window with up-to-date, reputation-based intelligence about bad network connections (GTI integration) Protects desktops and servers against botnets and DDoS attacks Patch endpoints less frequently and with less urgency Manage compliance with easy to-understand actionable views, workflow, event monitoring, and reporting ThirdBrigade Deep Security Host IPS IBM Proventia Cisco CSA End of Life Symantec Sophos
How often do you patch? How long does it take you to patch? How much does out of band patching cost? How do you protect unpatched systems? How do you lock down access to critical or vulnerable resoucres
Version: 8.0 Patch 3 Supported OS: [here] Product Page Sales Play Datasheet HIPS for Desktops Datasheet HIPS for Server Presentation Whitepaper: HIPS in a Day Technical Product Documentation
Legacy devices with costly support and no protection/patches available Fixed resource systems that cannot use conventional security technology i.e. AV Dealing with zero day threats and the operational cost of clean ups Cost associated with testing of AV signatures and ops management
Protect against zero-day and advanced persistent threats without signature updates Strengthen security, improve performance and lower ownership costs with dynamic whitelisting Efficiently control application access with McAfee ePO softwares centralized management platform Reduce patch cycles through secure whitelisting and advanced memory protection Secure critical systems and legacy systems (W2k or XP)
Bit9 [here] Microsoft [here] Lumension
Do you have any Legacy apps / systems? Do you have systems with limited resources or that cannot run traditional security i.e. Utility, Medical devices, ATMs, POS, etc How often do you need to patch? Are you concerned about the impact of zero day threats on your organisation? How do you protect critical servers and infrastructure?
Version: 6.1 Supported OS: [here] Linux, Solaris, Windows
Product Page Sales Play Datasheet Presentation WP: Evolving Desktop Secuirty WP: Securing Fixed Devices Technical Product Documentation McAfee Website Free Trial WP: Securing evolving Datacenter Video Best Practice Guide
McAfee Application Control USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Visibility - Who, What, When = Impact? Ineffective Security Reactive, Manual, Point Solutions Reduced Availability & Compliance Configuration errors = 60-65% downtime rising to 80% (Gartner & Forrester) Reactive Compliance
Monitor - Continuous visibility Assess - Track work flow and record change details Enforce - Authorised changes Value - Increased ROI (reduced OPEX) Upsell DAM & App Control Sell primarily to Operations & IT Security is Tier II
TripWire [here] Visibility but no control Continuous monitoring limited to Windows only Position Config Control Suite LogRhythm & Splunk Integrity monitoring (free) & basic scheduled scanning Not core focus, focus on log management
Downtime incurred by software changes? Compliance violations or fines? Manual change control? Visibility of all changes? Monitor effectiveness of change controls?
Minimize performance impact of security scanning if you install 10 times AV in 10 virtual sessions this will 10 times impact the physical hypervisor performance Virtualized environments are difficult to predict load and capacity plan IT is striving to make the most efficient utilization of high cost infrastructure Update DAT files in virtual session, e.g. Non-Persitent virtual sessions
Optimization of AV for virtual machines Offloads virus scanning and .DATs Provides 60% more VM density over traditionally deployed security Schedule scanning for servers based on load of the hypervisor and other parameters MOVE is the ONLY product providing 3 deployement options: 1. Multi Platform, 2. Agentless (vShield only), 3. Offline Scanning
Trend Symantec Kaspersky
Additional, Minimal, or Optimal? Is Security causing performance impact in your virtual environment? Is your security team involved in your Virtualization Project? Are you using VirusScan in your virtual Session? Which Hypervisors are you using, e.g. Vmware, Citrix, Microsoft HyperV?
