McAfee Network Security Platform

McAfee Network Security Platform

Einzigartige intelligente Sicherheitslösung zur Erkennung und Blockierung komplexer Bedrohungen im Netzwerk

Nächste Schritte:
  • Chat mit McAfee
    Planen Sie eine Neuanschaffung, oder haben Sie vor dem Kauf noch Fragen? Chatten Sie mit einem Experten von McAfee. Die Experten stehen Montag bis Freitag zur Verfügung. Nur in englischer Sprache.
  • Fachhändler suchen
  • Kontakt
  • Rufen: 08006647628

Überblick

McAfee Network Security Platform ist eine intelligente Sicherheitslösung, die komplexe Bedrohungen im Netzwerk erkennt und blockiert. Sie nutzt neben zahlreichen fortschrittlichen und signaturlosen Erkennungstechniken (z. B. Advanced Threat Defense) auch Echtzeit-Emulation sowie Endgeräteintegration. Diese Techniken gehen über einen einfachen Musterabgleich hinaus und wehren äußerst zuverlässig verborgene Angriffe ab. Dabei erreicht die Hardware-Plattform der nächsten Generation Geschwindigkeiten von über 40 Gbit/s und erfüllt mit dieser Fähigkeit auch die Leistungsanforderungen anspruchsvoller Netzwerke.

Im Rahmen des Security Connected-Ansatzes zur Sicherheitsverwaltung organisiert Network Security Platform mehrere Sicherheitstechnologien, sodass gemeinsam auch die schwer erfassbaren und verschleierten Angriffe bekämpft werden können, die eine Einzeltechnologie nicht entdecken würde. Durch diesen intelligenten Einsatz verhaltensbezogener Heuristikverfahren mit Echtzeit-Datenquellen von McAfee Global Threat Intelligence können böswillige Angriffe auch dann genau erkannt werden, wenn für sie keine Signatur existiert.

Sämtliche Sicherheits- und Verwaltungsinformationen werden in einer Ansicht zueinander in Beziehung gesetzt, wodurch der Zeit- und Arbeitsaufwand für Ihr IT-Personal sowie menschliche Fehler bei den Untersuchungen verringert werden. Aufgaben werden ausgeführt, sobald die Priorität der Detailinformationen bestimmt wurde. Auf diese Weise werden nur die benötigten Daten schrittweise und genau dann angezeigt, wenn es erforderlich ist. Die eingesparte Zeit und die vermiedenen Fehler ziehen Betriebskosteneinsparungen nach sich, und das freigesetzte Personal kann an anderen Projekten arbeiten. Network Security Platform optimiert die Sicherheitsabläufe über Layer-7-Daten hinaus, um versteckte Angriffsmuster für eine schnellere und genauere Reaktion auf Angriffe über das Netzwerk offenzulegen.

Leader & Visionary: McAfee IPS is a Gartner Magic Quadrant leader yet again.

Download Gartner Report

See McAfee Network Security Platform in action: Videos, demos & technical guides

Learn More

McAfee leads in IPS security and value

Download NSS Labs Report

Funktionen und Vorteile

Unerreichter Bedrohungsschutz

Unerreichter Bedrohungsschutz ist nur möglich, wenn sowohl bekannte als auch unbekannte Angriffe erkannt werden können. Diese IPS-Plattform der nächsten Generation setzt mehrere signarturlose Erkennungsmodule sowie eine überaus effiziente, schwachstellenbasierte Signaturerkennung ein, wodurch sie hochentwickelte Malware- und Zero-Day-Angriffe mit noch nie dagewesener Genauigkeit geschickt abwehren kann. Darüber hinaus bietet die fortschrittliche und signaturlose Malware-Untersuchung umfassenden Schutz vor unbekannten Angriffen und zusätzliche Signaturabwehrmaßnahmen, die einen geringen Arbeitsaufwand erfordern, schützen effizient vor bekannten Bedrohungen, ohne dass der Verwaltungsaufwand und die Betriebskosten in die Höhe schnellen.

