SlideShare a Scribd company logo
1 of 29
Download to read offline
McAfee MOVE / Endpoint Security
    Marco Schultes




02.06.2011
Marco Schultes - netlogix Hausmesse LIVE/11   1
Was IST eigentlich McAfee MOVE?


    Management for
          Optimized Virtual
      Environments

                                  2
2
Aber warum optimiert?

Heutige (AntiVirus)-
Applikationen sind
nicht für virtuelle
Umgebungen
programmiert, nicht
„hypervisor aware“
und deshalb sehr
verschwenderisch
im Umgang mit
Ressourcen.


                        3
MOVE - die neue Plattform zur
Absicherung virtueller Umgebungen
„MOVE is a new strategic Platform and NOT a single Product“
                       HIPS
                      Plug-in              AV for
                                           Server
                                           Plug-in

            File
        Encryption                                   AV for
          Plug-in                McAfee
                                 MOVE                 VDI‘s
                                Platform             Plug-in


             Site
                                                 SIA
            Adivsor
                                               Partner
            Plug-in
                                Device         Plug-in
                                Control
                                Plug-in
                                                               4
AntiVirus Optimierung
Die Probleme des Administrators




                                  5
Problem #1 - Virtuelle Server
“Klassisches AV frisst CPU-Leistung”
                             Individuelle                        Konsolidierte
                                Server                              Server




CPU & I/O Utilization



   On-Access Scans          3-5% CPU-Last auf           30% mit 10 virtuellen Maschinen
                          individuellen Maschinen

   On-Demand Scans      50-70% Last auf individuellen         Drei gleichzeitige Scans
                                Maschinen                   können den Host in die Knie
                                                                      zwingen




                                                                                          6
Problem #2 - Virtuelle Server
“READ-ONLY Images”
                                Virtual     Virtual    Offline
                                Machine     Machine    Virtual
                                                       Image


• READ-ONLY & Offline            Apps        Apps      Apps

  Images können nicht
  gepatched werden                OS          OS        OS

  und keine DAT-
                                          Hypervisor
  Updates erhalten


                                                                 7
Problem #3 - Virtuelle Desktops
    “AV-Storming”

Organisatorische
  Probleme
•   Kapazitätsplanung
•   Zeitplanung
•   VM-Dichte auf dem
    Hypervisor
•   Verschiedene
    Management-Oberflächen




                                      8
McAfee MOVE-AV für Server und VDI
              VM                 VM                MOVE
                                                   Virtual Appliance
                  Applications    Applications
                     MOVE                              Off-load
                                      MOVE
                                                      Processing
                      OS               OS

                                      Hypervisor                ePO

                                                                            McAfee ePO

                                                        MOVE AV for VDI’s
   Client                               • On-Access Scanning (OAS)
                                        • On-Demand Scanning (ODS) (angekündigt)
Virtual Desktop
                                        • Updates nur auf MOVE Virtual Appliance nötig
          Client
                                                     MOVE AV for Virtual Servers
                                        • Scan basierend auf Hypervisor-Auslastung
       Virtual Desktop
                                        • On-Demand Scanning (ODS)
                                        • Offline Scanning (OVI)
                                        • On-Access Scanning (OAS) (angekündigt)
                                                                                         9
Features

Effizientes Security-Management
 – Volle ePO-Integration
 – Hypervisor-unabhängig (Vmware
     ESX / Citrix XenServer / MS HyperV
     (angekündigt)
 – Offline Virenscan
 – Hypervisor-lastabhängig
 – Security Dashboards/Reports per
     Hypervisor




                                          10
McAfee MOVE
Ein technischer Überblick




                            11
Optimiertes File Scanning
1.   Lokaler Scan Cache
2.   Globaler Scan Cache
3.   File scannen
4.   Artemis Anbindung

                      3
                      2

               1                                              4
                           abc   abc
                                                            Scan
                                                     abc
                                                     ac
                           def
                           gi
                                 def
                                 gi
                                                     def
                                                     def
                                                     g ii
                                                     g      Engine


                                       Hypervisor


                                                    Artemis
                                                                     12
Advanced File Caching
•   Reduziert den Scan Overhead
     – Durch effizienten Einsatz von Caches
     – Lokaler Scan Cache auf der VM
     – Globaler Scan Cache auf der Scan Engine



    ePO Server

                                                                                  Scan
                                   abc                  abc                abc
                                   def
                                   gi
                                                        def
                                                        gi
                                                                           abc
                                                                           def
                                                                           def
                                                                           g ii
                                                                           g
                                                                                  Engine