Version: 2.6 Supported OS: [here]
Product Page Sales Play Datasheet Presentation Solution Brief Datacenter Security Technical Product Documentation McAfee Website Whitepaper on Website Free Trial Video: Why MOVE McAfee MOVE AV USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Secure mobile data: Protect confidential data from unauthorized access and exposure that may result in data loss/breach Compliance Reporting Data breach law compliance: Data breach and privacy laws require public disclosure of data loss events and can impose significant financial penalties Full Disk Encryption to secures data on desktops, laptops as well as MAC OS based systems Integration with ePO Deep Command to provide secure Wake- On-Lan Single-Sign-On with Windows Smart Card and PKI Support in PreBoot The last 5 years clear leader in the Gartner Magic Quadrant Support for Endpoint Encryption GO diagnostics reporting plugin for ePO Checkpoint [here] Sophos Symantec [here] Microsoft BitLocker [here] PGP
Do you have to comply with data breach or privacy laws? Does you know where your sensitive data resides? Have any of your employees had their device lost or stolen? Would you like to reduce the burden of audit by being able to prove compliance more easily? How do you protect data on removable media?
Version: 7.1 Support Windows [here] Support MAC OS [here]
System Administrator can access all data on the network and file servers Secure mobile data: Protect confidential data from unauthorized access and exposure that may result in data loss/breach Compliance Reporting Data breach law compliance: Data breach and privacy laws require public disclosure of data loss events and can impose significant financial penalties
Policy based encryption of files&folders on file servers as well as locally Transparent Encryption of any removable media no admin rights or software installtion required device can be used any time and anywhere Persistent encryption to safeguard sensitive data wherever it goes (file & folder) Integration with DLP Endpoint to enforce encryption of sensitive data (rule based)
Checkpoint [here] Sophos Symantec [here] Microsoft [here] PGP
Do you have to comply with data breach or privacy laws? Does you know where your sensitive data resides? Have any of your employees had their device lost or stolen? Would you like to reduce the burden of audit by being able to prove compliance more easily? How do you protect data on removable media?
McAfee Endpoint Encryption for File/Folder USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Patching of 100s or 1000s of database is a painful job Databases are often not patched Patching needs DOWNTIME and TESTING Releasing a new patch by the vendor increases the knowledge about vulnerabilities Patches are only provided for supported releases
Protects vulnerabilities of the database against attacks Reports attacks against the database Old and unsupported database versions are also protected More than 430 rules available Ready-To-Run immediate after installing the software NO downtime of the database during install and update
Imperva Guardium (IBM) [here]
Do you install the patches in time? Are there unsupported (old) database versions running? How long does it take to patch all the databases?
McAfee Website SC Magazine Award 2013 Free Trial McAfee Virtual Patching for Databases USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Not enough knowledge about who is accessing the data Unauthorized or undesired access to the database Customer is not able to patch all the databases timely Customer need to be compliant
Protecting the customers most valuable data stored in databases Detect and/or prevent unauthorized access to the database Virtual Patching allows a better planning for patching and reduce the need to patch Helps to enforce Compliance in the database (PCI-DSS, HIPAA, SOX ...) Auditing accessing or modifying data Flexible reporting for Auditors, Security Team, Management
Oracle needs a specific server for scanning the network traffic [here] Imperva networkbased appliance Guardium (IBM) networkbased appliance [here]
All of them see the incoming SQL-Statement, McAfee DAM sees also the targeted objects inside the database
Where are the sensitive data? Do you install all the patches after they are released by the vendor? Do you use databases which are not longer supported by the vendor? Do you get any info or alert, when a high priviliged user (e.g. Database Administraor) accesses data he should nnot access? Are your databases compliant?
McAfee Website Free Tria Video l McAfee Database Activity Monitoring USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
In huge environments with 100s or 1000s of database there is often no knowledge about the exact number of database Database often are not compliant to internal or external regulation Senesitive data (password, credit card number, PII) is often located in many database Database are often installed in different ways, some are secure others not
Offers an exact overview about configuration and status of the scanned databases Reports can used as TO DO for the DBA FIX Scripts helps the DBA Reporting: Patch Level, unsecure configuration, violation of regulations, vulnerabilites, sensitive data ... Reporting to: Management, Auditor, Security Staff and DBAs More than 4.200 single cheks Customer checks for specific requirenments
Application Security Imperva Guardium (IBM) [here] Next Generation Security
Where are the sensitive data? Are there accounts with weak or default password? Do you know all you DBAs or are there DBA-accounts in the database you dont know? Are backdoors installed inside the database? Is the database well configured? Are the databases patched? What about the patch level? Is there vulnerable program code inside the database?
