McAfee Advanced Threat Defense

McAfee Advanced Threat Defense

Rilevamento avanzato del malware furtivo del giorno zero.

Agisci:
  • Contatta McAfee
    Pronto a fare un acquisto o vuoi chiarire dei dubbi prima di acquistare? Contatta un esperto McAfee. Disponibile dal lunedì al venerdì. Disponibile solo in inglese.
  • Trova un rivenditore
  • Contattaci
  • Telefonare: 00800 122 55624

Panoramica

McAfee Advanced Threat Defense rileva l'odierno malware furtivo, del giorno zero, con un innovativo approccio a più livelli. Combina le firme antivirus a bassa manutenzione, le informazioni sulla reputazione e le difese basate sull'emulazione in tempo reale con l'approfondita analisi statica del codice e l'analisi dinamica nella sandbox per conoscere l'effettivo comportamento del malware. Questa combinazione rappresenta la tecnologia antimalware più robusta e avanzata presente sul mercato, in grado di raggiungere efficacemente l'equilibrio fra le esigenze di sicurezza e di prestazioni.

Con l'aggiunta di Advanced Threat Defense al suo portafoglio per la sicurezza, McAfee soddisfa i tre requisiti fondamentali per risolvere il problema posto dall'odierno malware avanzato: individuare, bloccare e risolvere. Advanced Threat Defense trova il malware avanzato e si integra con le soluzioni McAfee per la sicurezza della rete in modo da bloccare la minaccia, mentre McAfee Real Time comincia le attività di correzione o remediation.

SIEM tools are key to improving incident response
Best Practices Against Advanced Malware
Take an Integrated Approach to Advanced Threats

Caratteristiche e vantaggi

Rilevamento più accurato delle minacce

Minori probabilità di malware non individuato o di falsi positivi. McAfee Advanced Threat Defense usa l'analisi statica avanzata del codice e l'analisi dinamica nella sandbox per offrire una valutazione molto dettagliata e i dati per la classificazione del malware. Per evitarne il rilevamento, il malware furtivo e le minacce zero-day vengono compressi od occultati. Advanced Threat Defense utilizza una robusta tecnica di decompressione per vincere le tecniche evasive, permettendo un'analisi completa e una classificazione accurata. Grazie al gran numero di sistemi operativi supportati, le minacce vengono analizzate nelle stesse condizioni del profilo dell'host, così puoi individuare più malware con meno falsi allarmi.

Risposta più rapida alle minacce

Passa in modo rapido e semplice dall'analisi e blocco del malware avanzato alla protezione e risoluzione: un approccio più completo ed efficiente al problema del malware. Down selection: usando innanzitutto un misto di firme, reputazione ed emulazione in tempo reale, permette di identificare rapidamente un'ampia gamma di malware, rilevandoli velocemente e riducendo il numero di file che richiedono una più approfondita analisi nella sandbox.

Ridurre il TCO

La distribuzione centralizzata consente a più dispositivi di rete McAfee di condividere una stessa appliance per l'analisi del malware, quindi riducendo il numero delle appliance necessarie, semplificando l'amministrazione ed estendendo a un costo conveniente la protezione a tutta la rete. Advanced Threat Defense è in grado di sfruttare le soluzioni di sicurezza McAfee esistenti, riducendo la necessità di modificare l'architettura della rete e minimizzando i costi operativi.

Un unico fornitore di sicurezza con una stretta integrazione dei prodotti

McAfee offre tutti i componenti essenziali per individuare il malware avanzato, bloccare la minaccia e avviare la correzione. Offrendo una soluzione end-to-end che integra analisi avanzata delle minacce, prodotti per la rete e soluzioni per gli endpoint, McAfee dà visibilità sull'intera organizzazione e fornisce il contesto delle minacce, riducendo i tempi di reazione e semplificando la remediation.

Requisiti di sistema

McAfee Advanced Threat Defense è un dispositivo indipendente. Non esistono requisiti software o hardware minimi.

