McAfee Advanced Threat Defense

McAfee Advanced Threat Defense

Rilevamento avanzato del malware furtivo del giorno zero.

Agisci:
  • Contatta McAfee
    Pronto a fare un acquisto o vuoi chiarire dei dubbi prima di acquistare? Contatta un esperto McAfee. Disponibile dal lunedì al venerdì. Disponibile solo in inglese.
  • Trova un rivenditore
  • Contattaci
  • Telefonare: 800902644

Panoramica

Gli odierni attacchi mirati sono progettati per superare i sistemi di sicurezza tramite vari metodi che confondono le difese o le evitano completamente.

Con la soluzione McAfee Advanced Threat Defense, McAfee ha trasformato l'attività di rilevamento collegando le funzioni di analisi avanzata del malware con le difese, dal perimetro della rete all'endpoint, e condividendo le informazioni sulle minacce con l'intero ambiente IT. Grazie alla condivisione delle informazioni sulle minacce fra i sistemi di gestione, rete ed endpoint, McAfee interrompe immediatamente le comunicazioni di comando e di controllo, mette in quarantena i sistemi compromessi, blocca le ulteriori istanze dello stesso malware o similare, valuta se sono stati causati dei danni e intraprende delle azioni.

McAfee Advanced Threat Defense consente alle organizzazioni non solo di rilevare gli attacchi furtivi di oggi, ma anche di convertire le informazioni in azioni e, quindi, in protezione.

Soddisfa i tre requisiti fondamentali necessari per risolvere l'obiettivo di prevenzione delle minacce avanzate: individuare, bloccare e risolvere. McAfee Advanced Threat Defense individua il malware avanzato e si integra con le soluzioni di sicurezza McAfee per bloccare le minacce, identificare le macchine vulnerabili e cominciare le attività di risoluzione o remediation.

Best Practices Against Advanced Threats

Gartner Digital Newsletter

Read Now

See McAfee Advanced Threat Defense in action: Videos, demos & technical guides

Learn More

Fighting advanced threats one layer at a time

View Infographic

Caratteristiche e vantaggi

Rilevamento più accurato delle minacce avanzate

Minori probabilità di malware non individuato o di falsi positivi. McAfee Advanced Threat Defense usa l'analisi statica sofisticata del codice e l'analisi dinamica nella sandbox per offrire una valutazione molto dettagliata e i dati per la classificazione del malware. Per evitarne il rilevamento, il malware furtivo e le minacce zero-day persistenti vengono compressi od occultati. Advanced Threat Defense utilizza una robusta tecnica di decompressione per vincere le tecniche evasive, permettendo un'analisi completa e una classificazione accurata. Grazie al gran numero di sistemi operativi supportati, le minacce vengono analizzate nelle stesse condizioni del profilo dell'host, così puoi individuare più malware con meno falsi allarmi.

Risposta più rapida alle minacce

Passa in modo rapido e semplice dall'analisi e blocco del malware avanzato alla protezione e risoluzione delle minacce avanzate: una soluzione più completa ed efficiente al problema del malware. Down selection: usando innanzitutto un misto di firme, reputazione ed emulazione in tempo reale, permette di identificare rapidamente un'ampia gamma di malware, rilevandoli velocemente e riducendo il numero di file che richiedono una più approfondita analisi nella sandbox.

Ridurre il TCO

La distribuzione centralizzata consente a più dispositivi di rete McAfee di condividere una stessa appliance per l'analisi del malware, quindi riducendo il numero delle appliance di protezione delle minacce avanzate, semplificando l'amministrazione ed estendendo a un costo conveniente la protezione a tutta la rete. Advanced Threat Defense è in grado di sfruttare le soluzioni di sicurezza McAfee esistenti, riducendo la necessità di modificare l'architettura della rete e minimizzando i costi operativi.

Migliori insieme: I componenti di sicurezza operano come fossero uno solo

La stretta integrazione riduce il tempo che intercorre fra rilevamento, contenimento e protezione, consente un'efficiente gestione degli allarmi tramite i flussi di lavoro semplificati e mantiene in modo affidabile il throughput e l'imposizione delle policy. Il supporto di OpenIOC e STIX, due standard aperti per gli indicatori di compromissione e il formato delle informazioni sulle minacce, potenzia e abilita ulteriormente l'integrazione.

Requisiti di sistema

McAfee Advanced Threat Defense è un dispositivo indipendente. Non esistono requisiti software o hardware minimi.

