A Day In The Life

This is your day:
A constant struggle
to stay ahead
of security threats.
Do more with the hours in your day, and the dollars in your budget.
Every day cybercriminals steal
any data they can profit from.
Every day, you work to detect
and protect against new types
of attacks. You may try more
and more security solutions. But
that just adds more to manage.
Now there’s a way for security professionals like
you to deal with both security and complexity,
and get more done with the hours in your day
and the dollars in your budget.
Morning
You start your day with
new types of attacks
70-90%
of malware samples detected
were unique to the organizations
they were targeting.
27%
of attacks in 2014 were the
result of a targeted attack.
327
new threats happen
every minute, or more
than 5 every second.
Afternoon
By the middle of the day,
the cost of breaches is growing
$3.79M
is the average cost
of a breach.
98 days
is the mean time to
detect a breach at a
financial institution.
31 days
is the average time it takes
a large organization to
clean up and remediate after a
cyber-attack, at a cost of $20,000/day.
Evening
By the end of the day, you know
you need a single, integrated solution
1 web interface
that aligns security processes
for maximum visibility, with a
single agent to reduce the risk
of endpoint conflicts.
1 server
that can support hundreds
of thousands of devices
with an enterprise-class
architecture.
1 management
solution
for on-premises and
cloud-based platforms.
McAfee® ePolicy Orchestrator® software
lets you do more with the hours in your day
41%
less time deploying,
monitoring, and reporting
security policies.
31%
45%
less time
responding to
security incidents.
less time developing
security reports
for analysis.
And $423,000 more with your budget
over a 3-year period
(Based on 1,000 nodes)
12%
33%
16%
40%
time saved on client task
automation and endpoint
policy assignment.
time saved
on patching.
time saved on internal
security reporting and
compliance audits.
time saved fixing and
managing incidents,
events, and policies.
McAfee ePO™ provides a “single pane of glass” for
highly scalable, flexible, and automated centralized
oversight and enforcement of security management
policies to identify and respond to security issues
and threats from either a premises-based or
cloud-based platform.
Find out why more than 30,000
customers use McAfee ePO™ software
on almost 70 million nodes.
Go to www.mcafee.com/epo to learn more.
Gartner, May 2015: Best Practices for Detecting and Mitigating Advanced Persistent Threats & 2015 Verizon DBR
ISecG/ESG Gold Hour, April 2015
Source: McAfee labs, Q3 2015
Cost of Data Breach Study—Ponemon, May 2015
Advanced Threats Series—Ponemon, 2015
Intel and the Intel and McAfee logos are trademarks of Intel Corporation or McAfee, Inc. in the US and/or other countries. Other marks and brands may be claimed as the property of others.
Copyright © 2016 Intel Corporation. 62335info_sec-arch-cloud-security_0316