                                                              Hypervisor
      MOVE
                                         Cache Synchronization Protocol
      Server




                                                                                           13
Traditionelles AV vs. MOVE AV




                                14
McAfee Plattform-Test auf Citrix XenServer

                                 A/V within the guest                  Offloading A/V with MOVE

Memory Consumption                          60-120MB+                                   ~20MB
(per VM)

Peak CPU Usage (per                          80-100%                                     <10%
hypervisor)
VM Density                                       X                                        3X
Scanning Resource                               YES                                   NO
Utilization                                                             (Offloaded to Virtual Appliance)

DAT Update Resource                             YES                                   NO
Utilization                                                             (Offloaded to Virtual Appliance)

 The product plans, specifications and descriptions herein are provided for information only, subject to change
 without notice, results may vary and without warranty of any kind, express or implied
                                                                                                                  15
MOVE Agent in Action




                       16
MOVE Konfiguration




      Bis zu 2 Scan-Server können angegeben werden
            (virtuelle oder physikalische Server)

                                                     17
Security Dashboards / Reports




                                18
Hypervisor-aware Scheduler




                             19
Verhindert „AV Storming“




     Scan wird verhindert, da die Hypervisor-Auslastung zu hoch ist

                                                                      20
Zusammenfassung

     •   Erhöhen der virtuellen Server Security mit
         minimalen Performance-Auswirkungen

     •   Aktivieren von VDI Security bei gleichzeitig
         hoher VM Dichte pro Hypervisor

     •   (Zeit-)Einsparungen durch vereinfachtes
         zentrales Management über ePO

     •   Unabhängig vom Hypervisor
          – ESX / XenServer / Hyper-V




                                                        21
McAfee Data Protection




                         22
McAfee Data Protection

McAfee Data Loss Prevention                              McAfee Device Control
Full control and absolute                                Prevent unauthorized use
visibility over user behavior                            of removable media
                                 Data Loss   Device      devices
                                Prevention   Control

McAfee Total                                                     Integrated
Protection™                                                      technologies for
for Data                                                         total data
                                                                 protection
                                 Endpoint    Encrypted
                                Encryption   USB
McAfee Endpoint Encryption                               McAfee Encrypted USB
Full disk, mobile device, and                            Secure, portable external
file and folder encryption                               storage devices
coupled with strong
authentication
                                                                                     23
Data Breaches Don’t Discriminate

    “DuPont scientist downloaded                    “Royal London Mutual Insurance
     22,000 sensitive documents as he               Society loses eight laptops and the
     got ready to take a job with a                 personal details of 2,135 people”
     competitor…”

                                                        SC Magazine


“The FSA has fined              “Personal data of                   “ChoicePoint to pay
Nationwide £980,000             600,000 on lost                      $15 million over data
for a stolen laptop”            laptop”                              breach—Data broker sold
                                                                     info on 163,000 people”



                                                                                               24
Challenge
How best to protect confidential corporate data on mobile devices from loss, theft, or exposure
                                   to unauthorized parties?

    –     Laptops lost or stolen in airports, taxis and hotels cost companies an average of
          $49,2461

    –     36% of data breaches were due to lost or stolen laptop computers
            • Average cost is $6.75 million per breach2

    –     Best practices: “Ensure that portable data-bearing devices…are encrypted”2

    –     “Protected health information (PHI) is rendered unusable, unreadable, or
          indecipherable to unauthorized individuals if encrypted or destroyed”3

    –     Staying out of the news


    1   Ponemon
    2 Ponemon, 2009   Cost of a Data Breach
    3 HIPAA DHHS Guidance 2009                                                                    25
McAfee Endpoint Encryption
                            You need
                            •   Encryption for laptops, desktops, and mobile
                                devices with the flexibility to choose full disk or
                                file and folder encryption
   Data Loss     Device     •   Confidence in integrity of sensitive data when a
  Prevention     Control        device is lost or stolen
                            •   Safe Harbor protection
                            McAfee offers
                            •  Broad support for laptops, desktops, and mobile
                               devices
    Endpoint    Encrypted
   Encryption   USB         •   Full audit trails for compliance & auditing needs
                            •   Support for multiple strong authentication
                                methods
                            •   Certifications: FIPS 140-2, Common Criteria Level
                                4 (highest level for software products), BITS,
                                CSIA, etc.


