McAfee Partners – McAfee Blogs https://securingtomorrow.mcafee.com Securing Tomorrow. Today. Fri, 15 Feb 2019 17:15:18 +0000 en-US hourly 1 https://securingtomorrow.mcafee.com/wp-content/uploads/2018/11/cropped-favicon-32x32.png McAfee Partners – McAfee Blogs https://securingtomorrow.mcafee.com 32 32 PACE – People, Alignment, Culture, and Execution https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/pace-people-alignment-culture-and-execution/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/pace-people-alignment-culture-and-execution/#respond Fri, 15 Feb 2019 15:00:12 +0000 https://securingtomorrow.mcafee.com/?p=94178

McAfee was founded in 1987, and at 32 years old, we’re moving faster than ever before with more precision, agility, and innovation. With McAfee’s expected growth in 2019 as the device-to-cloud cybersecurity company, we recognize the need to ensure that the Americas Channel Team is sharply focused. As I’ve met with members of my team, […]

The post PACE – People, Alignment, Culture, and Execution appeared first on McAfee Blogs.

]]>

McAfee was founded in 1987, and at 32 years old, we’re moving faster than ever before with more precision, agility, and innovation. With McAfee’s expected growth in 2019 as the device-to-cloud cybersecurity company, we recognize the need to ensure that the Americas Channel Team is sharply focused. As I’ve met with members of my team, both individually and in planning sessions, we are already hitting the ground running. This year, the stage is set for our PACE—our pace within the company, and our People, Alignment, Culture, and Execution.

The first focus area, Our People, not only encompasses our team, but also our partners and customers. I truly believe if you take care of the people, the people will take care of you. As a Channel Organization, we ensure that both our partners’ and customers’ needs are met. Through tightly aligned cross-functional organizations internally, we are creating powerful unity as we serve customers together.

Our Alignment concentrates on making sure we’re moving in the same direction at the same time.

Within Our Culture, we have a primary and secondary culture. Our primary culture is centered around our pledge that each McAfee employee signs, declaring dedication to keeping the world safe from cyberthreats. However, the Channel Organization has also cultivated a secondary culture, which is supported by our corporate value surrounding candor and transparency. We aim for both cultures to be evident in everything we do.

With Our Execution, we believe that if we commit to something, we must execute it. Accountability is a priority for our team. Our Execution is currently centered around our MVISION portfolio family, which includes MVISION Endpoint, ePO, Cloud, Mobile, and EDR (coming soon). Designed to encompass our overall brand through a simple approach, MVISION is an integrated, open system from device to cloud that offers consolidated visibility, comprehension, and control across a digital landscape. If you’re not up to speed on MVISION, please take some time to research and get familiar. Our mutual customers are going to love it.

This year, we are excited to be working on our PACE. We are committed to maintaining a healthy PACE for the betterment of our customers, partners, and team. We hope the PACE we set this year will serve all who interact with McAfee.

The post PACE – People, Alignment, Culture, and Execution appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/pace-people-alignment-culture-and-execution/feed/ 0
2018 Americas Partner Summit https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/2018-americas-partner-summit/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/2018-americas-partner-summit/#respond Thu, 15 Nov 2018 14:00:19 +0000 https://securingtomorrow.mcafee.com/?p=92707

The Americas Partner Summit 2018 was held on Tuesday, October 16 at MPOWER Cybersecurity Summit. It was a day filled with McAfee and partner leadership coming together to collaborate on McAfee’s partner strategy, product portfolio, programs, and more. Here are some of the highlights: The Audience 338 partners 225 VAR, Disti, MSP, etc. 35 OEM […]

The post 2018 Americas Partner Summit appeared first on McAfee Blogs.

]]>

The Americas Partner Summit 2018 was held on Tuesday, October 16 at MPOWER Cybersecurity Summit. It was a day filled with McAfee and partner leadership coming together to collaborate on McAfee’s partner strategy, product portfolio, programs, and more. Here are some of the highlights:

The Audience

  • 338 partners
    • 225 VAR, Disti, MSP, etc.
    • 35 OEM
    • 78 SIA
  • 28% Executive-Level
  • 46% Director-Level
  • 26% Technical or Consultant-Level

McAfee Partner of the Year Awards

I invited the McAfee leadership team to the stage and we recognized 25 partners with awards for excellence and innovation in security. We welcomed DJ Miss Ninja to have some fun while we celebrated this elite group of partners for the work they’ve accomplished through innovative solutions for better customer outcomes, selling into net new logo accounts, and more. You can view the full list of winners here.

Create the Possible

As you know, McAfee has a vast ecosystem of partners – professional services, solution providers, service providers/systems integrators, original equipment manufacturers, security innovation alliance, and distribution. In 2017, I challenged you, our partner community, to collaborate with each other, and with McAfee, to deliver innovative solutions for better customer outcomes. And, wow did you deliver! Throughout the day, we showed seven short videos highlighting the innovation from unique partners in the Americas. Thank you to the partners who stepped out to document their success. The work that the McAfee Partner community has delivered in the last year is truly a testament that we can Create the Possible when we work together.

Key Takeaways

Partners heard program, product, and corporate strategy from our C-Level executives, and had the opportunity to dig deeper into the information through ample Q&A throughout the day. While we took numerous questions from the audience, our executives had some key call to actions from the partners.

To read about the key takeaways, download the slides from the various presentations, etc. please click here to visit the partner portal Partner Summit 2018 page.

 To Summarize

Partner Summit is where our partners go beyond the keynotes. Innovation, collaboration, and momentum is what will allow us to Create the Possible. The annual Partner Summit event provides a space where McAfee and McAfee Partners come together to build momentum to get us to the next possibility.

If you were unable to attend, I hope to see you next year. If you attended, I sincerely thank you and hope you walked away with action items that we can accomplish together.

Let’s go create the possible! Together is power.

The post 2018 Americas Partner Summit appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/2018-americas-partner-summit/feed/ 0
Why Traditional Database Security Doesn’t Protect Data https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/why-traditional-database-security-doesnt-protect-data/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/why-traditional-database-security-doesnt-protect-data/#respond Wed, 14 Nov 2018 17:23:45 +0000 https://securingtomorrow.mcafee.com/?p=92703

If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers would vary widely. Each team views the definition based on their own requirements, but the one answer that most likely won’t appear is: “To protect data.” Traditionally, database security has always been seen as a […]

The post Why Traditional Database Security Doesn’t Protect Data appeared first on McAfee Blogs.

]]>

If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers would vary widely.

Each team views the definition based on their own requirements, but the one answer that most likely won’t appear is: “To protect data.”

Traditionally, database security has always been seen as a means to protect the database systems from vulnerabilities, missing patches, simple misconfigurations, or SQL injections. While this certainly holds true in today’s environments too, we cannot ignore the fact that requirements for securing a company’s most valuable asset—its data—have changed.

Adding data to database security

With the increase in regulatory compliance requirements such as PCI-DSS, HIPAA, SOX, and GDPR, enterprises are asking more and more from their data protection solutions. Data is seen as the new oil—a way to fuel companies. Protecting data must be at the core of every strategy. Where better to start than the one place most data resides, the database?

Database security solutions in today’s data- and compliance-driven environments must not only allow companies to measure the level of security of their databases but must provide the ability to locate personal identifiable data, business critical data, and any other data that is of value to the organization.

In addition, any data that is discovered must be monitored, in real time, 24/7. Long gone are the days when audit logs were sufficient or simple network monitoring was considered adequate. Data is the world’s greatest asset and companies must invest in protecting their own data as well as their customers’ data.

As-a-service: a world of shared responsibilities

Database(s)-as-a-service is one of the fastest growing markets within the world of cloud. It provides organizations with unparalleled amounts of scalability and compute power while at the same time removing many of the challenges that we would see as traditionally related to database security (vulnerability and patch management, for example). In the shared responsibility world of the cloud, the one constant is data. Customers are always responsible for protecting and monitoring their data.

Too many data breaches are successful because the exfiltration of data was made possible by either very little or no real-time monitoring of the data. Traditional database security is not designed to protect data, it’s designed to protect the database from malicious SQL injections or vulnerabilities. One might argue that is data protection. But in reality, database security in today’s data-driven environments must allow organizations to monitor anyone and anything that accesses the “crown jewels,” in real time, with the ability to stop unauthorized access to data.

McAfee helps fill that gap by offering software-based database security solutions that allow the monitoring of database instances across both on-premises solutions and the cloud. Non-intrusive, lightweight, and easy to deploy, McAfee database security solutions allow customers to enjoy all the benefits of moving to a hybrid cloud enterprise database environment while retaining control over security, risk, and data protection.

For more information, visit the database security product information page.

The post Why Traditional Database Security Doesn’t Protect Data appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/why-traditional-database-security-doesnt-protect-data/feed/ 0
Together is Power: Why McAfee Partnered With British Telecom Group https://securingtomorrow.mcafee.com/consumer/together-is-power-why-mcafee-partnered-with-british-telecom-group/ https://securingtomorrow.mcafee.com/consumer/together-is-power-why-mcafee-partnered-with-british-telecom-group/#respond Wed, 17 Oct 2018 20:52:25 +0000 https://securingtomorrow.mcafee.com/?p=91873 Cybersecurity threats are growing in both number and strength day by day, making it almost impossible for any one person or organization to maintain a secure environment. This threat is potent, often indiscriminate, and puts both organizations and consumers at risk. Protection, therefore, requires an equally powerful and robust response. But building a strong response […]

The post Together is Power: Why McAfee Partnered With British Telecom Group appeared first on McAfee Blogs.

]]>
Cybersecurity threats are growing in both number and strength day by day, making it almost impossible for any one person or organization to maintain a secure environment. This threat is potent, often indiscriminate, and puts both organizations and consumers at risk. Protection, therefore, requires an equally powerful and robust response.

But building a strong response to modern cybersecurity threats requires a concerted and distributed effort. That’s why we’ve partnered with British Telecom Group (BT), one of the largest telecommunications companies in the United Kingdom, to provide a comprehensive security solution that helps BT Broadband customers protect themselves against viruses with McAfee as the underlying cybersecurity technology.

The shift to the focus on security was due in part to a recent survey BT conducted to customers, asking about their digital landscape and what concerns they have over the future. A significant portion of those who participated in the survey (60 percent) said they see the value in cybersecurity protection and would recommend the service.

That’s reassuring for us at McAfee to hear, but it underlines the point that folks around the world are waking up to the need to join forces, orchestrate, and fight against cyberattacks. This need for additional protection also provides businesses with the opportunity to differentiate themselves as adding a security benefit to their offerings also enhances consumer appeal and trust.

BT, in particular, will give its subscribers a complete Security solution which includes McAfee protection called BT Virus Protect, which supports up to 15 devices including computers and Android phones and tablets. The BT Security offering also  automatically keeps kids safe with built-in parental controls. This package incorporates network and device security, call blocking, cloud backup and McAfee Password Manager – TrueKey. It’s a holistic solution for, as BT puts it, a simple reason.

“Keeping our customers safe online is a key priority for BT. That’s why we provide the most comprehensive free online security tools of any major UK broadband provider,” Andrew Kirkpatrick General Manager of Digital Products and Security for BT Consumer said. “To help us achieve this, we have a long-standing partnership with McAfee to provide their award-winning anti-virus to our customers.”

Every time we join forces against cybercriminals, we create the right conditions for a more secure digital world. That’s because a collective response to cyberthreats is better than going alone. Because together is power.

The post Together is Power: Why McAfee Partnered With British Telecom Group appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/together-is-power-why-mcafee-partnered-with-british-telecom-group/feed/ 0
McAfee Honors 25 Partners with Awards for Excellence & Innovation in Security https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-honors-25-partners-with-awards-for-excellence-innovation-in-security/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-honors-25-partners-with-awards-for-excellence-innovation-in-security/#respond Wed, 17 Oct 2018 00:00:42 +0000 https://securingtomorrow.mcafee.com/?p=92023 Today McAfee, the device-to-cloud cybersecurity company, announced the winners of its distinguished Partner Awards. The awards ceremony, hosted at McAfee’s Americas Partner Summit in Las Vegas, recognized partners who demonstrated the embodiment of three foundational pillars of the McAfee Partner Program: strategic relationships, profitable partnerships and driving better customer outcomes. Partners received awards based on […]

The post McAfee Honors 25 Partners with Awards for Excellence & Innovation in Security appeared first on McAfee Blogs.

]]>
Today McAfee, the device-to-cloud cybersecurity company, announced the winners of its distinguished Partner Awards. The awards ceremony, hosted at McAfee’s Americas Partner Summit in Las Vegas, recognized partners who demonstrated the embodiment of three foundational pillars of the McAfee Partner Program: strategic relationships, profitable partnerships and driving better customer outcomes.

Partners received awards based on their commitment to McAfee’s business strategy, building strong ecosystems, dedication to customers, delivery of exemplary marketing strategies, going above and beyond in the name of community service, demonstration of technical efficiency and successful buildout of managed services.

“In cybersecurity no one company can prevent every possible threat, and that’s what makes the partner community so vital to the success of our customers,” said Ken McCray, head of channel sales and operations for the Americas at McAfee. “No matter what, we put the customer at the core of everything we do by working together with our partners to provide the solutions and expertise that businesses depend on.”

Winners included:

The post McAfee Honors 25 Partners with Awards for Excellence & Innovation in Security appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-honors-25-partners-with-awards-for-excellence-innovation-in-security/feed/ 0
McAfee Security Innovation Alliance 2018 DevCon Awards https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-security-innovation-alliance-2018-devcon-awards/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-security-innovation-alliance-2018-devcon-awards/#respond Wed, 17 Oct 2018 00:00:18 +0000 https://securingtomorrow.mcafee.com/?p=92017 Today McAfee, the device-to-cloud cybersecurity company, announced the winners of its distinguished SIA Partner Awards. The awards ceremony, hosted at McAfee’s Americas Partner Summit in Las Vegas, recognized partners who demonstrated the embodiment of innovation, strategic value, and market leadership in their respective market segments that complement the McAfee solution portfolio. “Today’s businesses are challenged […]

The post McAfee Security Innovation Alliance 2018 DevCon Awards appeared first on McAfee Blogs.

]]>
Today McAfee, the device-to-cloud cybersecurity company, announced the winners of its distinguished SIA Partner Awards. The awards ceremony, hosted at McAfee’s Americas Partner Summit in Las Vegas, recognized partners who demonstrated the embodiment of innovation, strategic value, and market leadership in their respective market segments that complement the McAfee solution portfolio.

“Today’s businesses are challenged more than ever before to stay ahead of the latest risks and cyberthreats,” said D.J. Long, vice president of strategic business development, McAfee. “McAfee understands that no single cybersecurity company can prevent every possible threat. The McAfee SIA program enables businesses to tap into certified integrated solutions from industry-leading providers to help protect data and minimize risk with fewer resources.”

We are pleased to announce the winners of the 2018 McAfee Security Innovation Alliance DEVCON Awards in the following three categories: Rookie of the Year, Most Innovative Partner of the Year, and SIA Partner of the Year.

Rookie of the Year 2018: Menlo Security

Rookie of the Year criteria include business impact, solution innovation, and program membership under 18 months.

Menlo Security joined SIA in May 2018. Their integration with McAfee Web Gateway was fully completed and certified in just one month! Immediately after certification, Menlo jumped in to support McAfee on a unique project to drive innovation with a mutual customer.

Menlo Security has partnered with McAfee to provide web security that wins against today’s advanced threats. McAfee Web Gateway customers can set up policies to dynamically route web sessions to the Menlo Security Isolation Platform. The enterprise is protected from any potential web threats while the user has a seamless experience with their native browser. The joint solution improves employee productivity by providing safe access to the internet and reduces burden on IT staff who no longer need to maintain restrictive web policies and manage exceptions. The Isolation Platform can also be used to address “air-gap” requirements of certain financial services and government organizations.

Most Innovative Partner of the Year: IBM Security

Criteria for Most Innovative Partner of the Year are based on the design and use of the McAfee ePO software development kit (SDK), McAfee Threat Intelligence Exchange, McAfee Data Exchange Layer, and other key McAfee technologies.

IBM Security are partnering with McAfee across multiple IBM and McAfee product sets and teams including Resilient, BigFix, and QRadar on the IBM side. Completed and certified integrations with IBM’s Incident Response platform, Resilient include: TIE, DXL, ePO, and ATD completed just last week. ESM is slated for end of September and NSP is in progress. Furthermore, all McAfee Resilient integrations are published on IBM’s AppExchange. Roadmap projects include: building QRadar -ePO app and working to leverage bi-lateral agent deployments with Big Fix. Read our  solution brief for more details

SIA Partner of the Year 2018 : Avecto/BeyondTrust (Both acquired this year by Bomgar)

Most Valuable Partner of the Year criteria cover the breadth and depth of the partner’s multiple integrations and close business engagement with McAfee.

Avecto are the undisputed leader in sales teaming success, with an average closed-won deal size of $350K and currently more than 30 registered and accepted opportunities in the pipeline. The other half of this team are BeyondTrust with $6M in pipeline and over 100% growth Year over Year. Avecto and BeyondTrust integrate with McAfee ESM, ePO and DXL.

For more information about our integrations read the solution briefs on integrations with Avecto and  BeyondTrust .

The post McAfee Security Innovation Alliance 2018 DevCon Awards appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-security-innovation-alliance-2018-devcon-awards/feed/ 0
McAfee Database Security in Rapid Deployment Mode https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-database-security-in-rapid-deployment-mode/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-database-security-in-rapid-deployment-mode/#respond Fri, 12 Oct 2018 16:44:52 +0000 https://securingtomorrow.mcafee.com/?p=92010 Location independent – speed is everything Deploying any software into the enterprise has always been a race against time. Every time someone has to manually install software, valuable time for business critical tasks is lost. Ever since the cloud became more than just something for start-up, fast paced companies, the focus of a speedy deployment […]

The post McAfee Database Security in Rapid Deployment Mode appeared first on McAfee Blogs.

]]>
Location independent – speed is everything

Deploying any software into the enterprise has always been a race against time. Every time someone has to manually install software, valuable time for business critical tasks is lost. Ever since the cloud became more than just something for start-up, fast paced companies, the focus of a speedy deployment has increased.

To deploy endpoint related software quickly and seamlessly you may have to use Windows Server Update Services (WSUS) or something similar.

Then, there is software that requires more configuration which generally is a manual process to setup all the required additional services and dependencies; or, in many cases, these are baked into virtual machines (VM) for easy deployment.

Plus, VMs, as practical as they might be, have their own challenges. Often, the overhead created by deploying multiple VMs is considerable, creating a new set of VMs even from templates is generally not what would be considered fast and is impractical for environments requiring rapid deploy and destroy cycles.

The cloud has proven what rapid deployment should look like. New resources are created within a few minutes and are always only a few clicks away. Scalable application services, VM’s, backend databases, everything is easy to roll out and get into production.

Introducing Containers

Container deployments have been around for a number of years, but they have been increasing in popularity over recent years especially in the cloud. It’s easy to see why. Containers are ultra-portable, ultra-lightweight and ultra-fast to deploy.

This lends itself to environments where rapid deployment is a must have. Most cloud platform providers have introduced support for their own container environments. Simple, fast push button deployments in both, the cloud and on premise are becoming ever more popular.

With this in mind McAfee Database Security has recently introduced its offering in a containerized version, both as a Docker image as well as through the Microsoft Azure Marketplace. Not only is this the first security software as a container on Azure’s Marketplace it also underlines the clear direction McAfee Database Security has, providing one set of controls no matter of the location for the monitoring of Databases. This allows for fast and easy deployment of the Database Security solution without the need to go through lengthy install processes.

Take a look at what I had to say at this year’s Microsoft’s Ignite Conference on our recent McAfee Database Security container release:

More information on McAfee Database Security in the Azure Marketplace can be found here, and don’t forget to take a look at the product page.

The post McAfee Database Security in Rapid Deployment Mode appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-database-security-in-rapid-deployment-mode/feed/ 0
Securing Data Together https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/securing-data-together/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/securing-data-together/#respond Wed, 03 Oct 2018 14:00:36 +0000 https://securingtomorrow.mcafee.com/?p=91730 At McAfee, we value keeping customers at the core of our business. We deeply care about serving our clients and partners with excellence and we actively work to implement changes based on their suggestions. One of the ways we receive this feedback is through The Channel Company’s Annual Report Card survey. The Annual Report Card […]

The post Securing Data Together appeared first on McAfee Blogs.

]]>
At McAfee, we value keeping customers at the core of our business. We deeply care about serving our clients and partners with excellence and we actively work to implement changes based on their suggestions. One of the ways we receive this feedback is through The Channel Company’s Annual Report Card survey.

The Annual Report Card summarizes results from a comprehensive survey that exhibits solution provider satisfaction across product innovation, support, and partnership for the hardware services and software vendors they team up with. More than 3,000 solution providers evaluate their satisfaction using this survey with over 65 vendor partners in 24 major product categories. The results help us understand how the market views McAfee, validate that we are doing the right things, and make changes as needed.

On behalf of McAfee, I am honored to announce that McAfee tied for the top spot in the Data Security category, receiving an overall score of 79.7. Within this category, McAfee scored highest in partnership (80.9) and managed and cloud services (76.3). Additionally, we took second place in Endpoint Security with an overall score of 80.3.

The cybersecurity landscape is constantly transforming with new threats targeting the data and systems of businesses everywhere. The main way McAfee protects data in this evolving environment is through McAfee Data Loss Prevention (McAfee DLP). This is a comprehensive solution that safeguards intellectual property and ensures compliance to internal policies by protecting sensitive data wherever it lives—on premises, in the cloud, or at endpoints. With McAfee DLP, users are empowered with data protection manual classification along with real-time pop-ups and a self-remediation tool to help increase employee data protection awareness.

We’re proud to provide a Data Loss Prevention solution that has earned the respect and trust of the partner community. Ultimately, we could not have accomplished this without our partners. We greatly appreciate partner loyalty and recognize the importance of the vital role they play in our business. We are excited to continue developing our partnerships and celebrate shared success along the way. Together with channel partners and distributors around the world, we are working to keep our customers and their data safe.

The post Securing Data Together appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/securing-data-together/feed/ 0
Minerva’s Anti-Evasion Platform as Part of the McAfee Ecosystem https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/minervas-anti-evasion-platform-as-part-of-the-mcafee-ecosystem/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/minervas-anti-evasion-platform-as-part-of-the-mcafee-ecosystem/#respond Fri, 24 Aug 2018 14:00:57 +0000 https://securingtomorrow.mcafee.com/?p=91223 This blog was written by Lenny Zeltser, VP of Products at Minerva Labs. What drives two endpoint security vendors to work together? The recognition that customers will benefit from the unique advantages of each company’s technologies. Useful defensive approaches that work in tandem are stronger together than they are when deployed independently. With this in mind, […]

The post Minerva’s Anti-Evasion Platform as Part of the McAfee Ecosystem appeared first on McAfee Blogs.

]]>
This blog was written by Lenny Zeltser, VP of Products at Minerva Labs.

What drives two endpoint security vendors to work together? The recognition that customers will benefit from the unique advantages of each company’s technologies. Useful defensive approaches that work in tandem are stronger together than they are when deployed independently. With this in mind, Minerva’s Anti-Evasion Platform is now certified by McAfee to work within the ePO ecosystem. Here’s why this is valuable for McAfee and Minerva customers.

Using Deception to Increase Prevention Efficacy

Despite the modern advancements in antivirus approaches, such as the use of artificial intelligence, attackers keep succeeding at slipping past such enterprise defenses. That’s the nature of the cat-and-mouse dynamics, which describe any approach that aims to distinguish between malicious and legitimate files. Minerva’s Anti-Evasion Platform uses a different approach to automatically prevent infections that involve evasion tactics.

The notion that the effectiveness of cybersecurity tools decreases over time is captured in Grobman’s Curve. Steve Grobman, the CTO for McAfee, developed this principle to explain that advancements in security technologies indirectly weaken their own efficacy by motivating attackers to develop evasive countermeasures. Minerva’s Anti-Evasion Platform’s methodology operates in a way that compensates for this degradation.

Minerva’s approach doesn’t involve scanning files or tracking processes to detect malicious code. Therefore, it doesn’t compete with or replace the need for antivirus software such as McAfee Endpoint Security. Instead, Minerva’s Anti-Evasion Platform uses elements of deception on the endpoint to cause malware to self-convict and terminate itself if it engages in evasive behavior.