Componenti hardware dell'appliance ATD-6000 ATD-3000
Dimensioni Montaggio in rack 2RU 43,79 cm (L) x 8,71 cm (A) x 71,12 cm (P) Montaggio in rack 1RU 43,81 cm (L) x 4,32 cm (A) x 73,66 cm (P)
Peso 22,68 kg 14,97 kg
Archiviazione Spazio su disco: 4 x 4 TB
SSD: 2 x 800 GB
Spazio su disco: 2 x 4 TB
SSD: 2 x 400 GB
Massimo consumo di elettricità 2 x 1600 W 2 x 750 W
Alimentatore ridondante CA ridondante, con funzionalità hot swap
Tensione CA 100-240 V a 50–60 Hz e 8,5 Amp 100-240 V a 50–60 Hz e 5,8 Amp
Temperatura Da 0°C a 35°C (operativa). Da –40°C a 70°C (non operativa)
Umidità relativa (senza condensa) Operativa: da 10% a 90%. Non-operativa: da 50% a 90%
Altitudine 0–10.000 piedi
Certificazioni di sicurezza Licenze e rapporti UL 1950, CSA-C22.2 N. 950, EN-60950, IEC 950, EN 60825, 21CFR1040 CB che coprono tutti gli scostamenti nazionali
Certificazione EMI FCC Parte 15, Classe A (CFR 47) (USA), ICES-003 Classe A

Video

Video

Learn how McAfee Advanced Threat Defense works with your current security from network to endpoint to protect against threats.

Malware is becoming more evasive than ever before, making sandbox detection difficult. Ensure your team catches stealth, zero-day malware with McAfee Advanced Threat Defense.

Jon Oltsik, Sr. Principle analyst, Security at ESG talks about today’s trends in advanced malware, detection options, and the importance of integration between endpoint and network solutions for protection, context and increased ability to respond. Jon shares his impression of McAfee Advanced Threat Defense.

Premi / Recensioni

Miercom
Miercom: Analisi avanzata delle minacce — Funzionalità e quote di cattura

Gli approcci della tecnologia per sconfiggere le minacce sofisticate variano notevolmente, con una gamma di opzioni di distribuzione e livelli di efficacia diversi. Qual è la giusta soluzione per la tua rete? Questo webcast illustra le funzionalità da cercare nella tua soluzione di analisi avanzata delle minacce. Rob Smithers, presidente e CEO di Miercom, ti darà una visione approfondita in base alla sua esperienza sul campo per verificare l'efficacia dei principali sistemi di analisi delle minacce avanzate.

Risultati dei test su McAfee Advanced Threat Defense
Risultati dei test su McAfee Advanced Threat Defense

AV-TEST ha eseguito un test sull'appliance McAfee Advanced Threat Defense per verificare le sue capacità di individuazione del malware.

CRN include McAfee nella sua classifica 2013 delle 25 migliori aziende di cui essere partner
CRN include McAfee nella sua classifica 2013 delle 25 migliori aziende di cui essere partner

In base ai commenti dei fornitori di soluzioni informatiche (SP), CRN Research seleziona i 25 migliori produttori di tecnologia da un elenco di quasi 230 aziende che offrono le 12 categorie di prodotti prese in considerazione dagli SP quando formalizzano le loro partnership, oggi come in futuro. Sono stati interpellati 1.000 SP di tutti tipi e dimensioni.

SC Magazine
Premi SC Magazine Readers Trust – Migliore protezione dalle APT

SC Magazine sceglie McAfee come finalista dei premi Readers Trust — Categoria Migliore Protezione contro le Minacce Avanzate Persistenti (APT).

Prodotti correlati

McAfee Advanced Threat Defense è un componente di base del portafoglio McAfee per la protezione della rete e del framework Security Connected. McAfee ha trasformato l'attività di rilevamento collegando le funzioni di analisi avanzata del malware con le difese, dal perimetro della rete all'endpoint, e condividendo le informazioni sulle minacce con l'intero ambiente IT.

McAfee Next Generation Firewall
McAfee Next Generation Firewall mette in sicurezza le grandi imprese contro gli attacchi più avanzati grazie a difese all'avanguardia altamente disponibili, scalabili e flessibili, tutte supportate da Security Connected, l'ecosistema antiminacce più ampio e sofisticato nel suo genere.

McAfee Network Security Platform
McAfee Network Security Platform è un'esclusiva soluzione di sicurezza intelligente che scopre e blocca le minacce sofisticate presenti nella rete. Avvalendosi di avanzate tecniche di rilevamento delle minacce, la nostra piattaforma difende contro gli attacchi furtivi con estrema accuratezza fino a 80 Gbps, fornendo contemporaneamente dettagliati dati contestuali su utenti, dispositivi e applicazioni. Ciò consente di rispondere adeguatamente agli attacchi che si originano nella rete.

