McAfee Threat Intelligence Exchange delivers a cohesive framework where security products collectively pinpoint threats and act as a unified threat defense system providing security resilience and immunity to infections. Threat Intelligence Exchange significantly optimizes threat prevention by narrowing the gap from encounter to containment from days, weeks, and months down to milliseconds.
Apply the power of knowledge — Threat Intelligence Exchange makes it possible for administrators to easily tailor comprehensive threat intelligence from multiple intelligence data sources. This customization empowers administrators to assemble, override, and tune the intelligence source information so that they can modify protection for their environment and organization.
Orchestrate in real time — Threat Intelligence Exchange is the first solution to use the McAfee data exchange layer, a bidirectional communications fabric enabling security intelligence, and adaptive security through product integration simplicity and context sharing. The data exchange layer supports the automatic configuration of products, reducing errors and eliminating effort to lower implementation and operational costs of integration.
Supercharge existing endpoint protection — Threat Intelligence Exchange provides breakthrough endpoint protection, using McAfee VirusScan Enterprise to make accurate file execution decisions. Endpoints will also be protected based on malware detected by network gateways, while network gateways block access based on endpoint convictions.
McAfee Threat Intelligence Exchange makes it possible for administrators to easily tailor comprehensive threat intelligence from global data sources, such as McAfee Global Threat Intelligence (GTI) and third-party feeds, with local threat intelligence sourced from real-time and historical event data coming from endpoints, gateways, and other security components.
The McAfee data exchange layer enables security components to dynamically join the McAfee Threat Intelligence Exchange. Shared insights bring deeper awareness of the threats targeting an organization. Attacks are discovered through the endpoints, gateways, and other security components united in providing real-time surveillance.
Threat details collected from malware encounters at endpoints and network gateways can propagate through the data exchange layer in milliseconds, educating all security components to proactively immunize against newly detected threats.
While increasing security resiliency, security cost of ownership is lowered by extending existing McAfee security detection, prevention, and analytic technology investments to proactively and efficiently protect your organization as soon as a threat is revealed.
McAfee Threat Intelligence Exchange requires the following products:
Adaptive intelligence and real-time communications orchestrate protection in the McAfee Security Connected Platform.
For a technical summary on the McAfee product listed above, please view the product data sheet.
Being friendly and social can enhance your career, strengthen friendships and overall lead to a happier life. However, we need to be mindful that those social interactions don’t make it easy for cyber criminals to gain valuable sensitive or personal information about our lives. In a social engineering attack, an attacker uses human interaction (social […]
There’s been a tremendous amount of activity over the past few weeks in response to the Heartbleed bug discovered in OpenSSL, an open source tool used by thousands of web sites to encrypt web traffic. The bug enables an attacker to obtain a random 64K chunk of memory which could contain sensitive information, such as […]
The post How to Automatically Block Sites Vulnerable to Heartbleed appeared first on McAfee.
I just read though the 2014 Verizon Data Breach Investigations Report (DBIR) which was made available on Verizon’s Enterprise site this week. Wow, 1,367 confirmed data breaches! It’s good to know that there are tools available to help prevent these incidents. And it’s our job to help businesses deploy these tools in a cost-effective and […]
The post Encryption: An Easy Safeguard to Protect Your Valuable Data appeared first on McAfee.
Cyber security has become a huge concern for businesses today, with valuable customer and corporate data accessible to determined individuals through a variety of avenues. Today, there are numerous digital and physical security risks posed by users who do not properly erase data before disposing of commonly used office equipment and devices. In order to […]
The post Are You Leaving Your Office Unlocked? Everyday Items Could Be Putting Company Data At Risk appeared first on McAfee.
As thought leaders at the largest dedicated security company in the world, we are tapped into all the hot cyber security topics at all times. So when we hear news about a breaking trend, like the Heartbleed vulnerability or the Target hack, we understand the issue and know how to respond. However, many average Americans […]
The post McAfee Thought Leadership Tapped to Provide Definitions on Hot Cyber Topics appeared first on McAfee.