3. Navigate Workload ComplexityCPU&MemoryIntensive
I/O Intensive
Enterprise
Applications
Graphics
Rendering
High
Performance
Computing
Edge
Routing
Storage
De-dupe
Big
Data
Low End
NetworkingCold
Storage
Content Delivery
and Gaming
Cloud
RAN
Small
Cell
E-Commerce
Dedicated
Hosting
Higher latency, lower throughput Lower latency, higher throughput
4. EC2 Offerings Can Address All of ThemCPU&MemoryIntensive
I/O Intensive
Enterprise
Applications
Graphics
Rendering
High
Performance
Computing
Edge
Routing
Storage
De-dupe
Big
Data
Low End
NetworkingCold
Storage
Content Delivery
and Gaming
Cloud
RAN
Small
Cell
E-Commerce
Dedicated
Hosting
Higher latency, lower throughput Lower latency, higher throughput
Enterprise
Applications
Graphics
Rendering
Edge
RoutingBig
Data
Cold
Storage
Content Delivery
and Gaming
Cloud
RAN
Dedicated
Hosting
R3 Memory Optimized
E5-2680 v2
X1 2TB memory
E7-8880 v3
G2 GPU Instance
E5-2670
C4 Compute
Optimized
E5-2666 v3
D2 Dense Storage
E5-2676 v3
I2 I/O Intensive
E5-2670 v2
M3 Standard Instance
M4 Instances
E5-2670 v2
E5-2676 v3
T2 Micro Instance
Intel® Xeon®
Processor Family
NEW
5. Saving Lives
PROBLEM
Significant challenges in monitoring
symptoms, the progression of the disease,
and the effectiveness of drug therapies
SOLUTION
Intel’s Basis Peak, Mobile, Cloudera,
+ AWS delivered more accurate
predictive models
7. INTEL® IoT GATEWAY REAL-TIME ANALYTICSAWS IoT PLATFORM
Amazon EC2
X1
Edge-to-Cloud Platform with AWS and Intel
8. Intel as a Technology Partner:
Building Blocks for Your Customers
INTEL COMPUTE AND STORAGE
HADOOP SECURITY BIG DATA ANALYTICS MGMT &
CONNECTIVITY
AMAZON EC2
10. Physical Network
Storage
Servers
Hypervisor
Cloud Service
Responsibility
Tenant
Responsibility
Virtual Network
Operating System / Containers
Applications & Middleware
Users
Segmentation
VM-VM
Encryption
Fencing
Protocol/Asset/
App Visibility
Threat/VPC
Flow Analytics
Exploits, Malware Recon
L7 DDoS WAF App Control Exploits App Aware Policies
User Behavior Analytics
Multi-enancy Risk
Infra Risk
App Risk
User Risk
McAfee and Amazon Work Together to
Secure Your Clouds
11. Visibility
Are my security controls at
cloud scale or choke point?
Security comes with the
cost of performance?
Cloud Scale Single Pane of Glass
Public Cloud
Legacy
Private
Cloud
Problems We Want to Solve for the Cloud
12. Discover & Protect Workloads
Detect & Correct Threats
1. Discover every workload,
running on every cloud,
and assess security gaps.
2. Protect workloads from
advanced malware without
performance penalties.
3. Detect anomalous activity and
correct it by hardening cloud
platform security.
4. Adapt by learning and sharing
threat intelligence with the
security ecosystem.
ADAPT
For All Clouds
(Private & Public)
DISCOVER
For All Workloads
(Windows & Linux)
Server Apps
14. Visibility into whether firewall best practices are being followed.
Cloud Workload Discovery
Instant Visibility across AWS, Azure, Vmware, OpenStack (using native Apis)
16. Comprehensive Cloud Workload Protection
`
Antivirus Host Firewall Intrusion
Prevention
Application
Whitelisting
Integrity
Monitoring
Encryption
Management
Local
Reputation
Sandbox
Testing
ADD-ONS
DevOps-Friendly Deployment
Advanced Memory Protection
From Discovery to Protection with Detection and Correction – in just a few clicks!
17. Choose the Right Security Profile
Dev-Test
Workloads
Traditional
Workloads
Cloud-Native
Workloads
Compliance
Workloads
Firewall Must-Have Must-Have Must-Have Must-Have
Antivirus Good-to-Have Must-Have Good-to-Have Must-Have
Encryption Optional Must-Have Must-Have Must-Have
Application Control Optional Good-to-Have Must-Have Must-Have
File Integrity Monitoring Optional Optional Must-Have Must-Have
Host IPS Optional Optional Optional Must-Have
Adequate protection and compliance for all cloud workloads.
18. Virtual Machine
OS
App
Virtual Machine
OS
App
Virtual Machine
OS
App
Cloud Network Protection
VIRTUAL NETWORK
Augment Native Cloud
Network Security
Flexible Micro-segmentation,
Deep Packet Inspection
East-West
Next Generation Features
Application Control, DDoS,
Callback Detection, ATD,
Endpoint and Threat Intelligence
Multiple Deployment Modes
SDN Controller, Dedicated
Instances, Probes
North-South
McAfee vNSP
Network Security and Intrusion Prevention without network chokes
19. • Delivered with
CloudFormation
Template
• Ansible/Chef/Puppet
Built-In Security
• Automatic client-
based load balancer
• Integrated with
AutoScale
Load Balanced
• Inline IPS/IDS
• Security Group
• AutoScale
• VPC Flows / Inspector
Built for the Cloud
•Ready for orchestration
•Live update of sensors
& agents
•Flexible license
Low OpEx/CapEX
• Micro-segmentation
across heterogeneous
cloud
• App Fencing
Virtual Overlay Network Single Console
• Single NSM to manage
across clouds
• Manage from AWS
or On-Prem
• Monitor user access
across cloud
Scaling Security into the Public Cloud
Scaling Security into the Public Cloud
20. Key Takeaways
1
Close collaboration
between Intel and
AWS results in
best-in-class
end-user experiences
and customer
success.
2
Instance types
accelerate your
customers’
applications—
regardless of
workload type.
3
Solutions for
deployment enable
many successful
outcomes.