For example, Minerva’s software makes every endpoint in the enterprise look like the analysis environment that malicious code is often designed to avoid. This aspect of the solution is called Hostile Environment Simulation. This is just one of the ways in which Minerva automatically prevents intrusions without requiring human intervention, manual configuration or professional services.

Minerva forces adversaries to make a choice: Use evasion and be subject to Minerva’s interference, or avoid such tactics and get caught by antivirus. As the result, McAfee Endpoint Security, augmented with Minerva’s Anti-Evasion Platform deliver significantly broader threat coverage than any other solution on the market.

Using Evasion Tactics Against the Adversary

As the McAfee Labs Threat Report that focused on evasion pointed out, “There are hundreds, if not thousands, of anti-security, anti-sandbox, and anti-analyst evasion techniques employed by malware authors. Many can be purchased off the shelf.” Gone are the days when attackers needed to possess advanced expertise to use such technologies.

Tactics for bypassing anti-malware tools eventually yield results, leading to costly investigative activities and losses associated with the compromise of sensitive data. Minerva’s focus on interfering with evasion methods is unusual in that the more evasive the threat, the easier it is for Minerva’s Anti-Evasion Platform to prevent the compromise.

For instance, Minerva examined the extent to which evasion tactics are used by modern exploit kits. We analyzed the points in the attack paths that involved some form of evasion, such as the avoidance of malware analysis tools. 99% of the examined attacks involved at least one evasion tactic somewhere along the path. Such techniques are designed to increase the likelihood that the attack succeeds. In contrast, the very use of evasion as part of the attack allows Minerva’s Anti-Evasion Platform to protect endpoints even if other security controls would’ve failed.

With Minerva, the very tactics that have historically given adversaries the upper hand, give defenders an advantage in protecting endpoints.

Enhanced Protection without Operational Burdens

The passive nature of Minerva’s technology allows customers to benefit from its protection without endpoint performance concerns. Moreover, Minerva’s integration with ePolicy Orchestrator (ePO) allows McAfee customers to deploy and operate Minerva’s Anti-Evasion Platform without operational burdens often associated with standalone agents.

It’s now possible to deploy Minerva via McAfee ePO software for all Microsoft Windows operation systems (Windows XP or above, including servers) across the enterprise. No reboot is required for installing, upgrading or uninstalling the Minerva agent. McAfee customers can also use ePO to centrally monitor and feed new threat intelligence of all evasive threats prevented by Minerva’s Anti-Evasion Platform.

In another example of Minerva working together with McAfee technologies, Minerva’s agent can interact with other components of the McAfee ecosystem using the Data Exchange Layer (DXL), which allows DXL-compatible solutions to collaborate on strengthening enterprise defenses. For instance, if Minerva’s Anti-Evasion Platform stops an evasive threat, Minerva can use DXL to share information about the malicious artifact with other DXL-compatible technologies. You can see this approach in action in Minerva’s video that illustrates the power of this approach.

Minerva’s participation in the McAfee ecosystem increases the efficacy of the joint solution to stop attacks. The ePO integration allows enterprises to accomplish this easily and efficiently. DXL makes it possible to share Minerva’s unique advantage with other compatible technologies and reinforces the notion that security is a team sport. To see this approach in action, reach out to Minerva for a demo.

About Minerva Labs

Minerva Labs is an award-winning, innovative endpoint security solution provider that protects enterprises from today’s stealthiest attacks, without the need to detect threats first—all before any damage has been done. The Minerva Anti-Evasion Platform blocks unknown threats that evade existing defenses by deceiving the malware and controlling how it perceives its environment.

About McAfee

McAfee is the device-to-cloud cybersecurity company. Inspired by the power of working together, McAfee creates business and consumer solutions that make our world a safer place for the benefit of all. McAfee’s holistic, automated open security platform allows all your disparate products to co-exist, communicate, and share threat intelligence with each other anywhere in the digital landscape.

About Author

Lenny Zeltser is a seasoned business and tech leader with extensive cybersecurity experience. He heads Product Management at Minerva Labs. Lenny also trains incident response and digital forensics professionals at SANS Institute. He has earned the prestigious GIAC Security Expert designation, has an MBA from MIT Sloan and a Computer Science degree from the University of Pennsylvania.

The post Minerva’s Anti-Evasion Platform as Part of the McAfee Ecosystem appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/minervas-anti-evasion-platform-as-part-of-the-mcafee-ecosystem/feed/ 0
Reaching GDPR: A Partner Approach https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/reaching-gdpr-a-partner-approach/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/reaching-gdpr-a-partner-approach/#respond Mon, 11 Jun 2018 16:35:58 +0000 https://securingtomorrow.mcafee.com/?p=89531 As Raj Samani, Chief Scientist and Fellow at McAfee says, “It’s critical that businesses do everything they can to protect one of the world’s most valuable assets: data.” Whether your organization achieved compliance with General Data Protection Regulation (GDPR) by the enforcement date on May 25, or still has a way to go, data will […]

The post Reaching GDPR: A Partner Approach appeared first on McAfee Blogs.

]]>
As Raj Samani, Chief Scientist and Fellow at McAfee says, “It’s critical that businesses do everything they can to protect one of the world’s most valuable assets: data.” Whether your organization achieved compliance with General Data Protection Regulation (GDPR) by the enforcement date on May 25, or still has a way to go, data will continue to play a large and evolving role in every sector and at every company. Samani explains, “The good news is that businesses are finding that stricter data protection regulations benefit both consumers and their bottom line. However, many have short-term barriers to overcome to become compliant, for example, to reduce the time it takes to report a breach.”

With the high cost to achieve compliance standards and even steeper fines if the rules are not met, complying with GDPR can seem daunting. If your organization is still working on meeting the base level regulation, McAfee and our partners have a wide range of materials to assist, including the National Institute of Standards and Technology (NIST) Cybersecurity Framework and a site with all you need to prepare for GDPR requirements. Additionally, McAfee Skyhigh has a detailed action guide to help organizations interpret the legislation and provide guidance on actions that need to be taken regarding data in the cloud.

McAfee doesn’t work alone in our commitment to GDPR and data security. Thanks to McAfee’s Security Innovation Alliance (SIA), we can quickly and effectively help more customers protect their data. These 125+ SIA vendors are committed to working together with our integrated ecosystem to help businesses reach and maintain GDPR standards.

While reaching compliance is the important first step, going beyond the data security fundamentals will quickly become critical to every organization, from commercial to healthcare. It is important to keep in mind that complying with GDPR does not mean you will not be breached. A genuine culture of privacy needs to be created as a core value within each organization. Consumers are increasingly aware of how companies are keeping their data secure and businesses cannot afford to lose customer confidence in relation to data security. Securing consumer’s personal data in a transparent manner can serve as a differentiating factor for any company.

As cybersecurity professionals, it is up to us at McAfee and our Partners to provide the most pertinent GDPR information to each of our customers and help instill the culture of data privacy. The advent of GDPR is the best opportunity in a generation to bring data security up to every customer’s C-Suite and introduce meaningful and lasting change in data security. Together, we can support our customers to achieve GDPR compliance and beyond!

The post Reaching GDPR: A Partner Approach appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/reaching-gdpr-a-partner-approach/feed/ 0
Women in the McAfee Channel https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/women-in-the-mcafee-channel/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/women-in-the-mcafee-channel/#respond Wed, 30 May 2018 19:00:42 +0000 https://securingtomorrow.mcafee.com/?p=89152 At McAfee, we work hard to advocate and empower women in what remains a male-dominated industry. Women currently make up less than 20 percent of U.S. tech jobs, despite making up more than half of the U.S. workforce, according to recent data compiled by virtual event solutions company, Evia. Considering the great talent and diversity […]

The post Women in the McAfee Channel appeared first on McAfee Blogs.

]]>
At McAfee, we work hard to advocate and empower women in what remains a male-dominated industry. Women currently make up less than 20 percent of U.S. tech jobs, despite making up more than half of the U.S. workforce, according to recent data compiled by virtual event solutions company, Evia. Considering the great talent and diversity of thought that women bring to our organizations, it is clear we need more women in tech.

With that said, I am proud and honored to recognize five outstanding women from McAfee who have been named by CRN on its prestigious Women of the Channel list. This annual list is comprised of brilliant women that span the IT channel, representing vendors, distributors, solution providers and other organizations that figure prominently in the channel ecosystem. Each is recognized for her outstanding leadership, vision and unique role in driving channel growth and innovation.

Sue Fossnes has been dedicated to the design, development and success of partner programs in the security market for much of her distinguished career. She has held positions in the cybersecurity industry leading regional and global channel programs and operations, where her innovative programs resulted in top line revenue growth and additional profitability opportunities for partners.  Sue has worked diligently to simplify and enhance the portfolio of McAfee profitability programs for our partners, with the goal of enriching the value proposition for partnering with us, and rewarding those partners who have invested deeply in our relationship in a predictable fashion.

Carrie Hayes is a senior marketing leader recognized for her broad marketing expertise in strategic planning, communications, demand generation, branding, and content marketing in technology for over 20 years, half of which has been spent at McAfee in various channel marketing roles.  Carrie develops integrated marketing strategies that enable partners to enhance their security expertise, increase profitability, drive demand and increase relevancy with customers across multiple routes to market around the globe. She also manages the McAfee global channels brand and solutions go-to-market for the channel. Most recently, Carrie led the Intel acquisition and McAfee spin-off re-branding initiatives for the Global Channels Organization.

Chari Rhoades leads the Americas channel operations and distribution at McAfee. Within her channel operations role, she leads a team responsible for special projects, enablement, and communications for the Americas’ partners. Her distribution team is focused on leveraging capabilities to increase McAfee’s customer market share. She also oversees several key channel initiatives focused on generating net new logos and new business growth.  Chari has held leadership roles in marketing, sales operations and communications.

Pamela Boich leads strategic planning and major initiatives for the global partner sales organization. Her team is responsible for driving the transformational projects that enables McAfee to better serve partners and customers, and provide global support to transacting distributors, resellers, and service providers. Pam entered the telecom and embedded systems industry in market research and product marketing roles.  She later transitioned into sales operations, partner programs, and strategic planning, and is now serving as the channel’s functional owner for key projects such as a Salesforce.com CRM implementation, Configure-Price-Quote development, and partner relationship management initiatives.

Regan Ogner is a senior leader of global distribution sales and works with internal teams and distributors worldwide to drive mutual growth and profitability. She has also held senior leadership roles in global partner marketing to accelerate partner growth and loyalty including partner enablement, demand generation, incentives, marketing development fund investments, events, digital marketing and partner communications. Regan joined McAfee Canada in 2010 where she was responsible for the Canadian and Northeast U.S. marketing strategy and programs.  Regan is a creative marketer and an authentic leader who helps others excel while making a positive impact on the business.

Please join me to congratulate these five women on this exciting recognition. Their passion and confidence never ceases to amaze me as they serve as an inspiration to the women they engage with, their teams, our channel partners, and future generations of women in the tech industry.

Cybersecurity Ventures predicts there will be 3.5 million cybersecurity job openings by 2021 as cybercrime will more than triple the number of job openings in the next five years. I am encouraged and proud to have the women of McAfee lead by example and ultimately attract more women to a career in cybersecurity.

The post Women in the McAfee Channel appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/women-in-the-mcafee-channel/feed/ 0
McAfee Showcases ESM-TYCHON Cyber Scorecard at Security Through Innovation Summit https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-showcases-esm-tychon-cyber-scorecard-at-security-through-innovation-summit/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-showcases-esm-tychon-cyber-scorecard-at-security-through-innovation-summit/#respond Tue, 22 May 2018 15:53:14 +0000 https://securingtomorrow.mcafee.com/?p=89005 On Tuesday, May 22, McAfee will host the 2018 Security Through Innovation Summit at the Willard Intercontinental Hotel in Washington, D.C. The half-day event will showcase a dynamic lineup of private and public sector experts addressing the key issues central to the future of federal cybersecurity and IT. This year’s showcase features the latest certified […]

The post McAfee Showcases ESM-TYCHON Cyber Scorecard at Security Through Innovation Summit appeared first on McAfee Blogs.

]]>
On Tuesday, May 22, McAfee will host the 2018 Security Through Innovation Summit at the Willard Intercontinental Hotel in Washington, D.C. The half-day event will showcase a dynamic lineup of private and public sector experts addressing the key issues central to the future of federal cybersecurity and IT.

This year’s showcase features the latest certified McAfee Security Innovation Alliance (SIA) integration combining McAfee Enterprise Security Manager (ESM) 10.3 with TYCHON, an enterprise endpoint management and endpoint detection and response (EDR) technology developed by Tychon LLC (Tychon). This combined solution addresses the U.S. Department of Defense (DoD) Cyber Scorecard mandate, which measures progress on targets set in DoD’s Cybersecurity Discipline Implementation plan released in 2015. The plan identified key tasks related to proper cyber management, such as requiring strong user authentication, removing outdated software and internet-facing web servers that no longer have an operational requirement, and properly aligning networks and information systems.

Of course, all these tasks require resources, and according to the recent McAfee report, Hacking the Skills Shortage, demand for cybersecurity professionals is outpacing the supply of qualified workers. However, nine out of 10 respondents said that cybersecurity technology could help compensate for a skills shortage. The shortage of qualified workers coupled with the vast number of cyber threats facing organizations highlights the need for integrated solutions that achieve more with fewer resources.

In combination with McAfee Policy Auditor, TYCHON provides real-time actionable information needed to populate the complete DoD Cyber Scorecard. The ESM-TYCHON integration enables McAfee customers to visualize the ten threat assessment items presented in the Cyber Scorecard via dynamic dashboards in real-time, including a Summary Dashboard presented by ESM, and a Detail Dashboard powered by TYCHON.

Specifically, the Detail Dashboard presents the status of each of the following:

  • Web Server Public Key Infrastructure (PKI)
  • User Logon
  • Host Based Security System (HBSS) Services
  • STIG Compliance
  • Microsoft Windows Patches
  • Linux/OSX Updates
  • System Compliance

Together, the McAfee-Tychon integration facilitates effective cyber incident response by providing executive summaries (overall scores) of an organization’s assets (endpoints) and reporting asset benchmark results. The Scorecard can filter data by asset, organizational group, and task results.

Such capabilities provide a critical advantage when organizations must maximize their teams’ abilities to effectively detect threats, reduce risks and ensure compliance. This latest McAfee SIA partner integration with Tychon offers customers a certified, integrated solution that allows them to resolve threats faster with fewer resources.

McAfee recently announced 19 new partners to the McAfee SIA program, and seven newly certified, integrated solutions. This partner ecosystem helps accelerate the development of open and interoperable security products, simplify integration with complex customer environments, and provide a truly integrated, connected security ecosystem to maximize the value of existing customer security investments.

Please visit our McAfee SIA page for more information on program partners, certified solutions, and membership details.

Please visit Tychon for more information on the TYCHON technology.

Please visit our Security Through Innovation Summit site for more information on this week’s public sector IT event.

The post McAfee Showcases ESM-TYCHON Cyber Scorecard at Security Through Innovation Summit appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-showcases-esm-tychon-cyber-scorecard-at-security-through-innovation-summit/feed/ 0
DNS – the Blind Spot in Your Security Ecosystem https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/dns-blind-spot-security-ecosystem/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/dns-blind-spot-security-ecosystem/#respond Wed, 11 Apr 2018 12:59:39 +0000 https://securingtomorrow.mcafee.com/?p=88301 It’s 10 a.m. on a Tuesday morning, and the company’s IT hero sits at her desk… “Firewall… check, anti-virus… check, network security… running, email systems…secured.”  But she has no idea whether the domain name system (DNS) servers are being used as back doors for cyber criminals sending her employees to a malicious site where critical […]

The post DNS – the Blind Spot in Your Security Ecosystem appeared first on McAfee Blogs.

]]>
It’s 10 a.m. on a Tuesday morning, and the company’s IT hero sits at her desk… “Firewall… check, anti-virus… check, network security… running, email systems…secured.”  But she has no idea whether the domain name system (DNS) servers are being used as back doors for cyber criminals sending her employees to a malicious site where critical information such as log-in credentials and credit card information can be stolen. Luckily for her, a new partnership addresses this stubborn problem.

Data exfiltration via DNS is happening more often than you think. According to a recent DNS Threat Survey in 2017, of the 1,000 organizations surveyed, 76% have experienced a DNS attack in the last year,  and 32% have suffered data loss. The report also estimated the average annual cost of DNS attacks to be more than $2 million*.   There is a misconception that a firewall can stop DNS-based attacks. This is not true because DNS traffic is not inspected and controlled by most firewalls.

The good news is DNS-based attacks are not invincible. The solution? A unified approach that will help improve visibility to DNS and web traffic, deliver in-depth content filtering, and quickly respond to new threats. McAfee and Infoblox have partnered to integrate McAfee® Web Gateway Cloud Services with Infoblox ActiveTrust® Cloud.  ActiveTrust Cloud blocks DNS-based data exfiltration and other threats using behavioral analytics, machine learning and up-to-date threat intelligence. Infoblox then redirects suspicious traffic to the McAfee® Web Gateway Cloud Services for deep levels of content inspection, including malware scanning and secure sockets layer (SSL) inspection. Here’s how it works:

  1. McAfee McAfee ePolicy Orchestrator (ePO) centrally deploys Infoblox ActiveTrust® Endpoint agent on endpoints.
  2. Infoblox ActiveTrust® Cloud detects and blocks DNS-based data exfiltration and requests to malicious domains.
  3. Based on pre-set policies, Infoblox ActiveTrust® Cloud redirects traffic to McAfee Web Gateway Cloud Services.
  4. McAfee Web Gateway Cloud Services starts to scan traffic accordingly for deeper inspection with URL filtering, SSL, malware scanning, and more.

The integration of Infoblox ActiveTrust Cloud and McAfee Web Gateway Cloud service unifies domain blocking and HTTP security to provide broader protection for mutual customers. The solution leverages DNS-based threat intelligence and helps close the security gap from DNS-based attacks such as data exfiltration, denial of service, and malware-related threats. Find out more about how McAfee and Infoblox work together here.

With that wrapped up, our IT hero has five minutes to grab a muffin before the next cybersecurity challenge hits.

* http://www.efficientip.com/resources/white-paper-dns-security-survey-2017/

The post DNS – the Blind Spot in Your Security Ecosystem appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/dns-blind-spot-security-ecosystem/feed/ 0
International Women’s Day in the Channel https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/international-womens-day-channel/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/international-womens-day-channel/#respond Thu, 08 Mar 2018 16:38:41 +0000 https://securingtomorrow.mcafee.com/?p=85195 I have had the privilege of working with many exceptional people over the course of my career. For International Women’s Day this year, I wanted to feature some of the dedicated and talented women I have the opportunity to work with in the Channel. The following individuals have great advice and stories that we all […]

The post International Women’s Day in the Channel appeared first on McAfee Blogs.

]]>
I have had the privilege of working with many exceptional people over the course of my career. For International Women’s Day this year, I wanted to feature some of the dedicated and talented women I have the opportunity to work with in the Channel. The following individuals have great advice and stories that we all can learn from.


Deb Gannaway
Principal, DG Technology Consulting

What made you get into the technology industry?

During my first job out of college our company started to leverage technology to change the way we interacted with our clients and to improve our company’s perception in the industry. I was asked at that time by our executive team to take on this new project. I don’t think anyone else wanted it because it seemed too different from the current approach and change is hard. However, after a few months working with the IT consulting firm assigned to our company and some of our test clients, it became crystal clear that I was one of the most fortunate employees because the project took off opening many doors.   I was at the right place as they say!

What are some things you do to help mentor and grow women within your organization?

The best way to mentor and help women and men grow is to lead by example.  Mentoring a high school young woman or a woman at work involves listening as well as teaching.  I encourage students and working adults to try new things, attend seminars, read books, take classes, set meetings with people you admire to learn from them and ask questions. All of these activities help an individual see possibilities and focus on their strengths personally and professionally.  I suggest making annual goals and review them quarterly. There are times those goals are met, exceeded or even changed. Last year we started an intern program to teach college students how to conduct meetings, communicate with partners and clients and work as a team.  I tell them how and why I started my business and let them know they can do if that is a dream.

Suggested Reading and Tips for Growth:

  • Stay current, go to seminars, create personal and business community
  • The Power of Positive Thinking by Norman Vincent Peale – I take this book with me and have been reading and rereading it for years. It keeps me grounded and focused.
  • First Break All the Rules by Marcus Buckingham – I like this for book for managers because it tells you what is obvious and keeps it simple. I think it is good for experienced managers and new managers.

 

Linda Ford
VP Marketing, DynTek Services, Inc.

What are some things you do to help mentor and grow women within your organization?

I’m passionate about recruiting young women to join the technology industry. This topic is near and dear to my heart and something I champion as an IAMCP WIT Chicago board member, Oak Grove School Education Foundation board member and woman of the channel.  Whenever I talk to young women about their career aspirations, I stress that a career in technology spans beyond just programming or engineering.  Tech careers are inclusive of sales, operations, marketing, human resources and much more.  You can pursue a broad range of interests in the tech field.  I also think young women, and men, today have an intrinsic understanding of technology as digital natives.  It is such an exciting time to be in technology because the work we do is so generally accessible to the public as a whole – there is a much greater understanding of how technology applies to our daily lives.

As a successful professional, what are two-to-three tips to maintaining a good work-life balance?

Check guilt at the door!  As a working mother, I feel like I am modeling a passion for work for my kids.  If we view our careers and life choices as assets to our character, whether it is working outside the home or in it, I believe that sends a positive message to our kids.  Also, work/life balance is never a 50/50 proposition.  It will constantly be shifting in one direction or the other.  I try to be ‘present’ for the task at hand.  If that is watching a soccer game, then it is time to put the cell phone away.

Suggested Reading and Tips for Growth:

  • Grit, by Angela Duckworth – I just read this with my 5th grader for a project.  It was a great reminder that hard work and passion are key.
  • I am a big believer in volunteering and networking with your communities – women in technology, local organizations and other passion projects.
  • Learn from the many women in the channel who work to create and promote the channel ecosystem with fierce intelligence, competitiveness and grace, while keeping family a key priority. Ask this network of women for advice, brainstorming, challenges and the like.  Having our mentors within arm’s reach is deeply fulfilling.

 

Susan O’Sullivan
VP Sales, US, Ingram Micro

What are some things you do to help mentor and grow women within your organization?

Mentoring is a gift that keeps on giving to everyone involved. I mentor many women at Ingram Micro and have been mentored by both men and women at Ingram Micro. We have such amazing people in and around our company, and I am always watching for up and coming individuals to engage with and learn from as well. Ingram Micro has made diversity a priority and to fuel the success of this ongoing initiative, we have our own Women’s Forum, which is part of our North American campuses.  Throughout the year, we bring in guest speakers and each female executive involved has her own small women’s group that meets monthly on campus and, or remotely.

As a successful professional, what are two-to-three tips to maintaining a good work-life balance?

Over the years, I’ve found it’s not so much how to balance, but how to be present when you’re in the moment so you can be the best at what you’re doing. When I am at work, I am at work. When I am home or back in the day when I was at a school or watching a sporting event, I was present.  Yes, at times, one crosses over into the next, but making it a priority to be present and not distracted by my device has made a positive difference at home and at work. If you hire smart, encourage teamwork and lead by example, finding a healthy balance and a clear headspace to enjoy the moments we have is priceless, and not as hard as it may seem.

Suggested Reading and Tips for Growth:

  • Built to Last by James Collins and Jerry Porras
  • The First 90 days by Michael D. Watkins
  • 7 Habits by Stephen Covey
  • Watch TED talks in the morning or before I go to bed on leadership, motivation, sales, team building; they can be so inspiring.
  • Take advantage of podcasts. You can listen to them on the go, in the air – they are a great on-demand learning tool.

 

Wendy Hoey
Senior Director of Global Sourcing, Optiv

What are some things you do to help mentor and grow women within your organization?

I have been very fortunate to work with a lot of up and coming young women and pride myself as being someone that they can always come to for direction and advice.

I set up short monthly meetings/calls with my female colleagues to run through what they have been doing, any issues or challenges that they have been encountering and just chat through and help with some advice and direction. With us all working remote we can get too bogged down day to day – so make some time to review how things are going with your other female colleagues, listen and learn from other experiences.

