• No results found

How To Protect Your Data From Attack

N/A
N/A
Protected

Academic year: 2021

Share "How To Protect Your Data From Attack"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

Situation

under

Control

Security Connected for

the Public Sector

(2)

Increase Availability.

Strengthen Resiliency.

Government entities face pressure to

reduce costs and increase transparency

while protecting data and networks. As

threats become more sophisticated and

compliance requirements evolve, a holistic

approach to security is needed. From

protecting the perimeter, cloud services,

and host security to mobile devices and

virtualization, the dynamics of service

delivery and IT challenges seem daunting.

A proactive control framework with

continuous monitoring, cyber readiness,

and intelligence and response is the key to

success. This framework must be built atop

specific controls: situational awareness,

real-time risk assessment, and resilient protection

for operationally efficient and effective.

McAfee partners with organizations dedicated to protecting national security, critical data, and mission-critical infrastructures. Through our optimized, connected security architecture and global threat intelligence, we deliver security that addresses the needs of the military, civilian government organizations, critical sectors, and systems integrators.

Because of our proven track record, strong, relationships, and qualification as a classified and non-classified vendor, federal decision-makers look to McAfee as their security partner of choice across unrestricted, restricted, and tactical zones. McAfee has the focus, skills, and resources to reliably deliver security optimization technologies. Our solutions pass rigorous security certifications, and our team enables fast, comprehensive deployments across the largest, most complex government networks. Our advanced solutions and technologies include: • Federal

• System integrators, telecommunications companies, and managed services providers • State and local government

(3)

Protect Networked and Critical Infrastructures

Industrial, defense, and military services are targets of the stealthiest cyberattacks. Today’s best practices wrap protection around each asset— data centers, databases, laptops, websites, and classified networks—and connect these controls for situational awareness. McAfee solutions for the public sector can secure every layer of your government network, saving you time, effort, and expense. From regulations and device control to cloud computing and virtualization, McAfee simplifies the security process, ensuring the availability of all assets, and securing sensitive data. A common management platform connects all your protection for effective risk mitigation. Match protection to your data

McAfee data protection solutions guard against the unauthorized transfer of sensitive data. McAfee prevents data exfiltration from applications like instant messaging and Screenscrape, from the network, and from physical devices, like removable storage. Our data protection solutions secure data at rest and in transit—with strong encryption, authentication, and policy-driven security controls.

Anchor control in your network

We connect data controls with proactive, layered protection for your entire network—intrusion prevention systems at trust zones; access controls; application-aware firewalls to restrict activities based on identity; and gateways that filter for sensitive data in encrypted content. McAfee network security solutions are engineered to NIST guidelines. For example, all of our McAfee security and information event management (SIEM) appliances are fully hardened, tested to earn Common Criteria certification to the third Evaluation Assurance Level (EAL3), and validated to FIPS 140-2, Level 2.

Secure every endpoint

On each endpoint, protection can begin beyond the operating system with protection from rootkits. We protect the entire stack to keep systems operational and your data safe— everywhere. Specialized protections monitor and restrict changes in configurations, applications, and files. We have optimized security within virtualized infrastructure, fixed-function devices, and cloud services.

Move ahead with mobility

Enterprise mobility management, network access control, data loss prevention, and encryption solutions enable secure access for personally owned devices. These centrally managed solutions let you exert consistent control over mobile, physical, and virtualized systems.

Get help from a specialist

We support proprietary protocols, small form factor, fixed-function devices, and an overall architecture for resilience, while enabling continuous compliance with mandates such as ISA-99, CFATS, NERC CIP, NRC 10 CFR 73.54, and others.

From classified to unclassified data, military to civilian applications, and field-deployed to headquarters-based operations, McAfee provides an extensive, proven portfolio used in numerous deployments:

The standard for the US Department of Defense HBSS

The standard for host and network protection in many civilian agencies, military services, and the intelligence community

Specialized, ruggedized platforms for military applications

Numerous multinode solutions to protect against severe network and host threats

Large endpoint and firewall deployments

The Security Connected framework enables strategic initiatives and effective policies that help government organizations achieve optimized security each day, reducing risk, driving compliance, and realizing operational efficiencies.

(4)

Size Up the Situation

Government infrastructures, including energy providers and other critical infrastructure sectors are targets for cyberattacks. Real-time risk assessment, analysis, and decision-making are especially important for public sector environments, guiding real-time threat mitigation as well as investments in policies, processes, and protection. With McAfee situational awareness solutions, you ensure the resiliency and availability of government assets while mitigating threats. McAfee security information and event management solutions collect and correlate events, creating a Big Data treasure trove without Big Data resource and performance issues.