Intelligente Sicherheitsverwaltung

Sie benötigen weniger Fachkenntnisse und Zeit, um Sicherheitsereignisse zu überwachen sowie zu untersuchen. Gleichzeitig können Sie die Administration großer und komplexer Implementierungen vereinfachen. Durch eine schrittweise Anzeige der Daten mithilfe geführter Gliederungen erhalten sie einerseits die richtigen Informationen genau dann und dort, wo Sie sie benötigen, während die hierarchische Verwaltung andererseits auch für die größten Implementierungen geeignet ist.

Globaler Schutz vor Malware

Durch die intelligente Nutzung eines Malware-Abwehrportfolios erhalten Sie eine umfassende Malware-Abdeckung. Schließen Sie zuverlässig Lücken im Malware-Schutz. McAfee bietet dafür mehr Abwehrmaßnahmen als jeder andere Anbieter für diese neueste und zerstörerischste Form des Angriffs auf die Netzwerksicherheit.

Nutzung unseres Security Connected-Frameworks

Sie können die Sicherheitslage Ihres Netzwerks verbessern, die Netzwerksicherheit für höhere Kosteneffizienz optimieren sowie die Netzwerksicherheit strategisch an Geschäftsinitiativen ausrichten. Security Connected ist der integrierte Ansatz für Netzwerksicherheit von McAfee, der nahtlos Daten und Workflows von anderen Sicherheitsprodukten einbindet.

Mehr Leistung und Skalierbarkeit

Durch eine zuverlässige Systemleistung ist bester Schutz auch unter größter Belastung verfügbar, wenn das Netzwerk vergrößert wird, oder sogar dann, wenn Netzwerksegmente ausfallen. Sie erzielen auch dann eine hohe Leistung und einen Durchsatz von mehreren Gigabit, wenn Funktionen der nächsten Generation mit statusbezogenem Failover verfügbar sind.

Mehr Übersicht und Kontrolle

Benutzer- sowie Geräteinformationen werden nahtlos in Kontrollelemente, Analysen sowie Anwendungen für genaue Berichterstellung integriert. Diese umfassende Übersicht hilft bei der Erkennung verdächtiger Anomalien, die in der Zusammenfassung nicht sichtbar sind. Kontrollrichtlinien lassen sich so flexibler an die Anforderungen des Unternehmens anpassen.

Demos und Tutorials

Demos

Network Security Platform is an intrusion prevention appliance that uses multiple detection engines to alert on today’s stealthy malware.

Use event correlation and progressive disclosure workflows to prioritize events, improve detection, and speed investigation.

Network Security Platform uses new advanced intrusion detection capabilities to uncover both known and unknown botnets.

Network Security Platform includes application visibility and control of over 1,100 applications and protocols.

Prevent denial-of-service attempts through connection limiting based on geo-location, IP reputation, and a number of other factors.

McAfee Endpoint Intelligence provides real-time, per-flow endpoint traffic correlation. This solution leverages intelligence in the network and on every Windows host to reveal relationships between endpoint executables and network traffic flows.

Network Security Platform incorporates McAfee Global Threat Intelligence to check the reputation of network communications based on billions of unique file, IP, URL, protocol, and geo-location data around the globe.

Tutorials

Explore the key features of McAfee Network Security Platform and learn more about how it integrates with McAfee Vulnerability Manager and McAfee ePolicy Orchestrator.

Videos

Learn how McAfee Network Security Platform supercharges your security to avoid zero-day threats.

Your IPS needs both signature and signature-less defenses.

Auszeichnungen und Berichte

NSS Labs
McAfee Network Security-Plattform erhält von NSS Labs die sehr begehrte Bewertung "Empfohlen"

NSS Labs testet die branchenweit führenden Anbieter von Systemen zum Eindringungsschutz für Netzwerke anhand zahlreicher Kriterien und veröffentlicht die Ergebnisse in Produktanalyseberichten. Lesen Sie im neuesten Security Value Map-Bericht von NSS Labs, wie McAfee die Führungsposition bei Sicherheit und Mehrwert übernommen hat und von NSS Labs entsprechend bewertet wurde.

