McAfee Network Threat Response is a software package that captures, deconstructs, and analyzes malware that is resident inside your network today. Network Threat Response is a powerful cybertool for security analysts. It automatically identifies malware targeting internal network vulnerabilities, and instantly captures and analyzes it to aid in rapid remediation and ongoing network defense.
Reveals what attackers don't want us to see
Network Threat Response combs through PDFs, Microsoft Office files, and all other network activities looking for attempts to hide or obscure malicious content, providing analysts with instant visibility into attacks.
Uncovers persistent attacks
Network Threat Response identifies and accumulates portions of attacks that trickle in over time, piecing together threat puzzles that sneak into networks at a snail’s pace.
Cuts analysis time down to minutes
Network Threat Response automates security analysts’ tasks by combing through network traffic, looking for signature patterns of malware activity. These attack vectors are automatically forwarded for full analysis and presented to the analyst who can view all the facets of an attack and make appropriate, targeted security changes. These targeted changes allow networks to maintain optimal protection with minimal impact on internal IT operations.
High-performance, high-security platform
Customers seeking to lower the hardware maintenance and management costs can now deploy Network Threat Response on the scalable and multifunctional CloudShield CS-4000 platform. Network Threat Response on the CS-4000 platform provides security-conscious enterprises with a scalable, physically secure, and cybertough approach to finding and avoiding security breaches caused by advanced malware attacks.
A single McAfee Network Threat Response device gives any security team the power of 20 analysts and reverse engineers without requiring a single hire. Unlike other security devices, which can generate thousands of events a day, analysts can review every event generated by McAfee Network Threat Response within minutes.
A distinguishing characteristic of advanced malware is its ability to evade detection. McAfee Network Threat Response looks at PDFs, Microsoft Office files, and all other network activities for attempts to hide or obscure traffic. NTR doesn’t just alert to the presence of obfuscation; it decodes the traffic, providing analysts with visibility into the attack that is not possible with other existing tools.
IPS solutions that are deployed in-line are forced to make difficult trade-offs due to performance pressures. That means more complicated threats may go undetected. NTR sits out of band, which frees it to perform more in-depth analysis without having to worry about time contstraints.
Network Threat Response has the unique ability to uncover slow moving, persistent attacks, identifying and accumulating portions of attacks that trickle in over time. Nothing else gives our customers the ability to piece together threat puzzles that sneak into their network at a snail’s pace.
Most tools are one-dimensional in their detections, but NTR utilizes a host of different methodologies that increase detection rates and allow for the detection of complicated attacks. NTR deploys a suite of commercial AV engines for validating network objects, in addition to McAfee AV. Sandbox Analysis? NTR deploys both ValidEdge and Cuckoo for executing and studying the impact of suspicious network objects in a virtual environment. In addition to these engines, NTR employs many other detection and analysis algorithms including JAR analysis, PDF analysis, Office document analysis, etc.
Shellcode is the set of instructions used by malware to infect and control a device. McAfee Network Threat Response uses patent-pending heuristics to detect the presence of shellcode, without requiring prior knowledge of the ever-changing, encrypted attack payload. Even obfuscated shellcode is detected with NTR’s suite of analysis engines, and it takes it a step further, deobfuscating the detected code and presenting it for easy analysis by security professionals.
NTR automates the Security Analysts task by combing through network traffic looking for signature patterns of malware activity and attack. Once identified, these “attack vectors” are automatically forwarded into the full suite of NTR analysis services. The result of this processing is presented to the analyst who can view all the facets of the attack and make appropriate, targeted security changes. These targeted security changes allow networks to maintain optimal protection with minimal impact on internal IT operations.
McAfee Network Threat Response accelerates the analysis of the captured data via its PCAP import capabilities. Captured data can be replayed through the McAfee Network Threat Response analysis engines where hidden traffic is decoded and key indicators are highlighted. As a result, an analyst has anchor points from which to start the investigation—shaving days off of analysis time. Netwitness and Solera are excellent sources of captured PCAP data.
McAfee Network Threat Response is a software solution that can run on a variety of hardware platforms. For optimal security and performance, we recommend running Network Threat Response on the CloudShield CS-4000 platform. Please see the data sheet for appliance specifications and details.
Ranked by IT solution providers (SPs), CRN Research ranks the Top 25 must-have technology suppliers from a list of nearly 230 companies in 12 product categories that SPs need to consider when formalizing their partnerships today and for the future. 1,000 unique SPs of all types and sizes were surveyed.
Topics : Network Security
For a technical summary of the CloudShield product listed above, please view the product data sheet and learn how McAfee Network Threat Response on the CloudShield CS-4000 platform complements your existing network defenses.
For a technical summary on the McAfee product listed above, please view the product data sheet.
How familiar are you with low-hanging fruit — the easiest ways for attackers to gain entry to your network and potentially run off with your valuable data? This white paper explores penetration tests that you can perform at your organization to gain an understanding of how to apply the proper defenses to prevent exploitation of the top five low-hanging fruit.
By providing a single, expandable framework supporting a proactive security infrastructure, McAfee Network Threat Response enables IT administrators to focus on tasks core to their business model without the need to reconfigure, reinstall, and retrain for an ever-changing threat landscape.
Protecting the Internet of Things means protecting the privacy of customers and colleagues. Most of the devices in the Internet of Things (IoT) reside outside of your security wall. Some, such as mobile point-of-sale terminals and other publicly accessible devices, are outside because they could be a gateway for malicious attacks. Others, such as sensors […]
Still running a Windows Server 2003? You’ll want to read this. As you may or may not have heard, the end of life for Windows Server 2003 is now set for July 14th, 2015 – meaning after that date, it will no longer be supported by Microsoft. So, what does this mean for you? It […]
Another great RSA Conference has come to a close. The Moscone Center may be cleared out, and San Francisco left slightly less populated, but the security innovations that made this year’s show worthwhile are here to stay. What We Announced This year at RSA, we announced our extended, integrated enterprise portfolio. Our enhanced portfolio provides […]
Organizations must adopt a new way of thinking about safeguarding sensitive data from theft and unauthorized exfiltration. The recent slew of high profile data breaches has prompted organizations to harden network perimeter defenses with the latest security technologies. In response, some cybercriminals are shifting their focus toward the human element, with phishing and social engineering […]
The post Application Layer Exfiltration Protection: A New Perspective on Firewalls appeared first on McAfee.
By 2017, the adoption of Office 365 is expected to more than double. And for business leaders, that means not only evaluating if Office 365 is the right choice for their organization, but also how to complete a secure migration. While the process may appear daunting, don’t fear! We partnered with Osterman Research to guide […]
The post Get Your Head in the Cloud! 5 Steps for Migrating to Office 365 appeared first on McAfee.