10
George Younan | Enterprise Solutions Architect McAfee Threat Intelligence Exchange

Top of Content Box Line Subtitle Line Title Line George Younan | Enterprise Solutions Architect McAfee Threat Intelligence Exchange

Embed Size (px)

Citation preview

Page 1: Top of Content Box Line Subtitle Line Title Line George Younan | Enterprise Solutions Architect McAfee Threat Intelligence Exchange

George Younan | Enterprise Solutions Architect

McAfee Threat Intelligence Exchange

Page 2: Top of Content Box Line Subtitle Line Title Line George Younan | Enterprise Solutions Architect McAfee Threat Intelligence Exchange

.

McAfee Confidential3

2004 2005 2006 2007 2008 2009 2010 2011 2012 2013

World’s Biggest Data BreachesThe Resulting Impact

3Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

AOL24,000,000

Cardsystems Solutions Inc

40,000,000.

TK/TJ Maxx94,000,000

Action.co.kr18,000,000

Heartland130,000,000 KT

Corp

Target110,000,000

Scribd

Ubisoft“unknown”

Yahoo

Yahoo22,000,000

WashingtonStatecourt

system

Ubuntu

Twitter

Nintendo

LivingSocial

50,000,000

SouthAfricapolice

CentralHudsonGas &

Electric

Drupal

Apple

Adobe152,000,000

SnapChat

NASDAQ

Ebay145,000,000

NeimanMarcus

MacRumors.com

LexisNexisKorea Credit Bureau20,000,000

Sony Online Entertainment

Blizzard14,000,000

RockYou!32,000,000

Medicaid

Sony PSN77,000,000

Evernote50,000,000

US Military76,000,000US Dept

of Defense

Universityof Utah

Hospitals& Clinics

T-MobileDeutscheTelecom17,000,000

Citigroup

Blue CrossBlue Shield

of Tennessee

BNY MellonShareowner

Services

South ShoreHospital,

Massachusetts

Triple-S Salud,

Inc.

JPMorganChase

EmergencyHealthcarePhysicians,

Ltd.

New YorkCity Health& Hospitals

Corp.

LincolnMedical& MentalHealthCenter

EducationalCredit

ManagementCorp

AdvocateMedicalGroup

HealthNet

CaliforniaDept. of Child

Support Services

UK Revenue& Customs25,000,000

NHS8,300,00

NemoursFoundation

MemorialHealthcare

System

HealthNetIBM

MorganStanleySmith

Barney

AOL92,000,000

Dai NipponPrinting

8,637,405

GS Caltex11,100,000

US Dept of Vet Affairs

26,500,000University of Miami

Starbucks

GapInc.

AT&T AvMed,Inc.

USNationalGuard

ColoradoGovernment

Tricare

FloridaCourts

CrescentHealth Inc.,Walgreens

StanfordUniversity

SutterMedical

Foundation

SpartanburgRegional

HealthcareSystem

EisenhowerMedicalCenter

US LawEnforcement

AOL24,000,000

ChileMinistry ofEducation

JeffersonCounty

Norwegian Tax

Authorities

YaleUniversity

State ofTexas

Militarysingles.com

Apple12,367,232

LinkedineHarmony

Last.fm

Formspring

Facebook6,000,000

TerraCom&YourTel

Stratfor

USArmy

Accidentally Published Hacked Inside Job Lost/Stolen Media Poor SecurityLost/Stolen Computer Unknown Virus

Page 3: Top of Content Box Line Subtitle Line Title Line George Younan | Enterprise Solutions Architect McAfee Threat Intelligence Exchange

.

McAfee Confidential4

The Need for Adaptive Threat PreventionThe current model is broken

Problem• Products act in isolation• Integrations are slow and brittle• Intelligence is not shared• Too much white noise• Responses are not automated• Each product requires its own update• Vendor or 3rd party dependency

Solution: Threat Intelligence Exchange• Products work together• Intelligence is shared• Responses are immediate• Environment responds as a whole• Can immunize the environment immediately• Can take action without vendor involvement

Page 4: Top of Content Box Line Subtitle Line Title Line George Younan | Enterprise Solutions Architect McAfee Threat Intelligence Exchange

.