CRN
CRN zählt McAfee zu den 25 besten Partnerunternehmen des Jahres 2013

CRN Research stellt eine Rangliste der 25 besten Technologieanbieter zusammen. Hierfür wurden die Rückmeldungen von IT-Lösungsanbietern zu fast 230 Unternehmen in 12 Produktkategorien ausgewertet, die von den Lösungsanbietern bei der Bildung von Partnerschaften für die aktuelle und zukünftige Zusammenarbeit berücksichtigt werden sollten. Für diese Rangliste wurden 1.000 verschiedene Lösungsanbieter aller Größen und Arten befragt.

Gartner
Magic Quadrant für Eindringungsschutzsysteme 2013

McAfee wird (erneut) als Marktführer im Gartner Magic Quadrant für Eindringungsschutzsysteme positioniert.

Anwenderberichte von Kunden

Bank Central Asia (English)

Bank Central Asia, a regional public bank in Indonesia, centralizes security management with McAfee ePolicy Orchestrator.

Kernpunkte
  • Eased compliance with internal and industry regulations.
  • Resulted in time savings with centralized management.
  • Provided integrated solutions to keep computers, the network, and data protected.

California Department of Corrections and Rehabilitation (CDCR) (English)

Leveraging the Security Connected strategy, the California Department of Corrections and Rehabilitation implemented SIEM, network IPS, data protection, and endpoint security solutions to secure its distributed IT environment over 37 locations.

Kernpunkte
  • Compliance with policy standards.
  • Dashboards enable centralized security management and provide easy access for executive reporting.

City of Chicago (English)

Chicago protects its critical infrastructure with an integrated solution from McAfee, combining SIEM, endpoint, and network security.

Kernpunkte
  • Maximized staff resources.
  • Malware incidents reduced by 2,000%.
  • Centralized management and analysis.
  • Integrated security event logging that captures events throughout the environment.

Eagle Rock Energy (English)

Eagle Rock strengthens its security infrastructure with the addition of new security management and network security solutions.

Kernpunkte
  • Integrated security architecture paves the way for business expansion.
  • Comprehensive threat detection ensures that security events from every source are noted and logged.
  • The combination of McAfee Web Gateway and McAfee Advanced Threat Defense thwarts inbound threats from the Internet.
  • Intrusion prevention monitors both external and internal activity.

Macquarie Telecom (English)

This leading Australian hosted IT provider drives a growing managed services business with Security Connected.

Kernpunkte
  • Fully integrated security platform easily managed from a central dashboard.
  • Visibility and control for clients over their hosted security environments.
  • Competitive advantage through partnership with a trusted technology provider.

State of Colorado (English)

McAfee SIEM solutions help the state of Colorado meet compliance requirements and remain cost effective.

Kernpunkte
  • Aggressively achieved first five controls per set goal
  • Ability to administer virus scans and obtain software inventory with McAfee ePO software
  • Vulnerability ranking within McAfee Enterprise Security Manager allows for more immediate and effective remediation

News und Veranstaltungen

Ressourcen

Berichte

Gartner Report: Avoid These Dirty Dozen Network Security Worst Practices (English)

This report identifies 12 commonly observed network security practices that reduce network availability, increase expenditure or risks, and alienate end users.

Magic Quadrant for Intrusion Prevention Systems: Leader and Visionary (English)

Leading research firm Gartner, Inc. has placed Intel Security in the leaders quadrant in its “Magic Quadrant for Intrusion Prevention Systems”. This marks the eighth consecutive time that McAfee was named a leader in this quadrant.

