McAfee Network Security Platform

McAfee Network Security Platform

Un'esclusiva soluzione di sicurezza intelligente che scopre e blocca le minacce sofisticate presenti nella rete.

Agisci:
  • Contatta McAfee
    Pronto a fare un acquisto o vuoi chiarire dei dubbi prima di acquistare? Contatta un esperto McAfee. Disponibile dal lunedì al venerdì. Disponibile solo in inglese.
  • Trova un rivenditore
  • Contattaci
  • Telefonare: 800902644

Panoramica

Network Security Platform è una soluzione di sicurezza intelligente unica in grado di scoprire e bloccare le minacce più sofisticate presenti nella rete. Sfruttando diverse tecniche avanzate di rilevamento senza firma come Advanced Threat Defense, emulazione in tempo reale e integrazione degli endpoint, supera ampiamente la semplice corrispondenza schemi per garantire la difesa contro gli attacchi furtivi sconosciuti con la massima precisione. La piattaforma hardware di prossima generazione è scalabile fino a velocità di oltre 40 Gbps e garantisce alle prestazioni di poter soddisfare le onerose esigenze delle reti.

Con il suo approccio Security Connected alla gestione della sicurezza, Network Security Platform organizza varie tecnologie di sicurezza per affrontare collettivamente gli attacchi elusivi ed evasivi che vengono mancati nei casi in cui si adotta un unico approccio. Questa applicazione intelligente di euristica comportamentale con feed di McAfee Global Threat Intelligence in tempo reale identifica gli attacchi dannosi per cui non esistono firme.

Tutte le informazioni di sicurezza e di gestione vengono visualizzate in un formato correlato che riduce il tempo necessario e l'impatto dell'errore umano nelle indagini. Le attività vengono potenziate quando si assegna una priorità ai dettagli, affinché soltanto i dati necessari vengano rivelati in modo progressivo quando servono. Il risparmio di tempo e gli errori evitati riducono i costi di esercizio e liberano il personale affinché lavori su altri progetti. Network Security Platform ottimizza le operazioni di sicurezza con una visibilità superiore a Layer-7 per esporre i criteri degli attacchi nascosti e per una rapida e accurata risposta agli attacchi veicolati dalla rete.

Leader & Visionary: McAfee IPS is a Gartner Magic Quadrant leader yet again.

Download Gartner Report

See McAfee Network Security Platform in action: Videos, demos & technical guides

Learn More

McAfee leads in IPS security and value

Download NSS Labs Report

Caratteristiche e vantaggi

Protezione dalle minacce senza confronti

Una protezione dalle minacce senza confronti data dalla capacità di identificare tanto gli attacchi noti quanto quelli sconosciuti. Grazie all'impiego di diversi motori di rilevamento senza firme e al rilevamento delle firme ultraefficiente basato sulle vulnerabilità, questa piattaforma IPS di prossima generazione difende dal malware avanzato e dagli attacchi zero-day con una precisione senza precedenti. L'ispezione avanzata senza firme del malware assicura una protezione completa dagli attacchi sconosciuti, mentre le difese minime con firme difendono in modo efficace contro le minacce note, sempre mantenendo a bassi livelli le attività amministrative e i costi di esercizio.

Gestione intelligente della protezione

Meno competenze e tempo necessari per monitorare e indagare gli eventi legati alla sicurezza; amministrazione semplificata di installazioni grandi e complesse. La rivelazione progressiva dei dati, tramite gli approfondimenti guidati, mostra le giuste informazioni dove e quando servono; la gestione gerarchica si adatta alle installazioni più grandi.

Protezione globale contro il malware

Copertura completa contro il malware tramite il direzionamento intelligente della gamma di difese antimalware. Grazie a un maggior numero di difese rispetto alle soluzioni degli altri fornitori, puoi ridurre le falle nella protezione usate dal malware, proteggendoti contro questo nuovissimo e temibile vettore degli attacchi alla sicurezza della rete.

Usa il nostro framework Security Connected

Migliora la condizione di sicurezza della rete, ottimizza la protezione riducendo i costi e allineala in modo strategico alle iniziative aziendali. Security Connected è l'approccio integrato di McAfee alla sicurezza della rete, che incorpora senza soluzioni di continuità i dati e i flussi di lavoro dagli altri prodotti di sicurezza.

Prestazioni e scalabilità

Prestazioni affidabili in modo che la migliore protezione sia disponibile anche sotto i carichi maggiori, dovuti alla crescita della rete, o nel caso in cui segmenti della rete stessa si guastino. Prestazioni elevate e throughput nell'ordine di molti gigabit anche quando sono disponibili le funzioni di nuova generazione, abilitate con il fail-over stateful.

Visibilità e controllo

Informazioni su utenti e dispositivi che si integrano senza soluzione di continuità nei controlli, nell'analisi e nelle applicazioni per una reportistica dettagliata. Questa visibilità approfondita mette allo scoperto le anomalie sospette che passerebbero inosservate in aggregato, dando più flessibilità per allineare le policy di controllo alle necessità dell'organizzazione.

Demo / Esercitazioni

Demo

Network Security Platform is an intrusion prevention appliance that uses multiple detection engines to alert on today’s stealthy malware.

Use event correlation and progressive disclosure workflows to prioritize events, improve detection, and speed investigation.

Network Security Platform uses new advanced intrusion detection capabilities to uncover both known and unknown botnets.

Network Security Platform includes application visibility and control of over 1,100 applications and protocols.

Prevent denial-of-service attempts through connection limiting based on geo-location, IP reputation, and a number of other factors.

McAfee Endpoint Intelligence provides real-time, per-flow endpoint traffic correlation. This solution leverages intelligence in the network and on every Windows host to reveal relationships between endpoint executables and network traffic flows.