Componenti hardware dell'appliance ATD-6000 ATD-3000
Dimensioni Montaggio in rack 2RU 43,79 cm (L) x 8,71 cm (A) x 71,12 cm (P) Montaggio in rack 1RU 43,81 cm (L) x 4,32 cm (A) x 73,66 cm (P)
Peso 22,68 kg 14,97 kg
Archiviazione Spazio su disco: 4 x 4 TB
SSD: 2 x 800 GB
Spazio su disco: 2 x 4 TB
SSD: 2 x 400 GB
Massimo consumo di elettricità 2 x 1600 W 2 x 750 W
Alimentatore ridondante CA ridondante, con funzionalità hot swap
Tensione CA 100-240 V a 50–60 Hz e 8,5 Amp 100-240 V a 50–60 Hz e 5,8 Amp
Temperatura Da 0°C a 35°C (operativa). Da –40°C a 70°C (non operativa)
Umidità relativa (senza condensa) Operativa: da 10% a 90%. Non-operativa: da 50% a 90%
Altitudine 0–10.000 piedi
Certificazioni di sicurezza Licenze e rapporti UL 1950, CSA-C22.2 N. 950, EN-60950, IEC 950, EN 60825, 21CFR1040 CB che coprono tutti gli scostamenti nazionali
Certificazione EMI FCC Parte 15, Classe A (CFR 47) (USA), ICES-003 Classe A

Video

Video

Outdated methods of malware detection leave crucial data at risk. Learn how McAfee solutions can prevent advanced malware attacks and protect valued assets.

Malware is becoming more evasive than ever before, making sandbox detection difficult. Ensure your team catches stealth, zero-day malware with McAfee Advanced Threat Defense.

Jon Oltsik, Sr. Principle analyst, Security at ESG talks about today’s trends in advanced malware, detection options, and the importance of integration between endpoint and network solutions for protection, context and increased ability to respond. Jon shares his impression of McAfee Advanced Threat Defense.

Premi / Recensioni

CRN include McAfee nella sua classifica 2013 delle 25 migliori aziende di cui essere partner
CRN include McAfee nella sua classifica 2013 delle 25 migliori aziende di cui essere partner

In base ai commenti dei fornitori di soluzioni informatiche (SP), CRN Research seleziona i 25 migliori produttori di tecnologia da un elenco di quasi 230 aziende nelle 12 categorie di prodotti che gli SP prendono in considerazione quando formalizzano le loro partnership, oggi come in futuro. Sono stati interpellati 1.000 SP di tutti tipi e dimensioni.

SC Magazine
Premi SC Magazine Readers Trust – Migliore protezione dalle APT

SC Magazine sceglie McAfee come finalista dei premi Readers Trust — Categoria Migliore Protezione contro le Minacce Avanzate Persistenti (APT).

Prodotti correlati

McAfee Advanced Threat Defense è un componente di base del portafoglio McAfee per la protezione della rete e del framework Security Connected. Advanced Threat Defense può funzionare come appliance autonoma per la sicurezza della rete oppure in sinergia con i sistemi McAfee per la prevenzione delle intrusioni e le soluzioni avanzate per la protezione web. Tutto viene gestito tramite una console centralizzata.

McAfee Network Security Platform
McAfee Network Security Platform è un'esclusiva soluzione di sicurezza intelligente che scopre e blocca le minacce sofisticate presenti nella rete. Avvalendosi di avanzate tecniche di rilevamento delle minacce, la nostra piattaforma difende contro gli attacchi furtivi con estrema accuratezza fino a 80 Gbps, fornendo contemporaneamente dettagliati dati contestuali su utenti, dispositivi e applicazioni. Ciò consente di rispondere adeguatamente agli attacchi che si originano nella rete.

McAfee Web Gateway
McAfee Web Gateway, implementato on premise con applicazioni o in un ambiente virtuale, offre una protezione proattiva e potente contro minacce zero-day, spyware e attacchi mirati. Web Gateway combina questa sicurezza avanzata con un controllo flessibile e dettagliato, che permette alla tua azienda di ottenere il massimo vantaggio dal web senza mettere a rischio la sicurezza.

McAfee ePolicy Orchestrator
McAfee ePolicy Orchestrator (McAfee ePO) è un componente fondamentale della piattaforma McAfee Security Management ed è l'unico software di classe enterprise a fornire la gestione unificata di endpoint, rete e sicurezza dei dati. Grazie alla visibilità end-to-end e alle potenti funzioni di automazione che riducono i tempi di risposta agli eventi, il software McAfee ePO rafforza notevolmente la protezione e permette di tagliare i costi di gestione e sicurezza.