SANS Report: Critical Security Controls: From Adoption to Implementation (English)

A recent SANS survey provides an in-depth look at the primary industries adopting critical security controls and how they approach implementation.

AV-Test Signature-less IPS Report (English)

Signatures are great for blocking known attacks, but a comprehensive signature-less architecture is needed to block new and unknown attacks. AV-Test validated that McAfee signature-less inspection blocks 99.98% of malware without any signatures enabled. Read the report to learn how McAfee IPS has raised the bar on IPS inspection and enables security beyond the signature.

Data Center IPS Comparative Analysis: Total Cost of Ownership (English)

By using total cost of ownership (TCO) instead of purchase price, it is possible to factor in management of the device via labor costs associated with product installation, maintenance, upkeep, and tuning.

NSS Labs 2014 Comparative Analysis Report for McAfee Network Security Platform NS-9300 (English)

NSS Labs Ranks McAfee as a Leader in Security and Value.

NSS Labs 2013 Product Analysis Report for McAfee Network Security Platform NS-9200 (English)

NSS Labs Ranks McAfee as a Leader in Security and Value.

Next-Generation Network Security (English)

McAfee and Intel have joined forces to create next-generation network security that detects threats before they reach networks.

McAfee IPS Appliance Test (English)

AV-TEST performed a review of McAfee’s IPS solution for the enterprise to determine malware detection and blocking capabilities.

NSS Labs 2012 Product Analysis Report for McAfee Network Security Platform M-8000 (English)

NSS Labs tests the industry's leading Network Intrusion Prevention vendors on dozens of criteria and releases their finding in Product Analysis Reports. In this report, the McAfee Network Security Platform M-8000 is rated on its security effectiveness, performance, management, TCO and overall value.

Datenblätter

McAfee Network Security Platform (NS-Series)

Eine technische Zusammenfassung zum oben genannten McAfee-Produkt finden Sie im entsprechenden Datenblatt.

McAfee Network Security Platform (M-Series)

Eine technische Zusammenfassung zum oben genannten McAfee-Produkt finden Sie im entsprechenden Datenblatt.

Virtual Network Security Platform

McAfee Network Security Platform virtual sensor is a full-featured advanced intrusion prevention system (IPS) solution ready for the unique demands of virtual environments. This intelligent security solution discovers and blocks sophisticated threats in virtual networks with unmatched speed, accuracy, and simplicity.

Infographics

IDC Business Value Snapshot

This snapshot of the IDC white paper "The Business Value of Network-Based Intrusion Prevention Systems," provides key data about McAfee Network Security Platform performance.

SANS Top 20 Critical Controls Poster (English)

The top 20 critical controls for effective cyberdefense.

Get a True Understanding of Malware DNA (English)

McAfee Network Security Platform can amplify existing signature and snort-based technologies to provide a true understanding of malware DNA.

Bury Threats Before They Bury Your Business (English)

Bury threats with McAfee’s Network Security Platform comprehensive signature-less approach to malware detection.

Kurzvorstellungen

Protocol-Based IPS Architecture (English)

This brief discusses the Intel Security approach to protocol-based Intrusion Prevention System inspection and how it differs from other security vendors. Intel Security uses protocol inspection as the foundation of IPS solutions and builds advanced intelligence on top of this architecture to provide superior protection and IPS performance.

McAfee Network Security Platform for the Data Center (English)

McAfee Network Security Platform combines extraordinary performance, advanced signature-less inspection, deep integration with other security systems, intelligent central management, and scalability to secure the very largest environments, making it the IPS of choice for the world’s most demanding data centers.

Advanced Threat Defense for Network IPS (English)

Many of today’s unknown, zero-day threats evade traditional signature-based defenses. The addition of third-party sandbox appliances can help, but they have several limitations: high cost of deployment, reliance on a generic virtualized environments, and limited analysis techniques, making the sandbox vulnerable to crafty malware designed to bypass analysis. McAfee Network Security Platform IPS and McAfee Advanced Threat Defense work together to find sophisticated threats, freeze them so they cannot infiltrate, and fix the damage done.

