SlideShare ist ein Scribd-Unternehmen logo
1 von 16
ePolicy Orchestrator 4.0 with Security Risk
Management


Mohamed A. Shishtawy


© 2007 McAfee, Inc.
Security Risk Management with
ePolicy Orchestrator
Module Topics


   • Security Risk Management with ePO
           – SRM Model
           – Centralized Security Management
           – Components & Architecture




  Security Risk Management with ePolicy Orchestrator   Module 1 - 3   © 2009 McAfee, Inc. All rights reserved.
Security Risk Management                                                              SRM Model
                                                                                     • Centralized Management
                                                                                     • Components & Architecture


                                                                                      • Machine import
                                                                       Identify &     • Machine discovery
                                                                      group assets    • Rogue detection


                                                                                      • Infection reporting
                                                                                      • Measure
                                                                      Determine       vulnerability
                                                                         risk         • Notification


                                                                                      • Configuration
                                                                      Protect and     • Enforcement
                                                                         block        • Maintenance


                                                                                      • Coverage reporting
                                                                                      • Compliance
                                                                                      reporting
                                                                       Measure
                                                                                      • System compliance
                                                                      compliance
                                                                                      • McAfee NAC




  Security Risk Management with ePolicy Orchestrator   Module 1 - 4                     © 2009 McAfee, Inc. All rights reserved.
Protecting The Enterprise


   • The Challenge
            –    Identify & group assets
            –    Determine risk
            –    Protect and block threats
            –    Measure compliance




   Security Risk Management with ePolicy Orchestrator   Module 1 - 5   © 2009 McAfee, Inc. All rights reserved.
Identify & Group Assets


   •   Import known machines from a browse list
   •   Synchronize with Active Directory
   •   Detect Rogue Systems
   •   Group machines according to management needs
   •   Assign policies on a generic or granular level




   Security Risk Management with ePolicy Orchestrator   Module 1 - 6   © 2009 McAfee, Inc. All rights reserved.
Determine Risk


   • Monitor threat events and propagation
   • Determine infection and outbreak source
   • Provide Automatic Responses to rule infringement




  Security Risk Management with ePolicy Orchestrator   Module 1 - 7   © 2009 McAfee, Inc. All rights reserved.
Protect And Block Threats


   •   Ensure correct configuration
   •   Enforce security policy
   •   Maintain and update protection
   •   Respond to rule intrusion




  Security Risk Management with ePolicy Orchestrator   Module 1 - 8   © 2009 McAfee, Inc. All rights reserved.
Measure Compliance


  •   Report on coverage and protection levels
  •   Determine compliance to anti-virus policy
  •   Determine compliance to system policy
  •   Roll-up reporting across multiple ePO servers




  Security Risk Management with ePolicy Orchestrator   Module 1 - 9   © 2009 McAfee, Inc. All rights reserved.
Centralized System Security Management                                                                             SRM Model
                                                                                                                   Centralized Mgmt
                                                                                                                  • Components/Architecture


                                                                             ePolicy
           Automatic                                      Manage only      Orchestrator                McAfee
                                                           one policy      Server and                 Download
          Responses to                                                       Master                     Site
            Threats                                        framework        Repository
                                                                                                                       Consolidate
                                                                                                                       monitoring
                                                                                             Product Updates
 Automatic                                                                                   DAT File Updates         and reporting
Responses /
  Threat                                                       Database
Notification                                                    Server


             Scalability &
                                                                                                          Rogue                            Web-based
              Bandwidth                                                                                   System                            Consoles
               savings                               Remote        Secure                                Detection
                                                      Agent     Bi-directional                            Sensor
                                                     Handler       Channel                       Update
                                                                                                Repository
          Product Updates                                                                                       Product Updates
          DAT File Updates                                                                                      DAT File Updates
           Policy Updates
           Threat Events                                                   Policy Updates
                                                                           Threat Events                                 Easily discover
                                                                                                                         non-compliant
                                                                                                                            systems
                       Managed Systems with McAfee Agents                           Managed Systems with McAfee Agents