                                                                                  26
Solution: Full Disk Encryption

Why encrypt?
   – Every disk drive in an organization eventually leaves said organization
      • Natural retirement/replacement
      • Loss
      • Theft
   – Knowing what sensitive information is on a given drive is difficult
      • Avoids having to classify data to decide what to protect
   – Applications use a myriad of “hidden” temp files that contain your data


Data protection made easy
   – Simple to deploy
   – Nearly transparent user experience



                                                                               27
Solution: Full Disk Encryption

Full Disk Encryption
• No data access without proper authentication
• Complete, proven protection against loss and theft
• Extensible complement to other data protection technologies
  like file encryption, encrypted USB drives, and DLP


How does it work?
• Disk drive is fully encrypted, sector A through sector Z
• As new information is created, it is encrypted
  on-the-fly
• A unique, per-device recovery token is used to
  handle normal “lost password” situations



                                                                28
Security Details Matter
CC EAL 4 and FIPS 140-2 Level 2 validation
     – Proves the security level by an independent body
AES 256-bit encryption
     – Encryption on-the-fly using strong algorithms
Up to three-factor authentication
     – McAfee Endpoint Encryption offers a strong pre-
         boot authentication
     – Support for various smart cards, USB tokens
         and biometric devices
ePO compliance reporting and deployment
     – Identify non-encrypted machines
     – Deploy using McAfee ePO
Business continuity
     – McAfee Endpoint Encryption offers offline
         challenge-response recovery
     – Reduce costs using our local user self-recovery
         (questions + answers)

                                                          29

More Related Content

What's hot

Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Digital Bond
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPSmmiznoni
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Sean Xie
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkPriyanka Aash
 
SonicWALL Advanced Features
SonicWALL Advanced FeaturesSonicWALL Advanced Features
SonicWALL Advanced FeaturesDavid Perkins
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityMarketingArrowECS_CZ
 

What's hot (20)

Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT Framework
 
SonicWALL Advanced Features
SonicWALL Advanced FeaturesSonicWALL Advanced Features
SonicWALL Advanced Features
 
Managing third party libraries
Managing third party librariesManaging third party libraries
Managing third party libraries
 
SourceFire IPS Overview
SourceFire IPS OverviewSourceFire IPS Overview
SourceFire IPS Overview
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
IPS Best Practices
IPS Best PracticesIPS Best Practices
IPS Best Practices
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 

Similar to McAfee MOVE & Endpoint Security

Transcending Computing Environment Boundaries: Seamless Computing Environmen...
Transcending  Computing Environment Boundaries: Seamless Computing Environmen...Transcending  Computing Environment Boundaries: Seamless Computing Environmen...
Transcending Computing Environment Boundaries: Seamless Computing Environmen...HCL Infosystems
 
SF DevOps: Introducing Vagrant
SF DevOps: Introducing VagrantSF DevOps: Introducing Vagrant
SF DevOps: Introducing VagrantMitchell Hashimoto
 
Decrease TCO w/ Server-side App Virtualization
Decrease TCO w/ Server-side App VirtualizationDecrease TCO w/ Server-side App Virtualization
Decrease TCO w/ Server-side App VirtualizationAppZero
 
It camp veeam presentation (no videos)
It camp veeam presentation (no videos)It camp veeam presentation (no videos)
It camp veeam presentation (no videos)Harold Wong
 
Symantec Delivers 30x Faster Failover For Microsoft Environments
Symantec Delivers 30x Faster Failover For Microsoft EnvironmentsSymantec Delivers 30x Faster Failover For Microsoft Environments
Symantec Delivers 30x Faster Failover For Microsoft EnvironmentsSymantec
 
Build the foundation for Private Cloud
Build the foundation for Private CloudBuild the foundation for Private Cloud
Build the foundation for Private CloudAppZero
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorASBIS SK
 
Cybera - Clouds & other computational frameworks for science
Cybera - Clouds & other computational frameworks for scienceCybera - Clouds & other computational frameworks for science
Cybera - Clouds & other computational frameworks for scienceCybera Inc.
 
