DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat...

37
DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES. DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Transcript of DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat...

Page 1: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 2: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

The Key to Secure

Digital Transformation is Becoming Cloud Native

Jonathan Andresen| Senior Director, APJDISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 3: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

MobileIron Confidential

Digital transformation

Mobility Cloud

Services

Productivity & experience

Communication

Automate workflows

Collaboration

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 4: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

4

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 5: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

5

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 6: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

6

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 7: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

7

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 8: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Legacy perimeter model

System image

Anti-malware agentsPerimeter

Firewall

Device VPN

VDI

IT controls the endpoint

IT controls network access

IT controls user identityDISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 9: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 10: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

The Evolution of McAfee

Device to Cloud

Device CloudNetwork

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 11: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

BusinessAcceleration

BetterSecurity

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 12: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

52% of companies

experience better security in the cloud.

Source: McAfee Cloud Adoption Report: Business Growth Edition, June 2019

Page 13: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Companies accelerate business when they protect their cloud data

Source: McAfee Cloud Adoption Report: Business Growth Edition, June 2019

+15%+11%

+32%

+36%+45%

+40%+38%

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 14: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Make Cloud the most secure environment for your business

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 15: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

McAfee Confidential

“Through 2023, 99% of Cloud security failures will be the customer’s fault.”

Gartner Magic Quadrant for CASB—2018

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 16: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 17: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Data and apps move to the cloud

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 18: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

End-Points and cloud iswhere work gets done

Data and apps move to the cloud

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 19: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Mobile proliferation creates new attack vector

End-Points and cloud iswhere work gets done

Data and apps move to the cloud

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 20: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

IT also demands the benefits of the cloud

Mobile proliferation creates new attack vector

End-Points and cloud iswhere work gets done

Data and apps move to the cloud

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 21: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Data ProtectionThreat Protection

Continuous Compliance

ShadowSaaS

IaaS/PaaS

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 22: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

▪ Data Protection▪ Threat Protection▪ Continuous Compliance

Control

▪ What: Data, Apps,Users, and Devices

▪ Who▪ Where▪ When▪ Shared

Visibility

MVISION Cloud

SaaS IaaS / PaaS Shadow

Unmanaged Managed

Cloud Security Requirements

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 23: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Cloud Access Security Broker Software

Encryption Software

Threat Intelligence Software

Privileged Access Management Software

Tokenization Software

46.2%

23.7%

20.6%

17.0%

14.2%

Information Security SpendingCAGR by Segment, 2017-2022

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 24: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Companies do more with the cloud when they protect their data with a CASB

Source: McAfee Cloud Adoption Report: Business Growth Edition, June 2019

Excluding Shadow IT

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 25: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

22.638.6

56.375.3

105.2

138.4

181.6

228.9

278.2

328.3

374.7

416.6

454.4

489.8

521.8

2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026

Public cloud market revenue worldwide from 2012 to 2026 (in billion U.S. dollars)

Source: https://www.statista.com/statistics/477702/public-cloud-vendor-revenue-forecast/

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 26: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Where Enterprise Sensitive Data is in the Cloud

This knowledge is driving our innovation

Salesforce

Office 365, Google Suite

Google Docs

Slack, Teams

AWS, Azure, Google

Custom Apps

Box, Dropbox

ServiceNow

High-RiskShadow

Med/Low-RiskShadow

31%

13%

11%

16%

8%

5%5%

7%

2%2%

CollaborationSaaS, 42%

ShadowIT, 10%

IaaS/PaaS,24%

BusinessSaaS, 24%

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 27: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Where Enterprise Sensitive Data is in the Cloud

This knowledge is driving our innovation

Salesforce

Office 365, Google Suite

Google Docs

Slack, Teams

AWS, Azure, Google

Custom Apps

Box, Dropbox

ServiceNow

High-RiskShadow

Med/Low-RiskShadow

31%

13%

11%

16%

8%

5%5%

7%

2%2%

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 28: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

31%

13%

11%

16%

8%

5%5%

7%

2%

2%

ShadowIT

1,935the actual number of cloud apps in use by an average organization

9%of shadow IT services in use are high risk

15 number of cloud apps IT believes are used today

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 29: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Source: McAfee Cloud Adoption Report

457638

8541018

11691353

169

259

333

409

513

582

626

897

1187

1427

1682

1935

2013 2014 2015 2016 2017 2018

Enterprise cloud apps Consumer cloud apps

an increase of 15% over last year

The average organization now uses 1,935 cloud apps

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 30: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

CollaborationSaaS, 42%

ShadowIT, 10%

IaaS/PaaS,24%

BusinessSaaS, 24%

Connected App Control

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 31: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Connected App Control

Only CASB Support for Microsoft TeamsCollaborationSaaS, 42%

ShadowIT, 10%

IaaS/PaaS,24%

BusinessSaaS, 24%

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 32: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

CASB Connect Catalog

CollaborationSaaS, 42%

ShadowIT, 10%

IaaS/PaaS,24%

BusinessSaaS, 24%

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 33: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Data Classification & Accountability

Client & End-Point Protection

Identity & Access Management

Application Level Controls

Network Control

Host Infrastructure

Physical Security

SaaSPaaSIaaS

The Cloud (First) Enterprise Challenges

Service Provider Responsibility

Customer Responsibility

Customers are Still Responsible for Security

Cloud Shared Responsibility Model DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 34: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Security is a shared responsibility

AWS Foundation Services

Compute Storage Database Networking

AWS Global Infrastructure

Regions

Availability Zones

Edge Locations

Client-side Data Encryption

Server-side Data Encryption

Network Traffic Protection

Platform, Applications, Identity & Access Management

Operating System, Network, & Firewall Configuration

Customer Applications & Content

Cu

sto

me

rs Customers have their choice of security configurations INthe Cloud

AWS is responsible for the security OFthe Cloud

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 35: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

Security is a shared responsibility

Client-side Data Encryption

Server-side Data Encryption

Network Traffic Protection

Platform, Applications, Identity & Access Management

Operating System, Network, & Firewall Configuration

Customer Applications & Content

Cu

sto

me

rs

fits here

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 36: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]

Page 37: DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN …€¦ · Encryption Software Threat Intelligence Software Privileged Access Management Software Tokenization Software 46.2%

DISCLAIMER: THESE SLIDES ARE ORIGINALLY PRESENTED IN CSA SUMMIT PHILIPPINES 2019, MANILA, PHILIPPINES.

DO NOT DISTRIBUTE OR RECREATE COPIES. FOR MORE INFORMATION PLEASE EMAIL: [email protected]