As a successful professional, what are two-to-three tips to maintaining a good work-life balance?

When you are on vacation – actually be on vacation, don’t check emails, they will be there when you get back! Too many of my American colleagues don’t ‘switch’ off and you need to have a break or what is the point of working so hard.

Block off some time every day in your calendar for ‘prep’ time. With so many people working remote – conference calls and meetings have taken over our day to day lives – so make sure you have a break by blocking some time in your day to day so that you have some time allotted for reviewing what you are doing that day, or even grabbing something to eat or to run the odd errand.

I also have some exercise bands in my home office – so when I am on a long call I can just do some simple exercises to keep my body moving as some days I can be stuck on calls for most of the day. I hate the days when my fit bit is telling me that I’ve only moved 1000 steps! Invest in a good blue tooth headset so you can move around while on calls – keep active!

Suggested Reading and Tips for Growth:

  • Set aside 2 hours a week for self-improvement. Pick some key topics within your industry and turn off your email, and your phone – block out in your diary, and review some subject matter from your industry.
  • The 4 Disciplines of Execution by Chris McChesney – Chris recently spoke at our SKO, and the principles within his book outline how to manage your tasks/objectives to ensure that you achieve the important ones and don’t get bogged down in the day to day whirlwind. I have started to use this method with my team and it’s already helped us achieve some goals that had been outstanding due to having too many projects at one time and not knowing where to start.

 

Jacquie Goldstein
Director, Software Partners, SHI

What are some things you do to help mentor and grow women within your organization?

My leadership tends to be more by example than anything coordinated. I have an open-door policy for all of my employees, and am always there to listen. I like to get to know all of my employees as well as they will let me get to know them. For me, it starts with showing woman in our industry that there are opportunities for them, and mentoring them on the importance of putting themselves out there for new opportunities, even if they don’t think they are 100% ready or fully qualified.  Most studies show that women tend to hold themselves back on growth opportunities until they feel they are totally prepared and/or ready, which could lead them to missing out on a realistic career –changing opportunity. I also stress the importance of confidence, especially within the technology industry – while though the numbers are increasing, it is still very male-centric industry. There are still many a conference I attend where I am one of the only women, and it is crucial for us to value our own worth, and insist that others do so as well. I also relay to young women, that it is so important to just be themselves and remember that they are only human, particularly when they are in a leadership role. You need to be your authentic you, or else you will not be true to yourself or ultimately in the job you are doing.

Suggested Reading and Tips for Growth:

  • Emergenetics Training at work was a truly amazing experience. It taught me a ton about myself that I was not previously in tune with, and made me understand the type of leader I am, and how I best process and learn new things. It also made me understand others which is worth its weight in gold. Moreover, any training on emotional intelligence/IQ is imperative to anyone in a leadership position.
  • Reread Oh the Places You’ll Go by Dr. Suess – I’m a huge proponent of going back to the basics. Sometimes, that which is the most simple, is the most profound.
  • There are tons of leadership books and training out there. Don’t be afraid to try different things, particularly those that may push you out of your comfort zone. The truth is, you never stop learning no matter what line of work you may be in, and the more open you are to different experiences, different techniques, and different points of view, the better off you are.

 

Shelly Bodine
Chief of Staff, SoftwareOne

What are some things you do to help mentor and grow women within your organization?

Currently I am working with a team of women within my organization who just launched our first “Women in Technology” forum in 2017.  It has been rewarding to see the amount of enthusiasm we have received as a group about the work we have done.  I have also served as a mentor for a number of women and men throughout my career, as it is a passion of mine to see people grow in their career.

As a successful professional, what are two-to-three tips to maintaining a good work-life balance?

Learn to set priorities in both areas of your life – and say no to things that don’t align. Your Family and Health should always be a priority.

Suggested Reading and Tips for Growth:

  • The Patrick Lencioni series of books – you can always relate to one of the “characters”
  • Networking – both formally at events, as well as informally by keeping in contact with those in your industry.

 

Tracy Holtz
Director, Security and Information Management, Tech Data

What made you get into the technology industry? 

Prior to joining Tech Data, I worked for a small components distributor which allowed me the opportunity to gain new skills and exposure to the industry which peaked my interest.  I quickly became fascinated with Security market and threat landscape therefore spent more time investing time to further enhance my knowledge and skills.
What are some things you do to help mentor and grow women within your organization?  

I encourage my team to get engaged in user groups, volunteer opportunities, and company projects which provide an opportunity to expand their knowledge base, provide exposure to senior leaders, and give back to the community.  In addition, offering regular mentoring sessions directly with employees to specifically dive deeper into personal opportunities.

Suggested Reading and Tips for Growth:

Find Your Why by Simon Sinek – I had previously read Sinek’s “Start with Why” earlier in the year and thoroughly enjoyed the book reflecting on purpose or beliefs that inspire you to apply with others. “Find Your Why” allows you an opportunity to leverage the knowledge gained in “Start with Why” but also find ways to inspire yourself at work, leading you to inspire others around you.

 

Chari Kelsey
Director, Channel Operations and Distribution – Americas, McAfee

What made you get into the technology industry?

I was and am still passionate about being on the good side of the fight. Knowing that the solutions we provide to our customers helps protect them keeps me inspired and engaged in this industry.

As a successful professional, what are your tips to maintaining a good work-life balance?

My calendar is everything to me. I make sure I am scheduling time for things that matter to me (time with my family and friends, working out, hobbies, etc.). I find that this approach ensures I prioritize how I use the time I have available.

Meditation has become a daily habit even if it is just for 10 min. It helps keep me focused.

Sometimes when things are crazy busy, I have to just mentally remind myself that I am doing my best. Some days one part of my life will take more from me than other parts. When I can just embrace the imbalance, I don’t get as thrown off by it and know that it will even out.

Suggested Reading and Tips for Growth:

  • The Confidence Code by Katty Kay and Claire Shipman – This was a recommendation from the last Women in Channel event I attended.
  • Better than Before by Gretchen Rubin- This is by far the best book I’ve read this year. It has great relatable and practical guidance for establishing habits around what you value.

 

Gabriela Ferado
Manager, Channel Sales, McAfee

What are some things you do to help mentor and grow women within your organization?
I am always available for a chat, and if people are willing to listen, always happy to give advice. For my team, my ultimate goal is always growth, so we should have a plan to achieve that in one way or another, as long as the individual is willing to do it.

As a successful professional, what are two-to-three tips to maintaining a good work-life balance?

First of all, accept that perfect balance is probably not achievable. Set boundaries and respect them as much as possible. There will be times when work needs more of you and times when life needs more of you. Just be okay with your decisions on how you spend your time and energy. We have to be well in all aspects of our lives in order to perform at our highest, so I do try to make sure I have a little bit of everything – work/fun/family/exercise, etc.

Suggested Reading and Tips for Growth:

  • The Art of Racing in the Rain by Garth Stein – It’s the story of a family as told by the family dog – who happens to love car racing and makes analogies between racing and life. Enzo the dog gives some good advice like “the car goes where the eyes go” – as in keep your eyes on the goal and do the right thing to get there.
  • Any book or training that makes you a better person

 

Kristin Carnes
Director, Worldwide Channel Sales, Cloud Business Unit, McAfee

 As a successful professional, what are two-to-three tips to maintaining a good work-life balance?
I’ve had a career all my life.  Like many women I went to work, got married, had kids and kept on working.  My job may not define me but it is a large part of who I am.  Raising two boys and having a husband who taught and coached for 17 years requires planning and the ability to deal with spontaneous situations.  Consciously schedule time for your personal life and set the example of “turning off” with the people you love, they will follow suit.  Expect there will be surprises and disruptions both from work and your personal life and choose wisely when and how you react.   Find a passion that has nothing to do with work and requires your complete concentration in order to master it successfully.

Suggested Reading and Tips for Growth:

The Bell Jar by Sylvia Plath. Being married to an English Teacher is what exposed me to this book.  While it can be dark and harrowing, I have found that reading it again throughout my life my lens changes depending on where I am in my own personal journey. As we mature and grow, so does our perspective.  I read The Bell Jar at least once every three years and while the story is the same, I find that the parts of the story that affect me change.

 

Megan Miles Gee

Partner Manager, Cloud Business Unit, McAfee

What made you get into the technology industry?

I’ve actually never known anything else, literally. You see, my father was in the industry so I was always surrounded by it.  I was fascinated by the work he and his company did and was always asking questions but never imagined myself following in his footsteps.  My degree is actually in English and Political Communication- I wanted to be the next Peggy Noonan, a political speech writer.  Fast forward, a couple of years out of college and a divorce later, and I was looking to begin my career.  I found an entry-level outside sales position for a telecommunications provider.  The ‘.com’ bubble had recently burst and the industry was rapidly changing.  My father had always been supportive of me and my sister and anything that we wanted to do but for the first time ever had some concerns.  He was concerned given the state of the industry but even more so because “his little girl” was entering “a man’s world.”  He had always been more progressive- he actually hired the first female director in the company to his staff. He shared with me the concerns other leadership had since she was female, (mind you, this was the south…in the ‘70’s) and he didn’t want that for me- he knew that I would have to work extra hard to prove myself, much like she did.  I appreciated his concerns and wasn’t worried because “it was just a sales job to get some experience under my belt and at least it was something that I was somewhat familiar with.”  That was14-years ago and I haven’t looked back.  He’s been 100% supportive of me and has been an amazing mentor.  My career in technology has ranged from sales, operations, consulting, and sales engineering.  Who knew that some of those silly questions like, “Dad, what makes a phone ring?” would bring me to where I am today!

Suggested Reading and Tips for Growth:

  • The 12 Week Year by Brian Moran and Michael Lennington
  • White Papers and McAfee briefs – Joining the McAfee team through acquisition of Skyhigh, there has been a lot to get up to date on here!

 

Natalie Tomlin
Channel Sales Director, Alternate Routes to Market, McAfee

What are some things you do to help mentor and grow women within your organization?

I am a strong proponent of encouraging women to speak up, talk, and be heard. I also advise people to talk to multiple women across the company to get a wide range of differing perspectives. It is my hope that these discussions will allow them to develop their own perspectives. Finally, I make sure that my team does an exercise where they write down their core values. If you have your values written down, it allows you to stay true to them.

What books and/or training do you suggest, and why?

  • From Good to Great by James Collins is my easily my number one pick.
  • Who Moved my Cheese by Ken Blanchard and Spencer Johnson is a good read, highlighting the fact that the only constant is change, so you always have to keep learning and adapting.
  • The Happiness Advantage by Shawn Achor is another one of the best books I’ve read recently, as it shows happiness fuels success rather than vice versa.

The post International Women’s Day in the Channel appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/international-womens-day-channel/feed/ 0
Together We Are Forming a Powerful Alliance Against the Bad Guys https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/together-forming-powerful-alliance-bad-guys/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/together-forming-powerful-alliance-bad-guys/#respond Fri, 23 Feb 2018 23:23:01 +0000 https://securingtomorrow.mcafee.com/?p=84726 McAfee Security Innovation Alliance (SIA) is a technology ecosystem designed to assemble the world’s leading security innovations to form a security ecosystem in the industry In some ways, cybersecurity remains a little like the Old West – a big, open area with some little pockets of law and order scatted here and there. After all, […]

The post Together We Are Forming a Powerful Alliance Against the Bad Guys appeared first on McAfee Blogs.

]]>
McAfee Security Innovation Alliance (SIA) is a technology ecosystem designed to assemble the world’s leading security innovations to form a security ecosystem in the industry

In some ways, cybersecurity remains a little like the Old West – a big, open area with some little pockets of law and order scatted here and there. After all, there are more than 1,300  different companies producing cybersecurity software products, and the proliferation of cyberthreats worldwide seems unlimited.

But considering the environment and stakes involved, it doesn’t make sense for customers to do it on their own.

Not only are companies trying to piece together cybersecurity tools from different vendors and get them to work together, but they have very little data on what the company next door is doing to meet new threats. In this model, everyone is on their own.

Therefore, McAfee developed the concept of “Together is Power.” This is more than a tag line. It means that the industry should take a stand so we can fight threats together. It means that cybersecurity products from different companies should integrate and work together, and it means that we should share the data we have about known threats.

This is the idea behind the Security Innovation Alliance (SIA), which McAfee created in 2007. The SIA is a technology ecosystem designed to assemble the world’s leading security innovations. With more than 125 vendors – including VMWare, ServiceNow, Toshiba, SanDisk, Aruba, Brocade, HP Enterprise, Check Point, Huawei, Tenable and Mobile Iron – the SIA program today is the premiere partnering ecosystem in the cybersecurity industry. In the past six months 24 companies have joined, including IBM, Micron Technology, and Atos.

Each company begins as an associate partner. After completing comprehensive integration testing for at least one use case, the partner is promoted to technology partner and its integrated product becomes McAfee-compatible. Selected technology partners that complement the McAfee product portfolio are invited to become sales teaming partners.

Many companies have attempted to emulate the success of the McAfee program, and we take this as a tribute to the success of our program and the prestige it has garnered within our industry.

SIA provides McAfee-tested partner integration with key products, including McAfee ePolicy Orchestrator (ePO), McAfee Endpoint Encryption for PC and File and Folder (EEPC/EEFF), McAfee Vulnerability Manager, McAfee Network DLP, and McAfee Enterprise Security Manager. This helps customers get more value from McAfee investments by lowering risk, delivering greater visibility, and enabling faster response to incidents. This in turn reduces time to problem resolution through better workflows, and also enhances visibility of events not collected by McAfee.

SIA provides opportunity for customers to enrich security operations and connect security solutions into an effective team, and includes point products as part of more complete solution. It reaches 35,000 organizations that use McAfee ePO.

ePO in turn provides visibility into the Data Exchange Layer (DXL), a communication fabric that connects and optimizes security actions across multiple vendor products, as well as internally-developed and open source solutions. Companies can gain secure, real-time access to new data and lightweight, instant interactions with other products. The recently-announced integration with Cisco pxGrid extends the reach end-to-end with better identity services and automated threat mitigation.

Don’t go it alone. Remember, “Together is Power.” So, join in. In addition to SIA, McAfee is a part of Cyberthreat Alliances and No More Ransomware initiative, and has now made DXL opens source though Open DXL.

For more information ion SIA, please go to the SIA Website.

The post Together We Are Forming a Powerful Alliance Against the Bad Guys appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/together-forming-powerful-alliance-bad-guys/feed/ 0
McAfee Sales Kick Off: Play to Win https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-sales-kick-off-play-win/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-sales-kick-off-play-win/#respond Thu, 15 Feb 2018 16:00:17 +0000 https://securingtomorrow.mcafee.com/?p=84472 As we approach the end of our first full year as a standalone company, we also just concluded the first Sales Kick-Off (SKO) as the new McAfee. I am happy to report that the initial excitement of the spin-off is still going strong and we are looking forward to the coming year. My takeaways from […]

The post McAfee Sales Kick Off: Play to Win appeared first on McAfee Blogs.

]]>
As we approach the end of our first full year as a standalone company, we also just concluded the first Sales Kick-Off (SKO) as the new McAfee. I am happy to report that the initial excitement of the spin-off is still going strong and we are looking forward to the coming year. My takeaways from the 2018 SKO are four things that will make McAfee our customers’ number one security vendor: Our Partners, Our Solutions, Our Team, and Our Culture.

OUR PARTNERS

Our partnerships are built on an understanding of long term mutual growth. We have focused on having lasting relationships with the highest quality partners out there. In return for the commitment from our partners, the North America Channel has worked to increase McAfee Market Share through six objectives:

  1. Become our top partners’ number one security vendor
  2. Competitive displacements in net-new logo accounts
  3. Develop joint go-to-market channel program with Cisco because of our recent integration announcements
  4. Redistribute the channel marketing budget on stronger ROI generating activities
  5. Improve partner sponsored briefings
  6. Expand channel support of alternative routes to market

I won’t get into the details of each of these goals here on my blog, but we are actively engaged and making it happen in 2018. I’ll talk about this further on the February 21st webcast for McAfee Partners. If you’re a partner with us, please register here.

OUR SOLUTIONS

2018 is the year for McAfee solutions. We’ve expanded our OpenDXL reach through ground-breaking SIA integrations with Cisco, acquired the leader in CASB, and migrated customers to ENS 10.5, unlocking a fully integrated ecosystem. McAfee paved a path throughout 2017 to make 2018 an incredible year for our products and solutions. Meanwhile, the growing MSP segment provides scalability to deliver McAfee powered solutions with high value managed services. We are on track to be the best device to cloud company on the market with strategic partnerships that wrap value added services around McAfee-powered solutions.

OUR TEAM

I hear it everywhere I go: This is a golden age of McAfee. All our players are in position. Our CEO, Chris Young, is committed to speeding up the pace; innovation and efficiency are at the forefront of every part of the company. We have a Channel and Sales management team with over 150 years of combined cybersecurity experience committed to giving our Channel team everything they need to achieve success. And finally, our Channel and Sales teams are dedicated to putting our partners at the core of every action, helping to ensure positive outcomes.

OUR CULTURE

Although always staples of the McAfee culture, there has been a strong push recently to guarantee all our employees are focused on ethics and values such as integrity, innovation, transparency, and agility. As a company, we emphasize inclusivity and candor to facilitate a better business as we engage with any challenges from a wide range of welcome perspectives. Together, these values enable us to play to win by ensuring we give our all to bring value to our partners and customers to create a safer online world.

The optimism from this year’s SKO is not illusory. While there will certainly be challenges to face in 2018, with these four important factors discussed in place, we can out-innovate our adversaries and competition.

The post McAfee Sales Kick Off: Play to Win appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-sales-kick-off-play-win/feed/ 0
Bringing Security to the Cloud and Beyond https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/bringing-security-cloud-beyond/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/bringing-security-cloud-beyond/#respond Fri, 19 Jan 2018 17:00:55 +0000 https://securingtomorrow.mcafee.com/?p=83775 I remember talking about cloud computing years ago as something in the future or as an “experiment,” knowing that one day it would be our everyday reality. Now, we’re there. Just ask yourself how many cloud applications you have on your smartphone or tablet to prove it. Cloud computing is everywhere and it is yet […]

The post Bringing Security to the Cloud and Beyond appeared first on McAfee Blogs.

]]>
I remember talking about cloud computing years ago as something in the future or as an “experiment,” knowing that one day it would be our everyday reality. Now, we’re there. Just ask yourself how many cloud applications you have on your smartphone or tablet to prove it. Cloud computing is everywhere and it is yet another example of how fast this industry evolves.

Cloud computing is big business – one of the fastest-growing segments in technology. Today, 95 percent of all enterprises use some form of cloud computing, and nearly three-quarters of those instances are hybrid use cases. Sales of cloud services are increasing almost 20 percent annually, with some sub-segments increasing as much as 40 percent. Comparatively, the security market is seeing annual growth rates of 9 percent.

While the adoption rate is growing, CIOs and CISOs consistently list security risks as one of the top inhibitors to cloud adoption. They simply don’t have the tools for gaining visibility into cloud environments or the means for controlling their cloud-hosted data. We must resolve this security risk.

Recently, McAfee made a substantial investment in cloud security by announcing the acquisition of Skyhigh Networks, a leader in the cloud access security broker (CASB) market segment according to Gartner. CASB provides businesses with control over and insights into the data and users flowing in and out of cloud resources. With that visibility, businesses can better manage access and make smart decisions over data movement. In short, CASB fills the control gap by acting as an intermediary between an organization’s on-premises infrastructure and a cloud provider’s infrastructure.

As our CEO Chris Young wrote, “McAfee and Skyhigh share more in common than values. We both aspire to make cybersecurity an accelerant to the limitless potential of our digital age. We both know that our employees are at the heart of everything we do. And we both are committed to modernizing cybersecurity environments for the future.”

I am excited about the Skyhigh acquisition and I hope you are, too.  We are set up for a successful 2018, and I am looking forward to seeing what the future holds for our partners and McAfee.

While I’m looking forward to continued success in 2018, I reflect on 2017 and am proud of what we’ve accomplished. Together, we grew New Routes to Market, announced exciting partnerships through Security Innovation Alliances, completed Executive Briefing Centers that led to net new logos and substantial business, and attended events like Tech Forum and Partner Summit. Through the change back to McAfee as a standalone company, we had an incredible year to remember!

This year, look forward to seeing more McAfee products, partnerships, and resources that will help us all secure the digital future.

The post Bringing Security to the Cloud and Beyond appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/bringing-security-cloud-beyond/feed/ 0
How McAfee Embedded Security Helps Medical Device Manufacturers Protect Their Products from Malware and Hacker Attacks https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-embedded-security-helps-medical-device-manufacturers-protect-products-malware-hacker-attacks/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-embedded-security-helps-medical-device-manufacturers-protect-products-malware-hacker-attacks/#respond Wed, 10 Jan 2018 17:00:37 +0000 https://securingtomorrow.mcafee.com/?p=83655

Like other Internet of Things (IoT) devices, medical equipment is a vulnerable attack surface. By 2018, it’s expected that sales of medical devices will exceed 14 million units—more than five times the sales of 2012.1 Network- and cloud-connected medical devices used in clinical settings—nurse stations, patient monitors, communications, networks, diagnostic devices, testing, scanning systems, blood […]

The post How McAfee Embedded Security Helps Medical Device Manufacturers Protect Their Products from Malware and Hacker Attacks appeared first on McAfee Blogs.

]]>

Like other Internet of Things (IoT) devices, medical equipment is a vulnerable attack surface. By 2018, it’s expected that sales of medical devices will exceed 14 million units—more than five times the sales of 2012.1 Network- and cloud-connected medical devices used in clinical settings—nurse stations, patient monitors, communications, networks, diagnostic devices, testing, scanning systems, blood gas analyzers, and more—are just as much at risk as healthcare IT networks, laptops, and tablets.

Typical attacks targeting such devices are ransomware, internal and external data exfiltration, distributed denial-of-service attacks, malware introduced via infected external memory devices, and network attacks. A single connected medical device can potentially be exploited to enable large-scale data theft.

Medical device manufacturers have a responsibility to secure their devices to prevent breaches and to protect the privacy of patient and healthcare facilities’ data. They must ensure their products conform to strict regulatory compliance mandates dictated by the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for medical devices issued by the US Food and Drug Administration (FDA).

Healthcare information is rich in both financial and personally identifiable data, making it a highly profitable target for cybercriminals. In the black market, a health record can fetch as much as $60, compared to $15 for a Social Security number.2 It’s estimated that approximately 100 million healthcare records were compromised just in the first quarter of 2015.3 A recent study reveals that the average cost of a healthcare breach in 2016 was $4 million per incident—up 29% since 2013.4

Let’s take a look at the trajectory of a typical threat that targets poorly secured medical devices. The implications can be devastating, with the potential for costly data breaches.

  1. An employee (either inadvertently or with malicious intent) installs malware on a connected medical device via a USB drive.
  2. The malware connects the infected device to an external command and control server.
  3. The perpetrator wipes out the data and overwrites a server’s Master Boot Record.
  4. The server affects hundreds or thousands of devices, potentially disabling them.

McAfee helps medical device manufacturers thwart attacks and comply with strict regulatory mandates and requirements by providing an array of embedded security solutions, including application control with whitelisting, antivirus and anti-malware protection, device security management, advanced data protection, encryption, and simplified, streamlined device management. McAfee solutions can be customized to meet the design requirements for a manufacturer’s medical device.

Siemens Healthineers—a global leader in medical imaging, laboratory diagnostics, and healthcare information technology—recognizes that system security is a critical concern among healthcare providers and customers. They employ trusted McAfee embedded security and solutions to ensure that security is designed into their devices at the outset. The Siemens Ultrasound System Security is an embedded antivirus solution powered by McAfee that offers a comprehensive defense against unwanted applications, blocking both known and unknown threats. In addition, their RapidLab1200 blood gas analyzer uses McAfee whitelisting to secure the device and prevent unauthorized applications from running on it. To learn more about how network security can be breached via a medical instrument and how Siemens works with McAfee to protect patient data on blood gas analyzers, view this informational video created by Siemens.

To learn about McAfee solutions for embedded medical systems and ensure that your devices have the best possible security, visit: https://www.mcafee.com/us/resources/data-sheets/ds-embedded-control-for-healthcare.pdf.