McAfee Threat Intelligence Exchange
McAfee Threat Intelligence Exchange ottimizza significativamente la prevenzione delle minacce avanzate, riducendo il ritardo fra l'individuazione e il contenimento degli attacchi mirati avanzati da giorni, settimane e mesi a pochi millisecondi.

McAfee Enterprise Security Manager
McAfee Enterprise Security Manager fornisce i contesti in modo veloce e approfondito per identificare le minacce critiche, agire rapidamente e rispondere in modo semplice ai requisiti di conformità. L'aggiornamento continuo sulle minacce globali e sui rischi aziendali consente una gestione dei rischi adattiva e autonoma, rendendo disponibili le risposte alle minacce e la reportistica per le questioni di conformità nell'ordine di minuti anziché di ore.

McAfee Web Gateway
McAfee Web Gateway, implementato in sito con le appliance oppure in un ambiente virtuale, offre una protezione proattiva e potente contro minacce zero-day, spyware e attacchi mirati. Web Gateway combina questa sicurezza avanzata con un controllo flessibile e dettagliato, che permette alla tua azienda di ottenere il massimo vantaggio dal web senza mettere a rischio la sicurezza.

McAfee Email Gateway
McAfee Email Gateway raggruppa la protezione dalle minacce in ingresso, la crittografia in uscita, la conformità avanzata, la prevenzione delle fughe di dati e l'amministrazione in una singola appliance intuitiva e di facile installazione. Elimina le inefficaci difese frammentate, semplifica gli ambienti di sicurezza di diversi produttori e riduce i costi operativi; il tutto rafforzando significativamente la sicurezza della posta elettronica.

McAfee ePolicy Orchestrator
McAfee ePolicy Orchestrator (McAfee ePO) è un componente fondamentale della piattaforma McAfee Security Management ed è l'unico software di classe enterprise a fornire la gestione unificata di endpoint, rete e sicurezza dei dati. Grazie alla visibilità end-to-end e alle potenti funzioni di automazione che riducono i tempi di risposta agli eventi, il software McAfee ePO rafforza notevolmente la protezione e permette di tagliare i costi di gestione e sicurezza.

Novità / Eventi

Casi cliente

City of Chicago (English)

Chicago protects its critical infrastructure with an integrated solution from McAfee, combining SIEM, endpoint, and network security.

In primo piano
  • Maximized staff resources.
  • Malware incidents reduced by 2,000%.
  • Centralized management and analysis.
  • Integrated security event logging that captures events throughout the environment.

Eagle Rock Energy (English)

Eagle Rock strengthens its security infrastructure with the addition of new security management and network security solutions.

In primo piano
  • Integrated security architecture paves the way for business expansion.
  • Comprehensive threat detection ensures that security events from every source are noted and logged.
  • The combination of McAfee Web Gateway and McAfee Advanced Threat Defense thwarts inbound threats from the Internet.
  • Intrusion prevention monitors both external and internal activity.

Risorse

Blueprint tecnologici

Find, Freeze, and Fix Advanced Threats (English)

Your organization is asking for an advanced malware detection and response strategy that’s sophisticated and adaptive against hacker attacks. Several design trends in advanced malware security affect the performance, efficacy, cost, and management complexity of an overall solution. What’s your next step?

Infographics

SANS Top 20 Critical Controls Poster (English)

The top 20 critical controls for effective cyberdefense.

Deeper Inspection. Better Threat Protection. (English)

Malware is becoming more complicated, covert, and clever. Your advanced threat protection solution needs to have just as cunning of a response.

Bury Threats Before They Bury Your Business (English)

Bury threats with McAfee’s Network Security Platform comprehensive signature-less approach to malware detection.

Take An Integrated Approach To Advanced Threats (English)

With today's advanced malware threats, IT departments need to expand their coverage with an appropriately configured security infrastructure. Finding, freezing and fixing advanced exploits fast requires a fully integrated, well-managed approach to IT security.

Panoramiche sulle soluzioni

Advanced Threat Defense for SIEM (English)

When advanced detection solutions, known as sandboxes, collaborate with SIEM solutions, enterprises can better understand and respond to unknown, advanced attacks. McAfee Advanced Threat Defense and McAfee Enterprise Security Manager work in concert to extract relevant data from advanced malware and dramatically reduce time to response by minimizing uncertainty and accelerating remediation.

