Today, targeted attacks are designed to defeat security systems through a variety of approaches that either confuse defenses or avoid them completely.
As a part of the McAfee Advanced Threat Defense solution, McAfee has transformed the act of detection by connecting advanced malware analysis capabilities with defenses — from the network edge through the endpoint — and sharing threat intelligence with the entire IT environment. By sharing threat intelligence among management, network, and endpoint systems, McAfee immediately shuts down command and control communications, quarantines compromised systems, blocks additional instances of the same or similar threats, assesses where damage may have occurred, and takes action.
McAfee Advanced Threat Defense enables organizations to not only detect today’s stealthy attacks but also convert information into action and ultimately, protection.
Address the three key requirements needed to solve today’s advanced threat prevention objective: find, freeze, and fix. McAfee Advanced Threat Defense finds advanced malware and integrates with McAfee security solutions to freeze the threat, identify vulnerable machines, and initiate fix or remediation actions.
Reduce the chances of missed malware or false positives. McAfee Advanced Threat Defense uses sophisticated static code and dynamic analysis (sandboxing) to provide the most detailed assessment and data on malware classification. Stealthy malware and zero-day persistent threats are packed or obfuscated to evade detection. Advanced Threat Defense employs strong unpacking to break through evasive techniques, enabling thorough analysis and accurate classification. With broad operating system support, threats are analyzed under the same conditions as the actual host profile, so you catch more malware with fewer false alerts.
Quickly and seamlessly move from advanced malware analysis and conviction to advanced threat protection and resolution — a more comprehensive, efficient solution to the malware problem. Down selection — first using a mix of signatures, reputation, and real-time emulation — helps quickly identify a broad range of malware, producing fast detection results and reducing the number of files requiring more thorough sandbox analysis.
Centralized deployment enables multiple McAfee network devices to share the same malware analysis appliance, reducing the number of required advanced threat protection appliances, simplifying administration, and cost-effectively scaling security across your network. Advanced Threat Defense can leverage your existing McAfee security solutions, reducing the need for network rearchitecture and minimizing operational costs.
McAfee offers all essential components to find advanced malware, freeze the threat, and initiate a fix. Offering an end-to-end solution that integrates advanced threat analysis, network products, and endpoint solutions, McAfee provides organization-wide visibility and context for threats, while reducing response time and simplifying remediation.
McAfee Advanced Threat Defense is a self-contained device. There are no minimum software or hardware system requirements.
|Appliance Hardware Components||ATD-6000||ATD-3000|
|Dimensions||2RU Rack Mountable 17.24"W x 3.43"H x 28"L||1RU Rack Mountable 17.25"W x 1.70"H x 29"L|
|Weight||50 lbs.||33 lbs.|
|Storage||Disk space HDD: 4 x 4TB
SSD: 2 x 800 GB
|Disk space HDD: 2 x 4TB
SSD: 2 x 400 GB
|Maximum Power Consumption||2x 1,600W||2x 750W|
|Redundant Power Supply||AC redundant, hot swappable|
|AC Voltage||100-240 V at 50–60Hz and 8.5 Amps||100-240 V at 50–60Hz and 5.8 Amps|
|Temperature||+10° to +35° C (operating) -40° to +70° C (non-operating)|
|Relative Humidity (Non-Condensing)||Operational: 10% to 90%; Non-operational: 50% to 90%|
|Safety Certification||UL 1950, CSA-C22.2 No. 950, EN-60950, IEC 950, EN 60825, 21CFR1040 CB license and report covering all national country deviations|
|EMI Certification||FCC Part 15, Class A (CFR 47) (USA), ICES-003 Class A|
Learn how McAfee Advanced Threat Defense works with your current security from network to endpoint to protect against threats.
Outdated methods of malware detection leave crucial data at risk. Learn how McAfee solutions can prevent advanced malware attacks and protect valued assets.
Malware is becoming more evasive than ever before, making sandbox detection difficult. Ensure your team catches stealth, zero-day malware with McAfee Advanced Threat Defense.
Jon Oltsik, Sr. Principle analyst, Security at ESG talks about today’s trends in advanced malware, detection options, and the importance of integration between endpoint and network solutions for protection, context and increased ability to respond. Jon shares his impression of McAfee Advanced Threat Defense.
AV-TEST performed a test of the McAfee Advanced Threat Defense appliance to determine its malware detection capabilities.
Ranked by IT solution providers (SPs), CRN Research ranks the Top 25 must-have technology suppliers from a list of nearly 230 companies in 12 product categories that SPs need to consider when formalizing their partnerships today and for the future. 1,000 unique SPs of all types and sizes were surveyed.
SC Magazine selects McAfee as a finalist for the Readers Trust Awards — Best Advanced Persisten Threat (APT) Protection category.