McAfee Confidential5

McAfee Threat Intelligence ExchangeBringing adaptive threat prevention to your environment

Ultrafast, bi-directional messaging fabric that connects individual security products so they operate as one entity. Network, Gateway, endpoint and cloud countermeasures are connected through this fabric.

A new plugin to you’re your McAfee Agent. It examines files on execution and makes intelligent decisions to protect your entire environment. These decisions are driven by a behavioral rules engine that understands your environment and leverages your threat intelligence.

Dedicated server acts as a repository for all of your threat intelligence. This includes the latest threat information from: - McAfee Security Connected components such as ATD, MWG, NSP, etc. - McAfee Global Threat Intelligence and 3rd party sources (e.g. VirusTotal)- System level and enterprise level intelligence

Page 5: Top of Content Box Line Subtitle Line Title Line George Younan | Enterprise Solutions Architect McAfee Threat Intelligence Exchange

.

McAfee Confidential13

Data Exchange Layer

Page 6: Top of Content Box Line Subtitle Line Title Line George Younan | Enterprise Solutions Architect McAfee Threat Intelligence Exchange

.

McAfee Confidential14

Asset

Threat

Identity

Activity

BPM

Risk

Data

Location

Data Exchange LayerAn innovative, real-time, bi-directional communications fabric providing with product integration simplicity.

Security components operate as one to immediately share relevant data between endpoint, gateway, and other security products enabling security intelligence and adaptive security.

THE SECURITY CONNECTED FRAMEWORKADAPTIVE SECURITY ARCHITECTURE

Page 7: Top of Content Box Line Subtitle Line Title Line George Younan | Enterprise Solutions Architect McAfee Threat Intelligence Exchange

.

McAfee Confidential18

Signed with a revoked certificate

McAfeeVSE Threat Intelligence

Module

McAfeeVSE Threat Intelligence

Module

McAfeeePO

McAfeeATD

YES NO

McAfeeGlobal ThreatIntelligence

3rd PartyFeeds

Data Exchange Layer

McAfeeTIE Server

File age hidden

Created by an untrusted process

Threat Intelligence ExchangeWorkflow

Page 8: Top of Content Box Line Subtitle Line Title Line George Younan | Enterprise Solutions Architect McAfee Threat Intelligence Exchange

.

McAfee Confidential19

McAfeeESM

McAfeeVSE Threat Intelligence

Module

McAfeeVSE Threat Intelligence

Module

McAfeeePO

McAfeeATD

McAfeeWeb Gateway

McAfeeEmail Gateway

McAfeeNGFW

McAfeeNSP

Data Exchange Layer

McAfeeGlobal ThreatIntelligence

3rd PartyFeeds

Gateways block access based on endpoint convictions

Security components

operate as one to immediately share relevant data between

endpoint, gateway, and other security

products

Proactively and efficiently protect your organization

as soon as a threat is revealed

McAfeeTIE Server

Threat Intelligence ExchangeWorkflow

Page 9: Top of Content Box Line Subtitle Line Title Line George Younan | Enterprise Solutions Architect McAfee Threat Intelligence Exchange

.

McAfee Confidential20

McAfeeESM

McAfeeVSE Threat Intelligence

Module

McAfeeVSE Threat Intelligence

Module

McAfeeePO

McAfeeATD

McAfeeWeb Gateway

McAfeeEmail Gateway

McAfeeNGFW

McAfeeNSP

Data Exchange Layer

NOYES

McAfeeGlobal ThreatIntelligence

3rd PartyFeeds

Endpoints are protected based on gateway convictions

McAfeeTIE Server

Threat Intelligence ExchangeWorkflow

Page 10: Top of Content Box Line Subtitle Line Title Line George Younan | Enterprise Solutions Architect McAfee Threat Intelligence Exchange

.

McAfee Confidential21

TIE Summary

21

You control what is good and bad in your environment

VirusTotal Integration for quick analysis

Identify patient zero in the case of a malware attack.

No more waiting for extra.dat files for malware that may be targeting your

environment.

You have Full visibility into every file executing in your environment