 

1 https://www.parksassociates.com/blog/article/dec2013-medical-devices

2 http://arnoldit.com/wordpress/2017/01/10/medical-records-are-the-hot-new-dark-web-commodity/

3 http://www.csoonline.com/article/2931474/data-breach/attackers-targeting-medical-devices-to-bypass-hospital-security.html

4 http://fortune.com/2016/06/15/data-breach-cost-study-ibm/

 

The post How McAfee Embedded Security Helps Medical Device Manufacturers Protect Their Products from Malware and Hacker Attacks appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-embedded-security-helps-medical-device-manufacturers-protect-products-malware-hacker-attacks/feed/ 0
McAfee Customer Success Group Puts Customers at the Core https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-customer-success-group-puts-customers-core/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-customer-success-group-puts-customers-core/#respond Wed, 18 Oct 2017 16:01:50 +0000 https://securingtomorrow.mcafee.com/?p=80666 To Our Valued Customers: Allow me to introduce myself. I am Aneel Jaeel, the new leader of the McAfee Customer Success Group. With 25 years of industry experience, I’m excited about applying what I’ve learned to help transform our organization to bring you the best possible customer experience. I’d like to share our vision of […]

The post McAfee Customer Success Group Puts Customers at the Core appeared first on McAfee Blogs.

]]>
To Our Valued Customers:

Allow me to introduce myself. I am Aneel Jaeel, the new leader of the McAfee Customer Success Group. With 25 years of industry experience, I’m excited about applying what I’ve learned to help transform our organization to bring you the best possible customer experience. I’d like to share our vision of customer success, which includes a new approach and a new flagship offering.

When it comes to protecting against breaches and other advanced threats, companies are facing big challenges—enterprise environments are more complex than ever before, the volume and sophistication of attacks is increasing at a rapid pace, and skilled staff are in short supply. There’s never enough time to keep up with new outbreaks, updates, and technology trends. With 1.8 million cybersecurity jobs going unfulfilled in 2017, building a top-notch team has never been more difficult. And threats are evolving rapidly, which means we need to proactively evolve our defenses.

As part of our transformation as a company, we pledge to dedicate ourselves to keeping the world safe from cyberthreats and to be your number one security partner. Our new Customer Success Group has aligned itself with that mission. We aim to put you, our customer, at the core to ensure that you get your desired outcomes from your McAfee solutions. With that goal always at the forefront, we are now providing holistic solutions that align Education Services, Professional Services, and Enterprise Support teams to help you achieve and maintain success throughout your entire threat defense lifecycle with us.

At MPOWER, we’ll be launching a new integrated offering—our flagship McAfee Premier Success Plan. We understand that acquiring the right solution is just the beginning. Equally important to a sound security strategy are decisions around design, deployment, maintenance, risk management, escalations, and education. Drawing from key services across our organization, we’ve created a simplified, all-in-one program focused on three outcomes. Through the McAfee Premier Success Plan, we’ll collaborate with you to more proactively plan and maintain your McAfee solutions, manage operational risk, and derive the full value of your security investment over time. Our comprehensive roadmap integrates professional services and solutions services, training, and technical support with personalized management.

We at the McAfee Customer Success Group believe in the principle that “Together is power.” When it comes to achieving digital safety and success, you are not alone.

We look forward to seeing you at MPOWER. If you want to learn more about the McAfee Customer Success Group and McAfee Premier Success Plan, visit: https://www.mcafee.com/us/support/premier-success-plan.aspx.

The post McAfee Customer Success Group Puts Customers at the Core appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-customer-success-group-puts-customers-core/feed/ 0
McAfee Honors 19 Partners with Awards for Excellence in Security https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-honors-nineteen-partners-awards-excellence-security/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-honors-nineteen-partners-awards-excellence-security/#respond Tue, 17 Oct 2017 19:35:17 +0000 https://securingtomorrow.mcafee.com/?p=80697 Today in Las Vegas, we recognized stand out performance by handing out our annual partner awards. This year, 19 partners were selected out of the thousands of partners who we work with, and all demonstrate the embodiment of three foundational pillars of the McAfee Partner Program: strategic relationships, profitable partnerships and customer outcomes. Partners received […]

The post McAfee Honors 19 Partners with Awards for Excellence in Security appeared first on McAfee Blogs.

]]>
Today in Las Vegas, we recognized stand out performance by handing out our annual partner awards. This year, 19 partners were selected out of the thousands of partners who we work with, and all demonstrate the embodiment of three foundational pillars of the McAfee Partner Program: strategic relationships, profitable partnerships and customer outcomes.

Partners received a variety of awards based on their commitment to McAfee’s business strategy. This includes building strong ecosystems, dedication to customers, delivery of exemplary marketing strategies, going above and beyond in the name of community service, demonstration of technical competence and successful buildout of managed services.

Partners are integral to our success and lead the way in driving our entire channel to improve and deliver high quality customer outcomes. By working together, we can provide better solutions that benefit our customers with greater protection, faster deployment times and reduced costs.

The 2017 McAfee Americas Partner Award winners were honored for their work in 2016. Winners included:

Partner

Award

SHI International

Partner of the Year, United States

Kudelski Security

Partner of the Year, United States

Information Systems Architects Inc. (ISA)

Partner of the Year, Canada

immixGroup, Inc.

Distribution Partner of the Year, North America

InfoReliance Corporation

Federal Partner of the Year, North America

CDW

Net-New Logo Partner of the Year, North America

CDW

Marketing Innovation Partner of the Year, Americas

DynTek Services, Inc.

Strategic Technical Partner of the Year, North America

SRG Security Resource Group Inc

Security Services Partner of the Year, Americas

Multisoft SAS

Partner of the Year – Northern Region, Latin America

Bafing S.A.C.

Partner of the Year – Southern Region, Latin America

NetSafe Corp Ltda.

Partner of the Year, Brazil

Software Express S.A. de C.V.

Partner of the Year, Mexico

Nexsys

Distribution Partner of the Year, Latin America

Nastec SPA

Strategic Technical Partner of the Year, Latin America

Adexsus, S.A.

Net-New Logo Partner of the Year, Latin America

Tech Data US

Community Service Leader Recognition

Dell USA

Community Service Leader Recognition

Ingram Micro US Community Service Leader Recognition

 

Distribution Partner of the Year, North America: immixGroup, Inc.

Distribution Partner of the Year, Latin America: Nexsys

Partner of the Year, United States: SHI International

Partner of the Year, United States: Kudelski Security

Partner of the Year, Federal: InfoReliance Corporation

Partner of the Year, Canada: Information Systems Architects Inc. (ISA)

Partner of the Year – Northern Region, Latin America: Multisoft SAS

Partner of the Year, Southern Region, Latin America: Bafing S.A.C.

Partner of the Year, Brazil: NetSafe Corp Ltda.

Partner of the Year, Mexico: Software Express, S.A. De C.V.

Net-New Logo Partner of the Year, Latin America: Adexsus, S.A.

Net-New Logo Partner of the Year, North America And Marketing Innovation Partner of the Year, Americas: CDW

Security Services Partner of the Year, Americas: SRG Security Resource Group Inc

Strategic Technical Partner of the Year, North America: Dyntek Services, Inc.

Strategic Technical Partner of the Year, Latin America: Nastec SPA

Community Service Leader Recognition Awards: Dell USA

 

Community Service Leader Recognition Award: Ingram Micro US

Community Service Leader Recognition Award: Tech Data US

If you couldn’t make it to Vegas this year, join us next year! We want to innovate, collaborate and build momentum with you. For more information on Partner Summit at #MPOWER17 and #McAfeePartners, follow @McAfee & @McAfee_Partners.

The post McAfee Honors 19 Partners with Awards for Excellence in Security appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-honors-nineteen-partners-awards-excellence-security/feed/ 0
The Power of Partnering: McAfee and Cisco Interoperability Delivers Strong Email Security https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/power-partnering-mcafee-cisco-interoperability-delivers-strong-email-security/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/power-partnering-mcafee-cisco-interoperability-delivers-strong-email-security/#respond Mon, 26 Jun 2017 04:02:19 +0000 https://securingtomorrow.mcafee.com/?p=75308 Highlights In cooperation through the McAfee Security Innovation Alliance and Cisco Solution Partner Program, McAfee® Advanced Threat Detection and Cisco Email Security Appliance now interoperate, providing an automated, closed-loop email security solution Solution Interoperability will be demonstrated at the Security Village at Cisco Live 2017 (Booth 55) in Las Vegas, June 25 – 29 As […]

The post The Power of Partnering: McAfee and Cisco Interoperability Delivers Strong Email Security appeared first on McAfee Blogs.

]]>
Highlights
  • In cooperation through the McAfee Security Innovation Alliance and Cisco Solution Partner Program, McAfee® Advanced Threat Detection and Cisco Email Security Appliance now interoperate, providing an automated, closed-loop email security solution
  • Solution Interoperability will be demonstrated at the Security Village at Cisco Live 2017 (Booth 55) in Las Vegas, June 25 – 29

As threats become more sophisticated and the resulting breaches more damaging, the modern enterprise requires more tightly-integrated, outcome-oriented security solutions. According to a survey commissioned by McAfee, 80% of security professionals with an integrated platform discover threats within 8 hours on average; in the “best of breed” camp only 54% could detect threats that quickly. Furthermore, the June 2017 McAfee Labs Threats Report  notes there are 244 new threats every minute or 4 every seconds. No security professional can keep up with this onslaught alone and no single company can provide a “silver bullet.

However, if we join forces against cybercriminals, we can create the right solutions and orchestrate safer environments with truly enhanced security. It’s not just a strategy, it’s the key to long term success in building a safer, more cyber secure future.

With that in mind, we are excited to announce interoperability of McAfee® Advanced Threat Defense (ATD) and Cisco Email Security (ESA) through the McAfee Security Innovation Alliance. McAfee® ATD, an open integration point for email gateways, and Cisco ESA provide an automated, closed-loop security solution with in-depth analysis capabilities that detect even highly camouflaged, evasive threats disguised in email attachments.

Why email? Email is a critical component of a modern enterprise workflow, used to exchange critical data every day—financial data, customer information, employee details, and more. However, email continues to be a primary attack vector for organizations large and small.

The benefits of a tightly-interoperable, closed-loop approach are further amplified when McAfee and other partner ecosystem products are in in play. McAfee ATD convictions of emerging threats and indicators of compromise (IoCs) can instantly be shared among management, network, forensics and endpoint solutions. This automated collaboration both enhances and accelerates time to protection and correction to safeguard the environment.

This enhanced solution will be showcased in the Security Village at Cisco Live 2017 (Booth 55) in Las Vegas, June 25 – 29, where we will demonstrate how customers can leverage McAfee® ATD deployments to further protect their environments against attacks.

Together, McAfee and Cisco are combining our inherent strengths and collaborating for a safer future. Together is, indeed, Power.

For more information, check out the following:

The post The Power of Partnering: McAfee and Cisco Interoperability Delivers Strong Email Security appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/power-partnering-mcafee-cisco-interoperability-delivers-strong-email-security/feed/ 0
Are Embedded OEM Device Manufacturers Responsible for Ensuring Their Devices are Secured? https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/embedded-oem-device-manufacturers-responsible-ensuring-devices-secured/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/embedded-oem-device-manufacturers-responsible-ensuring-devices-secured/#respond Tue, 02 May 2017 19:00:52 +0000 https://securingtomorrow.mcafee.com/?p=73142 Threats against the Industries Today’s devices are becoming more internet-connected as we speak. As our world becomes further intertwined with technology, new doors open directly into our lives for potential threats. Hackers are quickly advancing with their attacks, making it detrimental for end users if security is not provided. Consumers within the retail, medical, industrial […]

The post Are Embedded OEM Device Manufacturers Responsible for Ensuring Their Devices are Secured? appeared first on McAfee Blogs.

]]>
Threats against the Industries


Today’s devices are becoming more internet-connected as we speak. As our world becomes further intertwined with technology, new doors open directly into our lives for potential threats. Hackers are quickly advancing with their attacks, making it detrimental for end users if security is not provided. Consumers within the retail, medical, industrial controls and now even the automotive industries are concerned with using devices in their environment due to the potential risk of a cyber attack. Thus, it is critical for device manufacturers and embedded OEMs to provide security within their devices.

The estimated cost of an average cyber attack is $15 million. Approximately 12 million records were breached in just the first half of 2016 in the retail industry. From 2013 to 2016, the number of breaches in the medical Industry have nearly doubled. Within the industrial control industry, more than half of the critical infrastructure organizations have suffered from breaches in the last year. Additionally, in the automotive industry, automobiles are not immune to cyber attacks as well.

The benefits of partnering with McAfee


The McAfee Embedded OEM team is partnering with industry leading device manufacturers and embedded OEMs such as Siemens Healthineers, Schneider Electric, NCR, and Toshiba to embed security solutions within their devices and ensure the safety and privacy of customers.

Our security products feature anti-malware protection, comprehensive threat awareness and analysis, strong data encryption, and is topped off with streamlined security management, making it effective against threats yet simple enough to manage. With embedded security solutions, customers will be compliant and can avoid incidents that can result in high maintenance and service costs.

Our team is committed to be our embedded OEM partner’s #1 security vendor. We know that no one person, product, or organization can fight cybercrime alone. We simply believe that there’s power in working together. People working together. Products and solutions working together. Organizations and industries working together.

Let’s work together because Together is Power.
For more details about becoming an OEM partner, please visit our site: www.mcafee.com/oem

For additional information about our product solutions, please visit our site: www.mcafee.com/us/solutions/embedded-security.aspx

The post Are Embedded OEM Device Manufacturers Responsible for Ensuring Their Devices are Secured? appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/embedded-oem-device-manufacturers-responsible-ensuring-devices-secured/feed/ 0
McAfee and the Security Innovation Alliance: Together is Power https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-security-innovation-alliance-together-power/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-security-innovation-alliance-together-power/#respond Tue, 11 Apr 2017 23:00:14 +0000 https://securingtomorrow.mcafee.com/?p=71370 New McAfee is here. We turn the page in the next chapter of this company’s story. It’s one we have written with customers, partners, and employees alike. It readies us to be even more focused and innovative than ever before, with a singular mission of protecting all that matters to those who matter most to […]

The post McAfee and the Security Innovation Alliance: Together is Power appeared first on McAfee Blogs.

]]>
New McAfee is here. We turn the page in the next chapter of this company’s story. It’s one we have written with customers, partners, and employees alike. It readies us to be even more focused and innovative than ever before, with a singular mission of protecting all that matters to those who matter most to us.

The McAfee Security Innovation Alliance team is committed to keeping the world safe from cyber threats. Read our pledge:

 

The post McAfee and the Security Innovation Alliance: Together is Power appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-security-innovation-alliance-together-power/feed/ 0
McAfee Displacement Products Create a Trip of a Lifetime https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-displacement-products-create-a-trip-of-a-lifetime/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-displacement-products-create-a-trip-of-a-lifetime/#respond Mon, 30 Jan 2017 22:20:53 +0000 https://securingtomorrow.mcafee.com/?p=68621 This blog was written by Richard Steranka. In the second half of 2016, we challenged our Platinum and Gold partners to Challenge the Competition with a global partner incentive focused on competitive displacement. Cash prizes were awarded monthly for deal registrations, demos and proof of concepts (POCs). Eight grand prizes were awarded for a trip […]

The post McAfee Displacement Products Create a Trip of a Lifetime appeared first on McAfee Blogs.

]]>
This blog was written by Richard Steranka.

In the second half of 2016, we challenged our Platinum and Gold partners to Challenge the Competition with a global partner incentive focused on competitive displacement. Cash prizes were awarded monthly for deal registrations, demos and proof of concepts (POCs). Eight grand prizes were awarded for a trip of a lifetime!

Key Displacement McAfee Products One of the leading competitive displacement products in 2016 was the McAfee Endpoint Security platform. This unique platform provides a collaborative security framework that reduces the complexity of endpoint security environments, provides better performance to protect productivity and visibility into advanced threats, and speeds detection and remediation response. Real-time communication between threat defenses enables the sharing of events so IT can take action against potentially dangerous applications, downloads, websites, and files as suspicious behaviors are observed.

Challenge The Competition Again! In 2016, Platinum and Gold Partner sales representatives and sales engineers were the big winners from each region. The Trip of a Lifetime Grand Prize went to the salesperson with the largest booking within the incentive timeline. Sales engineers were selected in a random drawing for each approved demo and POC within the incentive timeline.

This popular competition runs through 2017. The Trip of A Lifetime prize package for two will be awarded in June and December with additional cash prizes for ENS 10.5 migrations, technical checks completed by sales engineers, and awards for MSP deals. Check out the 2017 Challenge the Competition Global Partner Incentive Program for details.

Sales Reps and Sales Engineers Win A Trip of A Lifetime

For sales reps, the North America Trip of A Lifetime winner is Norman Huszar from Digitalera Group LLC. In Latin America, the grand prize goes to Ester Vazquez Campos from Information Security Services United Inc. Sudarsan Ranganathan from Veeras Infotek is the grand prize winner for APAC, and the winner from EMEA is Marcin Filipczak from STiNET.

For sales engineers, the Trip of A Lifetime goes to Paul Kaplan of CipherTechs in North America, Carlos Coronel from Consulting Group Corporacion LatinoAmericana S.S. in Latin America, Shabeer Shiyam from South Asian Technologies Pvt Ltd. In APAC, and Eric Bruseker from Comparex B.V. in EMEA.

Erik Bruseker of Comparex said, “McAfee has been a strategic partner for years. The vision and implementation of an integrated and collaborative security platform speaks to our customers and aligns with the security value proposition of Comparex. This award is a confirmation that we are on the right track with McAfee.”

Each winner receives a unique Trip of A Lifetime for two guests, a choice of fantastic destinations around the globe, accommodations at a Four Seasons property, and many other ingredients to truly make a trip of a lifetime. We hope to see many more of our partner reps and SEs “Challenge the Competition” again with us. 2017 will be an exciting year for McAfee and our partners.

The post McAfee Displacement Products Create a Trip of a Lifetime appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-displacement-products-create-a-trip-of-a-lifetime/feed/ 0
Looking for a UEBA Solution? Here Are Some Key Considerations Before You Buy https://securingtomorrow.mcafee.com/business/looking-ueba-solution-key-considerations-buy/ https://securingtomorrow.mcafee.com/business/looking-ueba-solution-key-considerations-buy/#respond Mon, 23 Jan 2017 21:35:48 +0000 https://securingtomorrow.mcafee.com/?p=68179 As you begin mapping out your security defense strategy for 2017, you’ve undoubtedly seen a relatively new acronym on your radar—UEBA, or User and Entity Behavior Analytics. This game-changing innovation promises to connect the dots of an attack to provide advanced levels of detection and to unify security. UEBA solutions accomplish this by taking into […]

The post Looking for a UEBA Solution? Here Are Some Key Considerations Before You Buy appeared first on McAfee Blogs.

]]>
As you begin mapping out your security defense strategy for 2017, you’ve undoubtedly seen a relatively new acronym on your radar—UEBA, or User and Entity Behavior Analytics. This game-changing innovation promises to connect the dots of an attack to provide advanced levels of detection and to unify security. UEBA solutions accomplish this by taking into account users who are involved, the assets that are at risk, and how the attack is unfolding.

The first products in this market were called User Behavioral Analytics (UBA).  Then in August of 2015 (1), Avivah Litan at Gartner introduced the term “entity” into the title creating “user and entity behavioral analytics” (UEBA).  This change came as vendors began to support machine learning and analytic models that tracked and risk scored more than just user accounts.  To understand and give context to risks and threats, vendors added the ability to visualize not just user accounts, but also machines and servers, files and other data assets, IP addresses, and even applications.  These capabilities are critical to detecting and giving context to sophisticated threats and build on the capability to ingest and correlate multiple data classes.  More importantly, the ability to calculate risk to critical files and assets creates a “data centric” threat detection capability answering questions like; what files or digital assets are under attack? What critical files or digital assets are located on highly risky machines?  An analytics based data centric view of risk compliments DLP deployments and offers a new kind of threat visibility.

As with any emerging technology, it’s risky to assume that all UEBA vendors offer the same level and range of capabilities. To help clear up any confusion you might have, we interviewed Stephan Jou, Chief Technology Officer, with Interset, an McAfee Security Innovation Alliance partner. As a starting point, Stephan suggests that you consider some key criteria as you investigate potential vendors.

Q. You stress the importance of scalability and having a true “Big Data” architecture in a UEBA solution. What should buyers look for?
A.
Just about every UEBA vendor today claims that they support Big Data and Hadoop, but we’ve seen scalability issues at some customer deployments. The open source, Java-based framework Hadoop does indeed support the storage and processing of large data sets in a distributed environment, but, on its own, it’s not a Big Data platform. Supporting only a few components of a Big Data platform, but not a complete set, will result in scalability issues and bottlenecks. You need to ask UEBA vendors to clearly explain their architecture and all its components. If you have access to a Big Data expert, have them review the vendor’s architecture. Finally, contact customer and analyst references and ask them about any scalability issues they might know of.

Q. Why is it critical for UEBA solutions to support multiple data classes?
A.
Today’s UEBA solutions should support ingestion and correlation of multiple classes of data. Why? Because this will provide you with visibility and contextual understanding of threats across a broader threat surface—strengthening your detection capabilities. If the UEBA product can provide this capability, security analysts can quickly identify the attack, its target, and its methods. When you’re evaluating a UEBA solution, ask your vendor about what data classes are supported from what data sources and whether they are available out of the box. And, to avoid expensive customizations, make sure the products; analytic models work with your required data classes.

Q. Why is it important for a true UEBA solution to include analytics for both users and “other entities”?
A.
Early products in this market tracked only user behavior. Today, true UEBA solutions that incorporate machine learning and analytic models track both user accounts and computing resources, such as desktops, laptops, servers, files and other data assets, IP addresses, and even applications. This is critical to detecting and providing context around complex threats. By including entities, a UEBA solution can calculate risk to critical files and assets. This helps answer important questions, like “What files or digital assets are under attack?” and “What critical files or digital assets are located on highly risky machines?” When you’re looking at UEBA solutions, make sure that they support multiple entities and ask the vendor to demonstrate a risk score for each entity type.

Q. Why is mathematics so important in differentiating UEBA solutions?
A.
You’ll often see vendors tossing out sophisticated math terminology—like the Monte Carlo method, Gaussian profile estimation, and Recursive Bayesian Estimation—mostly to impress you. But really, what’s most important is how well their mathematical methods help you detect threats. The math used is important in three critical ways: it completely eliminates the need for rules and policies, it determines the accuracy and speed of detection, and it determines the breadth of entity visibility and threat detection coverage. When you’re reviewing UEBA products, be sure that the product does not require rules or thresholds—ever—and that it uses more than one type of math for machine learning and analytic detection. Also, the vendor should be able to explain the mathematical models and how they are applied to each type of threat or use case. Above all, ask vendors to prove their claims of use case coverage and detection accuracy. They should be able to run tests with your own data sets.

Q. When it comes to UEBA, why is having an extensible engine so important?
A.
Investing in a UEBA solution can significantly improve threat detection and response over the long term. The UEBA engine can literally become the automated threat detection brain of your security architecture if the analytics engine is extensible. This means it needs to cover multiple use cases and can be easily expanded to cover even more in the future—including unknown threats. How can you determine whether the solution is capable of this before you make a purchase commitment? Follow these four steps:

  • Share your threat detection and use case coverage roadmap with the vendor and find out if their roadmap matches yours.
  • Ask the vendor what it takes to add new use cases and whether they have ever done that previously.
  • Find out if the vendor has a repeatable process for threat coverage expansion.
  • Inquire as to whether customized projects around new data classes, new analytics, and new threats coverage are planned for future releases.
  • Finally, when selecting a UEBA product, ensure that the product supports multiple entities including user/account, machine/servers, files/digital assets, and application. Require that the vendor demonstrate a representation of each entity with associated risk scores – “most risky” report for each entity type.

Market Guide for User and Entity Behavior Analytics, Avivah Litan ID: G00276088

Stay up to date on the latest news and developments regarding the McAfee Security Innovation Alliance. Subscribe to D.J. Long’s blog

The post Looking for a UEBA Solution? Here Are Some Key Considerations Before You Buy appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/looking-ueba-solution-key-considerations-buy/feed/ 0
Taking Time to Find Resources https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/taking-time-find-resources/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/taking-time-find-resources/#respond Wed, 21 Dec 2016 18:45:35 +0000 https://securingtomorrow.mcafee.com/?p=67365 I wish I had a dollar for every time I’ve heard a partner say, “I didn’t know you do that,” in reference to McAfee’s support or resources. While I make a joke about getting paid for the question, the reality is that it has to change. McAfee partners need to know how supported they are […]

The post Taking Time to Find Resources appeared first on McAfee Blogs.