McAfee Advanced Threat Defense is a core component of the McAfee network security portfolio and the Security Connected framework. McAfee has transformed the act of detection by connecting advanced malware analysis capabilities with defenses — from the network edge through the endpoint — and sharing threat intelligence with the entire IT environment.
McAfee Next Generation Firewall
McAfee Next Generation Firewall secures enterprises against the most advanced attacks with highly-available, scalable, and flexible cutting-edge protections, all supported by Security Connected, the industry’s broadest and most sophisticated anti-threat ecosystem.
McAfee Email Gateway
McAfee Email Gateway consolidates inbound threat protection, outbound encryption, advanced compliance, data loss prevention, and administration into a single, easy-to-deploy, and user-friendly appliance. It eliminates ineffective piecemeal defenses, simplifies multivendor security environments, and reduces operating costs — while significantly strengthening email security.
McAfee Network Security Platform
McAfee Network Security Platform is a uniquely intelligent security solution that discovers and blocks sophisticated threats in the network. Using advanced threat detection techniques, it defends against stealthy attacks with extreme accuracy at speeds of up to 80 Gbps, while providing rich contextual data about users, devices, and applications for fast, accurate responses to network-borne attacks.
McAfee Web Gateway
McAfee Web Gateway, deployed on-premises with appliances or in a virtual environment, offers powerful, proactive protection against zero-day threats, spyware, and targeted attacks. Web Gateway combines this advanced security with flexible, granular control, enabling your business to take maximum advantage of the web without compromise.
McAfee ePolicy Orchestrator
McAfee ePolicy Orchestrator (McAfee ePO) is a key component of the McAfee Security Management Platform, and the only enterprise-class software, to provide unified management of endpoint, network, and data security. With end-to-end visibility and powerful automations that slash incident response times, McAfee ePO software dramatically strengthens protection and drives down the cost and complexity of managing risk and security.
McAfee Threat Intelligence Exchange
McAfee Threat Intelligence Exchange significantly optimizes advanced threat prevention, closing the gap from encounter to containment for advanced targeted attacks from days, weeks, and months down to milliseconds.
Topics : Network Security
Topics : Security Management, SIEM
Topics : Network Security, Security Management
The City of Chicago’s recently formed Information Security Office (ISO) is charged with overseeing cybersecurity across all areas of the city, including critical infrastructure within the water, aviation, and public safety departments.
Eagle Rock Energy Partners is an energy company focused on upstream activities, including oil and gas drilling, production, and development. Eagle Rock has working oil and gas properties and development opportunities in the midcontinent area, Permian, and southeast regions of Texas, as well as Oklahoma, Arkansas, Southern Alabama, Mississippi, and Louisiana.
For a technical summary on the McAfee product listed above, please view the product data sheet.
The top 20 critical controls for effective cyberdefense.
Malware is becoming more complicated, covert, and clever. Your advanced threat protection solution needs to have just as cunning of a response.
Bury threats with McAfee’s Network Security Platform comprehensive signature-less approach to malware detection.
With today's advanced malware threats, IT departments need to expand their coverage with an appropriately configured security infrastructure. Finding, freezing and fixing advanced exploits fast requires a fully integrated, well-managed approach to IT security.
This paper explores the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.
A recent SANS survey provides an in-depth look at the primary industries adopting critical security controls and how they approach implementation.
AV-TEST performed a test of the McAfee Advanced Threat Defense appliance to determine its malware detection capabilities.
This ESG Lab Validation report documents hands-on testing of McAfee Advanced Threat Defense, a key component of McAfee’s end-to-end solution for addressing advanced malware. Testing was designed to explore how the solution accurately detects advanced malware using a layered approach, the speed and effectiveness of responding to an attack, and the operational efficiencies of this integrated solution.
While enterprises appear to be aware of advanced malware and its security challenges, the measures to defend against it need some attention and investment. This report presents survey results that gauge enterprise awareness of advanced malware and what’s measures are being taken to defend against it.
AV-TEST performed a review of McAfee’s IPS solution for the enterprise to determine malware detection and blocking capabilities.
This report discusses how to estimate the cost of malicious cyber activity, and its effect on trade, technology and competitiveness.
Many of today’s unknown, zero-day threats evade traditional signature-based defenses. The addition of third-party sandbox appliances can help, but they have several limitations: high cost of deployment, reliance on a generic virtualized environments, and limited analysis techniques, making the sandbox vulnerable to crafty malware designed to bypass analysis. McAfee Network Security Platform IPS and McAfee Advanced Threat Defense work together to find sophisticated threats, freeze them so they cannot infiltrate, and fix the damage done.
Next-generation firewalls certainly offer expanded network security for branch offices and remote locations, but they can’t find and block stealthy, advanced malware. Through the Security Connected approach from McAfee, Advanced Threat Defense and McAfee Next Generation Firewall work hand-in-hand to find and freeze today’s evasive and targeted cyberattacks.
McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threat response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.
