24
McAfee Email Protection for Microsoft Office 365 Cloud University Thomas Bryant | Technical Director - OCTO

Cloud university intel security

Embed Size (px)

Citation preview

Top of Content Box Line

Subtitle Line

Title Line

McAfee Email Protection for Microsoft Office 365 Cloud University

Thomas Bryant | Technical Director - OCTO

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Agenda

• Executive Summary

• Customer Challenge

• Why McAfee

• Objections & Countering Competition

• Driving Sales

• Enablement & Getting Started

2

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

SECURITY: THE THIRD PILLAR OF COMPUTING

POWER EFFICIENT

PERFORMANCE

INTERNET

CONNECTIVITY

SECURITY

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Web Protection

Social Media

Protection

Email

Protection

Achieve Cyber

Readiness

Intelligence-Driven

Response

Protect Critical

Infrastructures

Counter

Stealth

Attacks

Exploding Data Continuous

Monitoring

Compliance

Reporting

Protect

Devices

Reporting

Real Time

Visibility

Targeted

Attacks

Identity

Protect IP

Identity

Protection

Enable the

Workforce

BYOD/

Mobile

App Protection

OS Protection

(Legacy, Win7/8,

Android, Mac)

Cloud

Virtualization

Servers/

Networks

Database

Security

Encryption

Identity and Access Control

Data Protection

Data Loss Prevention

Next Gen IPS

Next Gen Firewall

COMPREHENSIVE

MALWARE PROTECTION

NEXT GENERATION

ENDPOINT

SITUATIONAL AWARENESS

WEB AND

IDENTITY

DATA CENTER

TRANSFORMATION

NEXT

GENERATION

NETWORK

Intel Security – Big Picture of Security

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

McAfee Global Threat Intelligence Successful Threat Intelligence is Defined by Six Principles

June 17, 2015 5

Delivered via a complete suite of

security products

Uses a combination of

protection techniques,

where reputation is a must

Global research team

dedicated solely to GTI

Real-time, “in the cloud” threat collection

and intelligence distribution model

Spans the Internet

including millions of sensors

Across all key threat

vectors file | web | email | network

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Why McAfee is Best Positioned to Deliver GTI The Most Robust Telemetry Data in the Market

June 17, 2015 6

• 2.5B Malware Reputation Queries/Month

• 20B Email Reputation Queries/Month

• 75B Web Reputation Queries/Month

• 2B IP Reputation Queries/Month

• 300M IPS Attacks/Month

• 100M Ntwk Conn Rep Queries/Month

• 100+ BILLION QUERIES

Queries

Nodes

• Malware: 40M Endpoints

• Email: 30M Nodes

• Web: 45M Endpoint and Gateway Users

• Intrusions: 4M Nodes

• 100+ MILLION NODES, 120 COUNTRIES

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Executive Summary

Migrating email

infrastructure to

Microsoft Office

365 due to better

TCO than hosting

email in-house.

Rapid movement

to O365. 77% of

Fortune 500 have

purchased. Triple-

digit growth in last

21 months.

Email Threats do

not go away with

the cloud. O365

faces same

threats as on

premise

solutions.

Stronger security

is required as

advanced

phishing threats

become more

complex.

Layer in McAfee

Email Protection

to protect against

phishing,

continued service

and reliable

security.

Dedicated security

focus. Integration

with O365 helps

customers realize

its benefits without

compromise on

security.

The

Market

The

Customer

The

Result

The

Issue

The

Solution

The

Provider

7

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Office 365 is the #1 deployed Cloud Application!

“77% of Fortune 500

companies have

purchased it in the

last 12 months”

“Office 365 posted

triple-digit growth for

21 consecutive

months”

“nearly 50 million

Office 365 monthly

active users”

Source: Okta, Microsoft

Office 365 is the

catalyst for cloud

consumption and

embracement

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Email is Driving the Evolution

9

Email is the Primary Capability Being Used or Planned with Office 365

0% 20% 40% 60% 80%

Email

File Sharing

Document Management

Instant Messaging

Team Sites

Online Meetings

… Percentage of Respondents

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Customer Challenges

10

95% of all attacks on enterprise

networks result from spear phishing.

1 in 5 users will click on a link

within a phishing email. of HR & Finance

clicked on at least

1 phishing email.