]]>
I wish I had a dollar for every time I’ve heard a partner say, “I didn’t know you do that,” in reference to McAfee’s support or resources. While I make a joke about getting paid for the question, the reality is that it has to change. McAfee partners need to know how supported they are and what resources are at their fingertips.

Our partners extend our market reach, provide validation of our products and services, and extend our technical support capabilities to every corner of the globe. Without partners, McAfee couldn’t possibly cover the total addressable security market. Without partners, we wouldn’t be the market leader we are today. That’s why it’s important that our partners know what support and resources we have available regarding benefits, rewards, enablement, and support so that we can mutually succeed in security product sales and services.

What do we provide?

  • Marketing Resources: Visit the partner portal to access materials, including product brochures, white papers, technical specifications, videos, demand-generation kits, and research reports designed to aid partners in conveying the purpose, functionality, and value of security products to end customers.
  • Training and Certifications:McAfee provides training programs for acquiring and refreshing skills and certifications for demonstrating technical competency.
  • Professional Networking and Collaboration: We help partners connect with McAfee experts, as well as peer organizations, to leverage experience, knowledge, and capabilities. We recently launched a marketing peer group so partners can interact with each other in understanding and launching innovative customer outreach campaigns.
  • Business Planning: For some higher-performing partners, McAfee will form joint business plans. This benefit is tremendous, as it identifies opportunities, assigns resources, and establishes mutual performance goals and incentives.
  • Deal Protection and Sales Teaming Plans:McAfee understands that partners put a lot of effort into developing sales and customer accounts, which is why we have a deal-registration program to protect sales investments. But we go even beyond that with incumbency protection, providing assurance against encroachment on active And we also have teaming plans, with McAfee sales teams and partners working together to close sales opportunities.
  • Performance Incentives: No partner program would be complete without performance incentives. Yes, the baseline incentives are product discounts, but McAfee also offers rebates, special pricing, funding for business development, and more. We call the combination of different incentives and performance rewards our partner profitability stack. We put a lot of effort into performance incentives because we know profitable partners are happy, productive partners.

If you’re a partner reading this blog and you’re not currently tapped into these resources, and many others that we offer, it’s important that we get you there. It’s up to you to take the time to learn about McAfee resources, identify the ones that would benefit your business, and make every effort to gain access to them.

No one wants to see you succeed more than McAfee. Your success is our success. We need your help in ensuring that you have the support and resources needed for our mutual benefit. For 2017, devote a little time each week to researching and learning about all that McAfee has to offer. And if you need help identifying resources, just ask your account manager.

Together is Power!

The post Taking Time to Find Resources appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/taking-time-find-resources/feed/ 0
Blogging Best Practices and Hot Topics for Security Marketers https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/blogging-best-practices-hot-topics-security-marketers/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/blogging-best-practices-hot-topics-security-marketers/#respond Tue, 08 Nov 2016 21:29:34 +0000 https://securingtomorrow.mcafee.com/?p=64367 When used as part of an integrated marketing campaign, blogging can increase SEO effectiveness, help maintain mindshare, and create a stronger social presence. Blogging also lets potential customers get to know your firm better, warming them up to seeing you as a problem solver. Blogging has become a staple component of a content marketing strategy […]

The post Blogging Best Practices and Hot Topics for Security Marketers appeared first on McAfee Blogs.

]]>
When used as part of an integrated marketing campaign, blogging can increase SEO effectiveness, help maintain mindshare, and create a stronger social presence. Blogging also lets potential customers get to know your firm better, warming them up to seeing you as a problem solver.

Blogging has become a staple component of a content marketing strategy – serving as evidence that you know your industry well enough for customers to invest time with you. That you understand their needs, wants and challenges. Through your blog, you add value to their lives, ease their troubles, offer solutions, inspire them or action, or even entertain them.

Our Guide to Better Blogging

To help you write SEO-friendly blogs that showcase your firm’s expertise I’m sharing with you our Blogging Best Practices guide.

This one page guide provides expert advice on blogging for our McAfee Partner Marketing Community. It features nine tips to enhance titles, improve timing, optimize length, and more. And our list of 15 hot security topics arms you with some of the top search terms for security buyers – writing about these topics will drive new traffic to your website and increase engagement with your customers.

My three favorite tips are:

  1. Improve Timing and Frequency – Plan blogs around the timing of key events, launches, trending topics. Also consider your upcoming campaigns and keep a regular schedule. Plan on at least one blog per month, preferably more. Finally, here are some statistics from Torque on the best time to publish and share content to maximize the click-through rate:
    • Twitter: 12PM and after 6PM
    • LinkedIn: Tuesdays, Wednesdays, Thursdays at or after 10 AM
  2. Optimize Post Format – Add bold headers to create sections in your content. This helps readers scan your post and boosts your SEO. Also use paragraph breaks to organize your thoughts so it is easier and more enjoyable to read.
  3. Include Internal/External Links – Add external links to add credibility to your statement or ideas. And drive your marketing objectives by linking to an internal asset, guiding the reader into more of your content. Also use keywords as anchor text for links.

Be sure to check out the remaining tips and our list of hot security topics in our Blogging Best Practices guide to maximize your blog’s impact within your content marketing plan.

In my next blog I’ll discuss how to find, polish, and promote the thought leadership that you likely already have available in your firm. Fresh out of FOCUS, I’ll also share a timely example of how we are doing this at McAfee.

 

This blog post was written by Regan Ogner.

The post Blogging Best Practices and Hot Topics for Security Marketers appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/blogging-best-practices-hot-topics-security-marketers/feed/ 0
Deception and Sandboxing https://securingtomorrow.mcafee.com/business/deception-and-sandboxing/ Thu, 20 Oct 2016 14:47:58 +0000 https://blogs.mcafee.com/?p=53481 Leveraging Deception Technologies to Outsmart Hackers Hackers live and breathe deception. In fact, deception is the cornerstone of most of their attack strategies. Lately, enterprises have become increasingly interested in using deception themselves as a way to get into the minds of cybercriminals and thwart them. In other words, they are using deception to improve […]

The post Deception and Sandboxing appeared first on McAfee Blogs.

]]>
Leveraging Deception Technologies to Outsmart Hackers

Hackers live and breathe deception. In fact, deception is the cornerstone of most of their attack strategies. Lately, enterprises have become increasingly interested in using deception themselves as a way to get into the minds of cybercriminals and thwart them. In other words, they are using deception to improve detection.

Honeypots and Sandboxing

Honeypots, which are decoy computer systems designed to trap hackers and uncover malicious activities, have been in use for quite some time. They are built to lure hackers and to be attacked, so any network traffic that’s going to them is bound to be malicious. Their chief purpose and benefit is to collect and store accurate attack data that may be missed by network intrusion detection tools, thereby reducing false alerts and “noise.” As a honeypot is getting hacked, it collects logs of IP addresses, ports, files, and hosts that are being accessed. This data provides valuable threat intelligence for security teams—especially when it comes to zero-day attack techniques. Some of the disadvantages of honeypots are that they only attract threats for the type of systems they are simulating and they do little in terms of prevention.

Sandboxes work in a similar way, but focus on applications. These automated detection and analysis systems allow malware programs to execute in a controlled environment. The sandboxes perform analysis, capturing as many details as possible. Some can even scale up to allow for analysis of multiple malware samples. Sandboxes are good at spotting zero-day malware and stealthy attacks. Unfortunately, we’re seeing more malware cropping up that can evade sandboxes.

Next-Generation Deception Tools

Today, deception technologies are becoming more automated and sophisticated. Gartner notes that “A new class of products with distributed endpoint decoys is emerging with threat deception capabilities that can enhance our defenses,” according to Gartner. “In this new class of security products, distributed decoy systems are used to portray deception across multiple layers of interaction by attackers.”1

This is precisely what enterprises need to detect multistage targeted attacks and keep them from coming back. Two McAfee Security Innovation Alliance partners that are at the forefront of deception technology are Attivo Networks and TrapX. Let’s take a look at the capabilities of each one.

Attivo ThreatMatrix Platform: BOTsink deception servers

Integrated with McAfee Network Security platform, the ThreatMatrix solution uses real operating systems and a variety of enterprise application, endpoint, and server-level deception techniques, which are deployed across the network to lure attackers to the Attivo deception server and away from production assets. The ThreatMatrix platform includes ThreatStrike end-point deceptions that plant credential and ransomware bait to attract attacker engagement. When the attacker strikes, the BOTsink analysis engine identifies the attacker IP address, identifies methods of lateral movement, and can generate signatures for zero-day and polymorphic attacks. The full TTP of the attack, attack cycle information, and forensic reports simplify and accelerate incident response, remediation, and reporting.

The Attivo ThreatMatrix platform can be configured to forward events to McAfee ESM and users can view events within the ESM Dashboard.

Here’s how it works with McAfee Network Security Platform. Let’s say a user clicks on a malicious link in a phishing email that drops malware on the endpoint and directs it to connect with a command-and-control (C&C) server. Instead of allowing the endpoint to go through with that operation, McAfee Network Security Platform intervenes and sends the connection request to the BOTsink virtual engagement server, which acts like the targeted machine, launching the URL and engaging with the C&C server. Once the BOTsink deception server is infected, and the connection with the C&C server is made, the threat carries out its attack behaviors in the BOTsink sandbox, where it’s isolated and safely observed. The BOTsink advanced analytical engine then analyzes the botnet traffic. And, beyond just analyzing the threat, it reports attack data to endpoint and network security applications and network security, so they can check for the presence of the infected file or check for communications with malicious domains across the entire enterprise infrastructure.

TrapX DeceptionGrid

TrapX DeceptionGrid, which complements McAfee Advanced Threat Defense, provides a multitier deception platform that uses both DeceptionTokens or lures on end-points and emulations (fake assets). It deploys a rich set fake assets that look and act like your high-value real assets that are intermingled with actual information technology resources at scale in an enterprise network. These assets can take the form of traditional workstations, servers with enterprise application and storage or IoT devices such as ATM, PoS, SWIFT systems, medical devices, VoIP, SCADA, ICS, or routers/switches. The second attackers come in contact with an emulation, an alert is triggered and injected malware is sent to McAfee Advanced Threat Defense, which swiftly and accurately analyzes the threat and then, working with McAfee Threat Intelligence Exchange, incorporates the threat intelligence into enforcement processes across other McAfee Security solutions. DeceptionGrid also monitors egress traffic for known and previously unknown C&C traffic.  When the ATD sandbox detonates malware that has bypassed traditional defenses, actionable intelligence is transmitted back into TrapX DeceptionGrid to hunt for additional attacker activity.  This type of advanced deception technology enables IT security to find advanced threats that may bypass other security solutions and significantly reduce the time it takes to detect a breach.

Visit Attivo Networks and TrapX during McAfee Security FOCUS 16 Conference at the Aria Hotel,  Las Vegas, Nov 2- 4, 2016.

https://www.gartner.com/doc/reprints?id=1-2LSQOX3&ct=150824&st=sb&aliId=87768

 

The post Deception and Sandboxing appeared first on McAfee Blogs.

]]>
Marketing to Influence the Customer Experience https://securingtomorrow.mcafee.com/business/marketing-influence-customer-experience/ Tue, 18 Oct 2016 15:56:07 +0000 https://blogs.mcafee.com/?p=53420 Every form of marketing today is undergoing a sea change that is more than just a disruption. New digital marketing technologies are a welcome development for improving customer experience, as companies learn how to leverage data to empower customers, sharpen marketing content, and enable their sales force throughout the Customer Buying Journey. Meanwhile, marketers grapple […]

The post Marketing to Influence the Customer Experience appeared first on McAfee Blogs.

]]>
Every form of marketing today is undergoing a sea change that is more than just a disruption. New digital marketing technologies are a welcome development for improving customer experience, as companies learn how to leverage data to empower customers, sharpen marketing content, and enable their sales force throughout the Customer Buying Journey. Meanwhile, marketers grapple with how to engage with customers on their buying journey, how to organize a marketing function, and ultimately, how to deliver better customer experiences.

Indeed, research from McKinsey & Company shows a 5x bump in the growth rate of firms they call digital leaders – those using key digital technologies to modernize the B2B customer experience.

In B2B technology marketing, the engagement model has changed. Traditional marketing relied on vendors pushing content to potential customers, hoping to grab someone’s fleeting attention. Today, the customer is in charge and it’s about the buyer’s pull and inbound marketing. Fortunately, marketing organizations can now target specific personas or customer types through geo-targeting and search engine marketing.

Shift to Digital Marketing

The shift to digital marketing means the planning cycle has also changed. Marketing budgets used to be set on an annual basis with rigid control mechanisms. Today, digital marketing requires short term and flexible decision making in order to continually improve results and deliver an improved ROI.

The marketing skills required to deliver results in the new world of technology marketing are as different today as the marketing tools themselves. The acumen required is data mining and analysis with an ability to translate numbers and metrics into meaningful insight. The list of free software tools continues to grow, and each one churns out pages of data with just the click of a button. MarTech illustrates the complexity of the technology marketing landscape in this supergraphic which they shared at the 2016 MarTech Conference in San Francisco.

New Marketing Tools for Partners

The changes shaping our world can seem daunting, but marketers like us are better equipped than ever to directly improve customer experience using both new tools and new mindsets. To better navigate the digital marketing resources that McAfee supplies you, check out these two new additions to our Campaign Kits:

  • Campaign Activation Guides – outline a custom path to leveraging our content in your marketing campaigns
  • Social Cards – enhance your social media posts with visuals

These new resources are available now for the Hybrid Cloud Security Campaign Kit and coming soon to the remaining kits.

 

This blog post was written by Regan Ogner.

Sources:
MarTech supergraphic – complexity of the technology marketing landscape
McKinsey & Company – How B2B Digital Leaders Drive Five Times More Revenue Growth Than Their Peers

The post Marketing to Influence the Customer Experience appeared first on McAfee Blogs.

]]>
Keeping Kids Safe from Online Threats https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/keeping-kids-safe-online-threats/ Wed, 21 Sep 2016 19:45:31 +0000 https://blogs.mcafee.com/?p=52756 As a father of three children and a professional in the IT Security industry, online safety for kids is something near and dear to my heart. Despite technology shortcomings and the occasional breach, enterprises are relatively well-equipped to detect and defend against the tens of thousands of new threats that appear on the Internet every […]

The post Keeping Kids Safe from Online Threats appeared first on McAfee Blogs.

]]>
As a father of three children and a professional in the IT Security industry, online safety for kids is something near and dear to my heart.

Despite technology shortcomings and the occasional breach, enterprises are relatively well-equipped to detect and defend against the tens of thousands of new threats that appear on the Internet every day. They have complex security systems. They have trained, certified security professionals on staff. And they have the support of security experts like you, our McAfee partners.

But kids don’t have those resources. The average home personal computer has, at most, basic consumer antivirus software. Most smartphones and tablets have no security, which makes machines used by kids particularly vulnerable to digital threats such as viruses and phishing attacks.

But that’s not the worst of it.

Kids are exposed to numerous threats whenever they go online. According to www.nobullying.com:

  • 97% of teens 12 – 17 play online games. Some of these games are in an online open environment, where predators are often looking for victims.
  • Nearly 30% of parents allow their children to use the internet with no supervision or restrictions.
  • 5 – 7 year olds spend an average of 9.2 hours a week online. For 8 – 11 year olds, it’s 17 hours a week.
  • 12 – 17 year olds send and receive an average of 1,500 messages per month.

The sheer exposure of kids online and the online threats fueled the creation of McAfee’s Digital Safety Program (formerly McAfee’s Online Safety for Kids), which provides materials that security experts can use to raise schoolchildren’s awareness and offer tips for staying safe online.

Over the past five years, McAfee staff and partners have collaborated with dozens of school systems across the United States to bring greater security and knowledge of threats to school-age children. The program is interactive, getting kids to share their online experiences. Everyone who has ever participated in the Digital Safety Program walks away stunned by the stories they hear about the threats children encounter.

At our recent Technical Forum in Puerto Rico, McAfee staff and partners brought the Digital Safety Program to a local, private middle school, teaching more than 100 6th to 8th graders live from our keynote stage. When we’ve done this program in the past, the participating partners were owners, senior executives and sales and marketing people. This time, it was the techies delivering the message; in fact, it was our experienced partners, so their peers could understand how easy and satisfying it is to participate! The interaction inspired partners to think of new ways to protect kids and get their peers, and even customers, involved.

kenmccray

ken-mccray2

 

 

 

 

 

 

And that’s the magic of our Digital Safety Program; it’s inspirational. The exchange of information helps raise awareness with kids, and it helps make connections between security professionals and the people who need protection the most in their local communities. This inspiration leads to new security ideas that benefit businesses and individuals alike.

Social responsibility is part of being a good corporate citizen.  On a business development level, the McAfee Digital Safety Program has real benefits for partners, too. Many partners that participate with their local schools say the communities appreciate their efforts, which, in turn, leads to brand awareness. And for those presenting in the program, delivering the message is a great sales and marketing training tool. If you can explain security to children, you can explain it to anyone.

Even if there were no direct business benefit, online security for kids is worth the effort. I encourage all McAfee partners to learn more about the program and how they can bring it to their local schools. For more information, contact Chance Hoover.

Take a look at these photos from the Technical Forum McAfee Digital Safety Program Session. We had a phenomenal group of engaged and excited kids.

The post Keeping Kids Safe from Online Threats appeared first on McAfee Blogs.

]]>
Building Bridges to a More Connected Security Environment https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/building-bridges-connected-security-environment/ Tue, 13 Sep 2016 17:33:05 +0000 https://blogs.mcafee.com/?p=52534 For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were a few bridges here and there but the various islands remained largely inaccessible. It became clear, however, that in this era of rapidly evolving and advanced threats, we needed to find a way to build […]

The post Building Bridges to a More Connected Security Environment appeared first on McAfee Blogs.

]]>
For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were a few bridges here and there but the various islands remained largely inaccessible. It became clear, however, that in this era of rapidly evolving and advanced threats, we needed to find a way to build those bridges, to join the dots and ensure each part of the ‘security archipelago’ is not only connected, but integrated, with open channels of communication.

Well-funded crime organizations have continued to strain the capabilities of traditional security infrastructures, so an approach that allows organizations to draw on all available resources and make more informed and educated decisions is vital.

Security Connected

McAfee introduced the McAfee Threat Intelligence Exchange (TIE) and Data Exchange Layer (DXL) in response to these challenges. It is a secure communication platform that connects and unites disparate security technologies into a single coordinated system, allowing customers to make smarter security decisions, faster.

Customers can strengthen their threat defenses by drawing upon 3rd party vendor technologies that are integrated into the McAfee platform to optimize their security operations, neutralize emerging threats, fortify critical environments and safeguard data.

In essence, McAfee TIE/DXL ushers in a new era in security where the whole is greater than the sum of its parts. All components come together to work as a single cohesive system, regardless of vendor or underlying architecture.

Avecto, an McAfee Innovation Alliance partner has completed a fully integrated TIE/DXL solution to Avecto Defendpoint. This joint solution gives customers actionable intelligence on application reputation allowing them to drive configuration changes and make risk-based policy adjustments, all helping to create stronger defences against today’s threats.  You can learn more about Avecto’s integration with McAfee on a live webinar, Sept 21.   Chris Sherman, Analyst at Forrester will present on the Six Pillars of an Effective Endpoint Security Strategy, and hear from Avecto and McAfee on how to deal with the multitude of threats targeting endpoints through a balance of attack surface reduction and threat detection.   Register to attend: https://www.brighttalk.com/webcast/1743/221445 .

The post Building Bridges to a More Connected Security Environment appeared first on McAfee Blogs.

]]>
Techies Give Back at Tech Forum https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/channel-partners-step-up-to-teach-digital-safety-in-the-classroom/ Wed, 07 Sep 2016 17:41:12 +0000 https://blogs.mcafee.com/?p=52452 This blog was written by Chance Hoover. Earlier this month, more than 100 channel partner engineers from across the Americas came together in Fajardo, Puerto Rico, for 5 days of learning at the 10th annual Americas Technical Forum.  This group, along with 60 McAfee staff, made the journey for multiple reasons: deep-dive technical training, peer […]

The post Techies Give Back at Tech Forum appeared first on McAfee Blogs.

]]>
This blog was written by Chance Hoover.

Earlier this month, more than 100 channel partner engineers from across the Americas came together in Fajardo, Puerto Rico, for 5 days of learning at the 10th annual Americas Technical Forum.  This group, along with 60 McAfee staff, made the journey for multiple reasons: deep-dive technical training, peer networking, live malware demonstrations and – let’s be honest – the tropical paradise.

 

The McAfee staff and partners had many things in common, among them is they are all digital safety experts, more knowledgeable about threats, safety and preventative measures than most people – particularly children.

As part of the ongoing McAfee Digital Safety Program (formerly McAfee’s Online Safety for Kids), the Tech Forum planning team took full advantage of having all of these experts in one place at the same time. We decided to teach these engineers how to deliver a digital safety message to children in their home neighborhoods.  Further, we showed them just how easy it is by having fellow engineers deliver the message.

29021594706_19d340a360_z 29054467065_b0046c481b_z 28433533764_8c2c98fd9f_z

Ingram Micro’s Patrick Smith, Dyntek’s Brian Gancherov, and London Security’s Dennis London joined me on stage to teach digital safety to local middle school students (6th through 8th grade) from the Kingdom Christian Academy of Rio Grande. Expecting more advanced technical content, Tech Forum engineers were surprised that morning when more than 100 school age kids came walking into the general session room and we began talking to them about cyber security, safety, and ethics.  The children were very receptive, and asked incredible questions including –

  • What do I do if my identity is stolen?
  • How can I be safer while playing video games?
  • Can someone really look at you through your camera?

We capped off the morning session with a donation of 25  Chromebooks to the school. The Kingdom Christian Academy of Rio Grande operates largely on donations, so the Chromebooks were most appreciated. For the students, who were just in their second day of the school year, we had Frisbees, sunglasses and donuts. After the session, we had informal conversations with the kids about security, careers and Puerto Rican life.

29054440415_cf5b142707_k

The Digital Safety Program training at the Tech Forum in Puerto Rico is a great example of how McAfee partners can give a little something back to their communities and help keep children safe online. Since we returned to our respective day jobs, I have been inundated with requests by partners for session content and guidance on how to get started.  The three partner reps that helped with this particular session have collectively trained over 20,000 children to date, both with McAfee and on their own.  Although that is an amazing number, the reality is millions of school age children are coming online every year without any sort of education on potential threats.

All the Digital Safety Program takes is 40 minutes and the willingness to share expertise and experience with impressionable minds.

Won’t you get involved? We have all heard of the IT security talent shortage; a similar knowledge gap exists in our world’s youth. You have the knowledge and know-how to bridge that gap.  McAfee has the tools to help you, please reach out to me and let’s get started.

 

The post Techies Give Back at Tech Forum appeared first on McAfee Blogs.

]]>
Stepping Up to the Tech Training Challenge https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/stepping-tech-training-challenge/ Mon, 29 Aug 2016 22:51:39 +0000 https://blogs.mcafee.com/?p=52350 The clock is counting down to the big annual Focus conference in Las Vegas, where McAfee will unveil a number of new products and initiatives to strengthen further our core strategy of providing technology that leverages automation and intelligence to elevate security and safeguard against ever-evolving threats. The road to Focus went through Puerto Rico, […]

The post Stepping Up to the Tech Training Challenge appeared first on McAfee Blogs.

]]>
The clock is counting down to the big annual Focus conference in Las Vegas, where McAfee will unveil a number of new products and initiatives to strengthen further our core strategy of providing technology that leverages automation and intelligence to elevate security and safeguard against ever-evolving threats.

The road to Focus went through Puerto Rico, where we held our 10th annual Americas Technical Forum, and Technical Partner Advisory Council (TPAC) meeting. The event attracted more than 100 partners that wanted to gain hands-on technical training in product areas relevant to their businesses and attend great presentations about our technical innovations. Here’s a sampling of some of the talks.

