McAfee Threat Intelligence Exchange

McAfee Threat Intelligence Exchange

Prevenção adaptável contra ameaças

Próximas etapas:

Visão geral

O McAfee Threat Intelligence Exchange oferece uma estrutura coesa, na qual os produtos de segurança identificam ameaças coletivamente e atuam como um sistema unificado de defesa, oferecendo resiliência de segurança e imunidade a infecções. O Threat Intelligence Exchange agiliza consideravelmente a prevenção contra ameaças, reduzindo o período entre o encontro e a contenção de dias, semanas ou meses para milissegundos.

Aplique o poder do conhecimento: com o Threat Intelligence Exchange, os administradores podem personalizar facilmente informações abrangentes sobre ameaças a partir de diversas fontes de dados de inteligência. Essa personalização permite que os administradores reúnam, ignorem e ajustem as informações da fonte de inteligência para que possam modificar a proteção de seu ambiente e de sua organização.

Orquestre em tempo real: o Threat Intelligence Exchange é a primeira solução a usar a camada de troca de dados da McAfee, uma malha bidirecional de comunicações que possibilita a inteligência de segurança, e a segurança adaptável através do compartilhamento de contexto e da simplicidade de integração do produto. A camada de troca de dados tem suporte à configuração automática de produtos, reduzindo erros e dispensando o trabalho de redução de custos operacionais e de implementação da integração.

Poder extra para a proteção de terminais existente: o Threat Intelligence Exchange oferece proteção inovadora para terminais, usando o McAfee VirusScan Enterprise para tomar decisões precisas sobre a execução de arquivos. Os terminais também serão protegidos com base no malware detectado pelos gateways de rede, enquanto os gateways de rede bloqueiam o acesso com base nas condenações dos terminais.

Discover how to stay ahead of threats with SIEM intelligence

Register for Webcast

Advanced targeted attacks: It takes a system

Read White Paper

Recursos e vantagens

Informações abrangentes sobre ameaças

Com o McAfee Threat Intelligence Exchange, os administradores podem personalizar facilmente informações abrangentes sobre ameaças a partir de fontes de dados globais, como o McAfee Global Threat Intelligence (GTI) e canais de terceiros, com informações locais sobre ameaças obtidas de dados de eventos históricos e em tempo real, originários de terminais, gateways e outros componentes de segurança.

Visibilidade imediata da presença de ataques direcionados avançados

A camada de troca de dados da McAfee permite que os componentes de segurança ingressem dinamicamente no McAfee Threat Intelligence Exchange. As informações compartilhadas resultam em uma conscientização mais profunda sobre as ameaças que visam uma organização. Os ataques são descobertos através de terminais, gateways e outros componentes de segurança, que se unem para oferecer vigilância em tempo real.

Proteção proativa contra ameaças

Os detalhes sobre ameaças, coletados em encontros com o malware em terminais e gateways de rede, podem se propagar pela camada de troca de dados em milissegundos, orientando todos os componentes de segurança a imunizarem-se proativamente contra as ameaças recém-detectadas.

Eficácia operacional incomparável que reduz o custo de propriedade de segurança

Além de aumentar a resiliência da segurança, você vai reduzir o custo de propriedade de segurança estendendo seus investimentos existentes em tecnologia de análise, prevenção e detecção de segurança da McAfee, protegendo sua organização de forma proativa e eficiente assim que uma ameaça for revelada.

Requisitos de sistema

O McAfee Threat Intelligence Exchange exige os seguintes produtos:

  • McAfee ePolicy Orchestrator 5.1
  • McAfee Agent 5.0
  • McAfee VirusScan Enterprise 8.8, Patch 4

 

Vídeos

Vídeos

McAfee Threat Intelligence Exchange integrates, automates, and simplifies to decisively reduce TCO and optimize enterprise security. It eliminates complexity, provides instantaneous speed, and illuminated knowledge that can lower operating costs while streamlining protection and response ― all while freeing valuable security team resources.

Recursos

Documentos

Securosis: Applied Threat Intelligence (English)

One of the most compelling uses for threat intelligence is helping to detect attacks earlier. Examining for attack patterns identified via threat intelligence in your security monitoring and analytics processes shortens the window between compromise and detection. This Securosis white paper focuses on how to use threat intelligence to improve your ability to detect, prevent, and investigate attacks.