Monitor and manage events

McAfee Enterprise Security Manager, our security and information event management product, offers an unprecedented ability to centrally monitor, analyze, and report on security events across both general IT and limited-connectivity network zones. This allows for the detection of advanced stealth attacks.

Rely on our intelligence

Through integration of McAfee Global Threat Intelligence (McAfee GTI™), we connect a real-time understanding of the outside world —threat, reputation, and vulnerability data—

with a real-time understanding of the systems, information, and activities inside each organization.

McAfee Security Management products capture, normalize, and correlate event, vulnerability, compliance, and risk data. We synthesize data from diverse sources, including McAfee Security Innovation Alliance partners, into a unified dashboard. Diagnostic services work constantly to assess environment changes and launch automated responses or generate alerts based on risk and event thresholds, asset values, and organizational priorities. You can act instantly to adjust policies and countermeasures to protect your most valuable assets.

End isolation

The Security Connected framework tears down silo walls by centrally managing network, endpoint, and content solutions for situational awareness across all security and compliance processes. When the silo walls disappear, organizations can collaborate efficiently and get full value from the entire range of information throughout the network.

McAfee® Global Threat Intelligence delivers the industry’s most

comprehensive, real-time threat protection, providing McAfee products with deep visibility into current and emerging online dangers to activate deployment of countermeasures ahead of threats. It leverages millions of sensors and more than 350 researchers across more than 30 countries to predict, discover, research, and remediate threats across network, endpoint, and information solutions.

(5)

Results of a February 2012 Evalueserve survey sponsored by McAfee reveal the state of public sector security:

• Because of highly mature

security and compliance practices that resulted in a strong security posture, just under one-fifth of government executives surveyed said their organizations are optimized, spending just 4 percent of their IT budget on security

• About half of the survey

respondents said they spend about twice that much—8 percent—on security, but achieve a weaker security posture through less well-integrated, automated, or proactive processes

• At the bottom of the

maturity curve, one-fourth of government respondents described themselves as reactive, spending less than 3 percent of their IT budgets on security, most of that on firefighting rather than in improving security

Optimize Security for Each Initiative

Proactive and optimized security helps to reduce risk and minimize cost. McAfee works with government agencies to launch the latest strategic government initiatives—from network and endpoints to data and the cloud. The Security Connected Reference Architecture program provides solution guides and technology blueprints that explain the issues and help you deploy McAfee solutions.

Reduce spend

Pre-integrated McAfee security suites and security Software-as-a-Service (SaaS) offerings cost effectively meet the needs of both host and data protection requirements. Government administrators get comprehensive visibility across events and countermeasures provided by McAfee security protection. Integration and automation simplify operations, reduce costs, lower administrative overhead, and provide faster time to value, when adding, for example, security functions to the HBSS framework.

Integrate for efficiency

Integration starts with the management layer, a command and control core that provides a single lens to manage and report on your security. McAfee® ePolicy Orchestrator® (McAfee ePO) software, McAfee Risk Advisor, and McAfee Enterprise Security Manager work in concert to extend visibility and control across the entire security, risk, and compliance management environment. Integration with McAfee network,

endpoint, and information solutions, as well as the McAfee Security Innovation Alliance Partner Program, delivers unique data to support correlation, analysis, and reporting.

Adopt the cloud

Today, McAfee cloud computing solutions protect 40,000 customers and more than four million end users. Our services include security evaluations of plans and prospective providers, Security-as-a-Service, solutions tailored to cloud services and virtualized environments, and strategic partnerships with some of the world’s largest cloud service providers. Our data center solutions help you leverage private and hybrid approaches to transition to the cloud at your pace. Streamline compliance

Our risk and compliance products help you assess and prove compliance, speeding the process with predefined templates for FDCC and other open content protocols, including SCAP, XCCDF, and OVAL. McAfee security and information event management (SIEM) solutions connect these and other controls to simplify compliance management with hundreds of pre-built dashboards, complete audit trails, and consolidated reports. For instance, our support for the Unified Compliance Framework enables reporting of policies against more than 240 global regulations and control frameworks, including 50 related to US Federal Security and Privacy Guidance.

(6)
(7)

Improve Transparency without Jeopardizing Security

Access to information must be balanced with education, protection, and data confidentiality and integrity controls. The priority is to enable productive information sharing without taking on inappropriate risk from Internet-borne threats and politically motivated attackers. The flexible McAfee solution portfolio protects even the most demanding classified government networks to enable government-sponsored protection programs for citizens and constituents. Elevate protection

We can instantly detect and block interactions with compromised websites and risky content, as well as attacks that attempt to enter the network through any combination of browsers, web protocols, and email. These systems can thwart incoming threats like viruses, spyware, Trojans, and denial-of-service attacks, encryption, and browser vulnerabilities.