     Security Risk Management with ePolicy Orchestrator                     Module 1 - 10                             © 2009 McAfee, Inc. All rights reserved.
Feature Management


  • ePolicy Orchestrator manages products through:

           – Product deployment


           – Configuration management


           – Update and task configuration


           – Coverage reporting


           – Threat Event reporting




  Security Risk Management with ePolicy Orchestrator   Module 1 - 11   © 2009 McAfee, Inc. All rights reserved.
Architecture And Communication
                                                                                     Agent Handler

McAfee Agent                                              APACHE                               Event Parser
                                                          Service                                Service
Framework
  Service HTTP 80
                                                                                             Master
UDP 8081




                                                                                           Repository
              UDP 8082
 TCP 8081




                                                                                     DAL




                                                                                                                 HTTP
                                                                                                                 8080
                                                          ePO Server

                                                                                                Application Server
 Network                                                            Database                        (TOMCAT)
                             Console UI
                                                                                               Rogue
                                                                HTTPS 8443                                       Notification
                                                                                               Sensor
                                                                                                                   System
                                   Rogue                                                       System
                                                               HTTPS 8444
                                   Sensor



     Security Risk Management with ePolicy Orchestrator              Module 1 - 12                   © 2009 McAfee, Inc. All rights reserved.
Check Your Understanding

  Choose the correct answer(s):

  What are the four primary stages of the Security Risk
   Management model?

          • Discover, Determine, Defend, Detect

          • Find & Manage, Evaluate, Enforce & Protect, Fix &
            Comply

          • Assess, Remediate, Measure, Prioritize




  Security Risk Management with ePolicy Orchestrator   Module 1 - 13   © 2009 McAfee, Inc. All rights reserved.
Check Your Understanding

  Choose the correct answer(s):

  What are the four primary stages of the Security Risk
   Management model?

          • Discover, Determine, Defend, Detect

           Find & Manage, Evaluate, Enforce & Protect, Fix &
            Comply

          • Assess, Remediate, Measure, Prioritize




  Security Risk Management with ePolicy Orchestrator   Module 1 - 14   © 2009 McAfee, Inc. All rights reserved.
ePolicy Orchestrator 4.0 with Security   Risk
Management


Mohamed A. Shishtawy


© 2007 McAfee, Inc.

Weitere ähnliche Inhalte

Andere mochten auch

OER Talk @ University of Maryland #OAweek
OER Talk @ University of Maryland #OAweekOER Talk @ University of Maryland #OAweek
OER Talk @ University of Maryland #OAweekNicole Allen
 
Human environment-interactions
Human environment-interactionsHuman environment-interactions
Human environment-interactionsLexi34
 
Foil insulation radiant barrier from sinolam
Foil insulation radiant barrier from sinolamFoil insulation radiant barrier from sinolam
Foil insulation radiant barrier from sinolamWWW.SINOLAM.COM WEBSITE
 
Represii. Deportari. Foamete
Represii. Deportari. FoameteRepresii. Deportari. Foamete
Represii. Deportari. FoameteAdela Negura
 
AZIMUT Azimut 68S, 2007, 1.200.000 € For Sale Brochure. Presented By azimut-y...
AZIMUT Azimut 68S, 2007, 1.200.000 € For Sale Brochure. Presented By azimut-y...AZIMUT Azimut 68S, 2007, 1.200.000 € For Sale Brochure. Presented By azimut-y...
AZIMUT Azimut 68S, 2007, 1.200.000 € For Sale Brochure. Presented By azimut-y...Azimut Yacht Club
 
экоблок презентация
экоблок презентацияэкоблок презентация
экоблок презентацияmusorabolshenet
 
Open Educational Resources and Capacity Building for Development
Open Educational Resources and Capacity Building for DevelopmentOpen Educational Resources and Capacity Building for Development
Open Educational Resources and Capacity Building for DevelopmentNicole Allen
 
