.
McAfee Confidential
Security Obstacles Facing Organizations
Targeted Attacks
Siloed Security Organizations Lack of
VisibilitySeparate organizations utilizing point products, from multiple
vendors, operating in functional silos with no intelligence sharing.
Attacks are becoming more sophisticated, autonomous, and stealthy and are specifically designed to penetrate existing security controls, including security processes and people.
Too much data and not enough intelligence makes visibility into threats challenging. Reactive security infrastructure lacks the timely intelligence needed to identify threats.
2
.
McAfee Confidential 3
Organizations must innovate, operate, and grow with confidence
Fundamental Shifts in Our Digital WorldAn Increasingly Complex Digital Expanse
Mobile | Remote | Corporate
Dispersed Users Device & Data Proliferation
Cloud Bring Your Own ‘Whatever’
Billions of DevicesZettabytes of DataInternet of Things ‘Other People’s Computers’
BYODShadow IT
Consumerization
.
McAfee Confidential 4
Cybersecurity's Labor Shortage EpidemicNot Enough Gray-Matter for a Manual Solution
62%of organizations are currently understaffed*
2Million shortfall of qualified professionals by 2020**
Majority of positions take
3-6 months to fill, and 10% are never filled*
* State of Cybersecurity: Implications for 2015 - ISACA** The 2015 (ISC)2 Global Information Workforce Study - Extrapolation
.
McAfee Confidential
Cybercrime $618.16B(GDP
Sweden $570.59B)
Impact of an Unsustainable Approach
5
$3.79M
The 2015 (ISC)2 Global Information Workforce Study
Cost of Data Breach Study – Ponemon, May 2015
Economic Impact of Cybercrime II – CSIS, June 2014
Finance 98 daysRetail 197 days
Mean Time to Resolve: 2011-15
Mean Time to Detect
Advanced Threats Series – Ponemon, 2015
Annual Global Cost (USD)
Average Cost Per Breach
Within 1 day
33%
20% 3+ weeks
5%
8%
.
McAfee Confidential 6
4 Key Areas of SecurityBusiness and Security Outcomes
Safeguard Vital DataSafe adoption of innovative services.Protect data wherever it lives.Control user-to-cloud interaction.
Rapid LOB provisioning.Consistent policy extension.Maximized agility and utilization.
Fortify Critical Environments
Increased resilience to attacks. Minimized incident
impact. Shift from tactical to
strategic.
Neutralize Emerging Threats
Optimize Security Operations
Compressed decisions and actions. Improved resource output.
Reduced overall complexity.
10100111011010111001001001100110
10101010101001001001111010
10
.
McAfee Confidential 8
Time to Recover
Months -Weeks
Time to Discover
Years - Months
The Fundamental Security Challenge
$$$ Catastrophic Impact $$$
Overwhelmed Security Teams
Threat Volume and
Sophistication
Time to Compromise
Minutes
.
McAfee Confidential
Time to Recover
Minutes
Time to Discover
HoursHours
Business and Security Outcomes
9
$ Minimized Impact $
Optimized Security Teams
Advanced Defenses
Time to Compromise
Months
.
McAfee Confidential 10
Scalable and Sustainable Threat DefenseContinuous, Automated, and Shared Threat Intelligence
Detect – Illuminate low-threshold maneuvering through advanced intelligence and analytics.
Protect – Stop pervasive attack vectors while also disrupting never-before-seen techniques and payloads.
Adapt – Apply insights immediately throughout an integrated security system.
Correct – Improve triage and prioritize response as part of a fluid investigation.
10
.
McAfee Confidential 11
The Right Tools Resolve More RiskAdvanced Protection
Collaborative defenses
Rapid DetectionUnderstand the full picture
Deep VisibilityFacilitate precise actions
Connect isolated componentsImmediate Correction
Decide once and reduce redundancyAutomate Operations
Adapt to Prevent Future
Attacks
.
McAfee Confidential
A Sustainable Defensive Advantage
*Internal Benchmark testing applied to Advanced Malware cyber defense capability.
Applied Integration, Automation, and Orchestration
Resolve more risk, faster, and with fewer resources
Act Rapidly
71% reduction of manual efforts*
Optimize Resources
Over 1000% increase
in handling capacity*
Reduce Complexity
62% reduction of technology sprawl*
.
McAfee Confidential
Intelligent Endpoint Threat Defense
14
Outsmart Attackers
Integrated Threat Defense
Discover and Respond Faster
Immediate Visibility
Drive EfficiencyIncrease Capacity
Reduce Complexity
.
McAfee Confidential 15
Outsmart AttackersWith Integrated Counter Measures
Unified intelligence from Global, organizational, and 3rd-parties
Collaborative protect, detect and correct defenses act as a single adaptive system
Comprehensive coverage against the most pervasive threats
.
McAfee Confidential
Discover and Respond Faster
16
Through Immediate Visibility and Correlated Actions
Deep, continuous visibility and proactive hunting
Prioritize incidents, score risks, and investigate real-time
Interactive response and automated correction
.
McAfee Confidential 17
Drive Efficiency Increase Capacity and Reduce Complexity
Act with precision and speed by executing across the entire organization
Streamline workflows and central visibility, management and automation
Easily evolve security through shared intelligence and an adaptive architecture
.
McAfee Confidential 18
Scalable and Sustainable Threat DefenseSmart, fast and efficient
Detect – Illuminate low-threshold maneuvering through advanced intelligence and analytics.
Protect – Stop pervasive attack vectors while also disrupting never-before-seen techniques and payloads.
Adapt – Apply insights immediately throughout an integrated security system.
Correct – Improve triage and prioritize response as part of a fluid investigation.
18