SANS White Paper: Be Ready for a Breach with Intelligent Response (English)

How do we get more visibility into attacks across our environments, improve our response, and reduce response time? The solution is automating functions that should be automated and connecting the dots between detection systems and response. Connecting these dots and applying intelligence provides responders rich context into the observed behaviors for taking action. Integrating these processes improves accuracy, while reducing time, manpower, and costs involved in detecting and managing events. This white paper explores how to achieve this.

Advanced Targeted Attacks: It Takes a System (English)

Adaptive intelligence and real-time communications orchestrate protection in the McAfee Security Connected Platform.

Especificações

McAfee Threat Intelligence Exchange

Para um resumo técnico do produto McAfee listado acima, consulte o data sheet do produto.

Infographics

Uma segurança conectada cria Defesas Mais Inteligentes.

Stop emerging threats with applied knowledge — everywhere, instantly.

Relatórios

ESG Report: Tackling Attack Detection and Incident Response (English)

This report examines organizations’ security strategies, cyber-attack environments, incident response challenges and needs. A survey found that security professionals are inundated with security incidents and struggle with timely identification and resolution of targeted attacks. A lack of visibility into user and network activity, shortage of investigative skills and experience, and poor security analytics capabilities are key factors in slowing organizations’ response to incidents.

SANS Analytics and Intelligence Survey (English)

This paper explores the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.

Resumos de soluções

McAfee Threat Intelligence Exchange and Endpoint Protection (English)

McAfee Threat Intelligence Exchange delivers innovative endpoint protection with a system that adapts and learns from threat encounters, and immediately neutralizes emerging attacks.

Abuso de confiança

Attackers prey upon the institution of trust in many ways, with exploiting unsuspecting victims the primary pursuit. Learn how McAfee security technology can help protect against attacks seeking to abuse the trust your company has in its day-to-day operations.

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange (English)

There’s no doubt that organizations face significant challenges protecting their intellectual property and critical assets from the emerging threats that target their environments. This solutions brief highlights how McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight today’s advanced threats.

Segurança em conjunto

McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threat response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

Comunidade

Blogs

  • Franchising Ransomware
    Vincent Weafer - Julho 2, 2015

    Got a great business idea? Want to expand with less risk? Build a good product, develop some training, put them together into a repeatable formula, and collect the royalties from your franchisees. This model, used successfully for everything from fast food to hair salons to tax preparation, is now available for criminal ransomware. Cybercriminals have […]

    The post Franchising Ransomware appeared first on McAfee.

  • Beat the Ticking Clock Against Emerging Threats
    Paul Zimski - Julho 1, 2015

    In order to beat todays advanced threats, your security defense system relies on good communication. However, when your security posture is dependent on a slew of different products from a spread of vendors, communication can break down. This breakdown in communication means you’re losing valuable time in detecting cyberthreats. To address this communication breakdown, there […]

    The post Beat the Ticking Clock Against Emerging Threats appeared first on McAfee.

  • Securing Critical Infrastructure
    Lorie Wigle - Julho 1, 2015

    Protecting the Industrial Internet of Things from cyberthreats is a national priority.  Industrial automation and control systems are increasingly online, sending out information and receiving commands from local and remote control centers and corporate data systems. Technologies in this Industrial Internet of Things (IIoT) have tremendous potential to improve operations, reduce costs, enhance safety, increase […]

    The post Securing Critical Infrastructure appeared first on McAfee.

  • Cyber Resilience And Spear Phishing
    Mo Cashman - Junho 29, 2015

    Balanced security capability, defense in depth, integrated countermeasures, and a threat-intelligence strategy are critical to defending your business from spear-phishing attacks. Spear phishing continues to be the most successful means of gaining entry to an enterprise network and to valuable business or personal data. According to the latest Verizon Data Breach Investigations Report, two-thirds of […]

    The post Cyber Resilience And Spear Phishing appeared first on McAfee.

  • Government Agencies Should Turn to CDM During 30-Day Sprint
    Tom Gann - Junho 29, 2015

    The fallout from the OPM breach continues with news that clearance information may have been stolen and that more than 10 million federal employee records may have been breached. In response, the White House has ordered every agency to engage in a “30 day sprint” to shore up and bolster their defensive cybersecurity capabilities. During […]

    The post Government Agencies Should Turn to CDM During 30-Day Sprint appeared first on McAfee.