88%

1 in 3 organizations

will have a hybrid

deployment.

of all organizations identify service

availability as one of the top 3

technical concerns. 13%

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

11

McAfee 2014 Phishing Quiz

75,000 business users 100,000+ business users

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Why your customers need stronger email security

Solution Overview

12

AV-TEST.org – Feb 2015 Product Review Report

Microsoft System Center Endpoint Protection Microsoft Intel

Security

Industry

Average

Protection against 0-day malware attacks, inclusive of

web and email-threats (Real-World Testing) - 208

samples used

76% 98% 95%

Detection of widespread and prevalent malware

discovered in the last 4 weeks (the AV-TEST reference

set) 12,207 samples used

76% 100% 97%

Protection Score 0.0/6.0 5.0/6.0

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Email - 0.32%

File, 4%

Web, 12%

IP/Connection, 84%

If GTI were limited to what Email Vendors see

…Email and file data is all

we would see.

That’s not enough to provide

comprehensive protection.

Email Gateway

Web Gateway Advanced Malware

Network IPS Endpoint AV 3rd Party Feeds Firewall

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Different technology, different outcomes

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

ClickProtect for Embedded URL Protection

15

Customizable Templates Reinforces Awareness

Enterprise Web Security

http://www.funshion.com

McAfee GTI® Web Reputation:

Unverified

McAfee GTI® Web Category:

Entertainment, Streaming Media

Unmasks URL

Safe Preview

Is that your destination site?

95%

74%

58%

25%

Zero Day Protection Rate (GAM)

Source: AVTest.org

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Solution Overview

16

How it works

Recipient

O365 Exchange Online McAfee Email Protection

Sender’s Email Server

Sender

Not shown: Email Continuity enables customers to log into emails via web interface in the event of an outage Change in MXRecords routes mail accordingly to and from McAfee Email Protection

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Email Continuity Ensures Hosted Mailbox Uptime

• 60 days of rolling storage

• Web-based access to email during outage

• Post-outage email activity release and synchronization

17

Automatic service engagement when outage is detected

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Solution Overview

Targeted Attack Protection

• Phishing and malware protection

• Detects real-time URL malware threats with ClickProtect

• Customizable warning pages

• Built-in DLP technology

Faster and Reliable Protection

• Breadth of cloud intelligence sources

• Threat response times

• Email continuity

• Spam/Graymail filtering

Flexibility

• Advanced security for Exchange Online, Hybrid & Onsite

• Deploy any way you want, when you want

• Hybrid deployment options with single mgmt & reporting console

The value proposition

18

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

19

I don’t need additional security Targeted phishing is the biggest problem. It is echoed by analysts & customers alike. See a 10 minute demo to learn about latest phishing tactics on how advanced protection can help. Take the free Phishing quiz and help educate your employees.

I’m trying to reduce my TCO, not increase it Office 365 is a fantastic productivity solution; but MSFT is not known as a top security vendor. The cost to strengthen security is insignificant compared to the potential exposure and cost.

Service unavailability was cited as one of the 3 technical concerns by users of Office 365. Email Continuity, a feature of Email Protection, takes this concern away and further, enables your users to access email through a web-based interface, while Office 365 service is being restored.

Nobody will be looking to target my organization. Effort to reward is quite attractive, and you should also consider partners you work with. Consider CryptoLocker, or the Target Breach, which was initiated from 3rd party vendor much smaller than size of Target Stores.

Top Customer Objections

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

20

Working Together

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Delivery Flexibility

June 17, 2015 21

Marketplace • Fully Integrated into Ingram’s Marketplace

• Monthly for SaaS Email, Email Encryption,

Archiving, Web and Endpoint Security

Reseller Model • Monthly and Annual SKUs for SaaS Email, Email

Encryption, Archiving, Web, and Endpoint Security

• You Bill We Support

MSP model • Monthly SKUs for SaaS Email, Email Encryption,

Archiving, Web, and Endpoint Security

• You Bill, You Support

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Email Protection for Office 365 Enablement Tools www.mcafee.com/O365

Grab & Go Campaign Kit Webinar Replay

Phishing Quiz Customer Facing Landing Page

http://bit.ly/O365Replay

• Conversation Guide

• Email Content

• Phishing Quiz

• ClickProtect Video

• Osterman White Paper

• Customer Presentation

Help customers discover

how skilled they are at

detecting malicious

phishing attempts amid

common work-related

emails

Send customers here for

even more assets and

information around

strengthening their

security with Intel Security

Title Line

Subtitle Line

Top of Content Box Line

Top of Footer Line

Left Margin Line Right Margin Line

Top of Footer Line

Top of Content Box Line

Subtitle Line

Title Line

Right Margin Line Left Margin Line

McAfee Confidential

Contact your Account Team today

• Intel Security/McAfee Specialist

• Lindsay Oprandi

[email protected]

• Call (800) 456-8000, Ext 66617

Ingram Services US Sales Team Contact:

[email protected]

• Call (800) 705-7057, option 2

Ingram Services Canada Sales Team Contact:

[email protected]

• Call (877) 755-5002, option 1