OER Overview (MCCLPHEI Annual Conference 6/19/14 Salem, MA)
OER Overview (MCCLPHEI Annual Conference 6/19/14 Salem, MA)OER Overview (MCCLPHEI Annual Conference 6/19/14 Salem, MA)
OER Overview (MCCLPHEI Annual Conference 6/19/14 Salem, MA)Nicole Allen
 
Les données du Data Portal du Shift Project sur l'électricité britannique et ...
Les données du Data Portal du Shift Project sur l'électricité britannique et ...Les données du Data Portal du Shift Project sur l'électricité britannique et ...
Les données du Data Portal du Shift Project sur l'électricité britannique et ...The Shift Project
 
Una forma geométrica de medir irracionalidad
Una forma geométrica de medir irracionalidadUna forma geométrica de medir irracionalidad
Una forma geométrica de medir irracionalidadPedro Morales
 
духовные ценности волонтёра
духовные ценности волонтёрадуховные ценности волонтёра
духовные ценности волонтёраmusorabolshenet
 
Warp9: reactive primitives
Warp9: reactive primitivesWarp9: reactive primitives
Warp9: reactive primitivesrystsov
 
managerial accounting assignment - projected financial statements of maruti s...
managerial accounting assignment - projected financial statements of maruti s...managerial accounting assignment - projected financial statements of maruti s...
managerial accounting assignment - projected financial statements of maruti s...Tushar Upadhyay
 
Open access.2013 Biblioteca UPSC
Open access.2013 Biblioteca UPSCOpen access.2013 Biblioteca UPSC
Open access.2013 Biblioteca UPSCAdela Negura
 
OCHO HERRAMIENTAS ESENCIALES
OCHO HERRAMIENTAS ESENCIALESOCHO HERRAMIENTAS ESENCIALES
OCHO HERRAMIENTAS ESENCIALESInes Tazon
 

Andere mochten auch (20)

OER Talk @ University of Maryland #OAweek
OER Talk @ University of Maryland #OAweekOER Talk @ University of Maryland #OAweek
OER Talk @ University of Maryland #OAweek
 
Human environment-interactions
Human environment-interactionsHuman environment-interactions
Human environment-interactions
 
Weather
WeatherWeather
Weather
 
Foil insulation radiant barrier from sinolam
Foil insulation radiant barrier from sinolamFoil insulation radiant barrier from sinolam
Foil insulation radiant barrier from sinolam
 
Represii. Deportari. Foamete
Represii. Deportari. FoameteRepresii. Deportari. Foamete
Represii. Deportari. Foamete
 
AZIMUT Azimut 68S, 2007, 1.200.000 € For Sale Brochure. Presented By azimut-y...
AZIMUT Azimut 68S, 2007, 1.200.000 € For Sale Brochure. Presented By azimut-y...AZIMUT Azimut 68S, 2007, 1.200.000 € For Sale Brochure. Presented By azimut-y...
AZIMUT Azimut 68S, 2007, 1.200.000 € For Sale Brochure. Presented By azimut-y...
 
экоблок презентация
экоблок презентацияэкоблок презентация
экоблок презентация
 
Open Educational Resources and Capacity Building for Development
Open Educational Resources and Capacity Building for DevelopmentOpen Educational Resources and Capacity Building for Development
Open Educational Resources and Capacity Building for Development
 
OER Overview (MCCLPHEI Annual Conference 6/19/14 Salem, MA)
OER Overview (MCCLPHEI Annual Conference 6/19/14 Salem, MA)OER Overview (MCCLPHEI Annual Conference 6/19/14 Salem, MA)
OER Overview (MCCLPHEI Annual Conference 6/19/14 Salem, MA)
 
Les données du Data Portal du Shift Project sur l'électricité britannique et ...
Les données du Data Portal du Shift Project sur l'électricité britannique et ...Les données du Data Portal du Shift Project sur l'électricité britannique et ...
Les données du Data Portal du Shift Project sur l'électricité britannique et ...
 
