Esteban Próspero

9
. Esteban Javier Próspero | Director, Ingeniería Seguridad Conectada La Nueva Generación de Protección para Empresas @e_prospero

description

Presentación de Esteban Próspero en el Córdoba Tech Day.

Transcript of Esteban Próspero

Page 1: Esteban Próspero

.

Esteban Javier Próspero | Director, Ingeniería

Seguridad ConectadaLa Nueva Generación de Protección para Empresas

@e_prospero

Page 2: Esteban Próspero

.

1. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013-2018. Feb. 20142. IDC, The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in Far East. Dec. 2012

81%crecimiento de tráfico de datos móviles en 2013 (1.5 exabytes/mes)1

50%de los datos que necesitan protección están protegidos hoy2

40 %de los datos estarán en el cloud en el 20202

La Complejidad de IT Corporativa crece día a día

Page 3: Esteban Próspero

.

3

Ataques Avanzados: alto impacto material

1. http://online.wsj.com/news/articles/SB100014240527023042556045794066941821325682. McAfee, “Net Losses: Estimating the Global Cost of Cybercrime,” June 20143. Ponemon Institute 2013 Cost of Cyber Crime study

VENTAS caída 46%1

COSTOS más US $61M1

IMPACTO MARCAINCALCULABLE

GANANCIAScaída 34%1

Costo anual del crimen cibernético: US $400.000

millones2

Costo promedio de ataques 2013:

US $11.6 millones3

Cantidad de ataques exitosos: 122 por semana por

empresa3

MULTAS POSIBLESUS $400M a

$1.1B1

Ejemplo de la cadena de retail TARGET*

Page 4: Esteban Próspero

.

Endpoint Security

Network Security

Deep Security

Context and Orchestration

Threat Intelligence

Analytics

Security Management

Plataforma de Seguridad Conectada de McAfee

. 4McAfee Confidential

Page 5: Esteban Próspero

.

5

EndpointEndpoint

McAfeeePO

Adaptive security improves anti-malware protection• Better analysis of the gray• Crowd-source reputations from your own environment• Manage risk tolerance across departments / system types

Actionable intelligence• Early awareness of first occurrence flags attacks as they

begin• Know who may be / was compromised when certificate or

file reputation changes

YES NO

McAfeeGlobal ThreatIntelligence

3rd PartyFeeds

Data Exchange Layer

McAfeeTIE Server

McAfeeATD

McAfeeESM

Threat Intelligence ExchangeAdapt and Immunize—From Encounter to Containment in Milliseconds

ePO : Policy OrchestratorESM : Enterprise Security ManagerATD : Advanced Threat DetectionTIE : Threat Information Exchange

Page 6: Esteban Próspero

.

6

EndpointEndpoint

McAfeeePO

McAfeeATD

McAfeeGlobal ThreatIntelligence

3rd PartyFeeds

Data Exchange Layer

McAfeeTIE Server

McAfeeESM

Web GatewayEmail GatewayNGFW NSP

Threat Intelligence ExchangeAdapt and Immunize—From Encounter to Containment in Milliseconds

ePO : Policy OrchestratorESM : Enterprise Security ManagerATD : Advanced Threat DetectionTIE : Threat Information Exchange

Page 7: Esteban Próspero

.

7

McAfeeESM

EndpointEndpoint

McAfeeePO

McAfeeATD

Web GatewayEmail GatewayNGFW NSP

Data Exchange Layer

McAfeeGlobal ThreatIntelligence

3rd PartyFeeds

Gateways block access based on endpoint convictions

Security components operate as one to immediately share relevant data between endpoint, gateway, and other security products

Proactively and efficiently protect your organization as soon as a threat is revealed

McAfeeTIE Server

Protección Instantánea en toda la Empresa

ePO : Policy OrchestratorESM : Enterprise Security ManagerATD : Advanced Threat DetectionTIE : Threat Information Exchange

Page 8: Esteban Próspero

.

Made in Cordoba desde hoy

TIE

DXL

ESM

SIEM: Enterprise Security Manager

Performance

Inteligencia

Situational awareness

Data Exchange Layer

Real-time

Comunicación bidireccional

Seguridad adaptativa

Threat Information Exchange

Visibilidad y control real time

Protección y respuesta integral

Seguridad adaptativa

Page 9: Esteban Próspero

.

Esteban Javier Próspero @e_prospero

Muchas Gracias

[email protected]