Esteban Próspero

8 de Sep de 2014
Esteban Próspero
Esteban Próspero
Esteban Próspero
Esteban Próspero
Esteban Próspero
Esteban Próspero
Esteban Próspero
Esteban Próspero
Esteban Próspero
1 de 9

Mais conteúdo relacionado

Mais procurados

Issa jason dablowIssa jason dablow
Issa jason dablowISSA LA
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníMarketingArrowECS_CZ
Advanced Threat ProtectionAdvanced Threat Protection
Advanced Threat ProtectionLan & Wan Solutions
Antispam aneb plnoleté řešeníAntispam aneb plnoleté řešení
Antispam aneb plnoleté řešeníMarketingArrowECS_CZ
Atelier Technique CISCO ACSS 2018Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018African Cyber Security Summit
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security

Mais procurados(20)

Similar a Esteban Próspero

Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015SLBdiensten
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewStephen Bates
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managmentDean Iacovelli
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions

Similar a Esteban Próspero(20)

Mais de ClusterCba

Leandro Di PersiaLeandro Di Persia
Leandro Di PersiaClusterCba
Nicolás RamosNicolás Ramos
Nicolás RamosClusterCba
Ivan ArceIvan Arce
Ivan ArceClusterCba
Darren CamasDarren Camas
Darren CamasClusterCba
Diego MayDiego May
Diego MayClusterCba
Agustín BergalloAgustín Bergallo
Agustín BergalloClusterCba

Último

The Ultimate Administrator’s Guide to HCL Nomad WebThe Ultimate Administrator’s Guide to HCL Nomad Web
The Ultimate Administrator’s Guide to HCL Nomad Webpanagenda
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
Accelerating Data Science through Feature Platform, Transformers, and GenAIAccelerating Data Science through Feature Platform, Transformers, and GenAI
Accelerating Data Science through Feature Platform, Transformers, and GenAIFeatureByte
Understanding Wireguard, TLS and Workload IdentityUnderstanding Wireguard, TLS and Workload Identity
Understanding Wireguard, TLS and Workload IdentityChristian Posta
Demystifying ML/AIDemystifying ML/AI
Demystifying ML/AIMatthew Reynolds
Product Research Presentation-Maidy Veloso.pptxProduct Research Presentation-Maidy Veloso.pptx
Product Research Presentation-Maidy Veloso.pptxMaidyVeloso

Último(20)

Esteban Próspero

Notas do Editor

  1. The Security Connected platform from McAfee provides a unified framework for hundreds of products, services, and partners to learn from each other, share context-specific data in real time, and act as a team to keep information and networks safe. The Security Connected platform includes integrated solutions that address (starting from bottom): Analytics: McAfee ESM provides high-speed data mining and risk assessment based on hundreds of data sources and can directly integrate with McAfee countermeasures and threat intelligence to guide data-driven risk management. Context & Orchestration: DXL is first extensible high-speed communication layer that allows intelligence sharing, product deployment, and distribution of policies and protections. Threat Intelligence: Only McAfee creates an aggregate picture based on local, custom intelligence; a global, cross-vector threat intelligence network; and third party data services to drive countermeasure actions and efficient incident response. And, finally, at the foundation of Security Connected is McAfee Security Management, which provides a critical connective framework and an open platform. It unites product and technology components as well as processes and policies to enable an efficient and secure IT infrastructure that businesses can build on as they identify and pursue global business opportunities. McAfee Security Management create simplified management solutions that work together to give you complete visibility into your enterprise—including both a real-time and a historical view (what did that user do on that device across those days?). That requires deep integration across endpoints, the network, and the management software. In other words, McAfee Security Management gives you the visibility you need to analyze risk across all elements of your security environment, and then to make informed decisions and respond in less time. The products we’re about to talk about—including ePO, Deep Command, SIEM, and TIE—provide a connective framework that unites products, processes, and policies to enable a more efficient and more secure IT infrastructure that is ready for today’s threats, and those of tomorrow.
  2. In this use case, we have several security solutions working together with TIE (of the many that are possible): ePO (described earlier) SIEM (described earlier) DXL (real-time, bi-directional communications fabric) Advanced Threat Defense (ATD): Analyzes malware behavior In this example, <build 1> if an endpoint attempts to executes an executable file that has passed through VSE (may be suspicious, but neither DAT, GTI, nor VSE heuristics have enough data to convict it), TIE will send the file information to the TIE Server to learn more about it. The query is performed over the data exchange layer and includes file, process and environmental attributes recorded by the endpoint. <Build 2> In this case, TIE has seen the suspicious-but-not-convicted file elsewhere in the enterprise but checks with GTI to see if the reputation has changed. From this point, the TIE server will check the McAfee Global Threat Intelligence in the cloud for a reputation. It will then send back the results of this look up back to the endpoint. <Build 3> At this point, endpoint will take action according to the local TIE rules and risk tolerance-based policy admin has applied: 1. allow the file to execute. 2. Block it from executing but leave it in place. 3. Prevent execution and quarantine/clean because it is a known bad file. 4. Separately, TIE can sent the file to McAfee Advanced Threat Defense (ATD) for analysis (assuming you have ATD installed). If we assume that the reputation change assigns a malicious reputation to the file, the TIE dashboards in ePO will display the systems who have inquired about the file in the past – indicating that they are compromised (they executed it too) or may be compromised (asked about but did not execute the file). Admin can quickly view where and when systems have experienced the file and take prioritized remediation steps. This information is available also to SIEM, which can provide further analytics and deep inspection triggered by the initial TIE reputation change event.
  3. The next set of slides illustrate how Threat Intelligence Exchange works. In this example, <build 1> if an endpoint attempts to executes an executable file that VSE has never seen before and is not part of our DAT file, it will send the file information to the TIE server to determine if it is a known file. In this case, it has determined if it is an unknown file and does not have a reputation for this file. The query is to be performed over the data exchange layer and is to include file, process and environmental attributes recorded by the endpoint with regards to this file <Build 2> From this point, the TIE server will check the McAfee Global Threat Intelligence in the cloud for a reputation. It will then send back the results of this look up back to the endpoint. <Build 3> At this point, there are has some options, 1. allow the file to execute, 2. prevent it from executing and quarantine it, 3. Prevent execution because it is a known bad file, 4. Or if it doesn’t know the reputation, it can sent it to McAfee Advanced Threat Defense (ATD) for analysis. <Build4> to next slide
  4. <Build 1> Once classification is determined, ATD is to publish the information using the DXL Endpoints, Gateways and other security components are to consume classification changes published by specific sources Once a conviction is received endpoints immunize themselves – Prevent on endpoints which had not observed this file as of yet Detect and remediate on endpoints which had been previously infected Once a conviction is received by gateways they are to block access based on endpoint convictions Remark: The components added to this slide (McAfee ESM on the DXL, McAfee NGFW, McAfee NSP, McAfee MWG, McAfee MEG) are slated for a late 2H14 delivery