Social media
Social mediaSocial media
Social media
 
Una forma geométrica de medir irracionalidad
Una forma geométrica de medir irracionalidadUna forma geométrica de medir irracionalidad
Una forma geométrica de medir irracionalidad
 
духовные ценности волонтёра
духовные ценности волонтёрадуховные ценности волонтёра
духовные ценности волонтёра
 
Business in the future
Business in the futureBusiness in the future
Business in the future
 
үзүүлэн5
үзүүлэн5үзүүлэн5
үзүүлэн5
 
Warp9: reactive primitives
Warp9: reactive primitivesWarp9: reactive primitives
Warp9: reactive primitives
 
Cleopatra
CleopatraCleopatra
Cleopatra
 
managerial accounting assignment - projected financial statements of maruti s...
managerial accounting assignment - projected financial statements of maruti s...managerial accounting assignment - projected financial statements of maruti s...
managerial accounting assignment - projected financial statements of maruti s...
 
Open access.2013 Biblioteca UPSC
Open access.2013 Biblioteca UPSCOpen access.2013 Biblioteca UPSC
Open access.2013 Biblioteca UPSC
 
OCHO HERRAMIENTAS ESENCIALES
OCHO HERRAMIENTAS ESENCIALESOCHO HERRAMIENTAS ESENCIALES
OCHO HERRAMIENTAS ESENCIALES
 

Ähnlich wie Security Risk Management- moeshesh

2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk ManagementPinewood
 
High Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log ManagerHigh Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log ManagerNovell
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Reddy Marri
 
Process Steps
Process StepsProcess Steps
Process StepsmfeKEG
 
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersFive Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersVenafi
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutionsakshayvreddy
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsBob Rhubart
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_final241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_finalAnthony Hopkins
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSebastien Deleersnyder
 
DSS ITSEC Conference 2012 - Radware WAF Tech
DSS ITSEC Conference 2012 - Radware WAF TechDSS ITSEC Conference 2012 - Radware WAF Tech
DSS ITSEC Conference 2012 - Radware WAF TechAndris Soroka
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringTieu Luu
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec
 
Continuous Delivery using Release Management Automation
Continuous Delivery using Release Management AutomationContinuous Delivery using Release Management Automation
Continuous Delivery using Release Management AutomationPremkumar Veerakumar
 
Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2Naba Barkakati
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 

Ähnlich wie Security Risk Management- moeshesh (20)

2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management
 
High Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log ManagerHigh Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log Manager
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0
 
Process Steps
Process StepsProcess Steps
Process Steps
 
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersFive Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption Disasters
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutions
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_final241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_final
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
 
DSS ITSEC Conference 2012 - Radware WAF Tech
DSS ITSEC Conference 2012 - Radware WAF TechDSS ITSEC Conference 2012 - Radware WAF Tech
DSS ITSEC Conference 2012 - Radware WAF Tech
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012
 
Continuous Delivery using Release Management Automation
Continuous Delivery using Release Management AutomationContinuous Delivery using Release Management Automation
Continuous Delivery using Release Management Automation
 
Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 

Kürzlich hochgeladen

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Kürzlich hochgeladen (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Security Risk Management- moeshesh

