McAfee Network Threat Behavior Analysis

McAfee Network Threat Behavior Analysis

Network-wide threat visibility and assessment for enterprises

Next Steps:

Overview

Get cost-effective, network-wide visibility with McAfee Network Threat Behavior Analysis. Network Threat Behavior Analysis monitors and reports unusual network behavior by analyzing traffic from switches and routers from vendors such as Cisco, Juniper Networks, and Extreme Networks. It comes fully equipped with quad-core processors, a RAID array, distinct flow capacity, gigabit Ethernet connectivity, and offline storage area network connectivity.

Network Threat Behavior Analysis collects and analyzes traffic from the entire network — host and applications — to detect worms, botnets, zero-day threats, spam, and reconnaissance attacks. It reports any unusual behavior to help you maintain a comprehensive and efficient network security infrastructure.

Network Threat Behavior Analysis seamlessly integrates with the McAfee Network Security Platform intrusion prevention system to build a comprehensive and robust security infrastructure.

Enhanced security powered by McAfee Global Threat Intelligence
McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Network Threat Behavior Analysis uses the McAfee GTI network connection reputation service to identify domains and IP addresses that are infected or hosting malware attacks, and block those attacks.

Features & Benefits

Minimize IT and business risk

Detect behavior-based threats — even those that are unknown. McAfee Network Threat Behavior Analysis monitors and reports unusual behavior by analyzing network traffic, so you can identify and quickly respond to unauthorized application usage.

Maximize coverage and value

Pinpoint problem segments with cost-effective, network-wide visibility. Sort and analyze network traffic effortlessly and eliminate manual diagnosis of network-related traffic problems.

Get network-wide visibility and insight

Collect and analyze traffic from the entire network through a single Network Threat Behavior Analysis sensor. Analyze host and application behavior, identify threats through behavior-based algorithms, and inspect networks for worms, botnets, spam, zero-day threats, reconnaissance attacks, and associated behaviors.

Integrate Network Threat Behavior Analysis into your existing security infrastructure

Use Network Threat Behavior Analysis with your current network defenses. Seamlessly integrate Network Threat Behavior Analysis with the McAfee Network Security Platform intrusion prevention system to correlate unusual network behavior caused by intrusions. It also works with the McAfee ePolicy Orchestrator (ePO) software, McAfee Network Security Manager, and McAfee Vulnerability Manager, and is compatible with switches and routers from vendors such as Cisco, Juniper Networks, and Extreme Networks.

Improve security asset value

Protect against attacks arising from almost anywhere in your network — without extensive footprint expansion. With Network Threat Behavior Analysis, McAfee's Network Security Platform can see attacks emerging from the farthest regions of your network to deliver a better return on your network security investment.

System Requirements

McAfee Network Threat Behavior Analysis is a self-contained device. There are no minimum software or hardware system requirements.

Demos / Tutorials

Tutorials

Learn about McAfee Network Threat Behavior Analysis and how it provides real-time monitoring of the network to detect malicious behavior and previously unknown attacks.

Learn how to download and install a virtual Network Threat Behavior Analysis appliance on a VMware server.

Learn how to configure McAfee Network Threat Behavior Analysis through our step-by-step installation tutorial.

For guidance on how to use this McAfee product, watch the Quick Tips video listed above.

Awards / Reviews

CRN Ranks McAfee in their 2013 Top 25 Best Companies to Partner With
CRN Ranks McAfee in their 2013 Top 25 Best Companies to Partner With

Ranked by IT solution providers (SPs), CRN Research ranks the Top 25 must-have technology suppliers from a list of nearly 230 companies in 12 product categories that SPs need to consider when formalizing their partnerships today and for the future. 1,000 unique SPs of all types and sizes were surveyed.

Community

Blogs

  • Detection Effectiveness: the Beat Goes On
    McAfee Labs - August 27, 2014

    In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made this critical point: Stopping attacks before they breach and narrowing the breach discovery gap require the ability to detect threats at […]

    The post Detection Effectiveness: the Beat Goes On appeared first on McAfee.

  • Trust Is the Most Valuable Asset
    Jarno Limnell - August 15, 2014

    The most valuable asset for actors in cyberspace is trust. It is an important ingredient in successful business operations as well as in good governance. Trust and security are closely intertwined. One cannot exist without the other. Thus it is concerning that people at an increasing rate hesitate to trust the digital world. They are […]

    The post Trust Is the Most Valuable Asset appeared first on McAfee.

  • Cat “Hacker” Scouts Out Weak Wi-Fi Networks
    Gary Davis - August 12, 2014

    Man has always had an innate fascination with our feline friends. Ancient Egyptians famously worshiped them, some in the Middle Ages feared them, and today’s Internet denizens pay money to have their pictures taken with meme-generating kitties. But there’s another reason to consider the cat: it turns out that they’re expert when it comes to […]

    The post Cat “Hacker” Scouts Out Weak Wi-Fi Networks appeared first on McAfee.

  • Trailing the Trojan njRAT
    Neeraj Thakar - August 5, 2014

    One Trojan that just won’t go away is the remote access tool njRAT. Microsoft recently took down a leading domain associated with the malware, but that action did not come off as smoothly as the company hoped. We closely track this remote access tool (RAT) and see a rise in its popularity every year. The […]

    The post Trailing the Trojan njRAT appeared first on McAfee.

  • The Firewall is Turning 25, but is it Really All Grown Up?
    Pat Calhoun - July 23, 2014

    When I turned 25, I saw this as a pretty big milestone in my life.  At 25 years old, I felt like a true adult – I was now all grown up.  I was educated, employed, experienced and stable.   But when I look back, the journey from childhood to adulthood was really far from over […]

    The post The Firewall is Turning 25, but is it Really All Grown Up? appeared first on McAfee.

Related Solutions
Threats and Risks