McAfee Threat Intelligence Exchange delivers a cohesive framework where security products collectively pinpoint threats and act as a unified threat defense system providing security resilience and immunity to infections. Threat Intelligence Exchange significantly optimizes threat prevention by narrowing the gap from encounter to containment from days, weeks, and months down to milliseconds.
Apply the power of knowledge — Threat Intelligence Exchange makes it possible for administrators to easily tailor comprehensive threat intelligence from multiple intelligence data sources. This customization empowers administrators to assemble, override, and tune the intelligence source information so that they can modify protection for their environment and organization.
Orchestrate in real time — Threat Intelligence Exchange is the first solution to use the McAfee data exchange layer, a bidirectional communications fabric enabling security intelligence, and adaptive security through product integration simplicity and context sharing. The data exchange layer supports the automatic configuration of products, reducing errors and eliminating effort to lower implementation and operational costs of integration.
Supercharge existing endpoint protection — Threat Intelligence Exchange provides breakthrough endpoint protection, using McAfee VirusScan Enterprise to make accurate file execution decisions. Endpoints will also be protected based on malware detected by network gateways, while network gateways block access based on endpoint convictions.
McAfee Threat Intelligence Exchange makes it possible for administrators to easily tailor comprehensive threat intelligence from global data sources, such as McAfee Global Threat Intelligence (GTI) and third-party feeds, with local threat intelligence sourced from real-time and historical event data coming from endpoints, gateways, and other security components.
The McAfee data exchange layer enables security components to dynamically join the McAfee Threat Intelligence Exchange. Shared insights bring deeper awareness of the threats targeting an organization. Attacks are discovered through the endpoints, gateways, and other security components united in providing real-time surveillance.
Threat details collected from malware encounters at endpoints and network gateways can propagate through the data exchange layer in milliseconds, educating all security components to proactively immunize against newly detected threats.
While increasing security resiliency, security cost of ownership is lowered by extending existing McAfee security detection, prevention, and analytic technology investments to proactively and efficiently protect your organization as soon as a threat is revealed.
McAfee Threat Intelligence Exchange requires the following products:
Adaptive intelligence and real-time communications orchestrate protection in the McAfee Security Connected Platform.
To say cyber threats are getting more advanced may be the understatement of the year. Every minute, our 500-plus team at McAfee Labs learns something new about the behavior of malware and other types of network attacks. The most commonly undetected threat these days is the advanced evasion technique (AET). In the most basic terms, […]
Targeted attacks can take on many different forms and are flexible enough to adopt a variety of tactics. Think of them as a specialized unit for cyber criminals. They are utilized for very specific missions and operate with the precision of a surgical strike, rather than the carpet-bombing techniques used by other malware variants. Whether […]
The post July #SecChat – Targeted Attacks Set Sights on Vital Systems appeared first on McAfee.
Texas Tech University Health Sciences Center (TTUHSC) is a leader in education and research. With seven schools across six campuses, research facilities, and health care clinics, the university’s IT security team has the lofty task of protecting electronic medical records and health information in compliance with HIPAA regulations. Previously, TTUHSC lacked a centralized security management […]
The post Texas Tech University HSC Unifies Security and Compliance with McAfee SIEM Solutions appeared first on McAfee.
At last week’s Gartner Risk and Security Management Summit, Anton Chuvakin mentioned that 1-3% of systems are compromised today. He called it “a low intensity fire, not a conflagration.” This seemed like a great analogy for our challenge with incident response. As a security industry—indeed, as a society—it’s much more straightforward to detect, contain, and […]
There’s no denying that the open source software movement has its benefits, but it’s not without its shortcomings either. This fact was demonstrated in full earlier this year, when Heartbleed took the Web by storm. The vulnerability’s effects were felt around the world and resulted in an almost unprecedented exposure of private data. For our […]
The post June #SecChat Recap – Open Source Security in a Post-Heartbleed World appeared first on McAfee.