  • Brian Dye, corporate vice president and general manager of corporate products, reviewed our product portfolio. Dye also led a panel session with executive product management and the office of the CTO – a session that ran over the time allotted because partners were so engaged in the discussion.
  • Brett Kelsey, vice president and CTO of the Americas, gave a great talk about the evolving threat landscape and the need for integrated security solutions.
  • Josh Thurston & Carl Woodward, with the office of the CTO, performed a demo using advanced malware in an attack on a manufacturing facility (see photos below).

The technical experts of our partner community drank in all of the information, providing us with their reactions, suggestions, and critiques throughout the week. The entire point of the Technical Forum is to provide partners with insights into technology developments, preparing them for what’s to come. With this knowledge, they’re able to help their companies build packages, methodologies, and practices that lead to sales and more satisfied customers.

As I sat in the general session room, I watched the looks on partners’ faces. They nodded their heads. They took notes. They asked questions. They networked with their peers and exchanged tips. In many cases, partners made connections with companies whose capabilities and offerings complement their own. Partners tell us that attending these events is truly worthwhile.

That got me thinking that I want to see more partners attending these events. Next year, I hope to double partner attendance. We at McAfee need to share our information and insights with you, our partners, to ensure that you’re aware of and enabled to take advantage of our research, services, and innovations.

Getting more people to Tech Forum is good, but we can do even better than that. I would like to see more of you take advantage of the training and information resources that McAfee provides. Sign up to attend a live event. Take time out to listen to a Webinar. Download the latest technical brief. Sign up for an McAfee technical or intelligence newsletter.

One of the biggest challenges we all face is a lack of awareness of the threats, the threat landscape, and technologies available to counter those threats. McAfee provides training, resources, and support. I challenge you to take advantage of as many opportunities as possible, and I hope to see you next year at Technical Forum!

 

The post Stepping Up to the Tech Training Challenge appeared first on McAfee Blogs.

]]>
Becoming an Experimental Marketer https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/becoming-experimental-marketer/ Wed, 17 Aug 2016 19:01:11 +0000 https://blogs.mcafee.com/?p=52133 A few years ago, Optimizely decided to try something different for the 2013 Dreamforce event, a developer and user mega-conference hosted by Salesforce in San Francisco. Instead of spending the hefty $20,000 to set up a booth at the conference, they decided to spend $7,000 to launch a 20-foot illuminated blimp into the night sky […]

The post Becoming an Experimental Marketer appeared first on McAfee Blogs.

]]>
A few years ago, Optimizely decided to try something different for the 2013 Dreamforce event, a developer and user mega-conference hosted by Salesforce in San Francisco. Instead of spending the hefty $20,000 to set up a booth at the conference, they decided to spend $7,000 to launch a 20-foot illuminated blimp into the night sky above AT&T Park in San Francisco where Salesforce was holding their after party. The blimp read, “Blimp Ads Don’t Work, Website Optimization Does.”

Experimental marketing is quite simply doing things you have never tried. And by extension, it requires an entrepreneurial mindset—a willingness to take some calculated risks to find out what works for you and your business.

Recently I had a conversation with Linda Ford of BB Marketing on this topic, applied to today’s security technology marketer. My key takeaway – the beauty of modern marketing techniques is a relatively low cost and almost immediate feedback…or lack of feedback. In other words, doing more with less, and figuring out if your marketing is working faster and more precisely than ever – when you know how to listen and respond.

Check out the video –

Regan Video

Another key is to stay informed, learn from experts, and learn from peers – join the McAfee Partner Marketing Community on LinkedIn and you’ll find both.

 

This blog post was written by Regan Ogner.

The post Becoming an Experimental Marketer appeared first on McAfee Blogs.

]]>
Strengthening the channel: McAfee adds Guran Green https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/strengthening-the-channel-mcafee-security-adds-guran-green/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/strengthening-the-channel-mcafee-security-adds-guran-green/#comments Mon, 15 Aug 2016 17:45:29 +0000 https://blogs.mcafee.com/?p=51987   I’m pleased to introduce you to Guran Green, who recently joined McAfee Federal as Director of Channels. We’re especially excited about his appointment because we’re laser focused on expanding our channel partners. Guran is just the person to drive this initiative because of his wealth of experience and strategic vision. Guran brings our team […]

The post Strengthening the channel: McAfee adds Guran Green appeared first on McAfee Blogs.

]]>
 

I’m pleased to introduce you to Guran Green, who recently joined McAfee Federal as Director of Channels. We’re especially excited about his appointment because we’re laser focused on expanding our channel partners. Guran is just the person to drive this initiative because of his wealth of experience and strategic vision.

Guran brings our team more than 15 years of experience leading sales, marketing and operations personnel at the divisional and corporate level for several Fortune 500 companies. Known for his motivational management style, Guran’s track record of building highly motivated teams and developing strong vendor and customer relationships speaks for itself: In his time at immixGroup, Guran developed high value business relationships with over 600 different partners, resellers, and distributors.  Additionally, Guran managed more than 50 channel programs at Immix and guided his division through rapid growth – winning Distributor of the Year for McAfee three years in a row, Brocade (twice), RedHat, and Aruba.

Guran has a clear vision for McAfee Federal’s channel team: “We will support the federal government’s IT mission through a network of value-add solution providers, delivering industry-leading IT security products and services,” he said.  “You will see us focus on developing heightened technical proficiency and capabilities. Key amongst them will be delivering security solutions through the cloud.”

Guran cites collaboration as one of his strengths. “Strategic collaboration has always been a major focus of mine,” he said. “Partners collaborating with McAfee Federal can expect communication, transparency, integrity and accountability – along with profitable programs and business growth.”

You will love working with Guran; there is a reason why we named him our Distributor of the Year for three straight years. I am thrilled to have Guran as part of our team, and can’t wait to see the collaborations that result to better serve the federal government.

 

The post Strengthening the channel: McAfee adds Guran Green appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/strengthening-the-channel-mcafee-security-adds-guran-green/feed/ 1
Hot Security Market Needs Smart Engagements https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/hot-security-market-needs-smart-engagements/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/hot-security-market-needs-smart-engagements/#respond Fri, 12 Aug 2016 21:05:20 +0000 https://blogs.mcafee.com/?p=51963 Industry analysts vary on their opinions on the growth and health of the technology market. Depending on which report you read, growth will fall somewhere between .6 percent and 3.4 percent. Of course, different technology segments are growing at different rates. Few technology segments are growing faster than security. Market analysts agree the market for […]

The post Hot Security Market Needs Smart Engagements appeared first on McAfee Blogs.

]]>
Industry analysts vary on their opinions on the growth and health of the technology market. Depending on which report you read, growth will fall somewhere between .6 percent and 3.4 percent. Of course, different technology segments are growing at different rates.

Few technology segments are growing faster than security. Market analysts agree the market for security products and services is growing at an annual rate of 8 percent to 10 percent, and will continue to do so through the end of the decade. At this pace, the security market could go from $70 billion in sales in 2015 to $140 billion or more by 2020.

Some people may see these numbers and think they spell a chance to sell more products. That’s a fair conclusion, but there’s more to be thinking about. Rather than only approaching security from a product sales perspective, we should also  approach the problem from a systemic risk-management perspective that identifies exposures, continuously works to fill gaps, and measures security performance and effectiveness. Think of it as a lifecycle approach in which we have a persistent engagement with our customers.

What does a security lifecycle engagement look like?

  • Assess Security Posture. Start with a security assessment. Identify the security tools that are in place and those that are missing. Identify each customer’s security needs based on risk exposure and the potential consequences of a security breach.
  • Fill Gaps: Deploy new products and services that reduce risk exposure and make security more manageable. The goal is to help customers maintain confidentiality, data integrity, and operational availability.
  • Optimize: Make sure the security technologies deployed work as intended. Individual security products are rarely effective on their own. Once you’ve helped customers identify gaps, you need to integrate disparate technologies and test them to ensure operational performance.
  • Offer Support: Security requires domain expertise that few enterprises have on their own. Lend your expertise and skill to help customers understand risks and security incidents, remediate breaches, and investigate performance lapses. Through support, you’ll provide a valuable service and learn more about your customers’ security needs.
  • Measure Performance: Help customers establish policies and processes that provide a framework for measuring security performance and effectiveness. Through performance measures, you can demonstrate to customers the value of their security investments and justify future investments.
  • Make Adjustments: Based on the performance measures and the original security plan that came out of the assessment, make adjustments to fix deficiencies and safeguard against future and anticipated threats.

By engaging in security lifecycle management, you’ll have a greater understanding of customers’ needs. This, in turn, will lead to greater potential for product sales, professional services engagement, and extended managed security services contracts. The result of holistic and persistent security is higher ROI for the customer and greater profitability for you, the partner.

My ask is that all of McAfee partners will keep this mindset when they walk into a customer meeting, discover an opportunity, or engage with a customer renewal. Let’s be the best trusted advisors that we can be to our customers.

The post Hot Security Market Needs Smart Engagements appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/hot-security-market-needs-smart-engagements/feed/ 0
CompuCom Launches Cloud-Based Managed Service Powered by McAfee https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/compucom-launches-cloud-based-managed-service-powered-by-mcafee/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/compucom-launches-cloud-based-managed-service-powered-by-mcafee/#respond Wed, 03 Aug 2016 12:00:39 +0000 https://blogs.mcafee.com/?p=51660 This blog was written by Richard Steranka. Today, from Black Hat 2016 in Las Vegas, CompuCom announced the expansion of its Managed Security Services (MSS) through  the release of its upgraded Security Information and Event Management (SIEM) services. In my earlier blog, I spoke about the cyberskills shortage  and the active role that partners can […]

The post CompuCom Launches Cloud-Based Managed Service Powered by McAfee appeared first on McAfee Blogs.

]]>
This blog was written by Richard Steranka.

Today, from Black Hat 2016 in Las Vegas, CompuCom announced the expansion of its Managed Security Services (MSS) through  the release of its upgraded Security Information and Event Management (SIEM) services. In my earlier blog, I spoke about the cyberskills shortage  and the active role that partners can play in helping to alleviate this problem for customers. This is a great example of a partner who is helping enterprise, commercial and small- and medium-sized businesses (SMBs) safely embrace public cloud adoption, enable their employees to use personal devices for company work and leverage the Internet of Things (IoT) to collect and process Big Data.

CompuCom now provides the latest in security event monitoring to identify and halt threats before they become a breach. When combined with its other network, service desk, data center and cloud managed services, the portfolio delivers an exclusive, comprehensive managed IT service that is smarter, safer and more affordable. This helps businesses respond to threats faster, leading to faster remediation times and minimized costs.

To achieve these new capabilities, CompuCom has deployed McAfee Enterprise Security Manager (ESM) as its SIEM tool in a new and exciting way, as a completely cloud hosted and delivered solution. By leveraging a cloud delivered ESM service, CompuCom can respond to our client’s needs in a faster, agile and more cost effective manner.

CompuCom’s SIEM and McAfee’s ESM partnership include:

  • CompuCom’s SIEM and McAfee’s endpoint, which deliver more security features and functions, including real-time threat management on servers and desktops, virtualized or physical, on premises or in the cloud.
  • Advanced correlation of events across multiple systems and platforms. Today’s attacks are often coordinated across different vulnerabilities.
  • CompuCom’s comprehensive Managed Security Service that can be delivered on almost any manufacturer’s endpoint hardware.

For those of you at Black Hat this week, you can stop by McAfee booth #1465 on August 3 at 3:15pm PT for a presentation from Chad Atchley, Cloud Product Director, CompuCom.

The post CompuCom Launches Cloud-Based Managed Service Powered by McAfee appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/compucom-launches-cloud-based-managed-service-powered-by-mcafee/feed/ 0
The Role Partners Play in the Cyberskills Shortage https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/the-role-partners-play-in-the-cyberskills-shortage/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/the-role-partners-play-in-the-cyberskills-shortage/#comments Mon, 01 Aug 2016 18:42:36 +0000 https://blogs.mcafee.com/?p=51653 This blog was written by Richard Steranka. Last week, McAfee launched the Hacking the Skills Shortage Report in partnership with the Center for Strategic and International Studies. The report, which outlines the talent shortage crisis impacting the cybersecurity industry, unveiled some interesting statistics and unorthodox opportunities for channel partners (see infographic). One thing the report made […]

The post The Role Partners Play in the Cyberskills Shortage appeared first on McAfee Blogs.

]]>
This blog was written by Richard Steranka.

Last week, McAfee launched the Hacking the Skills Shortage Report in partnership with the Center for Strategic and International Studies. The report, which outlines the talent shortage crisis impacting the cybersecurity industry, unveiled some interesting statistics and unorthodox opportunities for channel partners (see infographic).

One thing the report made clear is the cyberskills shortage does direct and measurable damage. According to one in three respondents, a shortage of skills makes their organizations more desirable hacking targets. One in four say insufficient cybersecurity staff strength has damaged their organization’s reputation and led directly to the loss of proprietary data through a cyberattack.

According to the report, high value skills are in critically short supply, the most scarce being intrusion detection, secure software development and attack mitigation. While the talent shortage must be addressed, there lies an opportunity for the channel ecosystem to not only resell and provide professional services but to build out cutting edge Managed Security Services that leverage the latest protection, detection and correction technologies and processes. The report reveals that because of the talent deficit, more than 60% of survey respondents work at organizations that already outsource at least some cybersecurity work. The primary capabilities that were noted as outsourced in the report are risk assessment and mitigation, network monitoring and access management and repair of compromised systems.

Furthermore, according to Allied Research, World Managed Security Services Market – Opportunities and Forecasts, 2013 – 2020, the emergence of advanced and sophisticated attacks have been significantly impacting businesses in monetary terms. This growing challenge is leading them to look for better options to manage their data security like managed security services as these models have proven to be a cost-effective and efficient method to monitor or manage security infrastructure.

By bolstering managed security services that leverage the power of robust security technologies with predictive analytics and automation, partners, resellers, MSSPs, MSPs and distributors can take an active role in mitigating risks from next generation cyber threats during a challenging time for the industry.

 

The post The Role Partners Play in the Cyberskills Shortage appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/the-role-partners-play-in-the-cyberskills-shortage/feed/ 1
Setting the Bar for Marketing Innovation – Evolving our Marketing Strategy in the Security Technology Industry https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/setting-the-bar-for-marketing-innovation-evolving-our-marketing-strategy-in-the-security-technology-industry/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/setting-the-bar-for-marketing-innovation-evolving-our-marketing-strategy-in-the-security-technology-industry/#respond Wed, 29 Jun 2016 18:42:43 +0000 https://blogs.mcafee.com/?p=50919 Every year we recognize partners for achieving excellence in a variety of categories. Last month at our Americas Partner Summit, I had the pleasure of awarding our first ever Marketing Innovation Award to Linda Ford at BB Marketing. Linda is a true pioneer in the McAfee partner marketing community and embraces what we see as the […]

The post Setting the Bar for Marketing Innovation – Evolving our Marketing Strategy in the Security Technology Industry appeared first on McAfee Blogs.

]]>
Every year we recognize partners for achieving excellence in a variety of categories. Last month at our Americas Partner Summit, I had the pleasure of awarding our first ever Marketing Innovation Award to Linda Ford at BB Marketing. Linda is a true pioneer in the McAfee partner marketing community and embraces what we see as the best and most powerful path forward for marketing in the B2B security technology space.

What constitutes state-of-the-art marketing?

I sat down with Linda for her take on the new digital marketing frontier and what it means for McAfee partners. Over the next several weeks I will share four short videos that give her take on what constitutes state-of-the-art marketing. In the first video, you’ll see how content marketing is helping BB Marketing partners elevate the conversation. She discusses how to succeed as a marketer today and how to improve marketing in your organization by evolving into a ROI-driven revenue marketer.

Watch the first video in this series –

Regan Ogner you tube

A successful career in marketing should include befriending other innovative marketers you encounter. When you need inspiration to create state-of-the-art marketing initiatives, you need a network of people you can reach out to. Linda is one of the people I turn to when I need help refining ideas with critical feedback and support. To connect with Linda and other like-minded individuals, I invite you to join the new McAfee Partner Marketing Community.

 

This blog post was written by Regan Ogner.

The post Setting the Bar for Marketing Innovation – Evolving our Marketing Strategy in the Security Technology Industry appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/setting-the-bar-for-marketing-innovation-evolving-our-marketing-strategy-in-the-security-technology-industry/feed/ 0
The Channel Transformation to Ascend https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/channel-transformation-ascend/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/channel-transformation-ascend/#respond Mon, 27 Jun 2016 20:15:18 +0000 https://blogs.mcafee.com/?p=50882 This blog was written by Richard Steranka. In our continued quest to become our customers’ #1 security vendor and our partners’ #1 security partner, McAfee executives, myself included, recently traveled the world to connect with our channel partner community for our annual Partner Summit event. This year we hosted partners in their respective region of […]

The post The Channel Transformation to Ascend appeared first on McAfee Blogs.

]]>
This blog was written by Richard Steranka.

In our continued quest to become our customers’ #1 security vendor and our partners’ #1 security partner, McAfee executives, myself included, recently traveled the world to connect with our channel partner community for our annual Partner Summit event. This year we hosted partners in their respective region of the world, so we made five stops – Boca Raton, Florida; Tokyo and Osaka, Japan; Bangkok, Thailand; and Mallorca, Spain.

Under the theme Ascend, we showed partners across the globe how we are improving our customers’ security outcomes and elevating the security conversation with an integrated security portfolio designed to own the Threat Defense Lifecycle.

Core to solving our customer’s security challenges and creating more opportunities for partners is McAfee’s open platform. Along with our channel partners we are defining a new era in security, one where components work together as a cohesive system and one where customers benefit from the intelligence that we can offer to automate workflows and respond to protect a dynamic attack surface.

This is great news for you, our channel partners, because when you can sell an open, customizable platform, not only can you deliver a more complete solution to your customers, but your security practice will grow – larger deals, increased profitability, and higher professional services attach rates. Higher satisfaction leads to higher loyalty and greater customer retention. You get the picture, it’s a powerful cycle and how we differentiate ourselves at McAfee.

We are ascending beyond the conventional and moving to an improved channel partner program that is rich with opportunity, bold and confident with a vision and strategy to win. The market is forcing us to change and we are well positioned to ASCEND.

Visit your region’s partner portal page for Partner Summit presentations and more:

Finally, I urge partners around the globe to join us on July 14 for the Global Channels Webcast.

The post The Channel Transformation to Ascend appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/channel-transformation-ascend/feed/ 0
EMEA Channel Partner Summit: The highlights https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/emea-channel-partner-summit-highlights/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/emea-channel-partner-summit-highlights/#respond Wed, 22 Jun 2016 10:35:27 +0000 https://blogs.mcafee.com/?p=50814 This blog was written by David Small. As we look ahead to our annual FOCUS Security conference, a three day event that brings together leading cyber security experts from around the world to discuss their security initiatives, I want to reflect briefly on another great McAfee even that has just passed. Earlier this month, we […]

The post EMEA Channel Partner Summit: The highlights appeared first on McAfee Blogs.

]]>
This blog was written by David Small.

As we look ahead to our annual FOCUS Security conference, a three day event that brings together leading cyber security experts from around the world to discuss their security initiatives, I want to reflect briefly on another great McAfee even that has just passed.

Earlier this month, we held our annual EMEA Channel Partner Summit – this year in Mallorca – which gives us the chance to regularly gather with our partners and discuss how we’re going to grow together over the next 12 months. It was, once again, a brilliant few days, with interesting and insightful speeches from top McAfee leaders, and an entertaining awards ceremony and dinner to top it all off.

There are many highlights from the event that spring to mind for me, the main one being that we had the opportunity to speak to our partner community and share knowledge about how we can address customer needs and develop our businesses together.

With “ascend” the theme of our partner summit this year, I particularly enjoyed our GM, Chris Young, talking about the digital world today and what that means for organisations worldwide. With the proliferation of malware, the Internet of Things, and the global talent shortage reshaping the business of cybersecurity, more than ever, today’s enterprises rely on the right combination of technologies and talent to secure their organisations, all within acceptable levels of risk.

Here are some of the highlights from our EMEA Channel Partner Summit guests:

4J4A0390

Channel Summit 1 Channel-Summit2

We want to ascend together as we move forward, and events – such as our Channel Partner Summits – help us to do just that. So please do join us at FOCUS 2016 in November if you can, and would like the chance to meet us, and other leading security professionals from around the world. It’s set to be another fantastic event, and it’s in being held in Las Vegas – how can you say no to that? More information about FOCUS can be found here: mpower.mcafee.com/

The post EMEA Channel Partner Summit: The highlights appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/emea-channel-partner-summit-highlights/feed/ 0
New Campaign Kits: Elevate Your Marketing by Elevating Your Conversations https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/new-campaign-kits-elevate-your-marketing-by-elevating-your-conversations/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/new-campaign-kits-elevate-your-marketing-by-elevating-your-conversations/#respond Tue, 21 Jun 2016 17:03:22 +0000 https://blogs.mcafee.com/?p=50804 IT decision makers have spoken – good information is hard to find. According to IDG’s 2016 Customer Engagement Research, a staggering 80% of IT decision makers find it challenging to locate valuable information when they’re making a purchase decision. These potential customers are hungry for research-backed information that directly relates to their company’s top security challenges. Hence the […]

The post New Campaign Kits: Elevate Your Marketing by Elevating Your Conversations appeared first on McAfee Blogs.

]]>
IT decision makers have spoken – good information is hard to find. According to IDG’s 2016 Customer Engagement Research, a staggering 80% of IT decision makers find it challenging to locate valuable information when they’re making a purchase decision.

These potential customers are hungry for research-backed information that directly relates to their company’s top security challenges. Hence the need for marketers to adapt with some form of a content marketing campaign. But wait a minute, marketers also often have difficultly sourcing a steady stream of quality content to build out high-impact campaigns. What to do?

If you’re an McAfee channel partner, you’re in luck – use our new campaign kits.

Elevate your marketing by elevating the conversations your security practice takes to market. We’ve invested in research from the likes of Gartner, Forrester and IDG to determine the security buyer’s top challenges, along with providing you with thought leadership content that hits the mark for security buyers.

According to Lisa Matherly, head of content marketing at McAfee, “the research driving our new campaigns isn’t limited to just McAfee customers. We made the necessary investment to complete broad research that addresses the total security market.”

Set up your sales teams to engage and relate with prospects like never before by demonstrating expertise on the issues that they care about most. Security buyers need our help to make sense of security solution and threat landscapes. You’ll be providing them the information that they can trust and also use to begin building a business case to their executive teams

To download the campaign kits, identify customers who fit the target market and to plan your campaign, visit the Partner Portal Campaign Kit page.

 

This blog post was written by Regan Ogner.

The post New Campaign Kits: Elevate Your Marketing by Elevating Your Conversations appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/new-campaign-kits-elevate-your-marketing-by-elevating-your-conversations/feed/ 0
Celebrating our partners across EMEA https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/celebrating-partners-across-emea/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/celebrating-partners-across-emea/#respond Wed, 15 Jun 2016 08:38:28 +0000 https://blogs.mcafee.com/?p=50664 This blog was written by David Small. Last week, our EMEA Channel Partner Summit took place in Mallorca. This year’s Summit was a great success and once again highlighted the importance of our partners and the value they bring to McAfee. It’s been great to catch up with all of our partners and begin planning […]

The post Celebrating our partners across EMEA appeared first on McAfee Blogs.

]]>
This blog was written by David Small.

Last week, our EMEA Channel Partner Summit took place in Mallorca. This year’s Summit was a great success and once again highlighted the importance of our partners and the value they bring to McAfee. It’s been great to catch up with all of our partners and begin planning on how we can make the next twelve months even more successful than the last.

Not only has our Summit allowed us to connect with our partners, it has also given them the chance to see our vision for the future for cybersecurity. The security landscape is changing at an incredible pace and making sure our partners understand where we’re heading is integral to our success. Whether it’s new innovation or industry leading products, our partners are a critical part of our future.