McAfee Website Free Trial Video McAfee Vulnerability Scan for Databases USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Management complexity from siloed security, compliance tools and processes High operational costs to implement and maintain policies and protections Low visibility of IT security posture slows remediation and reporting times, increasing risk
End-to-end visibility with single point of reference for security and compliance across IT infrastructure Extensible framework that integrates with critical enterprise infrastructure, such as Microsoft Active Directory and Service Desk solutions Actionable reporting and event handling with an automated response system to streamline event management and common tasks Supercharge ePO ePO Deep Command out-of-band management and Real-Time for ePO to real-time visibility and action n/a How many management and reporting tools do you use to manage security across your enterprise? When Microsoft (or another critical software or infrastructure vendor) announces a vulnerability, how do you know all of your systems are up to date? How do you get the status of your internal or regulatory policy compliance across your entire infrastructure? How much time do you spend performing every day tasks that could be automated? Version: 5.0 Supported Products: ePO 4.6 [here] ePO 5.0 [here] Product Page Sales Play Security Connected
Datasheet Presentation incl Real-Time WP: Optimize Security Management with ePO Technical Product Documentation McAfee Website Whitepaper on Website Free Trial eASI Suite Installer Setup Guide
McAfee ePolicy Orchestrator (ePO) USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Real-time visibility Instant control and protection Address security issues as events are happening Ascertain Who uses what quickly Simplify compliance
Instant information provides visibility into the security state and health of McAfee products on even large numbers of endpoints Real-Time actions help ensure that defenses are installed, running, correctly configured, and up to date An efficient architecture routes around bottlenecks to scale visibility, updates, and control to large networks Proactive security management replaces check box compliance Fully integrated into McAfee ePO No other vendor can offer this kind of real-time visibility and action Show me systems where scanning is taking over x percent of the processor? Get McAfee HIPS Status from all machines Which McAfee Agents have errors or are not responding? Which systems do not have [McAfee Product] installed? When did this system check in last?
Version: 1.0.1 Support ePO 4.6.6 and above, McAfee Agent 4.6.6 and above
Cost of Desk-Side IT Visit Increase Operational Costs; Up to $250/Visit Endpoint PCs Must Be Resilient and Always Available for End Users Fast Threat Propagation Requires Quicker Security Policy Deployment Green & Clean Power Initiatives Limit Access for Security Updates
Protect endpoints ahead of emerging threats Connect to the disabled PC via Intel AMT, whether the PC is local or remote Security maintenance or time-intensive tasks during off hours without impacting productivity using the AMT Alarm Clock Wake PCs, update policies, and return them to lower power states to save energy Green IT Use the McAfee ePO Deep Command Discovery and Reporting module to discover Intel vPro AMT-capable PCs in your environment
Symantec Altiris IBM LanDesk
Does your company look into green IT initiatives to reduce power costs? How many endpoints in your environment are using Intel Core vPro equipped? What percentage of your endpoints are powered off during off hours? What version of ePO do you have deployed? How many of your employees are remote or SOHO tele-workers? Is your company global with many offices around the world?
Demo Video Video EEPC Remote Unlock Video EEPC Pwd Reset
McAfee ePO Deep Command USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
McAfee Labs detects 130.000 new threats every single day Threats now multiply and morph faster than ever which dictates against simply signature based defense mechanisms from identifying new, or zero-day threats Singature based protection alone cannot protect organization effectively against the maware explosion Improved detection of new and zero day threats due to the real time responsiveness of the GTI cloud based reputation services (4 Billion queries each day) 150 Million Endpoint & Network Sensors Detection of blended threats across all vectorsfile, web, email, and network The most comprehensive reputation systems in the industry providing reputation and predictive detection across spam, outbound web, malware, IP, and other threat vectors
All major competitors have a cloud based repution service today. However McAfee is still the only vendor which offers all repution vectors such as file, web, email and network in one single integrated Cloud. Every product in McAfee can learn and participate from each other How do you protect your organization against zero-day attacks? Are all your DAT files up to date each day? Do you spend too much time reacting to vulnerability and threat alerts/incidents? How do you prioritize remediation activities with thousands of malware samples identified each day and thousands of exploitable application vulnerabilities identified each year?