Você está na página 1de 21

Computer Technologies Pvt. Ltd.

(CTPL)




Presented By
Mohammed Ahmad Uddin


Copyright : Computer Technologies Pvt. Ltd (CTPL)
Agenda
About CTPL.
Product briefing which CTPL carries
Current Services at SGGS&IT
McAfee Endpoint Security
Overview


Copyright : Computer Technologies Pvt. Ltd (CTPL)
About CTPL
Established in 1994.
leading company, head Office at Pune offering End-to-End
Solutions in Security, Storage and Networking domains.
Carrying a vast experience and core expertise in providing
Information Management and Information Protection Centric
Solutions.
We provide a broad range of leading Internet and Network
security software & appliance solutions.
With the excellent tract record CTPL has more than 400 clients
thru different industry vertical in Maharashtra region.

Copyright : Computer Technologies Pvt. Ltd (CTPL)
Our Strengths and Achievements:

We have the depth and breadth of knowledge, clearly aligning the
security requirements to business needs.
We develop a long-standing strategic relationship with our customers
which allows us to evaluate their constantly shifting IT strategy on an
ongoing basis, ensuring the gaps are being addressed appropriately.
Focused on delivering Information Security Solutions to customers.
The only Security focused SI to have direct presence across
Maharashtra.
The only Security focused SI to have direct presence across
Maharashtra.
You get the best that technology can offer in Information Security.
Focused approach in addressing your IT needs and Security
challenges. Long term commitment to the region





Copyright : Computer Technologies Pvt. Ltd (CTPL)
Copyright : Computer Technologies Pvt. Ltd (CTPL)
Endpoint Security
Gateway Security
Copyright : Computer Technologies Pvt. Ltd (CTPL)
Networking
Copyright : Computer Technologies Pvt. Ltd (CTPL)
Availability & Storage
Copyright : Computer Technologies Pvt. Ltd (CTPL)
Copyright : Computer Technologies Pvt. Ltd (CTPL)
THREAT LANDSCAPE
16%
Increase in the Amount Of Malicious
URLs in 2013Total Now 75M!
18,000
New Unique Android Malware Samples
600,000+
MBR Attack-Related Samples in Q1 2013
1,500,000
Signed Malicious Binaries in Q2 2013
170,000,000+
Unique Malware Samples Now
Contained in the McAfee Zoo
320,000
Number of New Unique Samples
of Ransomware in Q2 2013
152
New Threats Every Minute,
or About 2.5 Every Second
Copyright : Computer Technologies Pvt. Ltd (CTPL)
New Android targeted malware
discoveries increased by 33% in the
last two reported quarters

Mobile ransomware attacks will
appear in volume in 2014

Near Field Communication (NFC)
attacks will target both data and
currency expropriation

Continued BYOD will enable mobile
attacks targeting enterprise
infrastructure
New Android Malware Samples
(200,000)
-
200,000
400,000
600,000
800,000
1,000,000
Q2
2011
Q3
2011
Q4
2011
Q1
2012
Q2
2012
Q3
2012
Q4
2012
Q1
2013
Q2
2013
Q3
2013
Prediction: Mobile malware will be the driver of
growth in the overall malware market
Mobile Malware Threats
Copyright : Computer Technologies Pvt. Ltd (CTPL)
Virtual Currency
Prediction: Virtual currencies will fuel increasingly malicious
ransomware attacks
Ransomware attacks are
empowered and enabled by virtual
currency attributes
Unregulated
Anonymity
Cryptolocker is just the start
Users & enterprises may protect
themselves
Current antimalware
Web filtering
Spam filtering
Copyright : Computer Technologies Pvt. Ltd (CTPL)
Threat Concerns:
Endpoint security
Protect against zero-day threats
Secure all mobile devices
Deploy patches as appropriate
Compliance, Risk, and Policy Concerns:
Protect sensitive and regulated data
Know what insider users are doing in the network
Business Concerns:
Reduce costs without jeopardizing security
Lack of in-depth security expertise
Secure new technologies and applications

Concerns
ePolicy Orchestrator
McAfee ePolicy Orchestrator (McAfee ePO)
Security Management Platform for unified management of endpoint,
network, and data security.
End-to-end visibility
An open, extensible architecture
Proven efficiencies
Personalized Command Center
Drag-and-Drop Dashboards and
Actionable Reports
Role-based Access Control
Powerful Workflows
Enterprise-ready
Extensible Framework
Complete Management
Real Time for ePolicy
Orchestrator
Real Time for McAfee ePO is the first to let you instantly find any information
about any computer, deploy products, or update configurations in the
environment in a matter of seconds.
Instant information on the state of computing assets
Increased protection through policy enforcement
Cross-referenced threat information with a large, continuously monitored
peer-to-peer network

Integrated within McAfee ePO workflow
Instant visibility and real-time actions
Predefined content
with periodic updates
Complete Management
McAfee Application
Control for Desktop
McAfee Application Control software provides complete protection
from unwanted applications and codeblocking threats without requiring
signature updates.