Promote safe web use

As employees use the web, fine-grained policies can control web and application use, even Facebook and content within websites, to reduce risk of infection and lost productivity. Innovative solutions such as website safety ratings and policy-based data loss prevention not only protect networked assets but also actively inform users of errors and newly risky sites. They fulfill the dual role of increasing employee awareness and shielding networks and data.

Eliminate weaknesses

McAfee vulnerability management solutions help government agencies identify and assess any system weaknesses that web-borne malware and attackers might exploit. When you know which systems are at risk, you can apply necessary remediation in a timely manner.

Take Charge

The Security Connected framework from McAfee offers real-world integration of multiple products, services, and partnerships. It enables centralized, efficient, and effective risk mitigation that aligns with public sector initiatives and specialized requirements. McAfee helps you optimize security practices and cut operational costs through enhanced situational awareness, multilayered threat protection, automated compliance, real-time threat intelligence, and centralized security management.

Use the Security Connected framework to optimize security:

Connect your data streams into a correlated, contextual dashboard that enables visibility and risk-based incident response

Use real-time diagnostics to assess the changing environment and launch automated responses or generate alerts based on risk and event thresholds, asset values, and organizational priorities

Embrace virtualization, mobile devices, and other innovations, ensuring the right controls and visibility are in place for confidentiality and compliance

Create a command and control layer for managing policies, deployment, and reporting more simply and efficiently

McAfee can help you extract more value from security investments while enabling the improved risk postures and cost-effective security that are central to an optimized Security Connected approach.

McAfee Professional Services With access to comprehensive global threat intelligence, the highly experienced McAfee Professional Services team tests McAfee government deployments against today’s most current threat scenarios. Our experts provide an objective perspective, as well as specialized tools and training to help address specific government security and compliance needs:

• Insights into new code releases • Direct access to tier three

McAfee Technical Support and research and development to address challenges unique to a specialized environment and to ensure a smooth deployment

• Processes and methodologies

to remove existing solutions and install new solutions

Sound guidance for providing

the most efficient and effective configurations

• Legacy knowledge of all

(8)

Security Connected Resources

The Security Connected framework from McAfee enables integration of multiple products, services, and partnerships for centralized, efficient, and effective risk mitigation. Built on more than two decades of proven security practices, the Security Connected approach helps organizations of all sizes and segments—across all geographies—improve security postures, optimize security for greater cost effectiveness, and align security strategically with business initiatives. The Security Connected Reference Architecture provides a concrete path from ideas to implementation. Use it to adapt the Security Connected concepts to your unique risks, infrastructure, and business objectives. McAfee is relentlessly focused on finding new ways to keep our customers safe.

Download the latest resources at mcafee.com/securityconnected.

About McAfee

McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), is the world’s largest dedicated security technology company. McAfee delivers proactive and proven solutions and services that help secure systems, networks, and mobile devices around the world, allowing users to connect safely to the Internet, browse, and shop the web more securely. Backed by its unrivaled global threat intelligence, McAfee creates innovative products that empower home users, businesses, the public sector, and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. McAfee is relentlessly focused on constantly finding new ways to keep our customers safe. McAfee

12010 Sunset Hills Road 5th Floor

Reston, VA 20190 1 888 847 8766

State and Local Government:

Government@mcafee.com

Federal Government:

Intelgov@mcafee.com DoDgov@mcafee.com Civiliangov@mcafee.com

References

Related documents

The authors designed the improved carrying structure of a flat wagon to ensure the required stability of a container within combined trains transported by train ferries.. The

Over 150 tricks, most of them working examples of classic magic props in miniature size, including small Square Circles, Dove Pans, Genii Tubes, Sid Lorraine’s Shoo Shoo

The Security Connected approach to security management streamlines security operations by combining real- time McAfee Global Threat Intelligence (McAfee GTI) feeds with rich

The Security Connected approach to security management streamlines security operations by combining real- time McAfee Global Threat Intelligence (McAfee GTI) feeds with rich

Conventionally, a literature review follows the introduction and precedes the research methodology (Hofstee, 2009); however, as the literature review is part of the research

Figure 2: Juniper Unified Access Control (UAC) and Guest User Access Infranet Controller EX-serie s 2 1 Apps Internet Firewall Guest Guest allowed bandwidth- limited,

Ovo peto izdanje izlazi kao popravljeno. U njemu su otklonjene sve zapa- žene grafičke pogreške, a pojedine definicije i pojmovi temeljitije su pojašnjeni. Neke

report on the submissions to the draft Regional Freight Plan and make recommendations to the Committee in accordance with the Terms of Reference in Attachment 2. Appoints …, …, …