A Well-Connected Sandbox (English)

A well-connected sandbox that is integrated from the network edge to endpoints is one of the most effective defenses against today’s constantly morphing and evasive advanced threats. This brief explains how McAfee Advanced Threat Defense, when integrated with other Intel Security solutions, provides an effective defense against zero-day threats.

Advanced Threat Defense for the Email Gateway (English)

Email is a vital communication vehicle for just about every business these days—and it is also a key threat vector for cybercrooks who are looking to steal valuable data or execute inbound attacks. As part of our unified, integrated Security Connected framework, McAfee Email Gateway and McAfee Advanced Threat Defense work together to find and freeze new, unknown, and stealthy advanced threats. For a complete end-to-end solution, add McAfee Real Time to the mix to quickly identify and fix systems impacted by advanced malware.

McAfee Advanced Threat Defense for McAfee Web Gateway (English)

Social networks, cloud applications, and content-sharing sites have become essential business tools and IT organizations are struggling to make them safely accessible from inside and outside the corporate environment. Read this Solution Brief and see how McAfee Threat Defense for McAfee Web Gateway helps overcome the obstacles.

Abuso di fiducia

Attackers prey upon the institution of trust in many ways, with exploiting unsuspecting victims the primary pursuit. Learn how McAfee security technology can help protect against attacks seeking to abuse the trust your company has in its day-to-day operations.

Advanced Threat Defense for Network IPS (English)

Many of today’s unknown, zero-day threats evade traditional signature-based defenses. The addition of third-party sandbox appliances can help, but they have several limitations: high cost of deployment, reliance on a generic virtualized environments, and limited analysis techniques, making the sandbox vulnerable to crafty malware designed to bypass analysis. McAfee Network Security Platform IPS and McAfee Advanced Threat Defense work together to find sophisticated threats, freeze them so they cannot infiltrate, and fix the damage done.

Advanced Threat Defense for Next-Generation Firewalls (English)

Next-generation firewalls certainly offer expanded network security for branch offices and remote locations, but they can’t find and block stealthy, advanced malware. Through the Security Connected approach from McAfee, Advanced Threat Defense and McAfee Next Generation Firewall work hand-in-hand to find and freeze today’s evasive and targeted cyberattacks.

Security in Unison (English)

McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threat response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

McAfee Delivers Comprehensive Threat Protection for the Financial Services Industry (English)

This solution brief explains how the McAfee Security Connected approach provides advanced threat protection for the financial services industry and prevents targeted attacks.

McAfee Advanced Threat Defense: Services solutions for Managed Service Providers (MSP) (English)

IT organizations are focused on shifting budgets from capital expenditures (CAPEX) to operational expenditures (OPEX) in an environment where in-house investments can easily get outpaced by an increasingly sophisticated cybercrime ecosystem. McAfee Advanced Threat Defense can help you to differentiate your services and protect customers against zero-day attacks by offering the industry’s most comprehensive threat protection.

Rapporti

Analisi dei cinque principali metodi di attacco alla rete: il punto di vista di un ladro

This report offers forensic insight into five of the most common network attack methods that data thieves love to use. It also provides practical guidance on how criminals view your network, how to use that information to maintain a dynamic security profile, and ways to minimize the likelihood of a breach and its injurious repercussions.

The Top Five Network Attack Methods (English)

This report offers insight into five of the most common network attack methods cybercriminals love to use. It provides valuable insight on how attackers target sensitive data and steal intellectual property, as well as guidance on what you can do to minimize the likelihood of a breach and its repercussions.

Market Quadrant: McAfee Advanced Threat Defense is Top Player (English)

This edition of Radicati Market Quadrants reviews products that offer protection from advanced persistent threats.

ESG Report: Tackling Attack Detection and Incident Response (English)

This report examines organizations’ security strategies, cyber-attack environments, incident response challenges and needs. A survey found that security professionals are inundated with security incidents and struggle with timely identification and resolution of targeted attacks. A lack of visibility into user and network activity, shortage of investigative skills and experience, and poor security analytics capabilities are key factors in slowing organizations’ response to incidents.

Gartner Digital Newsletter: Best Practices Against Advanced Threats (English)

The newsletter includes access to Gartner research ‘Five Styles of Advanced Threat Defense’ and discusses how Intel Security solutions help organizations with every aspect of their advanced threat defense strategy and has uniquely integrated them to provide a powerful security platform.

NSS Labs Product Assessment Brief: McAfee Advanced Threat Defense (English)

This report reviews McAfee Advanced Threat Defense, outlining strengths, weaknesses, opportunities and threats.

SANS Analytics and Intelligence Survey (English)

This paper explores the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.