Overview of VMware & VMware Education from IBM
Overview of VMware & VMware Education from IBMOverview of VMware & VMware Education from IBM
Overview of VMware & VMware Education from IBMctc TrainCanada
 
Brief about Windows Azure Platform
Brief about Windows Azure Platform Brief about Windows Azure Platform
Brief about Windows Azure Platform K.Mohamed Faizal
 
i//:squared Business Continuity Event
i//:squared Business Continuity Eventi//:squared Business Continuity Event
i//:squared Business Continuity EventJonathan Allmayer
 
Virtualization Manager 5.0 – Now with Hyper-V Support!
Virtualization Manager 5.0 – Now with Hyper-V Support!Virtualization Manager 5.0 – Now with Hyper-V Support!
Virtualization Manager 5.0 – Now with Hyper-V Support!SolarWinds
 
Improve your Developer Experiece using the WAS Liberty Profile with JRebel
Improve your Developer Experiece using the WAS Liberty Profile with JRebel Improve your Developer Experiece using the WAS Liberty Profile with JRebel
Improve your Developer Experiece using the WAS Liberty Profile with JRebel Anton Arhipov
 
To the cloud...
To the cloud...To the cloud...
To the cloud...AppZero
 
VMware Performance for Gurus - A Tutorial
VMware Performance for Gurus - A TutorialVMware Performance for Gurus - A Tutorial
VMware Performance for Gurus - A TutorialRichard McDougall
 
What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0Eric Sloof
 
VMware vSphere 5 seminar
VMware vSphere 5 seminarVMware vSphere 5 seminar
VMware vSphere 5 seminarMarkiting_be
 
Veeamvpower
VeeamvpowerVeeamvpower
Veeamvpowertoreil
 

Similar to McAfee MOVE & Endpoint Security (20)

Transcending Computing Environment Boundaries: Seamless Computing Environmen...
Transcending  Computing Environment Boundaries: Seamless Computing Environmen...Transcending  Computing Environment Boundaries: Seamless Computing Environmen...
Transcending Computing Environment Boundaries: Seamless Computing Environmen...
 
SF DevOps: Introducing Vagrant
SF DevOps: Introducing VagrantSF DevOps: Introducing Vagrant
SF DevOps: Introducing Vagrant
 
Decrease TCO w/ Server-side App Virtualization
Decrease TCO w/ Server-side App VirtualizationDecrease TCO w/ Server-side App Virtualization
Decrease TCO w/ Server-side App Virtualization
 
It camp veeam presentation (no videos)
It camp veeam presentation (no videos)It camp veeam presentation (no videos)
It camp veeam presentation (no videos)
 
Symantec Delivers 30x Faster Failover For Microsoft Environments
Symantec Delivers 30x Faster Failover For Microsoft EnvironmentsSymantec Delivers 30x Faster Failover For Microsoft Environments
Symantec Delivers 30x Faster Failover For Microsoft Environments
 
Build the foundation for Private Cloud
Build the foundation for Private CloudBuild the foundation for Private Cloud
Build the foundation for Private Cloud
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
 
Cybera - Clouds & other computational frameworks for science
Cybera - Clouds & other computational frameworks for scienceCybera - Clouds & other computational frameworks for science
Cybera - Clouds & other computational frameworks for science
 
Overview of VMware & VMware Education from IBM
Overview of VMware & VMware Education from IBMOverview of VMware & VMware Education from IBM
Overview of VMware & VMware Education from IBM
 
Презентация RDS & App-V, VDI
Презентация RDS & App-V, VDIПрезентация RDS & App-V, VDI
Презентация RDS & App-V, VDI
 
Brief about Windows Azure Platform
Brief about Windows Azure Platform Brief about Windows Azure Platform
Brief about Windows Azure Platform
 
i//:squared Business Continuity Event
i//:squared Business Continuity Eventi//:squared Business Continuity Event
i//:squared Business Continuity Event
 
Virtualization Manager 5.0 – Now with Hyper-V Support!
Virtualization Manager 5.0 – Now with Hyper-V Support!Virtualization Manager 5.0 – Now with Hyper-V Support!
Virtualization Manager 5.0 – Now with Hyper-V Support!
 
Improve your Developer Experiece using the WAS Liberty Profile with JRebel
Improve your Developer Experiece using the WAS Liberty Profile with JRebel Improve your Developer Experiece using the WAS Liberty Profile with JRebel
Improve your Developer Experiece using the WAS Liberty Profile with JRebel
 
PHP in the Cloud
PHP in the CloudPHP in the Cloud
PHP in the Cloud
 
To the cloud...
To the cloud...To the cloud...
To the cloud...
 
