Date post: | 06-Aug-2015 |
Category: |
Documents |
Upload: | ingram-micro-cloud |
View: | 98 times |
Download: | 1 times |
Top of Content Box Line
Subtitle Line
Title Line
McAfee Email Protection for Microsoft Office 365 Cloud University
Thomas Bryant | Technical Director - OCTO
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Agenda
• Executive Summary
• Customer Challenge
• Why McAfee
• Objections & Countering Competition
• Driving Sales
• Enablement & Getting Started
2
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
SECURITY: THE THIRD PILLAR OF COMPUTING
POWER EFFICIENT
PERFORMANCE
INTERNET
CONNECTIVITY
SECURITY
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Web Protection
Social Media
Protection
Protection
Achieve Cyber
Readiness
Intelligence-Driven
Response
Protect Critical
Infrastructures
Counter
Stealth
Attacks
Exploding Data Continuous
Monitoring
Compliance
Reporting
Protect
Devices
Reporting
Real Time
Visibility
Targeted
Attacks
Identity
Protect IP
Identity
Protection
Enable the
Workforce
BYOD/
Mobile
App Protection
OS Protection
(Legacy, Win7/8,
Android, Mac)
Cloud
Virtualization
Servers/
Networks
Database
Security
Encryption
Identity and Access Control
Data Protection
Data Loss Prevention
Next Gen IPS
Next Gen Firewall
COMPREHENSIVE
MALWARE PROTECTION
NEXT GENERATION
ENDPOINT
SITUATIONAL AWARENESS
WEB AND
IDENTITY
DATA CENTER
TRANSFORMATION
NEXT
GENERATION
NETWORK
Intel Security – Big Picture of Security
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
McAfee Global Threat Intelligence Successful Threat Intelligence is Defined by Six Principles
June 17, 2015 5
Delivered via a complete suite of
security products
Uses a combination of
protection techniques,
where reputation is a must
Global research team
dedicated solely to GTI
Real-time, “in the cloud” threat collection
and intelligence distribution model
Spans the Internet
including millions of sensors
Across all key threat
vectors file | web | email | network
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Why McAfee is Best Positioned to Deliver GTI The Most Robust Telemetry Data in the Market
June 17, 2015 6
• 2.5B Malware Reputation Queries/Month
• 20B Email Reputation Queries/Month
• 75B Web Reputation Queries/Month
• 2B IP Reputation Queries/Month
• 300M IPS Attacks/Month
• 100M Ntwk Conn Rep Queries/Month
• 100+ BILLION QUERIES
Queries
Nodes
• Malware: 40M Endpoints
• Email: 30M Nodes
• Web: 45M Endpoint and Gateway Users
• Intrusions: 4M Nodes
• 100+ MILLION NODES, 120 COUNTRIES
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Executive Summary
Migrating email
infrastructure to
Microsoft Office
365 due to better
TCO than hosting
email in-house.
Rapid movement
to O365. 77% of
Fortune 500 have
purchased. Triple-
digit growth in last
21 months.
Email Threats do
not go away with
the cloud. O365
faces same
threats as on
premise
solutions.
Stronger security
is required as
advanced
phishing threats
become more
complex.
Layer in McAfee
Email Protection
to protect against
phishing,
continued service
and reliable
security.
Dedicated security
focus. Integration
with O365 helps
customers realize
its benefits without
compromise on
security.
The
Market
The
Customer
The
Result
The
Issue
The
Solution
The
Provider
7
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Office 365 is the #1 deployed Cloud Application!
“77% of Fortune 500
companies have
purchased it in the
last 12 months”
“Office 365 posted
triple-digit growth for
21 consecutive
months”
“nearly 50 million
Office 365 monthly
active users”
Source: Okta, Microsoft
Office 365 is the
catalyst for cloud
consumption and
embracement
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Email is Driving the Evolution
9
Email is the Primary Capability Being Used or Planned with Office 365
0% 20% 40% 60% 80%
File Sharing
Document Management
Instant Messaging
Team Sites
Online Meetings
… Percentage of Respondents
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Customer Challenges
10
95% of all attacks on enterprise
networks result from spear phishing.
1 in 5 users will click on a link
within a phishing email. of HR & Finance
clicked on at least
1 phishing email.