SIEM: Fünf Voraussetzungen zur Lösung größerer Geschäftsprobleme

McAfee spoke with SIEM users and asked them to tell us about their primary issues with SIEM. This brief lists the top five issues along with corresponding customer case studies and use cases.

McAfee Network Security Platform: Services Solutions for Managed Service Providers (MSP) (English)

With attacks on the rise, IT budgets constrained, and experienced security personnel in short supply, businesses are looking to Managed Service Providers to help fill the gap. McAfee Network Security Platform is uniquely intelligent and purpose-built to offer unmatched protection, performance, and multitenant scale for your intrusion prevention system (IPS) services.

Schalten Sie den Sicherheits-Turbo ein

McAfee Network Security Platform and McAfee Enterprise Security Manager bring together real-time network protection, enterprise-wide situational awareness, and a responsive, investigation platform — in a seamlessly integrated solution that identifies and blocks more threats while ensuring rapid response to successful attacks as they emerge.

Whitepaper

Protect Critical Assets with Virtual Patching (English)

This white paper discusses virtual patching and how using predictive threat coverage, automated vulnerability scanning, and risk visualization is a scalable and cost-effective approach to protecting critical assets.

The Business Value of Using McAfee IPS — IDC (English)

In this white paper, leading market intelligence firm IDC provides a compelling view of the business value and benefits gained from using McAfee Network Security Platform. Derived from in-depth interviews with existing McAfee IPS customers, the report data shows how an IPS can provide cost and time savings across an organization.

Signature-less IPS: Secure Beyond the Signature (English)

Learn how the McAfee signature-less intrusion prevention system (IPS) technology is changing the way malware is detected and blocked. Signature-based detection provides an important foundation for intrusion inspection, but a layered signature-less architecture greatly enhances malware detection and reduces the risk. Read about the seven signature-less detection methods McAfee offers and how they are transforming IPS.

Beyond Layer-7 Visibility: A Simpler Path to Endpoint Intelligence (English)

Security products with layer-7 visibility are great. But in order to dramatically improve your understanding of security events, you need to extend your vision to the specific application processes responsible for initiating a connection. It’s something we call Beyond Layer-7 Visibility.

SANS Survey: Incident Response – How to Fight Back (English)

SANS recently surveyed incident response (IR) teams to get a clearer picture of what they're up against today. The results are in; most organizations lack formalized IR plans, they expressed a need to collect and correlate threat intelligence and SIEM tools are their focus for improving IR capabilities.

The Blended IPS: Leveraging Snort and Optimizing Malware Security (English)

This paper is to present the satisfied Snort user and open source security proponent with an effective way to add advanced malware detection and automated threat blocking to an existing Snort-based intrusion prevention system (IPS).

Conquer the Top 20 Critical Security Controls (English)

Critical Security Controls (CSCs) help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

Security Management 2.5 – Replacing Your SIEM Yet? (English)

This paper will walk you through the entire process — from soup to nuts — of evaluating, selecting, and deploying a SIEM. It offers pragmatic advice on how to get it done based on years working through this process as both consumers and vendors of SIEM technology. The process is not always painless, but we are certain it will help you avoid foundering on bad technology and inter-office politics. You owe it to yourself and your organization to ask the right questions and to get answers. It is time to slay the sacred cow of your substantial SIEM investment, and to figure out your best path forward.

The 7 Deadly Threats to 4G - 4G LTE Security Roadmap and Reference Design (English)

This paper provides a detailed review of seven threats that take on unique profiles within 4G networks. It also offers a security reference architecture to efficiently counter these threats with minimal cost or service disruption.

Security Connected from McAfee: Comprehensive, Cost-Effective Security (English)

With federal budgets trending downward and both cyberthreats and mandates heading upward, the question becomes, "Can you get comprehensive cybersecurity that provides real-time threat visibility and protection at a reasonable cost? The answer is yes."

