Integratorme may2014

Page 20

Cover Feature | Network Security

Vibin Shaju, CISSP Regional Manager, Presales, ME, McAfee

virtual desktops would argue that and servers to "Not so long ago, all you needed to protect were network security applications and is a must for any stationary systems in designated physical locations. databases. organisation. The But today, we need security that protects a virtual He adds, endpoint security “This integrated network of people, networks, services, and applications market is a framework delivers commoditized and that can be anywhere at any given moment." real-time visibility crowed market. into the security And given the information such as jailbreak or root status and risk management profile of your growth of mobile devices accessing the (critical to minimize the risk of malware business. At the same time, it automates corporate networks, end point security is infection), device ID, certificate status the security solutions through policy-based an absolute necessity. and OS version — checked before access deployment of countermeasures. We keep Therefore, Florian believes that it is is allowed. This feature seems simple the security always up to date owning more crucial these days to protect data at enough, but only SMAs, such as Dell SMAs the world’s most comprehensive threat rest and in-flight: this is where network appliances, include this protection. intelligence.” security solutions, such as Dell Secure An integrated security approach needs McAfee in addition has GTI, its threat Mobile Access (SMA) and Next Generation to be one that facilitates greater control intelligence platform that generates Firewalls, come into play. For example, at application level as well as helps reports with more than 100 million any mobile device (corporate or personal) enforce policies and monitoring across all sensors worldwide. With visibility across connecting to an organization’s network manifestations of the network, physical or all threat vectors — file, web, message, must have its security credentials — virtual quite effectively. and network — and a view into the latest Vibin says, “Business requirements vulnerabilities across the IT industry, have changed. Security needs to change McAfee correlates real-world data as well to address these new business collected from millions of sensors around dynamics. Not so long ago, all you needed the globe and delivers real-time, and often to protect were stationary systems in predictive and most importantly real-time designated physical locations. But today, protection via its security products. we need security that protects a virtual McAfee Security Connected empowers network of people, networks, services, and to protect the business everywhere, applications that can be anywhere at any wherever employees and digital assets go. given moment. Security needs to achieve “There is a need for security that’s the same ubiquity.” built-in by design, seamlessly integrated McAfee has been among the vendors into every device at every layer of the who have envisioned such an approach. compute stack and is protecting valuable Its Security Connected platform provides intellectual property, data, devices, and a unified framework for hundreds of identities. So in everyday and business products, services, and partners. According life, people can feel secure in the digital to McAfee, any organization can improve world. It’s why we’re taking a “security its security posture and minimize connected” approach. Across every operational costs through its innovative architecture of every platform from chip concepts, optimized processes, and to cloud — smartphones and tablets to practical savings. PCs, servers, and beyond. We’re moving Vibinsays, “McAfee Security Connected security from discrete solutions to an enables businesses to optimize security integrated approach as pervasive as every day and reduce risk while driving computing itself.” compliance and improving operational McAfee has also launched the find, efficiencies—everywhere. From mobile freeze and fix advanced malware solution devices and endpoints to mission-critical (MATD) to prevent against complete networks and servers. From hosted zero day threats based on sandboxing services in the cloud to supply-chain and static code analysis with integrated processes between partners. And from GTI and Gateway Antimalware engines.

20  |  May 2014


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.