You are on page 1of 31

Living

Security
Now

Tayfun Er
Commercial Sales Regional Manager
Turkiye & Azerbaijan
State of the Industry
01 03
Nation-states attack Targeted threats
private companies take over

02 04
Expanding Overwhelmed
attack surface security teams
01 Nation-states attack
private companies

86%
u se d in
ckdoo r
i n d s b a c ks
So lar W r at t a
-s t at e cybe
nation
02 Expanding
attack surface

77%
Subject: Earnin
g opportunity
carrier employ for a mobile
ee ~ $20000+
My name is Ale
x.
I am looking for
insiders/employ
ees at either AT

03 Targeted threats
Verizon or T-Mob T,
ile
I can offer you up
wards of $20000
\*inside jobs\* at a week to do
either ATT, Veriz
me. – these task on or T-Mobile fo

take over
s are low risk fo r
you will get paid r you and me… pl
insanely well by us
involve Sim Sw me. – the jobs w
apping 1 or 2 cu ill
you won’t even stomers a week…
be noticed!!!
You can contac
t me on Telegram
whitedoxbin , my username
is
[https://t.me/whi
tedoxbin][https://t
.me/white
[https://telegram
“ Ran
.org/](https://teleg
ram.org/) we ca
somw
discuss further on n
Telegram or em
ail. If you are
are a
interested. This
45% 39% 29% you! Grow
is a great opport
in
unity for me and

Smal g Threat
l Bus
Employee error Insider threats Poor cyber iness to
es”
hygiene
04 Overwhelmed
62% difficulty
retaining
security teams

76% struggle to recruit


and hire
your problems persist…
SIEM EDR

Security NDR
Analytics

Cloud Shift
SIEM
DDR
a On-Premises
SIEM

SIEM SOAR XDR EDR EPP

SOAR
CDR
UEBA

ITDR
What is XDR?

Extended goes across Detection comes from Response enables your


several security vectors the ability to detect, organization to be better
including endpoints, correlate, and prioritize prepared to respond
network, data, cloud, threats across multiple effectively to attacks in
email and other third- vectors the moment real time.
party products. they arise.
Open & Native Security
Operations

Endpoint Data
Security Protection

Network Email Vulnerability Cloud Identity


Management
Principles Scale Security
Operations Intelligence

Simplicity Open
Endpoint Data
Security Protection

Network Email Vulnerability Cloud Identity


Management
SecOps Revolution
Traditional Enterprise Modern Enterprise

Enterprise Perimeter Cloud / SaaS Office / Data Center

Endpoint EDR

NDR
Network Cloud
X
D Email
SOC R
Email
DDR
Remote
Data CDR
Platform

Endpoint Security
Product Research
Data Security
Threat Intelligence
Cloud Security Advanced
Core Adversarial Resilience
Research & Advocacy
Email Security Engines
Center
Data Science ML / AI
Network Security
Research Engineering
3rd Party Engine
Data Lake
Cloud

Trellix Network Endpoint

Product
Lines
Email Data

3 rd PA R T Y
I N T EG R AT I O N S
EW
N

McAfee ENS
Agent
OUTPUT
Unified
(EPP)
Endpoint Protection Platform
Trellix
Endpoint Endpoint Endpoint Detection & Response

Forensics
McAfee EDR Agent FireEye HX xAgent
(EDR) (EDR + Forensics) Windows, Mac, Linux
Platform

Endpoint Security
Product Research
Data Security
Threat Intelligence
Cloud Security Advanced
Core
Research AdversarialResilience
Email Security Engines &Advocacy
Center
Data Science ML / AI
Network Security
Research Engineering
3rd Party Engine
Data Lake
Console Console Console Console Console Console

Endpoint Network Data Email Cloud 3rd


Security Security Security Security Security Party
Console
UX + APIs

Endpoint Network Data Email Cloud 3rd


Security Security Security Security Security Party

Core Engines
EW
N

Console
UX + APIs

XDR
Correlation + Contexualization + Playbooks

DATA LAKE

Endpoint Network Data Email Cloud 3rd


Security Security Security Security Security Party

Core Engines
EW
N

Trellix Network Detection & Response

Trellix Network Investigator

D E T E C T I O N A S A S E R V I C E

Trellix Network
Trellix IPS Trellix NX Forensics
N
EW
Thank You

You might also like