A Prudent Approach to Next-Generation Network Security (English)

According to Enterprise Strategy Group, a prudent approach to next-generation network security requires more hands-on planning, product evaluations, and real-world testing — and less reliance on third-party lab testing and market reports alone.

McAfee Network Security Platform: Netzwerk-IPS der nächsten Generation

This white paper discusses how the McAfee Network Security Platform can help organizations unify network security across physical and virtual environments, streamline security operations, and protect themselves from emerging malware, zero-day attacks, denial-of-service exploits and advanced targeted attacks.

Consolidate Network Security to Reduce Cost and Maximize Enterprise Protection (English)

Learn how McAfee Network Security Platform helps you realize greater consolidation benefits while minimizing project costs and disruption to your production environment.

Combating Advanced Persistent Threats (English)

Learn how to prevent, detect, and remediate APTs.

Solving Critical Challenges of the Virtualized Data Center (English)

Brocade and McAfee have partnered on a portfolio of offerings that seamlessly blend network innovations and security management to address the challenges of both physical and virtual environments.

Schutz wichtiger Ressourcen mit virtuellen Patches

Schließung des Bedrohungsfensters mit vorausschauendem Bedrohungsschutz.

Das neue Zeitalter der Botnets

Robot-Netzwerke, die allgemein als Botnets bekannt sind, haben eine bewegte Vergangenheit. Grundsätzlich handelt es sich bei einem Bot um ein Paket aus Skripten oder Befehlen oder um ein Programm, das eine Verbindung zu einem Zielort (meist ein Server) herstellen und einen oder mehrere Befehle ausführen soll. Meist führt er dabei mehrere Funktionen aus. Ein Bot ist von sich aus nicht zwingend böswillig oder schädlich.

Community

Blogs

  • Government Agencies Should Turn to CDM During 30-Day Sprint
    Tom Gann - Juni 29, 2015

    The fallout from the OPM breach continues with news that clearance information may have been stolen and that more than 10 million federal employee records may have been breached. In response, the White House has ordered every agency to engage in a “30 day sprint” to shore up and bolster their defensive cybersecurity capabilities. During […]

    The post Government Agencies Should Turn to CDM During 30-Day Sprint appeared first on McAfee.

  • Hackers Gonna Hack! Here’s How to Fight Back
    Paul Zimski - Juni 23, 2015

    Nobody ever said network defense was easy. If you’re in charge of protecting your enterprise’s digital assets, the one thing you always seem to be fighting is time. Even after you have read every security analyst report on the market and deployed best-of-breed security products, if your IT security and data protection tools don’t work […]

    The post Hackers Gonna Hack! Here’s How to Fight Back appeared first on McAfee.

  • Securing Private and Hybrid Clouds
    Raja Patel - Juni 5, 2015

    As-a-service models offer huge opportunities, but also complicate security. Sometimes the easiest way to migrate to a new architectural modelis to let others do the work, others who are experts in their field. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While […]

    The post Securing Private and Hybrid Clouds appeared first on McAfee.

  • ESG Lab Spotlight on SIEM
    Karl Klaessig - Juni 2, 2015

    It’s no secret that today’s attack surface is growing. Everywhere you turn there’s news of a new breach or targeted attack. Look around you – is your mobile device nearby? The answer is most likely yes. In a world of connected devices and people on the go, our affinity for multi-tasking is in turn causing […]

    The post ESG Lab Spotlight on SIEM appeared first on McAfee.

  • Did a Hacker Take Control of a Commercial Airplane?
    Gary Davis - Mai 20, 2015

    As the popular saying goes, what goes up must come down. And if you’re on a flight, both elements should be done in a controlled manner. Thankfully, we have a lot of people working across industries to make sure that all flights take off and land safely — and that includes the cybersecurity industry. But […]

    The post Did a Hacker Take Control of a Commercial Airplane? appeared first on McAfee.