Risorse

Blueprint tecnologici

Find, Freeze, and Fix Advanced Threats (english)

Your organization is asking for an advanced malware detection and response strategy that’s sophisticated and adaptive against hacker attacks. Several design trends in advanced malware security affect the performance, efficacy, cost, and management complexity of an overall solution. What’s your next step?

Infographics

Deeper Inspection. Better Threat Protection. (english)

Malware is becoming more complicated, covert, and clever. Your threat defense needs to have just as cunning of a response.

Bury Threats Before They Bury Your Business (english)

Bury threats with McAfee’s Network Security Platform comprehensive signature-less approach to malware detection.

Take An Integrated Approach To Advanced Threats (english)

With today's advanced malware threats, IT departments need to expand their coverage with an appropriately configured security infrastructure. Finding, freezing and fixing advanced exploits fast requires a fully integrated, well managed approach to IT security.

Panoramiche sulle soluzioni

McAfee Delivers Comprehensive Threat Protection for the Financial Services Industry (english)

This solution brief explains how the McAfee Security Connected approach provides advanced threat protection for the financial services industry and prevents targeted attacks.

McAfee Advanced Threat Defense: Services solutions for Managed Service Providers (MSP) (english)

IT organizations are focused on shifting budgets from capital expenditures (CAPEX) to operational expenditures (OPEX) in an environment where in-house investments can easily get outpaced by an increasingly sophisticated cybercrime ecosystem. McAfee Advanced Threat Defense can help you to differentiate your services and protect customers against zero-day attacks by offering the industry’s most comprehensive threat protection.

Advanced Malware: Protecting Federal Agencies with a Layered Defense Strategy (english)

Determined cyberattackers are striking US federal agencies with malware that is both more malicious and smarter than ever before. This malware is targeted, stealthy, evasive, and adaptive—enabling these characteristics in advanced persistent threats. Sure, known threats are still with us, but lurking in their midst are complex zero-day attacks that elude traditional defenses such as signatures. We are faced with designer rootkits and Trojans that can hide and move around US government networks, go unnoticed for long periods of time as they do their dirty work, infiltrating those networks and systems to steal vital government and citizen data assets. It’s a big and continually evolving problem that must be foremost in the minds of those entrusted to secure our government’s most sensitive and vital information and communication assets.

Counter Stealthy Malware (english)

The most menacing type of cyberattack is invisible. Using sophisticated techniques to hide its presence, stealthy malware may operate outside of the OS or move dynamically across endpoints to conceal the attackers’ actions. The risk to enterprises is real, with high-profile attacks such as Operation High Roller impacting companies around the globe. Traditional antivirus or intrusion prevention systems are no match for this new breed of stealthy malware; instead, enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.

Neutralize Advanced Threats (english)

Each month brings new media coverage of a targeted attack against a business, government, or critical infrastructure operator previously considered “invulnerable.” As more organizations encounter advance malware issues - the cost, disruption, and public humiliation of data breaches and targeted attacks become an executive-level discussion. Comprehensive threat protection requires coordination of anti-malware technologies deployed with sensitivity to performance and risk.

Neutralize Advanced Threats (english)

Each month brings new media coverage of a targeted attack against a business, government, or critical infrastructure operator previously considered “invulnerable.” As more organizations encounter advance malware issues - the cost, disruption, and public humiliation of data breaches and targeted attacks become an executive-level discussion. Comprehensive threat protection requires coordination of anti-malware technologies deployed with sensitivity to performance and risk.

Advanced Malware: Nowhere to Hide with a Layered Defense Strategy (english)

Smart and malicious advanced malware is targeted stealthy, evasive, and adaptive. Sandboxing and other stand-alone products can't do the job on their own. This editorial brief explains why you need an arsenal of layered, integrated defenses to protect against these sophisticated threats.

Rapporti

McAfee Advanced Threat Defense Test Results (english)

AV-TEST performed a test of the McAfee Advanced Threat Defense appliance to determine its malware detection capabilities.

ESG Lab Validation Report: McAfee Advanced Threat Defense (english)

This ESG Lab Validation report documents hands-on testing of McAfee Advanced Threat Defense, a key component of McAfee’s end-to-end solution for addressing advanced malware. Testing was designed to explore how the solution accurately detects advanced malware using a layered approach, the speed and effectiveness of responding to an attack, and the operational efficiencies of this integrated solution.