VMware Performance for Gurus - A Tutorial
VMware Performance for Gurus - A TutorialVMware Performance for Gurus - A Tutorial
VMware Performance for Gurus - A Tutorial
 
What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0
 
VMware vSphere 5 seminar
VMware vSphere 5 seminarVMware vSphere 5 seminar
VMware vSphere 5 seminar
 
Veeamvpower
VeeamvpowerVeeamvpower
Veeamvpower
 

More from netlogix

TYPO3 Neos and Flow - Security 2.0
TYPO3 Neos and Flow - Security 2.0TYPO3 Neos and Flow - Security 2.0
TYPO3 Neos and Flow - Security 2.0netlogix
 
FLOW3: Security mit AOP
FLOW3: Security mit AOPFLOW3: Security mit AOP
FLOW3: Security mit AOPnetlogix
 
Astaro Security Wall - Sechs Schritte zur sicheren IT
Astaro Security Wall - Sechs Schritte zur sicheren ITAstaro Security Wall - Sechs Schritte zur sicheren IT
Astaro Security Wall - Sechs Schritte zur sicheren ITnetlogix
 
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3netlogix
 
SMS PASSCODE: Authentifizierung per Handy
SMS PASSCODE: Authentifizierung per HandySMS PASSCODE: Authentifizierung per Handy
SMS PASSCODE: Authentifizierung per Handynetlogix
 
EMA - Enterprise Managed Archive: globales Informationsmanagement clever gel...
EMA  - Enterprise Managed Archive: globales Informationsmanagement clever gel...EMA  - Enterprise Managed Archive: globales Informationsmanagement clever gel...
EMA - Enterprise Managed Archive: globales Informationsmanagement clever gel...netlogix
 
XenDesktop 5 und das letzte "Puzzleteil"
XenDesktop 5 und das letzte "Puzzleteil"XenDesktop 5 und das letzte "Puzzleteil"
XenDesktop 5 und das letzte "Puzzleteil"netlogix
 
Ein Hypervisor alleine macht nicht glücklich: Interessante Add-Ons zu VMware ...
Ein Hypervisor alleine macht nicht glücklich: Interessante Add-Ons zu VMware ...Ein Hypervisor alleine macht nicht glücklich: Interessante Add-Ons zu VMware ...
Ein Hypervisor alleine macht nicht glücklich: Interessante Add-Ons zu VMware ...netlogix
 
Next Generation Unified Communications mit Microsoft Lync 2010
Next Generation Unified Communications mit Microsoft Lync 2010Next Generation Unified Communications mit Microsoft Lync 2010
Next Generation Unified Communications mit Microsoft Lync 2010netlogix
 
netlogix Care: Cloudbasierte, proaktive Systemüberwachung als Managed Service
netlogix Care: Cloudbasierte, proaktive Systemüberwachung als Managed Servicenetlogix Care: Cloudbasierte, proaktive Systemüberwachung als Managed Service
netlogix Care: Cloudbasierte, proaktive Systemüberwachung als Managed Servicenetlogix
 
Microsoft System Center Day 2011
Microsoft System Center Day 2011Microsoft System Center Day 2011
Microsoft System Center Day 2011netlogix
 
Microsoft System Center - Lizenzierung
Microsoft System Center - LizenzierungMicrosoft System Center - Lizenzierung
Microsoft System Center - Lizenzierungnetlogix
 
Building a large eCommerce application with Extbase, Fluid and Apache Solr
Building a large eCommerce application with Extbase, Fluid and Apache SolrBuilding a large eCommerce application with Extbase, Fluid and Apache Solr
Building a large eCommerce application with Extbase, Fluid and Apache Solrnetlogix
 
Citrix XenServer 5.6: Die Neuerungen
Citrix XenServer 5.6: Die NeuerungenCitrix XenServer 5.6: Die Neuerungen
Citrix XenServer 5.6: Die Neuerungennetlogix
 
DataCore Speichervirtualisierung
DataCore SpeichervirtualisierungDataCore Speichervirtualisierung
DataCore Speichervirtualisierungnetlogix
 
VMware View 4
VMware View 4VMware View 4
VMware View 4netlogix
 
VMware ThinApp 4.5
VMware ThinApp 4.5VMware ThinApp 4.5
VMware ThinApp 4.5netlogix
 