SANS: Critical Security Controls–From Adoption to Implementation (English)

A recent SANS survey provides an in-depth look at the primary industries adopting critical security controls and how they approach implementation.

McAfee Advanced Threat Defense Test Results (English)

AV-TEST performed a test of the McAfee Advanced Threat Defense appliance to determine its malware detection capabilities.

ESG Lab Validation Report: McAfee Advanced Threat Defense (English)

This ESG Lab Validation report documents hands-on testing of McAfee Advanced Threat Defense, a key component of McAfee’s end-to-end solution for addressing advanced malware. Testing was designed to explore how the solution accurately detects advanced malware using a layered approach, the speed and effectiveness of responding to an attack, and the operational efficiencies of this integrated solution.

Gartner Report: Designing an Adaptive Security Architecture for Protection from Advanced Attacks (English)

Most enterprise security protection efforts and products have focused primarily on blocking and prevention techniques as well as on policy-based controls to block threats. However, perfect prevention is impossible. Advanced targeted attacks are easily bypassing traditional firewalls and signature-based prevention mechanisms. All organizations should now assume that they are in a state of continuous compromise.

McAfee IPS Appliance Test (English)

AV-TEST performed a review of McAfee’s IPS solution for the enterprise to determine malware detection and blocking capabilities.

The Economic Impact of Cybercrime and Cyber Espionage (English)

This report discusses how to estimate the cost of malicious cyber activity, and its effect on trade, technology and competitiveness.

Schede tecniche

McAfee Advanced Threat Defense

Per un riassunto tecnico sui prodotti McAfee elencati qui sopra, vedere la scheda tecnica del prodotto.

White paper

SANS Survey: Incident Response – How to Fight Back (English)

SANS recently surveyed incident response (IR) teams to get a clearer picture of what they're up against today. The results are in; most organizations lack formalized IR plans, they expressed a need to collect and correlate threat intelligence and SIEM tools are their focus for improving IR capabilities.

Preventing Targeted Attacks with McAfee's Advanced Threat Defense (English)

In this white paper, IDC outlines McAfee Advanced Threat Defense (ATD) within the context of the specialized threat analysis and protection market. Our centralized approach to malware analysis, deep integrations across the product portfolio, and three-pronged focus on "Find, Freeze, Fix" as a way of dealing with threats is unique within the market and provides a more holistic approach than other detection-oriented products.

Conquer the Top 20 Critical Security Controls (English)

Critical Security Controls (CSCs) help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

Crea una sandbox migliore

As malware becomes more sophisticated and evasive, new technologies are emerging to uncover threats no matter how well they’re camouflaged. This white paper proposes a logical design strategy for dynamic malware analysis that optimizes detection effectiveness, efficiency, and economics.

Attacchi mirati avanzati: ci vuole un sistema

Adaptive intelligence and real-time communications orchestrate protection in the McAfee Security Connected Platform.

Comunità

Blog

  • A Thief’s Perspective #5: Network and Resource Abuse Methods
    Nat Smith - luglio 20, 2015

    Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Cyber-criminals are the Hyenas of the Digital Ecosystem (my sincerest apologies to hyenas). Cyber-criminals […]

    The post A Thief’s Perspective #5: Network and Resource Abuse Methods appeared first on McAfee.

  • A Thief’s Perspective #4: SSL Attack Methods
    Steve Grossenbacher - luglio 20, 2015

    Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Coffee, Cocaine, and SSL Attacks. Today’s cybercriminals have borrowed a tried and true technique […]

    The post A Thief’s Perspective #4: SSL Attack Methods appeared first on McAfee.

  • A Thief’s Perspective #3: Stealthy Attack Methods
    Anne Aarness - luglio 20, 2015

    Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part blog series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Breaking Bad Code: Exposing the Walter White of Attack Methods The popular crime […]

    The post A Thief’s Perspective #3: Stealthy Attack Methods appeared first on McAfee.

  • A Thief’s Perspective #2: Evasive Attack Methods
    Nat Smith - luglio 20, 2015

    Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part blog series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. No Smoke. No Mirrors. No Misdirection: Evasive Thieves Attack with Houdini-like Prowess. Cyber-thieves […]

    The post A Thief’s Perspective #2: Evasive Attack Methods appeared first on McAfee.

  • A Thief’s Perspective #1: Browser Attack Methods
    Steve Grossenbacher - luglio 20, 2015

    Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part blog series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Employees Are So Helpful—Just Ask any Hacker. Everyone must choose their battles. Take […]

    The post A Thief’s Perspective #1: Browser Attack Methods appeared first on McAfee.

Minacce e rischi correlati