I want to offer a huge thanks to all of our partners for contributing to our organisation over the last twelve months. With that in mind, it gives me great pleasure to announce the full list of our 2016 McAfee EMEA Partner Award winners;

EMEA

DACH Partner of the Year: Bucker EDV – Germany

EMER Partner of the Year: DRS – South Africa

NEEU Partner of the Year: Atea – Denmark

SEUR Partner of the Year: Informatica El Cortes Ingles – Spain

UKIR Partner of the Year: Herjavec Group – UK

Technical Partner of the Year: Nebula – Turkey

Distribution Partner of the Year: Abbakan – France

EMEA Partner of the Year: HP – EMEA/UK

Here I am (middle) presenting the EMEA Partner of the Year award to HP UK, alongside Intel Security's Richard Steranka (left) and Andy Elder (right)
Presenting the EMEA Partner of the Year award to HP UK, alongside McAfee’s Richard Steranka (left) and Andy Elder (right)

The post Celebrating our partners across EMEA appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/celebrating-partners-across-emea/feed/ 0
CRN Names SIX McAfee Women to its 2016 Women of the Channel List https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/crn-names-six-mcafee-women-to-its-2016-women-of-the-channel-list/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/crn-names-six-mcafee-women-to-its-2016-women-of-the-channel-list/#respond Thu, 26 May 2016 19:00:31 +0000 https://blogs.mcafee.com/?p=50041 This blog was written by Richard Steranka. Last week, CRN named SIX women from McAfee to its prestigious 2016 Women of the Channel list. The women named to this list include : Allison Clarke, Director, Global Channel Programs and Enablement, McAfee Gia Filice, Global Channel Strategy and Marketing, McAfee Angela Huertas, Channel Programs Manager, McAfee Lisa Matherly, […]

The post CRN Names SIX McAfee Women to its 2016 Women of the Channel List appeared first on McAfee Blogs.

]]>
This blog was written by Richard Steranka.

Last week, CRN named SIX women from McAfee to its prestigious 2016 Women of the Channel list.

The women named to this list include :

  • Allison Clarke, Director, Global Channel Programs and Enablement, McAfee
  • Gia Filice, Global Channel Strategy and Marketing, McAfee
  • Angela Huertas, Channel Programs Manager, McAfee
  • Lisa Matherly, Head of Content Marketing, McAfee
  • Sonia Morello, Americas Sales & Operations Manager, McAfee
  • Regan Ogner, Head of Global Channel Marketing, McAfee

To have so many McAfee women recognized for their outstanding leadership, vision, and unique role in driving channel growth and innovation, is a true testament to the caliber of women we have at McAfee.

We also have TWO women who made the 2016 Power 100 an elite subset of the prestigious annual Women of the Channel list. Lisa Matherly and Gia Filice both made it into this exclusive group of channel influencers, which are drawn from the larger pool of CRN’s 2016 Women of the Channel. Only the most influential of the list’s constituents are selected for the Power 100, which means that Gia and Lisa were both singled out for their unique roles in the advancement of our organization and the IT channel at large.

The women executives who comprise the 2016 Women of the Channel list span the IT channel, representing vendors, distributors, solution providers and other organizations that figure prominently in the channel ecosystem. CRN editors select the Women of the Channel honorees on the basis of their professional accomplishments, demonstrated expertise and ongoing dedication to the IT channel.

The 2016 Women of the Channel list is now featured in the June issue of CRN Magazine and online at www.CRN.com/wotc2016.

Again, congrats to these women for their amazing accomplishments.

The post CRN Names SIX McAfee Women to its 2016 Women of the Channel List appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/crn-names-six-mcafee-women-to-its-2016-women-of-the-channel-list/feed/ 0
What Strategic Engagement Can Do for You – Americas Partner Awards https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/americas-partner-awards/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/americas-partner-awards/#respond Thu, 12 May 2016 16:00:34 +0000 https://blogs.mcafee.com/?p=49583 Last night at the McAfee Americas Partner Summit we recognized elite performance in our channel by handing out our annual partner awards. This year’s group of 19 partners were selected out of the 1000s of partners who we work with and evaluate. Our 2016 winners personified excellence in security practice business acumen throughout 2015 and […]

The post What Strategic Engagement Can Do for You – Americas Partner Awards appeared first on McAfee Blogs.

]]>
Last night at the McAfee Americas Partner Summit we recognized elite performance in our channel by handing out our annual partner awards. This year’s group of 19 partners were selected out of the 1000s of partners who we work with and evaluate. Our 2016 winners personified excellence in security practice business acumen throughout 2015 and embody the three pillars of the McAfee Partner Program: strategic engagement, mutual growth and profitability, and driving better customer security outcomes.

Speaking from my perspective as a long-time channel executive, our annual partner awards are absolutely one of the best ways to cap off a couple days of invigorating business discussions with our partner community. Everyone loves recognition. And selfishly it reminds me how the McAfee Partner Program makes the industry’s best security practices better.

These partners are helping lead the charge and pave the way, so others will want to follow. They challenge our entire channel to improve and make my job highly-fulfilling. Most importantly, they are raising the bar on value-added services that benefit our end customers by expertly leveraging McAfee’s suite of integrated security technology and services that simplify the Threat Defense Lifecycle.

My deepest thanks goes to all of our partners for making the commitment to investing in our organization, but right now the folks listed below earned a special place in my heart. I’m already excited thinking about the next set of security practices that we’ll be able to bring along this year for our 2017 awards.

That said, below is the list of our 2016 McAfee Americas Partner Award winners:

 Latin America (LTAM)

  • Tecnasa, Partner of the Year – Northern Region, Latin America
  • Novared S.A., Partner of the Year – Southern Region, Latin America
  • Scunna Network Technologies, Partner of the Year – Brazil
  • Software Express S.A. de CV, Partner of the Year – Mexico
  • MPS Mayorista de Colombia, Distribution Partner of the Year – Latin America

North America (NA)

  • Secure Technologies International, Federal Partner of the Year – Canada
  • Tech Data Canada, Distribution Partner of the Year – Canada
  • Information Systems Architects, Partner of the Year – Canada
  • International Systems Marketing, Sub 25M Commercial Partner of the Year – United States
  • Forsythe, Sub 25M Partner of the Year – United States
  • ThunderCat Technology, Federal Partner of the Year – United States
  • CDW, GHE Partner of the Year – United States
  • Optiv, Commercial Partner of the Year – United States
  • Tech Data, Distribution Partner of the Year – United States
  • SHI, Partner of the Year – United States

Americas (LTAM and NA)

  • DG Technology, Marketing Innovation Award – Americas
  • Ingram Micro and Tech Data, Community Service Leaders of the Year – Americas
  • Dyntek, Partner of the Year – Americas

The post What Strategic Engagement Can Do for You – Americas Partner Awards appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/americas-partner-awards/feed/ 0
McAfee Corporate Marketing Priorities https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-corporate-marketing-priorities-2/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-corporate-marketing-priorities-2/#respond Tue, 10 May 2016 14:32:13 +0000 https://blogs.mcafee.com/?p=49576 As we move into the second half of 2016, I hope you and your marketing teams have recognized the value of refining your strategic marketing initiatives to map to the new buying paradigm.  Our marketing team has certainly been hard at work developing initiatives and campaigns you can access immediately to jumpstart your efforts. On […]

The post McAfee Corporate Marketing Priorities appeared first on McAfee Blogs.

]]>
As we move into the second half of 2016, I hope you and your marketing teams have recognized the value of refining your strategic marketing initiatives to map to the new buying paradigm.  Our marketing team has certainly been hard at work developing initiatives and campaigns you can access immediately to jumpstart your efforts.

On our recent Q2 Global Channels Webcast, Allison Cerra joined us to discuss our top three corporate marketing priorities aimed at making a bigger splash than ever before in the marketing community. We are looking to elevate our efforts in thought leadership, demand generation, and strategic engagement.

  • Thought Leadership: We’re defining a thought leadership platform that allows partners to compete more effectively. A properly executed thought leadership platform will lead customers to our unique selling proposition.
  • Demand Generation: Driving a demand generation machine linked to incremental pipeline and bookings has obvious benefits to both our partners and McAfee.
  • Strategic Engagement: We’re looking to become more consultative to you and execute data-driven marketing plans.

I challenge you to take time this week to map your current marketing priorities to the new buying paradigm and identify potential areas of improvement. By aligning to industry best practices, McAfee and our partners can become market leaders and reach customers in ways our competition cannot. Tune in next week to hear more about the initiatives our corporate priorities are driving within the channel marketing team. Believe me – we are just getting started.

 

This blog post was written by Regan Ogner.

The post McAfee Corporate Marketing Priorities appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-corporate-marketing-priorities-2/feed/ 0
Cloud Adoption Is in the Forecast https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/cloud-security-report/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/cloud-security-report/#respond Thu, 14 Apr 2016 04:01:01 +0000 https://blogs.mcafee.com/?p=48895 This blog was written by Richard Steranka. McAfee recently released new research on the quickening pace of enterprise cloud adoption. A cloud-first shift for enterprise services has key implications for our channel partners selling and delivering security solutions. In the new report Blue Skies Ahead? The State of Cloud Adoption, we found that respondents expect […]

The post Cloud Adoption Is in the Forecast appeared first on McAfee Blogs.

]]>
This blog was written by Richard Steranka.

McAfee recently released new research on the quickening pace of enterprise cloud adoption. A cloud-first shift for enterprise services has key implications for our channel partners selling and delivering security solutions.

In the new report Blue Skies Ahead? The State of Cloud Adoption, we found that respondents expect 80% percent of their IT budgets to be dedicated to cloud computing services in the next 16 months.

Our partner community plays an important role in helping our customers strike the appropriate balance of trust and caution. The demand for organizations to spin up on-demand infrastructure is exploding. Security is an integral part of helping the cloud scale quickly and safely.

Let’s help them get the security part of the equation right on the front end. Use the new Securing Hybrid Infrastructure Sales Play resources and co-op marketing collateral, which will be on the Partner Portal in the next few days. Finally, if you’re not able to click over to the full report, here is a summary of some key findings –

Cloud computing covers a wide range of services, from infrastructure to applications, in private, hybrid, and public variants. Great news for our partners. A survey of 1,200 IT professionals responsible for cloud security across eight countries revealed that:

  • Organizations are using more than 40 cloud services
  • 81% of organizations surveyed identify IaaS (Infrastructure-as-a-Service) as the most likely to be deployed in the future. Think Amazon Web Service or Microsoft Azure, for example.
  • SaaS is seen as the least likely to be deployed, but is clearly still in the plans at 60%
  • More than ever, departments are storing a wide range of data in their clouds

The increased deployment of cloud services appears to be building on an implicit trust, but there are still a lot of unknowns.

  • More than 20% of the IT departments cannot be certain whether there are unauthorized cloud services in use, and 13% cannot say for certain what is stored in their clouds
  • IT departments are using a variety of methods to deal with shadow IT, including database activity monitoring (49%), next-generation firewalls (41%), and web gateways (37%)
  • While less than 25% of organizations have experienced unauthorized access to their cloud data or services, the continued lack of visibility is the greatest concern, expressed by 58% of those surveyed
  • Only 34% of respondents feel that their executives and directors fully understand the security implications of the cloud, while 20% believe that the C-suite is virtually unaware of the potential dangers

The post Cloud Adoption Is in the Forecast appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/cloud-security-report/feed/ 0
My First Six Weeks https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/first-six-weeks/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/first-six-weeks/#respond Mon, 07 Mar 2016 21:57:49 +0000 https://blogs.mcafee.com/?p=48066 I am tasked with writing my first BLOG. With more than 25 years in this industry, I am quickly overwhelmed with the fact that I have never written a BLOG. Interestingly, I don’t remember if the blogging topic was covered in the interview process. Well here it goes…. A Little Bit About Me: I am […]

The post My First Six Weeks appeared first on McAfee Blogs.

]]>
I am tasked with writing my first BLOG. With more than 25 years in this industry, I am quickly overwhelmed with the fact that I have never written a BLOG. Interestingly, I don’t remember if the blogging topic was covered in the interview process. Well here it goes….

A Little Bit About Me:

I am a regular guy that has a passion and a drive to help people stay secure and connected, a passion for cyber security. I am a husband, a father, and the three things that drive me are my faith, family, and legacy. It is important to me that when I look back on anything I’ve done, that I can be confident in the legacy I leave behind. I go into each new task, new position, new chapter in life, with this mentality. My new role as Head of The Americas Channel Sales and Operations is no different- I hope to leave a legacy, and that starts now.

Starting This New Journey:

Let me first thank the thousands of partners who make up the McAfee channel partner community. I am excited to represent your interest as we focus on bringing you what I believe are the key elements of our partnership; A.) Providing the solution to solve and automate our customer’s security challenges B.) Sales and Executive engagement that is focused on mutual goals, and C.) Engaging in financially rewarding opportunities that exceed corporate objectives.

I started the journey as the new channel chief on a Wednesday morning in an executive meeting with Security Resource Group (SRG) from Calgary, AB and ended the day with M&S Technologies at their National Sales Meeting. This first day was the perfect representation of what I’ve continued to see over the first six weeks in this role. Together, with McAfee, partners are solely focused on solving their customers security needs with the Threat Defense Lifecycle methodology. This has me very excited to lead our incredible channel team.

 If I could sum up the last six weeks into two words, they would be ‘fast’ and ‘productive’. Here’s a brief overview of what I’ve been up to in order to ensure that we continue to ascend together and become our Customers’ number one security partner.

Here are the Highlights:

  • Met with key stakeholders and outlined short term and long term goals, 2016 Go-to-Market plan, and reviewed the McAfee organization
  • Conducted more than 30 channel team 1:1s to ensure I know how to support every person that makes up this incredibly talented organization
  • Promoted five key channel team members to optimize our partner coverage and partner experience
  • Attended Bill McAlister’s Executive Sales Meeting with my new peers, we previewed the 2016 Sales Objectives prior to McAfee’s Sales Kick Off meeting in February
  • Received some great coverage in CRN, Channelnomics, The VAR Guy, San Francisco Business Times, Channel 2e2, and Redman Channel Partner
  • Attended the direct report business review, as we discussed developing an aggressive Greenfield account channel strategy.
  • Held our first McAfee Channel All Hands Meeting internally and my first channel briefing, where Fernando Quintero officially handed me the keys to the channel organization
  • Attended the 2016 McAfee Sales Kick Off in Las Vegas, NV. The theme for the year is “eXceptional” and becoming the “X” factor in our customers’ environments, as we solve their business needs.
  • Attended an executive briefing with DynTek at their Las, Vegas, NV Executive Briefing Center
  • Participated as the keynote speaker for McAfee’s Channel StarTrac at our Plano, TX regional office. We hosted more than 20 partner representatives, focusing on the Threat Defense Life Cycle.
  • Attended our internal New Hire System Engineers training with the objective to educate them about our worldwide channel strategy and partner community

Conclusion and Call To Action:

As you can see I’ve hit the ground running! I am here, I am dedicated to our McAfee partners and to our channel organization. I am excited about this opportunity and have enjoyed every minute of the beginning of this journey.

Writing this blog gave me the opportunity to sit back and reflect. I challenge each of you to reflect on what you’ve done lately in order to take your business to the next level. Greater success, bigger accomplishments and endless opportunities are to come. Let’s continue to build on the momentum of the Threat Defense Lifecycle and ascend to new heights where we have the opportunity to solve and automate our customers’ security challenges.

Together, we can make a difference. Until next time…

The post My First Six Weeks appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/first-six-weeks/feed/ 0
Targeting Your Success in 2016 https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/targeting-success-2016/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/targeting-success-2016/#respond Fri, 29 Jan 2016 19:23:04 +0000 https://blogs.mcafee.com/?p=47299 This blog was written by Richard Steranka. Thanks to all of you who attended our Q1 Global Channels webcast to hear what we have in store for the McAfee Partner Program in 2016. If you missed the webcast, I encourage you to watch a replay or download the slides from the Partner Portal. Our collective […]

The post Targeting Your Success in 2016 appeared first on McAfee Blogs.

]]>
This blog was written by Richard Steranka.

Thanks to all of you who attended our Q1 Global Channels webcast to hear what we have in store for the McAfee Partner Program in 2016. If you missed the webcast, I encourage you to watch a replay or download the slides from the Partner Portal. Our collective efforts this past year not only contributed to 93% of McAfee bookings, but set the stage for a spectacular 2016.

It’s stats like this that testify the front-and-center role that you, our partners, play in McAfee’s overall mission to be our customer’s #1 security partner. In 2016 several elements of our multi-year partner program overhaul will blossom and deliver maximum profitability to you and optimal security outcomes to our mutual customers.

As discussed in detail on our webcast, here’s our 2016 channel priorities and a few highlights within each area that will see to our success:

2016 Channel Priorities

Strategic Engagement – We are placing the utmost importance on developing joint business plans with you to precisely align on specific sales opportunities and growth. We will establish what success looks like at the outset and collaborate to course correct like never before with real-time metrics provided by tools like the Partner360 dashboard and later this year Salesforce.com.

Mutual Growth and Profitability – The Sales Rules of Engagement we introduced in 2015 emphasized fostering a culture of shoulder-to-shoulder engagement throughout the customer buying process. We’ll accelerate on this path with enhancements to our MDF plan that include improved marketing campaigns. We’re also making key updates to our profitability programs and removing friction in day-to-day transactions with several ease of doing business improvements.

Better Customer Outcomes – Our customers will continue to benefit with our ongoing mutual investments to training and enablement. You will have access to the best tools, incentives, and guidance in the industry to build out world-class security practices, which includes managed services.

2015 was a glimpse at the success possible when we commit to investing in one. We are poised to go far in 2016 as we rise above conventional channel partner programs and point products with our strategy to own the Threat Defense Lifecycle.

Please share your feedback with us by taking part in our partner survey that will launch on February 4.

The post Targeting Your Success in 2016 appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/targeting-success-2016/feed/ 0
Security, By the Numbers, Is Big https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/security-by-the-numbers-is-big/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/security-by-the-numbers-is-big/#respond Mon, 04 Jan 2016 19:33:26 +0000 https://blogs.mcafee.com/?p=46893 When you quantify security, the numbers are big and plentiful. The reality of data being compromised is staggering, but we have immense opportunity to fight against the ever-evolving and rapidly expanding threat landscape. We must take these times seriously and move quickly, together, to help our customers stay protected. Data compromises increased by 28% in […]

The post Security, By the Numbers, Is Big appeared first on McAfee Blogs.

]]>
When you quantify security, the numbers are big and plentiful. The reality of data being compromised is staggering, but we have immense opportunity to fight against the ever-evolving and rapidly expanding threat landscape. We must take these times seriously and move quickly, together, to help our customers stay protected.

  • Data compromises increased by 28% in 2014, according to the Identity Theft Resource Center. 2015 is tracking equally significant increases.
  • According to the Verizon 2015 Data Breach Investigations report, the total loss to security breaches in 2014 topped $700 million. However, other estimates claim $600 billion annually. No one knows for sure, but the reality is this: Many businesses are feeling pain related to security-breach losses.
  • The average cost of remediating a security breach is $217 for each record, according to the Ponemon Institute.
  • Tens of millions of data records were compromised in 2014, but a breach of just 10 million could upwards of $2.2 billion in remediation costs when we look at Ponemon’s estimates.

These statistics are what we face today, but they can’t even come close to adequately reflecting the damage to a company’s reputation and loss of potential business that occurs with a breach.

It’s little wonder, then, that security is one of the few bright spots on the technology landscape when it comes to spending. Analyst firm Gartner says Worldwide IT Spending to Decline 5.5 Percent in 2015*. We believe this is one of the most significant contractions in technology spending since the recession of 2007-2009. Security spending will increase a whopping 8.4 percent this year and is forecasted to increase annually by 9 percent over the next three years. This is a pivotal time for us to help.

Bank of America Merrill Lynch estimates that the total security market is valued at $75 billion and is expected to top $170 billion by 2020. Part of the reason security spending is going to more than double over the next four years is unbounded availability of security technologies. Businesses are keep spending on ineffective products with few results in return.

All of these numbers point to a problem, but not necessarily the solution. At our annual Partner Summit and Focus Conference, McAfee unveiled its strategy for addressing the ever-increasing volume of threats and mounting costs. The strategy rests on three pillars.

  1. Protect. Applying appropriate levels of protection to IT assets and data. As McAfee CTO Steve Grobman said at Focus, there’s no shortage of security products; there’s a death of effective technologies and deployments. We must deliver effective security, not just “security theater.”
  2. Detect. Quickly identifying threats and breaches, and remediating security incidents to minimize damage. According to Ponemon, it takes 256 days to detect an external security breach and 158 days to find an internal incident. We must find and eradicate threats and breaches as fast as we can; the longer a breach goes undetected, the greater the damage.
  3. Correct. Take corrective action to ensure security breaches aren’t repeated. According to the Verizon report, 90 percent of all security breaches target known vulnerabilities, so dating back to 2002 when Windows NT was the dominant operating system. Systematic improvements and change management will reduce the number of vulnerabilities and reduce the attack surface. The result is an increasingly less vulnerable enterprise.

In practical terms, these three strategic pillars can be summarized in two words: “Do better.” We, McAfee, and you, our partners, must do a better job. We must understand the threat landscape, work with customers to identify and quantify their risk exposure, devise and design effective and evolving security systems, apply intelligence to security management processes, and continuously measure results.

We’re challenged to apply our considerable resources – efficiently and effectively – to ensure security spending isn’t just a black hole from which nothing comes back out. Our goal is to make every dollar spent on security products, services, and support equate to hundreds of dollars in savings on incidents that never happen.

Join me in rising to this challenge, committing to building sound security practices, and delivering superior value based on McAfee technology and your skill. Together, we can keep our customers safe and produce positive returns on security investments.

 

*Gartner Press Release, Gartner Says Worldwide IT Spending to Decline 5.5 Percent in 2015, June 30, 2015, http://www.gartner.com/newsroom/id/3084817.

The post Security, By the Numbers, Is Big appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/security-by-the-numbers-is-big/feed/ 0
Moore’s Law and Security https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/moores-law-security/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/moores-law-security/#respond Wed, 06 May 2015 16:44:34 +0000 https://blogs.mcafee.com/?p=43179 In case you haven’t noticed, you owe Moore’s Law a belated birthday card. The famed theorem, which set the technology industry’s evolutionary pace by positing that computational power would double every year, turned 50 this year. We in the technology industry owe a lot to Moore’s Law, as it’s given us the foundation on which […]

The post Moore’s Law and Security appeared first on McAfee Blogs.

]]>
In case you haven’t noticed, you owe Moore’s Law a belated birthday card. The famed theorem, which set the technology industry’s evolutionary pace by positing that computational power would double every year, turned 50 this year.

We in the technology industry owe a lot to Moore’s Law, as it’s given us the foundation on which to build new technologies, applications, processes, and companies. Fortunes are owed to McAfee co-founder Gordon Moore, whose law has set expectations for what’s to come and when. As a result, we’ve been able to accurately predict the evolutionary steps in computational performance and capabilities.

While we all owe much to Moore’s Law, it’s admittedly a bit of a double-edged sword. The observation has led to more powerful computers and data centers, and it’s made technologies such as mobile and cloud computing possible, but it’s also created new and more potent cyberattacks and enabled hackers to target systems with increasing effectiveness.

For McAfee and our partners, Moore’s Law is a catalyst. The steady, predictable increase in computational power will always bring new applications – hardware, software, and cloud – that come with vulnerabilities. The technology industry has yet to create an impenetrable operating system, application, or infrastructure. It’s incumbent on security practitioners and professionals to stay current with new technologies, understand security measures, and convey that to end users.

Here are the things that security solution providers should do:

  1. Stay Current. Even if you’re not adopting or reselling new and emerging technologies, it’s a good idea to keep pace on what’s being developed and coming out. Your customers will have questions about new applications. It’s best to have a working knowledge of new technologies so you can engage in conversation.
  1. Monitor Customer Technology Adoption. The best way to address a customer’s evolving security needs is to monitor the technologies they’re adopting. The addition of new technologies and resources to their IT fabric is an opportunity to engage in a dialog about security and demonstrate value by proactively moving to protect their investments.
  1. Plan with Customers. Beyond just reacting to customer’s technology adoption, it’s a good idea to remain persistently engaged with customers and plan for their security needs. This helps you maintain relevancy and enables you to act as their trusted advisor. By adopting new technology, customers incur both costs and risks, and planning is a means of mitigating that risk before anything is actually purchased.

The question comes up periodically: When will Moore’s Law reach its limit? When will the pace of computational evolution slow or stop? The answer: Not for the foreseeable future, and that means we security folks need to keep pace or risk becoming obsolete.