Trapeze WLAN-Lösung
Trapeze WLAN-LösungTrapeze WLAN-Lösung
Trapeze WLAN-Lösungnetlogix
 
EMA Email Archive Appliance
EMA Email Archive ApplianceEMA Email Archive Appliance
EMA Email Archive Appliancenetlogix
 
Data Domain Backup & Recovery
Data Domain Backup & RecoveryData Domain Backup & Recovery
Data Domain Backup & Recoverynetlogix
 

More from netlogix (20)

TYPO3 Neos and Flow - Security 2.0
TYPO3 Neos and Flow - Security 2.0TYPO3 Neos and Flow - Security 2.0
TYPO3 Neos and Flow - Security 2.0
 
FLOW3: Security mit AOP
FLOW3: Security mit AOPFLOW3: Security mit AOP
FLOW3: Security mit AOP
 
Astaro Security Wall - Sechs Schritte zur sicheren IT
Astaro Security Wall - Sechs Schritte zur sicheren ITAstaro Security Wall - Sechs Schritte zur sicheren IT
Astaro Security Wall - Sechs Schritte zur sicheren IT
 
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
 
SMS PASSCODE: Authentifizierung per Handy
SMS PASSCODE: Authentifizierung per HandySMS PASSCODE: Authentifizierung per Handy
SMS PASSCODE: Authentifizierung per Handy
 
EMA - Enterprise Managed Archive: globales Informationsmanagement clever gel...
EMA  - Enterprise Managed Archive: globales Informationsmanagement clever gel...EMA  - Enterprise Managed Archive: globales Informationsmanagement clever gel...
EMA - Enterprise Managed Archive: globales Informationsmanagement clever gel...
 
XenDesktop 5 und das letzte "Puzzleteil"
XenDesktop 5 und das letzte "Puzzleteil"XenDesktop 5 und das letzte "Puzzleteil"
XenDesktop 5 und das letzte "Puzzleteil"
 
Ein Hypervisor alleine macht nicht glücklich: Interessante Add-Ons zu VMware ...
Ein Hypervisor alleine macht nicht glücklich: Interessante Add-Ons zu VMware ...Ein Hypervisor alleine macht nicht glücklich: Interessante Add-Ons zu VMware ...
Ein Hypervisor alleine macht nicht glücklich: Interessante Add-Ons zu VMware ...
 
Next Generation Unified Communications mit Microsoft Lync 2010
Next Generation Unified Communications mit Microsoft Lync 2010Next Generation Unified Communications mit Microsoft Lync 2010
Next Generation Unified Communications mit Microsoft Lync 2010
 
netlogix Care: Cloudbasierte, proaktive Systemüberwachung als Managed Service
netlogix Care: Cloudbasierte, proaktive Systemüberwachung als Managed Servicenetlogix Care: Cloudbasierte, proaktive Systemüberwachung als Managed Service
netlogix Care: Cloudbasierte, proaktive Systemüberwachung als Managed Service
 
Microsoft System Center Day 2011
Microsoft System Center Day 2011Microsoft System Center Day 2011
Microsoft System Center Day 2011
 
Microsoft System Center - Lizenzierung
Microsoft System Center - LizenzierungMicrosoft System Center - Lizenzierung
Microsoft System Center - Lizenzierung
 
Building a large eCommerce application with Extbase, Fluid and Apache Solr
Building a large eCommerce application with Extbase, Fluid and Apache SolrBuilding a large eCommerce application with Extbase, Fluid and Apache Solr
Building a large eCommerce application with Extbase, Fluid and Apache Solr
 
Citrix XenServer 5.6: Die Neuerungen
Citrix XenServer 5.6: Die NeuerungenCitrix XenServer 5.6: Die Neuerungen
Citrix XenServer 5.6: Die Neuerungen
 
DataCore Speichervirtualisierung
DataCore SpeichervirtualisierungDataCore Speichervirtualisierung
DataCore Speichervirtualisierung
 
VMware View 4
VMware View 4VMware View 4
VMware View 4
 
VMware ThinApp 4.5
VMware ThinApp 4.5VMware ThinApp 4.5
VMware ThinApp 4.5
 
Trapeze WLAN-Lösung
Trapeze WLAN-LösungTrapeze WLAN-Lösung
Trapeze WLAN-Lösung
 
EMA Email Archive Appliance
EMA Email Archive ApplianceEMA Email Archive Appliance
EMA Email Archive Appliance
 
