McAfee MVISION Cloud. Data Security for the Cloud Era

Similar documents
McAfee Skyhigh Security Cloud for Citrix ShareFile

McAfee Skyhigh Security Cloud for Amazon Web Services

Comprehensive Database Security

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.

Securing Office 365 with SecureCloud

GDPR: An Opportunity to Transform Your Security Operations

CloudSOC and Security.cloud for Microsoft Office 365

McAfee Public Cloud Server Security Suite

SIEM: Five Requirements that Solve the Bigger Business Issues

McAfee Total Protection for Data Loss Prevention

McAfee epolicy Orchestrator

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

McAfee Endpoint Threat Defense and Response Family

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

SIEM Solutions from McAfee

McAfee Endpoint Security

Office 365 Buyers Guide: Best Practices for Securing Office 365

Sustainable Security Operations

CipherCloud CASB+ Connector for ServiceNow

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

McAfee Embedded Control

McAfee Advanced Threat Defense

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Access Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions

Juniper Sky Advanced Threat Prevention

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

The McAfee MOVE Platform and Virtual Desktop Infrastructure

ForeScout ControlFabric TM Architecture

Security by Default: Enabling Transformation Through Cyber Resilience

McAfee Security Management Center

Securing Your Most Sensitive Data

JUNIPER SKY ADVANCED THREAT PREVENTION

McAfee Virtual Network Security Platform

Symantec Endpoint Protection Family Feature Comparison

PROTECT AND AUDIT SENSITIVE DATA

Global Manufacturer MAUSER Realizes Dream of Interconnected, Adaptive Security a Reality

Crash course in Azure Active Directory

NIST Compliance Controls

McAfee Database Security Insights

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Securing Your Microsoft Azure Virtual Networks

Securing the Software-Defined Data Center

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Defend Against the Unknown

The threat landscape is constantly

GUIDE. Navigating the General Data Protection Regulation Mini Guide

SYMANTEC DATA CENTER SECURITY

Building Resilience in a Digital Enterprise

Citrix ShareFile Share, store, sync, and secure data on any device, anywhere

Privileged Account Security: A Balanced Approach to Securing Unix Environments

A Security Admin's Survival Guide to the GDPR.

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

SentinelOne Technical Brief

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE

Next-Gen CASB. Patrick Koh Bitglass

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

2018 Edition. Security and Compliance for Office 365

7 Best Practices for Data Security in Office 365 and Beyond

McAfee Embedded Control for Retail

McAfee Web Gateway Administration

Securing Your Amazon Web Services Virtual Networks

CIS Controls Measures and Metrics for Version 7

Symantec Network Access Control Starter Edition

Microsoft Security Management

CIS Controls Measures and Metrics for Version 7

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

THE ACCENTURE CYBER DEFENSE SOLUTION

Imperva Incapsula Website Security

Securing Office 365 with Symantec

The Need In today s fast-paced world, the growing demand to support a variety of applications across the data center and help ensure the compliance an

Protecting Your Enterprise Databases from Ransomware

EXTENDING BEHAVIORAL INSIGHTS INTO RISK-ADAPTIVE PROTECTION & ENFORCEMENT

Addressing Today s Endpoint Security Challenges

Sobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse.

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

WHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

United Automotive Electronic Systems Co., Ltd Relies on McAfee for Comprehensive Security

HIPAA Controls. Powered by Auditor Mapping.

Google Identity Services for work

SentinelOne Technical Brief

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

Cybersecurity Roadmap: Global Healthcare Security Architecture

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and

Data Insight Feature Briefing Box Cloud Storage Support

Compliance Brief: The National Institute of Standards and Technology (NIST) , for Federal Organizations

IBM services and technology solutions for supporting GDPR program

Security and Compliance for Office 365

Mapping BeyondTrust Solutions to

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks

How to Apply a Zero-Trust Model to Cloud, Data and Identity

Built-in functionality of CYBERQUEST

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

Transcription:

McAfee MVISION Cloud Data Security for the Cloud Era McAfee MVISION Cloud protects data where it lives today, with a solution that was built natively in the cloud, for the cloud. It s cloud-native data security. Key Use Cases Enforce data loss prevention (DLP) policies across data in the cloud Prevent unauthorized sharing of sensitive data to the wrong people Detect Gain complete visibility into data, context, and user behavior across all cloud services, users, and devices. Protect Take real-time action to enforce policies across cloud services and apply persistent data protection. Block sync/download of corporate data to personal devices Detect compromised accounts, insider threats, and malware Encrypt cloud data with keys that only you can access Audit and tighten the security settings of cloud services Correct Remediate security threats by eliminating security misconfigurations and correcting high-risk user activities. Connect With Us 1 McAfee MVISION Cloud