Protect against zero-day and APTs
without signature updates
Strengthen security and lower ownership
costs with dynamic whitelisting
Automatically accept new
software added through
your authorized processes
Provide flexibility to desktop
users by optionally allowing
them to approve new
applications



Block known and unknown threats
Use whitelisting to only allow approved
applications to run
Integrates with McAfee ePO console for
centralized IT management
Easily protect unsupported legacy
systems, such as Microsoft Windows NT
and 2000
Complete
Endpoint Security
16
McAfee Deep
Defender
McAfee Deep Defender is a next generation of hardware-enhanced
endpoint security, enabled by McAfee DeepSAFE technology, operating
beyond the operating system, designed to detect, block and remediate
advanced, hidden attacks.
Deeper level of protection
beyond the OS
Real-time kernel-level
monitor of memory
DeepSAFE technology loads
before the OS
Protection from previously
hidden threats beyond the
OS for enhanced security
MBR & BIOS protection
Managed by ePO AV-Test Deep Defender Competitive Test 2013
Operates beyond the OS
Prevent kernel mode rootkits from
installing
Exposes hidden malware
Jointly developed by McAfee & Intel
Runs in conjunction of other anti-
malware software
Supports all Intel Core i3, i5, i7, as well
as Xeon
Complete
Endpoint Security
17
McAfee Endpoint
Encryption
McAfee Endpoint Encryption solutions use industry-leading encryption
algorithms and offers multiple layers of data protection to transparently secure
a broader scope of confidential information
Full disk or file/folder encryption for Microsoft
Windows PCs or Mac OS X
Enables automatic, transparent encryption
without hindering performance
Enhanced performance through
support for Intel AES-NI technology
Remote out-of-band management
with ePO Deep Command
Supports: Windows 8, 7, Vista, XP
Server 2008, 2003; (32- and 64-bit)
Enforces strong access control with pre-
boot authentication
Prevents unauthorized access to
information on PCs, laptops, network
servers, and removable media
Provides key-sharing mechanisms that
allow users to share files securely
Centrally managed with ePO
Complete
Endpoint Security
18
McAfee Enterprise
Mobility Management
McAfee Enterprise Mobility Management enables security and management
for mobile devices, data, and applications
Support for company- and employee-owned devices
MDM (Mobile Device Management) manage policy, provisioning, and security
OTA (over-the-air)
Security restrict access, features, functionality, risky devices, email, contacts,
calendar, and more
ePO Security Management use ePO to track and manage the device lifecycle
with streamlined processes, automation, dashboards, and granular policy options
Mobile monitoring, alerting, analytics, and reporting
Full and select remote data wipe; remote lock
Secure container and anti-malware for Android
Enterprise class scalability of over 25k devices per
server or over 100k with load balancing
Simplify using ePO for mobile and traditional
endpoint security management
EMM suite includes McAfee EMM, McAfee Secure
Container for Android, McAfee VirusScan Mobile for
Android, and McAfee ePO

Supported Device Platforms:
Apple iOS 4.3, 5.0, 6
Windows Phone 7.x
Android 2.2 and higher
Complete
Endpoint Security
19
McAfee VirusScan
Mobile Security
McAfee VirusScan Mobile Security protects mobile devices by scanning and
cleaning malware from files, memory cards, applications, Internet downloads,
text messages, and attachments.
Always-on protection identifies and
removes malware
Built from the ground up for mobile
to be light on resources
Real time scanning and alerts
Configurable scanning frequency
and scan depth
Strong and fast detection
Independently managed
Support for Android 2.1 to 4.0
smartphones and tablets
Complete
Endpoint Security
20
Concerns addressed
September 7, 2014 30
Threat Concerns:
Endpoint security
Protect against zero-day threats
Secure all mobile devices
Deploy patches as appropriate

Compliance, Risk, and Policy Concerns:
Protect sensitive and regulated data
Know what insider users are doing in the network

Business Concerns:
Reduce costs without jeopardizing security
Lack of in-depth security expertise
Secure new technologies and applications
McAfee Endpoint Security Demo

Você também pode gostar