Data Domain Backup & Recovery
Data Domain Backup & RecoveryData Domain Backup & Recovery
Data Domain Backup & Recovery
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

McAfee MOVE & Endpoint Security

  • 1. McAfee MOVE / Endpoint Security Marco Schultes 02.06.2011 Marco Schultes - netlogix Hausmesse LIVE/11 1
  • 2. Was IST eigentlich McAfee MOVE? Management for Optimized Virtual Environments 2 2
  • 3. Aber warum optimiert? Heutige (AntiVirus)- Applikationen sind nicht für virtuelle Umgebungen programmiert, nicht „hypervisor aware“ und deshalb sehr verschwenderisch im Umgang mit Ressourcen. 3
  • 4. MOVE - die neue Plattform zur Absicherung virtueller Umgebungen „MOVE is a new strategic Platform and NOT a single Product“ HIPS Plug-in AV for Server Plug-in File Encryption AV for Plug-in McAfee MOVE VDI‘s Platform Plug-in Site SIA Adivsor Partner Plug-in Device Plug-in Control Plug-in 4
  • 5. AntiVirus Optimierung Die Probleme des Administrators 5
  • 6. Problem #1 - Virtuelle Server “Klassisches AV frisst CPU-Leistung” Individuelle Konsolidierte Server Server CPU & I/O Utilization On-Access Scans 3-5% CPU-Last auf 30% mit 10 virtuellen Maschinen individuellen Maschinen On-Demand Scans 50-70% Last auf individuellen Drei gleichzeitige Scans Maschinen können den Host in die Knie zwingen 6
  • 7. Problem #2 - Virtuelle Server “READ-ONLY Images” Virtual Virtual Offline Machine Machine Virtual Image • READ-ONLY & Offline Apps Apps Apps Images können nicht gepatched werden OS OS OS und keine DAT- Hypervisor Updates erhalten 7
  • 8. Problem #3 - Virtuelle Desktops “AV-Storming” Organisatorische Probleme • Kapazitätsplanung • Zeitplanung • VM-Dichte auf dem Hypervisor • Verschiedene Management-Oberflächen 8
  • 9. McAfee MOVE-AV für Server und VDI VM VM MOVE Virtual Appliance Applications Applications MOVE Off-load MOVE Processing OS OS Hypervisor ePO McAfee ePO MOVE AV for VDI’s Client • On-Access Scanning (OAS) • On-Demand Scanning (ODS) (angekündigt) Virtual Desktop • Updates nur auf MOVE Virtual Appliance nötig Client MOVE AV for Virtual Servers • Scan basierend auf Hypervisor-Auslastung Virtual Desktop • On-Demand Scanning (ODS) • Offline Scanning (OVI) • On-Access Scanning (OAS) (angekündigt) 9
  • 10. Features Effizientes Security-Management – Volle ePO-Integration – Hypervisor-unabhängig (Vmware ESX / Citrix XenServer / MS HyperV (angekündigt) – Offline Virenscan – Hypervisor-lastabhängig – Security Dashboards/Reports per Hypervisor 10
  • 12. Optimiertes File Scanning 1. Lokaler Scan Cache 2. Globaler Scan Cache 3. File scannen 4. Artemis Anbindung 3 2 1 4 abc abc Scan abc ac def gi def gi def def g ii g Engine Hypervisor Artemis 12
  • 13. Advanced File Caching • Reduziert den Scan Overhead – Durch effizienten Einsatz von Caches – Lokaler Scan Cache auf der VM – Globaler Scan Cache auf der Scan Engine ePO Server Scan abc abc abc def gi def gi abc def def g ii g Engine Hypervisor MOVE Cache Synchronization Protocol Server 13
  • 14. Traditionelles AV vs. MOVE AV 14
  • 15. McAfee Plattform-Test auf Citrix XenServer A/V within the guest Offloading A/V with MOVE Memory Consumption 60-120MB+ ~20MB (per VM) Peak CPU Usage (per 80-100% <10% hypervisor) VM Density X 3X Scanning Resource YES NO Utilization (Offloaded to Virtual Appliance) DAT Update Resource YES NO Utilization (Offloaded to Virtual Appliance) The product plans, specifications and descriptions herein are provided for information only, subject to change without notice, results may vary and without warranty of any kind, express or implied 15
  • 16. MOVE Agent in Action 16
  • 17. MOVE Konfiguration Bis zu 2 Scan-Server können angegeben werden (virtuelle oder physikalische Server) 17
  • 18. Security Dashboards / Reports 18
  • 20. Verhindert „AV Storming“ Scan wird verhindert, da die Hypervisor-Auslastung zu hoch ist 20
  • 21. Zusammenfassung • Erhöhen der virtuellen Server Security mit minimalen Performance-Auswirkungen • Aktivieren von VDI Security bei gleichzeitig hoher VM Dichte pro Hypervisor • (Zeit-)Einsparungen durch vereinfachtes zentrales Management über ePO • Unabhängig vom Hypervisor – ESX / XenServer / Hyper-V 21