Webtorials State-of-the Market Report: Doing Battle with Advanced Malware

While enterprises appear to be aware of advanced malware and its security challenges, the measures to defend against it need some attention and investment. This report presents survey results that gauge enterprise awareness of advanced malware and what’s measures are being taken to defend against it.

McAfee IPS Appliance Test (english)

AV-TEST performed a review of McAfee’s IPS solution for the enterprise to determine malware detection and blocking capabilities.

The Economic Impact of Cybercrime and Cyber Espionage (english)

This report discusses how to estimate the cost of malicious cyber activity, and its effect on trade, technology and competitiveness.

McAfee Web Gateway: 2013 Malware Blocking Rates (english)

AV-Test performed a test of McAfee Web Gateway to determine its malware detection and blocking capabilities.

Schede tecniche

McAfee Advanced Threat Defense

Per un riassunto tecnico sui prodotti McAfee elencati qui sopra, vedere la scheda tecnica del prodotto.

White paper

Preventing Targeted Attacks with McAfee's Advanced Threat Defense (english)

In this white paper, IDC outlines McAfee Advanced Threat Defense (ATD) within the context of the specialized threat analysis and protection market. Our centralized approach to malware analysis, deep integrations across the product portfolio, and three-pronged focus on "Find, Freeze, Fix" as a way of dealing with threats is unique within the market and provides a more holistic approach than other detection-oriented products.

Conquer the Top 20 Critical Security Controls (english)

The strength of the Critical Security Controls (CSCs) is their ability to reflect the consensus of successful experiences captured and refined over multiple revisions. The CSCs help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

Crea una sandbox migliore

As malware becomes more sophisticated and evasive, new technologies are emerging to uncover threats no matter how well they’re camouflaged. This white paper proposes a logical design strategy for dynamic malware analysis that optimizes detection effectiveness, efficiency, and economics.

Advanced Targeted Attacks: It Takes a System (english)

Adaptive intelligence and real-time communications orchestrate protection in the McAfee Security Connected Platform.

Comunità

Blog

  • Consumers Eager for Connected Technology
    Robert Siciliano - settembre 16, 2014

    Many of us are familiar with the Jetson’s TV cartoon that showed the life of a family in 2026 and how technology is a part of their everyday life. If you’re like me, some of the gadgets that George and his family had are probably things you thought were cool or would be convenient to […]

    The post Consumers Eager for Connected Technology appeared first on McAfee.

  • Network Security Perspective: One Phish, Two Phish
    Ruby Williams - settembre 9, 2014

    It’s hard to believe we’re already past the half way mark for the year, but I suppose that’s what happens when we live in a world with so much action and activity all around us.  As I’ve said before, the pace of business today is overwhelming.  We’re inundated with content and data coming at us […]

    The post Network Security Perspective: One Phish, Two Phish appeared first on McAfee.

  • Detection Effectiveness: the Beat Goes On
    McAfee Labs - agosto 27, 2014

    In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made this critical point: Stopping attacks before they breach and narrowing the breach discovery gap require the ability to detect threats at […]

    The post Detection Effectiveness: the Beat Goes On appeared first on McAfee.

  • Trust Is the Most Valuable Asset
    Jarno Limnell - agosto 15, 2014

    The most valuable asset for actors in cyberspace is trust. It is an important ingredient in successful business operations as well as in good governance. Trust and security are closely intertwined. One cannot exist without the other. Thus it is concerning that people at an increasing rate hesitate to trust the digital world. They are […]

    The post Trust Is the Most Valuable Asset appeared first on McAfee.

  • Cat “Hacker” Scouts Out Weak Wi-Fi Networks
    Gary Davis - agosto 12, 2014

    Man has always had an innate fascination with our feline friends. Ancient Egyptians famously worshiped them, some in the Middle Ages feared them, and today’s Internet denizens pay money to have their pictures taken with meme-generating kitties. But there’s another reason to consider the cat: it turns out that they’re expert when it comes to […]

    The post Cat “Hacker” Scouts Out Weak Wi-Fi Networks appeared first on McAfee.

Minacce e rischi correlati