Get cost-effective, network-wide visibility with McAfee Network Threat Behavior Analysis. Network Threat Behavior Analysis monitors and reports unusual network behavior by analyzing traffic from switches and routers from vendors such as Cisco, Juniper Networks, and Extreme Networks. It comes fully equipped with quad-core processors, a RAID array, distinct flow capacity, gigabit Ethernet connectivity, and offline storage area network connectivity.
Network Threat Behavior Analysis collects and analyzes traffic from the entire network — host and applications — to detect worms, botnets, zero-day threats, spam, and reconnaissance attacks. It reports any unusual behavior to help you maintain a comprehensive and efficient network security infrastructure.
Network Threat Behavior Analysis seamlessly integrates with the McAfee Network Security Platform intrusion prevention system to build a comprehensive and robust security infrastructure.
Enhanced security powered by McAfee Global Threat Intelligence
McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Network Threat Behavior Analysis uses the McAfee GTI network connection reputation service to identify domains and IP addresses that are infected or hosting malware attacks, and block those attacks.
Detect behavior-based threats — even those that are unknown. McAfee Network Threat Behavior Analysis monitors and reports unusual behavior by analyzing network traffic, so you can identify and quickly respond to unauthorized application usage.
Pinpoint problem segments with cost-effective, network-wide visibility. Sort and analyze network traffic effortlessly and eliminate manual diagnosis of network-related traffic problems.
Collect and analyze traffic from the entire network through a single Network Threat Behavior Analysis sensor. Analyze host and application behavior, identify threats through behavior-based algorithms, and inspect networks for worms, botnets, spam, zero-day threats, reconnaissance attacks, and associated behaviors.
Use Network Threat Behavior Analysis with your current network defenses. Seamlessly integrate Network Threat Behavior Analysis with the McAfee Network Security Platform intrusion prevention system to correlate unusual network behavior caused by intrusions. It also works with the McAfee ePolicy Orchestrator (ePO) software, McAfee Network Security Manager, and McAfee Vulnerability Manager, and is compatible with switches and routers from vendors such as Cisco, Juniper Networks, and Extreme Networks.
Protect against attacks arising from almost anywhere in your network — without extensive footprint expansion. With Network Threat Behavior Analysis, McAfee's Network Security Platform can see attacks emerging from the farthest regions of your network to deliver a better return on your network security investment.
McAfee Network Threat Behavior Analysis is a self-contained device. There are no minimum software or hardware system requirements.
Learn about McAfee Network Threat Behavior Analysis and how it provides real-time monitoring of the network to detect malicious behavior and previously unknown attacks.
Learn how to download and install a virtual Network Threat Behavior Analysis appliance on a VMware server.
Learn how to configure McAfee Network Threat Behavior Analysis through our step-by-step installation tutorial.
For guidance on how to use this McAfee product, watch the Quick Tips video listed above.
Ranked by IT solution providers (SPs), CRN Research ranks the Top 25 must-have technology suppliers from a list of nearly 230 companies in 12 product categories that SPs need to consider when formalizing their partnerships today and for the future. 1,000 unique SPs of all types and sizes were surveyed.
For a technical summary on the McAfee product listed above, please view the product data sheet.
How familiar are you with low-hanging fruit — the easiest ways for attackers to gain entry to your network and potentially run off with your valuable data? This white paper explores penetration tests that you can perform at your organization to gain an understanding of how to apply the proper defenses to prevent exploitation of the top five low-hanging fruit.
I want to share some of the good work McAfee Labs did in the past year in optimizing and enhancing the V2 DATs (malware definition files, also known as AVV DATs) used in McAfee VirusScan Enterprise and other McAfee enterprise products. In 2014, we reduced DAT size by more than 45% to about 70MB, down […]
For McAfee Labs the New Year will start with a lot of excitement. During the next 10 weeks, several of us researchers will teach a master class at Oregon State University. During this class, “Defending against the Dark Arts,” more than 60 students will be served a diversity of topics, including malware, forensics, memory analysis, […]
The post McAfee Labs Researchers Offer Master Class in Security at Oregon State appeared first on McAfee.
Adobe Flash vulnerabilities and exploits have worried users and security professionals for many years. The situation today remains serious. A quick search of the National Vulnerability Database shows 277 vulnerabilities reported in Flash Player since 2011. For Flash zero-day attacks (which means that there was no patch from Adobe when the vulnerability was exploited), researcher […]
The post An Advance You Won’t Want to Miss: McAfee Adds Flash Exploit Detection to NSP 8.2 appeared first on McAfee.
Much has been written in a variety of news, financial, and political publications about the effects upon the populace and economy as a result of the October 2013 government shutdown. From thousands of children having their “Head Start” programs terminated to poultry and meat inspections potentially not occurring, to a $2 billion to $6 billion […]
McAfee Labs provides important information about threats in a variety of ways, from our McAfee Global Threat Intelligence service that feeds into many of our products, to published Threat Reports, our online Threat Center, and many active bloggers. Although it is useful for security professionals to know about the latest threats, one question that I […]
The post How Do I Defend Against Threats in the Latest McAfee Labs Report? appeared first on McAfee.