Empowering Organizations to Better Recognize and Respond to Cyber-Attacks

RSA Conference 2015 is here, and with it, groundbreaking innovations in the security space. This year, we’re bringing to the table some major announcements that will help bolster defenses against a cyber threat landscape that is increasing both in size and in complexity. So—how exactly are we shaking up security this year? Here’s a quick overview.

Building and Using Your Network of Informants

In law enforcement, having a network of informants can be both a blessing and a curse. A blessing, because they provide you with valuable information, tips and clues you might otherwise miss. And a curse, because its questionable how trustworthy or accurate said information is. So in the end, it is a compilation of past behavior, corroborating stories and additional factors that ultimately lead to a conviction. Network security needs to move in a similar direction. Learn how Intel Security expands your informant network by integrating McAfee Web Gateway and DLP Endpoint to Threat Intelligence Exchange (TIE) and McAfee Email Gateway to Enterprise Security Manger (ESM).

Intelligent, Actionable, Integrated – Reaping the benefits of SIEM

For automated tools such as Security Information and Event Management (SIEM) to improve your security posture and reduce your response time, they need to be intelligent, actionable, and integrated. They need to help you find what’s important so your team can spend more time with the most critical issues and less time trying to understand what’s important and what’s not. Learn more about the latest release of McAfee Enterprise Security Manager (ESM), v9.5 here.

Your Network Security Diagnosis

Are you worried about stealth attacks across multiple vectors? Trying to keep to a long-term security strategy that is constantly changing due to evolving attacks and hopeful new products? The bad news is that no single product is going to ease your worries. The good news is that an integrated treatment plan is available, cost-effective, and does not require major surgery or expensive medicines. Learn more about how McAfee Next Generation Firewall (NGFW), with the Security Connected ecosystem, addresses these and other concerns about your security health.

Security in the Software Defined Data Center

Nearly every component of a data center operates as a generalized pool of hardware resources – meaning you can provision, operate, and manage them in the most efficient way for your requirements. Workloads in these Software Defined Data Centers (SDCC) spread across multiple machines and even locations, expanding and contracting as needed. As each component becomes virtual, it puts pressure on the supporting functions to adapt and security is stepping up to respond to this pressure. Learn more about how to approach security in the software defined data center here.

Building Secure Castles in the Cloud

The vast majority of companies use public cloud servers either as their primary service infrastructure, overflow capacity, or emergency backup. While this Infrastructure as a Service (IaaS) is certainly delivering on the promises of reduced costs and greater agility, there are still questions about security. These virtual slices of machines are running distributed workloads located somewhere else, meaning you cannot rely on traditional host-based security or network perimeter security. Learn more about how McAfee Public Cloud Server Security (PCS) gives you greater visibility and control of your public cloud workloads.

Intel Security and Ericsson: Managed Security Services

Intel Security and Ericsson, the world’s largest telecommunications equipment manufacturer and telecoms service-provider, have partnered to deliver managed security services (MSS) to the world. Through this collaboration, we’re offering offer a combination of top-ranked network security products. Carriers can re-brand and sell these MSS products with the support of Intel Security’s sales and marketing teams. Meanwhile, Ericsson will provide the provisioning, on-going security operations management and customer-support. Learn more about this partnership here.

Securing the Software-Defined Infrastructure

With computing, network, and storage infrastructure moving towards a software-defined environment, it’s time for security to adapt and evolve to its new surroundings. That’s where the Intel Security Controller (ISC) comes in. ISC abstracts and controls security functions, and protects your virtual workloads with distributed security appliances. The big picture? Reduced cost and time of security deployment. Find out more about ISC functions and capabilities here.

Want to learn more about our latest innovations? Come find us at the Intel Security booth #3705 at RSA, and see how we’re extending and integrating our enterprise portfolio with new solutions and partnerships. To see all the Intel Security RSA happenings, see here. Also, be sure to stay on top of the latest updates from us at the conference, by following us on Twitter and LinkedIn.

Leave a Comment

16 − 2 =