  • 1. ePolicy Orchestrator 4.0 with Security Risk Management Mohamed A. Shishtawy © 2007 McAfee, Inc.
  • 2. Security Risk Management with ePolicy Orchestrator
  • 3. Module Topics • Security Risk Management with ePO – SRM Model – Centralized Security Management – Components & Architecture Security Risk Management with ePolicy Orchestrator Module 1 - 3 © 2009 McAfee, Inc. All rights reserved.
  • 4. Security Risk Management  SRM Model • Centralized Management • Components & Architecture • Machine import Identify & • Machine discovery group assets • Rogue detection • Infection reporting • Measure Determine vulnerability risk • Notification • Configuration Protect and • Enforcement block • Maintenance • Coverage reporting • Compliance reporting Measure • System compliance compliance • McAfee NAC Security Risk Management with ePolicy Orchestrator Module 1 - 4 © 2009 McAfee, Inc. All rights reserved.
  • 5. Protecting The Enterprise • The Challenge – Identify & group assets – Determine risk – Protect and block threats – Measure compliance Security Risk Management with ePolicy Orchestrator Module 1 - 5 © 2009 McAfee, Inc. All rights reserved.
  • 6. Identify & Group Assets • Import known machines from a browse list • Synchronize with Active Directory • Detect Rogue Systems • Group machines according to management needs • Assign policies on a generic or granular level Security Risk Management with ePolicy Orchestrator Module 1 - 6 © 2009 McAfee, Inc. All rights reserved.
  • 7. Determine Risk • Monitor threat events and propagation • Determine infection and outbreak source • Provide Automatic Responses to rule infringement Security Risk Management with ePolicy Orchestrator Module 1 - 7 © 2009 McAfee, Inc. All rights reserved.
  • 8. Protect And Block Threats • Ensure correct configuration • Enforce security policy • Maintain and update protection • Respond to rule intrusion Security Risk Management with ePolicy Orchestrator Module 1 - 8 © 2009 McAfee, Inc. All rights reserved.
  • 9. Measure Compliance • Report on coverage and protection levels • Determine compliance to anti-virus policy • Determine compliance to system policy • Roll-up reporting across multiple ePO servers Security Risk Management with ePolicy Orchestrator Module 1 - 9 © 2009 McAfee, Inc. All rights reserved.
  • 10. Centralized System Security Management  SRM Model  Centralized Mgmt • Components/Architecture ePolicy Automatic Manage only Orchestrator McAfee one policy Server and Download Responses to Master Site Threats framework Repository Consolidate monitoring Product Updates Automatic DAT File Updates and reporting Responses / Threat Database Notification Server Scalability & Rogue Web-based Bandwidth System Consoles savings Remote Secure Detection Agent Bi-directional Sensor Handler Channel Update Repository Product Updates Product Updates DAT File Updates DAT File Updates Policy Updates Threat Events Policy Updates Threat Events Easily discover non-compliant systems Managed Systems with McAfee Agents Managed Systems with McAfee Agents Security Risk Management with ePolicy Orchestrator Module 1 - 10 © 2009 McAfee, Inc. All rights reserved.
  • 11. Feature Management • ePolicy Orchestrator manages products through: – Product deployment – Configuration management – Update and task configuration – Coverage reporting – Threat Event reporting Security Risk Management with ePolicy Orchestrator Module 1 - 11 © 2009 McAfee, Inc. All rights reserved.
  • 12. Architecture And Communication Agent Handler McAfee Agent APACHE Event Parser Service Service Framework Service HTTP 80 Master UDP 8081 Repository UDP 8082 TCP 8081 DAL HTTP 8080 ePO Server Application Server Network Database (TOMCAT) Console UI Rogue HTTPS 8443 Notification Sensor System Rogue System HTTPS 8444 Sensor Security Risk Management with ePolicy Orchestrator Module 1 - 12 © 2009 McAfee, Inc. All rights reserved.
  • 13. Check Your Understanding Choose the correct answer(s): What are the four primary stages of the Security Risk Management model? • Discover, Determine, Defend, Detect • Find & Manage, Evaluate, Enforce & Protect, Fix & Comply • Assess, Remediate, Measure, Prioritize Security Risk Management with ePolicy Orchestrator Module 1 - 13 © 2009 McAfee, Inc. All rights reserved.
  • 14. Check Your Understanding Choose the correct answer(s): What are the four primary stages of the Security Risk Management model? • Discover, Determine, Defend, Detect  Find & Manage, Evaluate, Enforce & Protect, Fix & Comply • Assess, Remediate, Measure, Prioritize Security Risk Management with ePolicy Orchestrator Module 1 - 14 © 2009 McAfee, Inc. All rights reserved.
  • 15.
  • 16. ePolicy Orchestrator 4.0 with Security Risk Management Mohamed A. Shishtawy © 2007 McAfee, Inc.