McAfee Network Threat Response is a software package that captures, deconstructs, and analyzes malware that is resident inside your network today. Network Threat Response is a powerful cybertool for security analysts. It automatically identifies malware targeting internal network vulnerabilities, and instantly captures and analyzes it to aid in rapid remediation and ongoing network defense.
Reveals what attackers don't want us to see
Network Threat Response combs through PDFs, Microsoft Office files, and all other network activities looking for attempts to hide or obscure malicious content, providing analysts with instant visibility into attacks.
Uncovers persistent attacks
Network Threat Response identifies and accumulates portions of attacks that trickle in over time, piecing together threat puzzles that sneak into networks at a snail’s pace.
Cuts analysis time down to minutes
Network Threat Response automates security analysts’ tasks by combing through network traffic, looking for signature patterns of malware activity. These attack vectors are automatically forwarded for full analysis and presented to the analyst who can view all the facets of an attack and make appropriate, targeted security changes. These targeted changes allow networks to maintain optimal protection with minimal impact on internal IT operations.
High-performance, high-security platform
Customers seeking to lower the hardware maintenance and management costs can now deploy Network Threat Response on the scalable and multifunctional CloudShield CS-4000 platform. Network Threat Response on the CS-4000 platform provides security-conscious enterprises with a scalable, physically secure, and cybertough approach to finding and avoiding security breaches caused by advanced malware attacks.
A single McAfee Network Threat Response device gives any security team the power of 20 analysts and reverse engineers without requiring a single hire. Unlike other security devices, which can generate thousands of events a day, analysts can review every event generated by McAfee Network Threat Response within minutes.
A distinguishing characteristic of advanced malware is its ability to evade detection. McAfee Network Threat Response looks at PDFs, Microsoft Office files, and all other network activities for attempts to hide or obscure traffic. NTR doesn’t just alert to the presence of obfuscation; it decodes the traffic, providing analysts with visibility into the attack that is not possible with other existing tools.
IPS solutions that are deployed in-line are forced to make difficult trade-offs due to performance pressures. That means more complicated threats may go undetected. NTR sits out of band, which frees it to perform more in-depth analysis without having to worry about time contstraints.
Network Threat Response has the unique ability to uncover slow moving, persistent attacks, identifying and accumulating portions of attacks that trickle in over time. Nothing else gives our customers the ability to piece together threat puzzles that sneak into their network at a snail’s pace.
Most tools are one-dimensional in their detections, but NTR utilizes a host of different methodologies that increase detection rates and allow for the detection of complicated attacks. NTR deploys a suite of commercial AV engines for validating network objects, in addition to McAfee AV. Sandbox Analysis? NTR deploys both ValidEdge and Cuckoo for executing and studying the impact of suspicious network objects in a virtual environment. In addition to these engines, NTR employs many other detection and analysis algorithms including JAR analysis, PDF analysis, Office document analysis, etc.
Shellcode is the set of instructions used by malware to infect and control a device. McAfee Network Threat Response uses patent-pending heuristics to detect the presence of shellcode, without requiring prior knowledge of the ever-changing, encrypted attack payload. Even obfuscated shellcode is detected with NTR’s suite of analysis engines, and it takes it a step further, deobfuscating the detected code and presenting it for easy analysis by security professionals.
NTR automates the Security Analysts task by combing through network traffic looking for signature patterns of malware activity and attack. Once identified, these “attack vectors” are automatically forwarded into the full suite of NTR analysis services. The result of this processing is presented to the analyst who can view all the facets of the attack and make appropriate, targeted security changes. These targeted security changes allow networks to maintain optimal protection with minimal impact on internal IT operations.
McAfee Network Threat Response accelerates the analysis of the captured data via its PCAP import capabilities. Captured data can be replayed through the McAfee Network Threat Response analysis engines where hidden traffic is decoded and key indicators are highlighted. As a result, an analyst has anchor points from which to start the investigation—shaving days off of analysis time. Netwitness and Solera are excellent sources of captured PCAP data.
McAfee Network Threat Response is a software solution that can run on a variety of hardware platforms. For optimal security and performance, we recommend running Network Threat Response on the CloudShield CS-4000 platform. Please see the data sheet for appliance specifications and details.
Ranked by IT solution providers (SPs), CRN Research ranks the Top 25 must-have technology suppliers from a list of nearly 230 companies in 12 product categories that SPs need to consider when formalizing their partnerships today and for the future. 1,000 unique SPs of all types and sizes were surveyed.
Topics : Network Security
For a technical summary of the CloudShield product listed above, please view the product data sheet and learn how McAfee Network Threat Response on the CloudShield CS-4000 platform complements your existing network defenses.
By providing a single, expandable framework supporting a proactive security infrastructure, McAfee Network Threat Response enables IT administrators to focus on tasks core to their business model without the need to reconfigure, reinstall, and retrain for an ever-changing threat landscape.
Six months after the fact, Heartbleed continues to make news. Many websites are still vulnerable to the Heartbleed exploit and their stolen data has appeared in the online black market. Lists of vulnerable or unpatched websites have also appeared in the black market, and cybercriminals are taking aim. These challenges were recently covered in McAfee’s […]
The post How the NIST Framework will Help with the Latest Threats appeared first on McAfee.
Advanced evasion techniques (AETs) have developed quite a reputation in the information security sector, given their ability to disguise advanced persistent threats (APTs) and stealthily siphon out data. Although AETs have been active security threats for quite some time, several misconceptions remain. In an effort to dig deeper into how these threats are passing through […]
The post “What’s Next” Europe Report Provides Insight on Advanced Evasion Techniques appeared first on McAfee.
Cloud computing is a growing trend for organizations of all sizes, and many enterprises are adopting it — but what does this shift to the cloud mean for their security? While the appeal of cloud options is obvious in terms of efficiency and scalability, security issues have triggered some (much deserved) hesitancy among information security professionals. The challenges […]
The post September #SecChat: The Evolution of Cloud & Server Security appeared first on McAfee.
A busy week at the Intel Developer Forum has just come to a close. Over the course of three (somewhat) sunny days in San Francisco, we got a chance to see what the developers, makers and creators of today’s technologies have in store for the upcoming year. Just in case you didn’t get a chance […]
The post IDF 2014 – Where There’s a Developer, There’s a Way! appeared first on McAfee.
If there’s one term that can make a CISO squirm whenever mentioned, it’s “Shadow IT.” After all, when tasked with securing an enterprise-scale network, most CISOs frown on business units and employees procuring their own tech solutions — like Dropbox, Flickr, or Gmail — without notifying IT for proper vetting. But that discomfort isn’t stopping […]
The post Shadow IT and the Future of the Cloud: How CISOs Lost Visibility and How They Can Regain It appeared first on McAfee.