  • 23. McAfee Data Protection McAfee Data Loss Prevention McAfee Device Control Full control and absolute Prevent unauthorized use visibility over user behavior of removable media Data Loss Device devices Prevention Control McAfee Total Integrated Protection™ technologies for for Data total data protection Endpoint Encrypted Encryption USB McAfee Endpoint Encryption McAfee Encrypted USB Full disk, mobile device, and Secure, portable external file and folder encryption storage devices coupled with strong authentication 23
  • 24. Data Breaches Don’t Discriminate “DuPont scientist downloaded “Royal London Mutual Insurance 22,000 sensitive documents as he Society loses eight laptops and the got ready to take a job with a personal details of 2,135 people” competitor…” SC Magazine “The FSA has fined “Personal data of “ChoicePoint to pay Nationwide £980,000 600,000 on lost $15 million over data for a stolen laptop” laptop” breach—Data broker sold info on 163,000 people” 24
  • 25. Challenge How best to protect confidential corporate data on mobile devices from loss, theft, or exposure to unauthorized parties? – Laptops lost or stolen in airports, taxis and hotels cost companies an average of $49,2461 – 36% of data breaches were due to lost or stolen laptop computers • Average cost is $6.75 million per breach2 – Best practices: “Ensure that portable data-bearing devices…are encrypted”2 – “Protected health information (PHI) is rendered unusable, unreadable, or indecipherable to unauthorized individuals if encrypted or destroyed”3 – Staying out of the news 1 Ponemon 2 Ponemon, 2009 Cost of a Data Breach 3 HIPAA DHHS Guidance 2009 25
  • 26. McAfee Endpoint Encryption You need • Encryption for laptops, desktops, and mobile devices with the flexibility to choose full disk or file and folder encryption Data Loss Device • Confidence in integrity of sensitive data when a Prevention Control device is lost or stolen • Safe Harbor protection McAfee offers • Broad support for laptops, desktops, and mobile devices Endpoint Encrypted Encryption USB • Full audit trails for compliance & auditing needs • Support for multiple strong authentication methods • Certifications: FIPS 140-2, Common Criteria Level 4 (highest level for software products), BITS, CSIA, etc. 26
  • 27. Solution: Full Disk Encryption Why encrypt? – Every disk drive in an organization eventually leaves said organization • Natural retirement/replacement • Loss • Theft – Knowing what sensitive information is on a given drive is difficult • Avoids having to classify data to decide what to protect – Applications use a myriad of “hidden” temp files that contain your data Data protection made easy – Simple to deploy – Nearly transparent user experience 27
  • 28. Solution: Full Disk Encryption Full Disk Encryption • No data access without proper authentication • Complete, proven protection against loss and theft • Extensible complement to other data protection technologies like file encryption, encrypted USB drives, and DLP How does it work? • Disk drive is fully encrypted, sector A through sector Z • As new information is created, it is encrypted on-the-fly • A unique, per-device recovery token is used to handle normal “lost password” situations 28
  • 29. Security Details Matter CC EAL 4 and FIPS 140-2 Level 2 validation – Proves the security level by an independent body AES 256-bit encryption – Encryption on-the-fly using strong algorithms Up to three-factor authentication – McAfee Endpoint Encryption offers a strong pre- boot authentication – Support for various smart cards, USB tokens and biometric devices ePO compliance reporting and deployment – Identify non-encrypted machines – Deploy using McAfee ePO Business continuity – McAfee Endpoint Encryption offers offline challenge-response recovery – Reduce costs using our local user self-recovery (questions + answers) 29