Beruflich Dokumente
Kultur Dokumente
Firewall
and the Security Connected Ecosystem
Speaker Name | Title
.
Executives/CISOs
Network Operations
Security Operations
Business Continuity
Security must scale easily
and not impede productivity.
Optimize IT Spend
Reduce Capex/Opex to free
up other resources.
Visibility & Compliance
Pass security audits on time
to avoid penalties.
Advanced Threats
Fast blocking of malware,
zero-day attacks and AETs.
Data Exfiltration
Detect and block attempts to
steal sensitive information.
Analysis & Reporting
Simplify policy management,
workflows and forensics.
Executive/CISO Benefits
Cost-effective security that scales easily with your business
Business Continuity
Unified Software
Core provides value,
flexibility and
scalability to grow with
your business.
Optimize IT Spend
Advanced Security
and Connectivity
features included to
provide value and
simplify licensing.
Business Continuity
Unified Software Core provides flexibility and scalability to support growth plans
FW/VPN
IPS
L2FW
different functional
roles and deployment
options
Singl
e
pane-of-glass
Optimize IT Spend
High-value features included with standard license
Business
Security Simplified
Continuity
Evasion Prevention
Licensing Native Active-Active
Antivirus & Anti-Spam
MaintenanceClustering
IPsec & SSL VPN
Application Control
Support
&
Multi-Link &
User ID
Augmented VPN
IPS
Built-in Routing
Anti-Botnet
Support
Stateful Inspection
Executive
Summary
Reports.
.
Business Value
Survey and analysis by IDC
Investments
Year 0
Benefits
Year 1
Cumulated Benefits
Year 2
Year 3
Year 4
Year 5
$120,000
$109674
$100,000
$84662
$80,000
$60260
$60,000
$36347
$40,000
$20920
$12825
$20,000
$-
$25970
$26361
$26850
$27460
$(5647)
$(5647)
$(2448)
$-
$(2448)
$(2448)
$(2448)
$(2448)
-$20,000
IDC Report: Calculating the Business Value of Next Generation Firewall, October 2014
.
McAfee products
consistently outpace
their competition in
cost, market presence,
technology, and
technical support.
Romeo Siquijor, CISO
Cemex
Availability &
Scalability
Active-Active
Clustering and
Multi-Link provide
network resiliency for
uninterrupted
operations.
Performance
Unified Software
Core and Clustering
accelerate resourceintensive security
functions.
Centralized
Management
McAfee Security
Management Center
provides simple,
centralized control of
large distributed
environments.
.
Updates
Node 1: NGF-3206
Up to 16 active-active nodes
cluster, only with McAfee
v5.7
Operational benefits:
99.999% uptime
v5.8
McAfee Next
Generation
Firewall Cluster
v5.6
Node 4: NGF-325
Node 5: Software
10
11
3/4G
ISP 2
ISP N
Multi-Link
IPsec VPN
Cable
DSL 1
DSL 2
MPLS
Regular
Traffic &
Back-up
links
Critical
Traffic
Multi-Link
Business Continuity
Transparent failover
Load-balancing
or back-up links
Security
.
12
0%
Firewall Performance Degradation
-20%
-40%
-1%
-8%
-16%
-35%
-60%
-80%
-70%
-100%
McAfee NGFW 5206
-87%
Industry Average
Throughput and Scalability Report McAfee NGFW 5206, Miercom, October 2014
.
13
14
Operating Costs
Reduce support
overhead
requirements
How?
Today
Future
15
Centralized Management
McAfee Security Management Center (SMC)
McAfee
Security
Management
Center
MSSP
Enabling Advanced
Security
Rich context policies
Flexible admin roles
MSSP capabilities
Distant Sites
SIEM
Resource Optimization
Efficiency workflows
Plug-and-play deployment
Scheduled and automated
tasks
Situational Awareness
Data visualizations
Built-in log investigation
tools
SIEM integration
.
16
Centralized Management
Simple and efficient policy management
Hierarchical
Policies
Global Policy
Templates
Policies
Main policy can Share policies
automatically
populate
between
follow template sub-policies
firewalls
changes
17
Centralized Management
Plug-and-play deployment for fast and easy remote site rollouts
McAfee Installation
Cloud
Initial configuration
pushed from the cloud
Initial configuration
uploaded
New York
Paris
London
McAfee Security
Management Center
Tokyo
San Francisco
Sao Paolo
Minut
es
McAfee Next
Generation Firewalls
.
18
100%
18%
25%
42%
75%
50%
82%
75%
58%
25%
0%
Keeping the lights on
Contributing to innovation
19
20
Advanced Threats
Security Connected
and McAfee NGFW
collaborate in real-time
across multiple
security solutions to
block zero-day attacks,
morphing malware,
and AETs.
Data Exfiltration
Application Layer
Exfiltration
Protection leverages
endpoint intelligence to
block endpoint-driven
data breach attacks at
the network level.
21
Detection; 35%
Protection; 22%
Detection
&
Protection
22
Security Connected
Ecosystem
Comprehensive Threat
Intelligence
Local and global sources,
200+ partners
Full Stack
Normalization
AET Prevention
Blocks over 800 Million
evasive attacks
23
Global
Reputation
Endpoint
Intelligence
SIEM
Integration
McAfee Endpoint
Intelligence Agent
Endpoint
Management
McAfee Enterprise
Security Manager
Sandbox
Analysis
McAfee Next
Generation
Firewall
ePolicy
Orchestrator
McAfee Advanced
Threat Defense
24
Detect anomalies:
Alerts based
on deviations
Rapid
Respons
e
to alerts and unusual
patterns
on your network.
.
25
Dynamic
File
Analysis
Static
Code
Analysis
Unpacking
Disassembly of Code
Calculate Latent Code
Familial Resemblance
Accurate
Discover
y
&
Alerting
of zero-day threats.
.
26
Security
Operations
ePolicy
Orchestrator
Endpoints
Discover
&
Take
Action
on suspicious endpoint
behaviors.
.
27
What is an AET?
L.1
McAfee Next
Generation Firewall
L.2
L.3
OSI
Layers
L.4
L.5
L.6
L.7
Packet flow
28
29
Anomaly detected
& connection blocked
Highly
Granula
r
Control
POS
Application
Vendor
McAfeeXNGFW
NGFW
POS
Application
Point of
Sales
Terminals
Internet
User: Bill
Group: Cashiers
Connection: HTTPS
Process: POSX.exe
Compares packet
information to policy
of endpoint
applications and
connections.
.
30
Fast &
Simple
Drill-Down
and navigation.
31
32
Summary
The best choice for your business
McAfee Next Generation Firewall provides
Advanced Protection
for critical assets while delivering
http://mcafee.com/ngfw
Proven Business
Value
across organization roles.
Executives/CISOs
Network Operations
Security Operations
Business Continuity
Optimize IT Spend
Visibility & Compliance
Advanced Threats
Data Exfiltration
Analysis & Reporting
.
33
34