88%
1 in 3 organizations
will have a hybrid
deployment.
of all organizations identify service
availability as one of the top 3
technical concerns. 13%
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
11
McAfee 2014 Phishing Quiz
75,000 business users 100,000+ business users
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Why your customers need stronger email security
Solution Overview
12
AV-TEST.org – Feb 2015 Product Review Report
Microsoft System Center Endpoint Protection Microsoft Intel
Security
Industry
Average
Protection against 0-day malware attacks, inclusive of
web and email-threats (Real-World Testing) - 208
samples used
76% 98% 95%
Detection of widespread and prevalent malware
discovered in the last 4 weeks (the AV-TEST reference
set) 12,207 samples used
76% 100% 97%
Protection Score 0.0/6.0 5.0/6.0
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Email - 0.32%
File, 4%
Web, 12%
IP/Connection, 84%
If GTI were limited to what Email Vendors see
…Email and file data is all
we would see.
That’s not enough to provide
comprehensive protection.
Email Gateway
Web Gateway Advanced Malware
Network IPS Endpoint AV 3rd Party Feeds Firewall
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Different technology, different outcomes
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
ClickProtect for Embedded URL Protection
15
Customizable Templates Reinforces Awareness
Enterprise Web Security
http://www.funshion.com
McAfee GTI® Web Reputation:
Unverified
McAfee GTI® Web Category:
Entertainment, Streaming Media
Unmasks URL
Safe Preview
Is that your destination site?
95%
74%
58%
25%
Zero Day Protection Rate (GAM)
Source: AVTest.org
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Solution Overview
16
How it works
Recipient
O365 Exchange Online McAfee Email Protection
Sender’s Email Server
Sender
Not shown: Email Continuity enables customers to log into emails via web interface in the event of an outage Change in MXRecords routes mail accordingly to and from McAfee Email Protection
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Email Continuity Ensures Hosted Mailbox Uptime
• 60 days of rolling storage
• Web-based access to email during outage
• Post-outage email activity release and synchronization
17
Automatic service engagement when outage is detected
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Solution Overview
Targeted Attack Protection
• Phishing and malware protection
• Detects real-time URL malware threats with ClickProtect
• Customizable warning pages
• Built-in DLP technology
Faster and Reliable Protection
• Breadth of cloud intelligence sources
• Threat response times
• Email continuity
• Spam/Graymail filtering
Flexibility
• Advanced security for Exchange Online, Hybrid & Onsite
• Deploy any way you want, when you want
• Hybrid deployment options with single mgmt & reporting console
The value proposition
18
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
19
I don’t need additional security Targeted phishing is the biggest problem. It is echoed by analysts & customers alike. See a 10 minute demo to learn about latest phishing tactics on how advanced protection can help. Take the free Phishing quiz and help educate your employees.
I’m trying to reduce my TCO, not increase it Office 365 is a fantastic productivity solution; but MSFT is not known as a top security vendor. The cost to strengthen security is insignificant compared to the potential exposure and cost.
Service unavailability was cited as one of the 3 technical concerns by users of Office 365. Email Continuity, a feature of Email Protection, takes this concern away and further, enables your users to access email through a web-based interface, while Office 365 service is being restored.
Nobody will be looking to target my organization. Effort to reward is quite attractive, and you should also consider partners you work with. Consider CryptoLocker, or the Target Breach, which was initiated from 3rd party vendor much smaller than size of Target Stores.
Top Customer Objections
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
20
Working Together
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Delivery Flexibility
June 17, 2015 21
Marketplace • Fully Integrated into Ingram’s Marketplace
• Monthly for SaaS Email, Email Encryption,
Archiving, Web and Endpoint Security
Reseller Model • Monthly and Annual SKUs for SaaS Email, Email
Encryption, Archiving, Web, and Endpoint Security
• You Bill We Support
MSP model • Monthly SKUs for SaaS Email, Email Encryption,
Archiving, Web, and Endpoint Security
• You Bill, You Support
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Email Protection for Office 365 Enablement Tools www.mcafee.com/O365
Grab & Go Campaign Kit Webinar Replay
Phishing Quiz Customer Facing Landing Page
http://bit.ly/O365Replay
• Conversation Guide
• Email Content
• Phishing Quiz
• ClickProtect Video
• Osterman White Paper
• Customer Presentation
Help customers discover
how skilled they are at
detecting malicious
phishing attempts amid
common work-related
emails
Send customers here for
even more assets and
information around
strengthening their
security with Intel Security
Title Line
Subtitle Line
Top of Content Box Line
Top of Footer Line
Left Margin Line Right Margin Line
Top of Footer Line
Top of Content Box Line
Subtitle Line
Title Line
Right Margin Line Left Margin Line
McAfee Confidential
Contact your Account Team today
• Intel Security/McAfee Specialist
• Lindsay Oprandi
• Call (800) 456-8000, Ext 66617
Ingram Services US Sales Team Contact:
• Call (800) 705-7057, option 2
Ingram Services Canada Sales Team Contact:
• Call (877) 755-5002, option 1