Platform Unified Policy Engine Applies unified policies to all cloud services across data at rest and in transit. Leverage policy templates, import policies from existing solutions, or create new ones. Policy Creation Wizard Defines customized policies using rules connected by Boolean logic, exceptions, and multi-tier remediation based on incident severity. Pre-Built Policy Templates Delivers out-of-the-box policy templates based on business requirement, compliance regulation, industry, cloud service, and third-party benchmark. Cloud Registry Provides the world s largest and most accurate registry of cloud services with a 1-10 CloudTrust Rating based on a 261-point risk assessment. Privacy Guard Leverages an irreversible one-way process to tokenize user identifying information on premises and obfuscate enterprise identity. AI-Driven Activity Mapper Leverages artificial intelligence to understand apps and map user actions to a uniform set of activities, enabling standardized monitoring and controls across apps. User Behavior Analytics Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of user threats. Guided Learning Provides human input to machine learning models with real-time preview showing the impact of a sensitivity change on anomalies detected by the system. Multi-Instance Protection Enforce a uniform set of security policies across all cloud service instances, with the ability to associate policy violations and investigate activities, anomalies, and threats at an instance level. 2 McAfee MVISION Cloud

Detect Content Analytics Leverages keywords, pre-defined alphanumeric patterns, regular expressions, file metadata, document fingerprints, and database fingerprints to identify sensitive data. Collaboration Analytics Detects granular viewer, editor, and owner permissions on files and folders shared to individual users, everyone in the organization, or anyone with a link. Access Analytics Understands access context including device operating system, device management status, location, and corporate/personal accounts. Security Configuration Audit Discovers current cloud application or infrastructure security settings and suggests modifications to improve security based on industry best practices. Cloud Usage Analytics Summarizes cloud usage including cloud services in use by a user, data volumes, upload count, access count, and allowed/denied activity over time. Account Compromise Detection Analyzes login attempts to identify impossible crossregion access, brute-force attacks, and untrusted locations indicative of compromised accounts. Cloud Activity Monitoring Captures a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics. Insider Threat Detection Leverages machine learning to detect activity signaling negligent and malicious behavior including insiders stealing sensitive data. Privileged User Analytics Identifies excessive user permissions, inactive accounts, inappropriate access, and unwarranted escalation of privileges and user provisioning. We use McAfee to layer security controls like data loss prevention and access control so that the easy path to collaboration is also the secure path. Tim Tompkins, Senior Director of Security Innovation, Aetna 3 McAfee MVISION Cloud

Protect Multi-Tier Response Defines policies with multiple levels of severity and enforce distinct response actions based on the severity level of the incident. Quarantine Isolates files that trigger policies in a secure administrative location within the cloud service where it was found. McAfee never stores quarantined files. Collaboration Control Downgrades file and folder permissions for specified users to editor or viewer, removes permissions, and revokes shared links. Removal Permanently removes data from cloud services that violate policy to comply with compliance regulations. Contextual Access Control Enforces coarse allow/block access based on servicelevel risk and granular activity-level controls to prevent upload and download of data. Autonomous Remediation Coaches users to correct policy incidents, and once corrected, automatically resolves incident alerts to reduce manual review of incidents. In-App Coaching Coaches users in real-time within the native email, messaging, and collaboration application where the incident occurred. Encryption Protects sensitive data with peer-reviewed, functionpreserving encryption schemes using enterprisecontrolled keys for structured and unstructured data. Information Rights Management Applies rights management protection to files uploaded to or downloaded from cloud services, ensuring sensitive data is protected anywhere. Policy Incident Management Offers a unified interface to review incidents, take manual action, and rollback an automatic remediation action to restore a file and its permissions. 4 McAfee MVISION Cloud

Correct Adaptive Authentication Forces additional authentication steps in real-time via integration with identity management solutions based on access control policies. Closed-Loop Policy Enforcement Integrates with existing firewall or web gateway to govern risky cloud service usage and activities. Malware Detection Identifies known signatures, sandboxes suspicious files, and detects behavior indicative of malware exfiltrating data via cloud services and ransomware. Integration Data loss prevention (DLP) Security information and event management (SIEM) Secure web gateway (SWG) Next generation firewall (NGFW) Key management service (KMS) Access management (IDaaS) Information rights management (IRM) Enterprise mobility management (EMM/MDM) Directory services (LDAP) Malware Extermination Terminates advanced threats by permanently neutralizing and removing malware. McAfee s Cloud-Native Data Security technology is helping Caesars Entertainment protect our valuable company data as we move from legacy applications to cloud applications. Les Ottolenghi, Executive Vice President and CIO, Caesars Entertainment 5 McAfee MVISION Cloud

McAfee Sky Gateway Enforces policies inline for data in motion in real-time. Email mode Leverages the native mail flow to enforce policies across all messages sent by Exchange Online inline or in passive monitoring mode. Universal mode Sits inline between the user and cloud service and steers traffic after authentication to cover all users and all devices, without agents. McAfee Sky Link Connects to cloud service APIs to gain visibility into data and user activity, and enforce policies across data uploaded or shared in near real-time and data at rest. McAfee Lightning Link Establishes a direct out-of-band connection to cloud services to enforce policies in real-time with comprehensive data, user, and device coverage. McAfee Sky Link McAfee Lightning Link McAfee Sky Gateway Universal Mode McAfee Sky Gateway Email Mode McAfee Ground Link McAfee Ground Link Brokers the connection between McAfee and onpremises LDAP directory services, DLP solutions, proxies, firewalls, and key management services. Visit us at www.mcafee.com. 2821 Mission College Blvd. Santa Clara, CA 95054 888.847.8766 www.mcafee.com McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. Copyright 2018 McAfee, LLC. 3753_1018 OCTOBER 2018 6 McAfee MVISION Cloud