The post Moore’s Law and Security appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/moores-law-security/feed/ 0
Office 365 Ascent Is Security Opportunity https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/office-365-ascent-security-opportunity-2/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/office-365-ascent-security-opportunity-2/#respond Wed, 11 Mar 2015 19:35:23 +0000 https://blogs.mcafee.com/?p=41896 Microsoft is on a roll with its cloud strategy. In the past two quarters, the software giant has posted triple-digit revenue growth for its cloud-based application services, driven largely by its Office 365 application suite and email services. Office 365 is driving much of Microsoft’s commercial and consumer cloud growth, and that’s not expected to […]

The post Office 365 Ascent Is Security Opportunity appeared first on McAfee Blogs.

]]>
Microsoft is on a roll with its cloud strategy. In the past two quarters, the software giant has posted triple-digit revenue growth for its cloud-based application services, driven largely by its Office 365 application suite and email services.

Office 365 is driving much of Microsoft’s commercial and consumer cloud growth, and that’s not expected to change anytime soon. Some estimates place the total number of mailboxes migrating to the cloud will be 65 percent. Currently, 83 percent of mailboxes are on-premises, while 17 percent are hosted. Microsoft has about 5 percent to 10 percent of the market share through Office 365. This means there’s still 48 percent of the hosted mailbox market up for grabs – and Microsoft has momentum in capturing share.

The adoption of cloud-based productivity, collaboration, and email services such as Office 365 offers many advantages in cost, connectivity, mobility, and productivity. Security, however, isn’t necessarily one of those benefits. While Office 365 and similar services have many embedded security features, they’re not immune to many prevalent attacks.

If you’ve been following the news lately, you’ve probably heard about the latest high-profile attacks against major banks and hacks that revealed millions of user identities. Most of these attacks and data compromises started as simple emails containing malicious URLs. Through spear-phishing attacks, hackers and other miscreants are able to stealthily insert malicious code into network domains. Advanced malware can then watch network activity, identify weaknesses, send intelligence back to its controllers, and open doors to allow unauthorized access.

According to McAfee Labs, 95 percent of all Internet-based attacks start with spear-phishing. Email is a powerful tool, but it needs equally powerful security to safeguard data, software, and infrastructure from unauthorized access and compromises. This is where the increasing adoption of Office 365 and other email services works in favor of McAfee partners.

Migrating to Office 365 is not a trivial exercise. It may require extensive planning and phased movement of mailbox credentials and files from legacy systems to the cloud. This transition can leave data exposed to leaks and compromises if the proper security protocols aren’t in place. Partners can provide value-added services by facilitating the planning and implementation of these migrations on a customer’s behalf. In addition, they can take the security aspects into consideration by providing the software licensing that keeps data from being exposed.

Once Office 365 is in place, it requires ongoing security support. McAfee has an array of solutions that enhance Office 365 protection starting with McAfee Email Protection, which includes or integrates into remarkable technology for detecting and thwarting threats at multiple levels.

  • ClickProtect: inspects and identifies malicious and suspicious URLs before they can be opened and introduce vulnerabilities and exploits.
  • McAfee Gateway Anti-Malware Engine: real-time behavioral engine that identifies viruses, worms, and Trojans without reliance on conventional signatures.
  • McAfee Data Loss Prevention: identifies sensitive data in motion, helping to reduce the chances of data leaks.
  • McAfee SaaS Email Encryption: prevents data from being accessible, even if compromised.
  • McAfee Advance Threat Defense for Email Protection: scans email attachments and blocks malware from infecting systems.

Cloud-based services such as Microsoft’s Office 365 are gaining popularity because of their cost, flexibility, ease of use, and convenience, but those strong value benefits don’t negate the need for data protection. McAfee partners need to work with end users to ensure they understand that moving to the cloud doesn’t eliminate risk and to help them navigate the technologies available to mitigate that risk. It’s more than an opportunity; it’s an imperative.

For more information on how to extend advanced email protection to your Microsoft Office 365 customers, click here.

The post Office 365 Ascent Is Security Opportunity appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/office-365-ascent-security-opportunity-2/feed/ 0
McAfee IPS and the Gartner Magic Quadrant https://securingtomorrow.mcafee.com/business/mcafee-ips-gartner-magic-quadrant/ https://securingtomorrow.mcafee.com/business/mcafee-ips-gartner-magic-quadrant/#comments Tue, 20 Jan 2015 20:30:58 +0000 https://blogs.mcafee.com/?p=40752 For the eighth consecutive year, Gartner is telling your customers that McAfee is a leader in the Network Intrusion Prevention System (IPS) market. Do you know why? It’s a compelling story that centers on the McAfee Network Security Platform, an IPS solution that discovers and blocks sophisticated threats in the network. But first, the preface […]

The post McAfee IPS and the Gartner Magic Quadrant appeared first on McAfee Blogs.

]]>
For the eighth consecutive year, Gartner is telling your customers that McAfee is a leader in the Network Intrusion Prevention System (IPS) market. Do you know why?

It’s a compelling story that centers on the McAfee Network Security Platform, an IPS solution that discovers and blocks sophisticated threats in the network. But first, the preface to the story: Security Connected, otherwise known as the best way to secure our customers’ businesses.

Security Connected is a unified, adaptive framework for encouraging McAfee and third-party products and services to learn from each other, share threat intelligence and context in real time, and act as a team to keep data and networks safe.

Integral to this connected approach is our Network Security Platform. It provides industry-leading coverage against advanced threats, malware callbacks, zero-day threats, and denial-of-service attacks. Built from the ground up for integration with McAfee’s Security Connected Ecosystem, McAfee’s Network Security Platform leverages security data from across the organization and help plug the security gaps often missed by other pieced-together security solutions.

To learn more, check out the new McAfee Network Security Platform video and webinar that highlight just what you can accomplish in 60 seconds with IPS. Then, utilize the ready-to-execute campaign kit materials to grow your business and revenue for network IPS solutions. Be sure to read Magic Quadrant for Intrusion Prevention Systems report. Then, share the news with your customers. They’ll take your word for it… and Gartner’s.

With the McAfee Network Security Platform, your customers get the latest cutting edge protection against advanced threats. Now is the time to help your customers renew or upgrade their appliances and we’ve got a few new promotions to help you do this. Use the Network Security Platform Promotions to help your customers gain the savings to move to the latest Advanced Threat appliances. It’s that easy.

McAfee’s ability to paint a vision and then execute in the IPS security space continues to be validated and recognized—our leadership is unparalleled in the market and our placement as a clear leader in the quadrant proves that we listen to our customers and work tirelessly to solve their toughest security problems.

 

The post McAfee IPS and the Gartner Magic Quadrant appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/mcafee-ips-gartner-magic-quadrant/feed/ 8
New Year, New Partner Learning Center https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/new-year-new-partner-learning-center/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/new-year-new-partner-learning-center/#comments Mon, 19 Jan 2015 22:17:13 +0000 https://blogs.mcafee.com/?p=40724 This blog post was written by Allison Clarke. In 2015 we are “Thinking Big” and nothing demonstrates this more than the new Partner Learning Center (PLC). We listened to your feedback and made changes to improve your training experience, including streamlined navigation and the ability to track your training progress in real-time. These changes were […]

The post New Year, New Partner Learning Center appeared first on McAfee Blogs.

]]>
This blog post was written by Allison Clarke.

In 2015 we are “Thinking Big” and nothing demonstrates this more than the new Partner Learning Center (PLC).

We listened to your feedback and made changes to improve your training experience, including streamlined navigation and the ability to track your training progress in real-time. These changes were designed to help you quickly find the training you need so you can spend more time helping your customers secure their businesses.

To help you get up-to-speed with the new and improved PLC, we have created some resources for you.

As always, we strive to build the best training platform for you so please continue to provide us with your feedback on your experience with the PLC. Please click here to take a brief survey of your experience.

The post New Year, New Partner Learning Center appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/new-year-new-partner-learning-center/feed/ 2
Introducing the McAfee Partner Program https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/introducing-mcafee-security-partner-program/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/introducing-mcafee-security-partner-program/#respond Thu, 08 Jan 2015 21:47:53 +0000 http://blogs.mcafee.com/?p=40580 What better way to kickoff the start of 2015 than with our new McAfee Partner Program. This new program was created to provide you with the flexibility to align with customer requirements, buying preferences, routes to market and business models, enabling you to grow your business with us. On January 1, 2015, the following changes […]

The post Introducing the McAfee Partner Program appeared first on McAfee Blogs.

]]>
What better way to kickoff the start of 2015 than with our new McAfee Partner Program. This new program was created to provide you with the flexibility to align with customer requirements, buying preferences, routes to market and business models, enabling you to grow your business with us.

On January 1, 2015, the following changes took effect:

  1. New Program Name The newly named McAfee Partner Program brings together the experience and expertise of McAfee with the innovation and proven performance of McAfee.
  2. Consolidation of Solution Competencies We have reduced the number of solution competencies from five to three, with the new solution competencies focused on Endpoint Security, Network Security and Security Management.
  3. New Specializations The Managed Service Provider (MSP) and Authorized Support Provider programs will become specializations with a streamlined set of requirements, tools and benefits.
  4. Simplified Enablement and Training We have transitioned to a points-based Continuing Education (CE) model, removing the requirement to complete annual baseline certification. New enablement resources, including the Expert Center and Post-Sales Services Enablement are also available.
  5. Enhanced Partner Experience We’re launching new platforms to improve your experience.
  • Partner 360 Dashboard provides a single source of truth allowing you to make better long-term business decisions.
  • SMARTmarketing Platform provides you with turn-key marketing programs to drive awareness, generate demand, track ROI, and drive sales in 2015.
  • Partner Learning Center has a streamlined interface and navigation to help you take your sales and technical training to the next level.

With all these exciting changes, I encourage you to learn more about the new partner program by visiting www.mcafee.com/partners/ and reviewing our new McAfee Partner Program infographic.

The post Introducing the McAfee Partner Program appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/introducing-mcafee-security-partner-program/feed/ 0
Register, Track, Certify: Don’t Lose Your ACE Status in 2015 https://securingtomorrow.mcafee.com/business/register-track-certify-dont-lose-ace-status-2015/ https://securingtomorrow.mcafee.com/business/register-track-certify-dont-lose-ace-status-2015/#respond Tue, 16 Sep 2014 20:33:15 +0000 http://blogs.mcafee.com/?p=38046 This blog post was written by Allison Clarke. As an Accredited Channel Engineer (ACE) you are probably aware of all of the great rewards you get from your ACE status; which is why it is important to remember to keep up to date through re-certification. If you obtained your ACE status prior to January 1, […]

The post Register, Track, Certify: Don’t Lose Your ACE Status in 2015 appeared first on McAfee Blogs.

]]>
This blog post was written by Allison Clarke.

As an Accredited Channel Engineer (ACE) you are probably aware of all of the great rewards you get from your ACE status; which is why it is important to remember to keep up to date through re-certification. If you obtained your ACE status prior to January 1, 2014 your ACE certification will expire by the end of 2014 if you don’t take action.

Recertifying is simple. Using our Activity Registration tool makes it easy to ensure you are meeting compliance to maintain your ACE status into 2015. Just log your Proof of Concept or demonstration into the system and you’ll be on your way to re-certification.

As an ACE you have the opportunity to take advantage of the following benefits:

  • $50 in McAfee Rewards per Demo
  • $100 in McAfee Rewards per PoC
  • Invite to ACE only special events and opportunities
  • Direct Access to McAfee CTEEs
  • Click here to see the terms and conditions

The post Register, Track, Certify: Don’t Lose Your ACE Status in 2015 appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/register-track-certify-dont-lose-ace-status-2015/feed/ 0
Price Book Changes for 2014 https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/price-book-changes-for-2014/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/price-book-changes-for-2014/#respond Fri, 17 Jan 2014 19:29:46 +0000 http://blogs.mcafee.com/?p=32639 Our Price Books have been complicated and difficult to use. So as part of our continuing effort to be easier to do business with we’re changing them in 2014. We know your time is valuable and key to your company’s success. You need to be able to quickly and easily find the products and services […]

The post Price Book Changes for 2014 appeared first on McAfee Blogs.

]]>
Our Price Books have been complicated and difficult to use. So as part of our continuing effort to be easier to do business with we’re changing them in 2014.

We know your time is valuable and key to your company’s success. You need to be able to quickly and easily find the products and services that matter to your customers, so we’re taking steps to systematically reduce the number of SKUs in our Price Book. These changes will be implemented in phases with phase one beginning in Q1 2014.

In phase one, we have removed close to 100 SKUs from the Price Book. Most of the SKUs being cut are non-active SKUs.

To ensure a seamless change we are introducing a legacy solution section to the Price Book , and any existing quotes will be valid for 30 days per our standard policy. Please note after February 13, 2014, we’ll no longer honor any quotes containing deleted SKUs.

We’re not making changes to our business, nor are we discontinuing any product lines. This change is focused on optimizing our Price Books to make it easier for you to sell McAfee, which is consistent with our channel strategy to invest in, grow with and optimize for you, our channel partners.

What do you need to do? It’s simple: Just review our FAQ document (Partner Portal Login Required) on the Price Book web page and contact your McAfee Channel Account Manager with any questions or concerns.

The post Price Book Changes for 2014 appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/price-book-changes-for-2014/feed/ 0
McAfee vs. Symantec: Who came out on Top? https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-vs-symantec-who-came-out-on-top/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-vs-symantec-who-came-out-on-top/#respond Thu, 16 May 2013 16:33:10 +0000 http://blogs.mcafee.com/?p=24813 This blog post was written by Gavin Struthers. Everyone loves a good game and the thrill of competing to win. Competition helps inspire two teams to push further and the fans to cheer harder. In business, as in the case of McAfee and Symantec, our rivalry means we create better products, push to stay on […]

The post McAfee vs. Symantec: Who came out on Top? appeared first on McAfee Blogs.

]]>
This blog post was written by Gavin Struthers.

Everyone loves a good game and the thrill of competing to win.

Competition helps inspire two teams to push further and the fans to cheer harder.

In business, as in the case of McAfee and Symantec, our rivalry means we create better products, push to stay on top, and help our partners do the same.

Head-to-Head in CRN

As you may have seen, CRN’s Head-to-Head slideshow featured McAfee and Symantec competing in the security arena around spyware protection, intrusion prevention, and overall channel profitability.

As with any good rivalry, the game is always exciting. While CRN’s consensus is that Symantec does have a strong portfolio, McAfee came out on top for Security Management Console (ePolicy Orchestrator), cutting-edge hardware-based security, and overall partner profitability.

“Show me the money” –  Keeping Partners Profitable

While industry accolades validate the work we do at McAfee–and we’re always flattered to receive them—one of the biggest success metrics for me is to see partners’ profitability increase. So we were especially thrilled to hear that partners told CRN that our channel program is more profitable and that our efforts to increase support for your businesses haven’t gone unnoticed.

And customers appreciate the results, too. For customers, we’re setting a new industry standard for time to respond. We know it can be difficult to share intelligence across different solutions and that’s an issue for customers who are dealing with threats and want to respond quickly.

Transforming Security, Together

As I wrote back in February in my post Transforming the Security Industry…Together, you can’t adequately protect customers from the volume and sophistication of today’s cyber attacks without an integrated security platform that proactively and intelligently protects. That’s why using an end-to-end McAfee solution is so key to network security for customers.

We’ve got the tools to respond to threats in real time with Real Time ePolicy Orchestrator (ePO) that queries information from all of your customer’s endpoints in seconds, leading to more intelligent analysis and quick decision making on the part of IT.

With new devices and new threats hitting networks every day, it’s our goal to work together to ensure customers’ networks stay secure through innovative products and help you stay profitable through innovative channel programs.

The post McAfee vs. Symantec: Who came out on Top? appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-vs-symantec-who-came-out-on-top/feed/ 0
Top 5 Reasons To Participate in the McAfee Virtual Sales Kickoff https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/top-5-reasons-to-participate-in-the-mcafee-virtual-sales-kickoff/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/top-5-reasons-to-participate-in-the-mcafee-virtual-sales-kickoff/#respond Tue, 19 Feb 2013 00:17:19 +0000 http://blogs.mcafee.com/?p=22195 In 2013 we remain committed to investing in, growing with and optimizing for you, our channel partners. A prime example of this commitment is our Virtual Sales Kickoff (VSKO), where we take the same content created of our Sales Kickoff and make it available to you. This year’s VSKO features a slew of new content […]

The post Top 5 Reasons To Participate in the McAfee Virtual Sales Kickoff appeared first on McAfee Blogs.

]]>
In 2013 we remain committed to investing in, growing with and optimizing for you, our channel partners. A prime example of this commitment is our Virtual Sales Kickoff (VSKO), where we take the same content created of our Sales Kickoff and make it available to you. This year’s VSKO features a slew of new content from the latest security trends and customer pain points to how to uncover new business opportunities and how to sell against the competition.

Top 5:
1. Learn insights and predictions on security marketplace trends
2. Hear McAfee business leaders outline plans and priorities
3. Learn how to align with McAfee’s marketing focus areas for 2013
4. Earn four CE credits required in 2013 for completing both VSKO and FCPA
5. Be entered to win a new Dell Convertible Ultrabook

To get started Click Here.

And, after participating in the VSKO, come back to this blog entry and let me know what you thought, but more importantly let me know how we can improve it for next year.

The post Top 5 Reasons To Participate in the McAfee Virtual Sales Kickoff appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/top-5-reasons-to-participate-in-the-mcafee-virtual-sales-kickoff/feed/ 0
Tool Talk: Cracking the Code on XtremeRAT https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/tool-talk-unleashing-validedge-on-xtremerat/ https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/tool-talk-unleashing-validedge-on-xtremerat/#respond Wed, 31 Oct 2012 21:06:20 +0000 http://blogs.mcafee.com/?p=19826 Late last week, reports began to surface that the Israeli police (along with other regional law enforcement) were targeted by a malware attack.  The entry vector was described as a phishing campaign sent from Benny Gantz (head of the Israeli Defense Forces).  Initially, details and indicators around the malware were beyond sparse. Aside from the FROM: address, […]

The post Tool Talk: Cracking the Code on XtremeRAT appeared first on McAfee Blogs.

]]>
Late last week, reports began to surface that the Israeli police (along with other regional law enforcement) were targeted by a malware attack.  The entry vector was described as a phishing campaign sent from Benny Gantz (head of the Israeli Defense Forces).  Initially, details and indicators around the malware were beyond sparse. Aside from the FROM: address, little was known that could assist in any sort of investigation. After nearly 24 hours from the first reports, both details and samples of the malware started to flow. As soon as we could confirm details of the phish email and the malicious attachments, we were able to cross-reference sample data already in our malware database and connect the dots.

Generic Dropper.p (Xtrat)
Generic Dropper.p (XtremeRAT)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This is where, from the research side, things begin to get fun.

Automated malware analysis is nothing new to our industry. Most vendors (ourselves included) have tools to handle this internally, and assist our skilled human analysts with proper classification, documentation, and other recurring tasks that must occur with the daily barrage of new and unique malicious binaries. The bar for this threat, however, has been raised. With ValidEdge, we were able to generate enormous amounts of usable and actionable data from the execution of malware samples. We get feedback from basic static analysis, as well as from runtime data. We get all the usual system modification data, and full and complete network/communication data, and samples and memory dumps from second-level threats (dropped, created, downloaded entities). And it’s all done in a safe environment, with extremely robust reporting.

To fully illustrate, let’s focus on the Trojan that affected the Israeli police. In the McAfee universe, we detect this threat as Generic Dropper.p.

To start with, you simply submit your sample(s) to the ValidEdge appliance/host. The ways to do that vary depending on implementation. In my setup, it’s as simple as dropping the file, via FTP, on the appliance, then picking up the results set the same way (different directory on the FTP server). Easy and fast. I immediately had a set of results from my submission of the following sample:

Sample Data

 

 

 

 

The result sets are organized as a specific directory structure.

Analysis Report sample
Analysis report sample

This is where we typically end with most tools. The exception here, from my experience, is that there is much more data generated by the appliance to start taking action on.  The way in which the information is organized is also very friendly and workable. Some basic examples follow:

Sample Data
Sample Data

Sample Data 2
Sample Data 2

Sample Data 3
Sample Data 3

Sample Data 4
Sample Data 4

From here we can get enough static data to build a picture of the malware and its behavior. We also have network data and full memory dumps and screenshots at our disposal should we need to dig further.

MemDumps
Memory dumps
PCAPs
PCAPs

All the secondary/dropped files are presented as well. As such, these can be easily analyzed in context.

Dropped Files
Dropped files

Dropped files, specific to this threat, are detected via McAfee Global Threat Intelligence along with the current DATs.

Example:

Name: word.exe
MD5: 2BFE41D7FDB6F4C1E38DB4A5C3EB1211
Detection: Artemis!2BFE41D7FDB6

At this point you have plenty of information to understand what this threat is doing, how it communicates, and much more. Some would argue that deep malware analysis is an art form. But to embark on that sort of journey you need enough data to make constructive, creative, and accurate decisions. Tools like ValidEdge do exactly that.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The post Tool Talk: Cracking the Code on XtremeRAT appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/tool-talk-unleashing-validedge-on-xtremerat/feed/ 0
Security Connected by the McAfee Channel (by Alex Thurber) https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/security-connected-by-the-mcafee-channel/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/security-connected-by-the-mcafee-channel/#respond Tue, 19 Oct 2010 19:09:36 +0000 http://blogs.mcafee.com/?p=5910 As part of the Mcafee Security Connected initiative launched at FOCUS10, we announced McAfee Security Management 5, which provides a unified monitoring, management, and reporting system that scales to any-sized organization and ensures all endpoints, networks and content are secure.

The post Security Connected by the McAfee Channel (by Alex Thurber) appeared first on McAfee Blogs.

]]>
As part of the Mcafee Security Connected initiative launched at FOCUS10, we announced McAfee Security Management 5, which provides a unified monitoring, management, and reporting system that scales to any-sized organization and ensures all endpoints, networks and content are secure.

Businesses’ security purchases today are mostly tactical, typically resulting in a multi-vendor approach that is unpractical for many reasons. Threats are accelerating at a rate that far surpasses the existing approach to managing multiple products and layers of security independently. In order to effectively stay ahead of these security threats, transparency to all risks associated with mobile devices via centralized view.

McAfee ePO has been a favorite among McAfee partners because if it’s ease of management, integration, and level of intelligence. I’d like to share the new features and benefits that you will be able to share with your customers.

  • Application Enablement:  New interfaces and Software Development Kits (SDK’s) provide an open platform for companies, developers, and partners to integrate centralized security management into existing business processes.  McAfee® ePolicy Orchestrator® (“McAfee ePO”) platform now offers a Web API that enables customers and partners to integrate security operations into change and systems management frameworks.  A new version of McAfee® Risk Advisor includes a SDK that enables rapid integration of new security countermeasures – broadening the risk profile view and reducing operational costs.  In support of this new SDK, McAfee is also announcing McAfee Application Control as a newly recognized countermeasure within McAfee Risk Advisor.  

 

  • Shared Intelligence: Provides coordinated defenses across security layers so that endpoints, networks, email, web, and data layers work together to minimize or eliminate security attacks.  McAfee has integrated its Global Threat Intelligence across its broad portfolio of products, delivering a shared threat intelligence model. McAfee has developed game-changing enhancements – such as the evolution of its reputation services and use of the cloud to hunt for threats proactively. McAfee has also ported its threat intelligence to the iPhone and iPad enabling IT security professionals to have real-time access to threat information wherever and whenever they need it.

 

  • Unified Management: McAfee Security Management can administer the security of any device, data, network, application, or database across security implementations that range from hosted/SaaS to on-premises as well as a hybrid and virtual and physical environments.  Due to the dynamic nature of virtual environment, the McAfee MOVE platform also includes the automated ability for security management policies to follow the virtual host they are associated with regardless of where it is located and how often it is moved. 

 

  • Situational Awareness: Allows businesses to monitor, manage and report on metrics to reduce risk, focus security efforts and investments, and reduce costs.   On the SaaS Platform, McAfee provides automatic asset discovery and synchronization through integration with Microsoft Active Directory that eliminates manual asset entry and out-of-sync security policies. McAfee ePO platform also adds the ability to create Situational Policy Assignments – logical groupings of policies that security administrators can apply to assets based on business or security posture need. 

 

For more information about the McAfee Security Management platform visit www.mcafee.com/securitymanagement

The post Security Connected by the McAfee Channel (by Alex Thurber) appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/security-connected-by-the-mcafee-channel/feed/ 0