This solution brief explains how the McAfee Security Connected approach provides advanced threat protection for the financial services industry and prevents targeted attacks.
Email is a vital communication vehicle for just about every business these days—and it is also a key threat vector for cybercrooks who are looking to steal valuable data or execute inbound attacks. As part of our unified, integrated Security Connected framework, McAfee Email Gateway and McAfee Advanced Threat Defense work together to find and freeze new, unknown, and stealthy advanced threats. For a complete end-to-end solution, add McAfee Real Time to the mix to quickly identify and fix systems impacted by advanced malware.
Social networks, cloud applications, and content-sharing sites have become essential business tools and IT organizations are struggling to make them safely accessible from inside and outside the corporate environment. Read this Solution Brief and see how McAfee Threat Defense for McAfee Web Gateway helps overcome the obstacles.
IT organizations are focused on shifting budgets from capital expenditures (CAPEX) to operational expenditures (OPEX) in an environment where in-house investments can easily get outpaced by an increasingly sophisticated cybercrime ecosystem. McAfee Advanced Threat Defense can help you to differentiate your services and protect customers against zero-day attacks by offering the industry’s most comprehensive threat protection.
Determined cyberattackers are striking US federal agencies with malware that is both more malicious and smarter than ever before. This malware is targeted, stealthy, evasive, and adaptive—enabling these characteristics in advanced persistent threats. Sure, known threats are still with us, but lurking in their midst are complex zero-day attacks that elude traditional defenses such as signatures. We are faced with designer rootkits and Trojans that can hide and move around US government networks, go unnoticed for long periods of time as they do their dirty work, infiltrating those networks and systems to steal vital government and citizen data assets. It’s a big and continually evolving problem that must be foremost in the minds of those entrusted to secure our government’s most sensitive and vital information and communication assets.
Each month brings new media coverage of a targeted attack against a business, government, or critical infrastructure operator previously considered “invulnerable.” As more organizations encounter advance malware issues - the cost, disruption, and public humiliation of data breaches and targeted attacks become an executive-level discussion. Comprehensive threat protection requires coordination of anti-malware technologies deployed with sensitivity to performance and risk.
Smart and malicious advanced malware is targeted stealthy, evasive, and adaptive. Sandboxing and other stand-alone products can't do the job on their own. This editorial brief explains why you need an arsenal of layered, integrated defenses to protect against these sophisticated threats.
Your organization is asking for an advanced malware detection and response strategy that’s sophisticated and adaptive against hacker attacks. Several design trends in advanced malware security affect the performance, efficacy, cost, and management complexity of an overall solution. What’s your next step?
SANS recently surveyed incident response (IR) teams to get a clearer picture of what they're up against today. The results are in; most organizations lack formalized IR plans, they expressed a need to collect and correlate threat intelligence and SIEM tools are their focus for improving IR capabilities.
In this white paper, IDC outlines McAfee Advanced Threat Defense (ATD) within the context of the specialized threat analysis and protection market. Our centralized approach to malware analysis, deep integrations across the product portfolio, and three-pronged focus on "Find, Freeze, Fix" as a way of dealing with threats is unique within the market and provides a more holistic approach than other detection-oriented products.
Critical Security Controls (CSCs) help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.
As malware becomes more sophisticated and evasive, new technologies are emerging to uncover threats no matter how well they’re camouflaged. This white paper proposes a logical design strategy for dynamic malware analysis that optimizes detection effectiveness, efficiency, and economics.
Adaptive intelligence and real-time communications orchestrate protection in the McAfee Security Connected Platform.
One question I often hear is “When will Intel Security (McAfee) publish a report on the latest threat?” It seems to be a hot trend today for security companies to offer reports with topics such as “Operation X” or “Malware Y,” or to trumpet how many zero-day vulnerabilities they have found. Do we now measure […]
The post At Intel Security, Protecting Customers Takes Precedence Over Seeking Headlines appeared first on McAfee.
Internet of Things (IoT) needs “white networks” to scale and deliver the assurance we require for machine-things; white as in “clean and pure”. The IoT will contain all the devices on the current internet, plus many new devices used for machine-to-machine and industrial applications and services. In contrast to a “white network” I would assess […]
We’ll be releasing four blog posts over the next week. Each blog will contain a repeated clue word to help you solve the puzzle below. Track all four clues to help solve the final puzzle and a chance to win a Nikon D3200 DSLR camera and 18-55mm lens!. To enter the contest, after the […]
Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers and programs that can be accessed through browsers. The most common exploit targets are Java, Flash, PDFs, and Silverlight. Exploit kits use lots of techniques to evade detection by security products. Exploit kits use several common techniques: Code […]
While the dust in Las Vegas may still be settling from three jam-packed days of security discussions, demos, expert panels, and more, we‘ve brought back with us valuable takeaways and tales from FOCUS 14. During the 7th annual McAfee FOCUS conference, brought to you by Intel Security, we talked with partners about the future of […]