Network Security Platform incorporates McAfee Global Threat Intelligence to check the reputation of network communications based on billions of unique file, IP, URL, protocol, and geo-location data around the globe.

Esercitazioni

Explore the key features of McAfee Network Security Platform and learn more about how it integrates with McAfee Vulnerability Manager and McAfee ePolicy Orchestrator.

Video

Your IPS needs both signature and signature-less defenses.

Premi / Recensioni

NSS Labs
NSS Labs assegna l'ambitissima valutazione "Raccomandato" a McAfee Network Security platform

NSS Labs sottopone a test i principali fornitori di prodotti per la prevenzione delle intrusioni nella rete in base a decine di criteri, pubblicando i risultati nelle sue relazioni sull'analisi del prodotto. Leggi l'ultimo rapporto di NSS Labs "La mappa della convenienza della sicurezza" per sapere in che modo McAfee è diventato il leader in sicurezza e convenienza secondo NSS Labs.

CRN
CRN include McAfee nella sua classifica 2013 delle 25 migliori aziende di cui essere partner

In base ai commenti dei fornitori di soluzioni informatiche (SP), CRN Research seleziona i 25 migliori produttori di tecnologia da un elenco di quasi 230 aziende che offrono le 12 categorie di prodotti prese in considerazione dagli SP quando formalizzano le loro partnership, oggi come in futuro. Sono stati interpellati 1000 SP di tutti tipi e dimensioni.

Gartner
Magic Quadrant 2013 per i sistemi di prevenzione delle intrusioni

McAfee è (ancora) fra i Leader nel Gartner Magic Quadrant per i sistemi di prevenzione delle intrusioni.

Casi cliente

Bank Central Asia (English)

Bank Central Asia, a regional public bank in Indonesia, centralizes security management with McAfee ePolicy Orchestrator.

In primo piano
  • Eased compliance with internal and industry regulations.
  • Resulted in time savings with centralized management.
  • Provided integrated solutions to keep computers, the network, and data protected.

California Department of Corrections and Rehabilitation (CDCR) (English)

Leveraging the Security Connected strategy, the California Department of Corrections and Rehabilitation implemented SIEM, network IPS, data protection, and endpoint security solutions to secure its distributed IT environment over 37 locations.

In primo piano
  • Compliance with policy standards.
  • Dashboards enable centralized security management and provide easy access for executive reporting.

City of Chicago (English)

Chicago protects its critical infrastructure with an integrated solution from McAfee, combining SIEM, endpoint, and network security.

In primo piano
  • Maximized staff resources.
  • Malware incidents reduced by 2,000%.
  • Centralized management and analysis.
  • Integrated security event logging that captures events throughout the environment.

Eagle Rock Energy (English)

Eagle Rock strengthens its security infrastructure with the addition of new security management and network security solutions.

In primo piano
  • Integrated security architecture paves the way for business expansion.
  • Comprehensive threat detection ensures that security events from every source are noted and logged.
  • The combination of McAfee Web Gateway and McAfee Advanced Threat Defense thwarts inbound threats from the Internet.
  • Intrusion prevention monitors both external and internal activity.

Leading Mexican Bank (English)

The Mexican branch of a leading worldwide bank is at the forefront of security with McAfee Network Security Platform and McAfee Professional Services.

Macquarie Telecom (English)

This leading Australian hosted IT provider drives a growing managed services business with Security Connected.

In primo piano
  • Fully integrated security platform easily managed from a central dashboard.
  • Visibility and control for clients over their hosted security environments.
  • Competitive advantage through partnership with a trusted technology provider.

State of Colorado (English)

McAfee SIEM solutions help the state of Colorado meet compliance requirements and remain cost effective.

In primo piano
  • Aggressively achieved first five controls per set goal
  • Ability to administer virus scans and obtain software inventory with McAfee ePO software
  • Vulnerability ranking within McAfee Enterprise Security Manager allows for more immediate and effective remediation

Novità / Eventi

Risorse

Infographics

IDC Business Value Snapshot

This snapshot of the IDC white paper "The Business Value of Network-Based Intrusion Prevention Systems," provides key data about McAfee Network Security Platform performance.

SANS Top 20 Critical Controls Poster (English)

The top 20 critical controls for effective cyberdefense.

Get a True Understanding of Malware DNA (English)

McAfee Network Security Platform can amplify existing signature and snort-based technologies to provide a true understanding of malware DNA.

Bury Threats Before They Bury Your Business (English)

Bury threats with McAfee’s Network Security Platform comprehensive signature-less approach to malware detection.

Panoramiche sulle soluzioni

Protocol-Based IPS Architecture (English)

This brief discusses the Intel Security approach to protocol-based Intrusion Prevention System inspection and how it differs from other security vendors. Intel Security uses protocol inspection as the foundation of IPS solutions and builds advanced intelligence on top of this architecture to provide superior protection and IPS performance.

McAfee Network Security Platform for the Data Center (English)

McAfee Network Security Platform combines extraordinary performance, advanced signature-less inspection, deep integration with other security systems, intelligent central management, and scalability to secure the very largest environments, making it the IPS of choice for the world’s most demanding data centers.

Advanced Threat Defense for Network IPS (English)

Many of today’s unknown, zero-day threats evade traditional signature-based defenses. The addition of third-party sandbox appliances can help, but they have several limitations: high cost of deployment, reliance on a generic virtualized environments, and limited analysis techniques, making the sandbox vulnerable to crafty malware designed to bypass analysis. McAfee Network Security Platform IPS and McAfee Advanced Threat Defense work together to find sophisticated threats, freeze them so they cannot infiltrate, and fix the damage done.

Il SIEM: cinque requisiti per risolvere i problemi delle grandi imprese

McAfee spoke with SIEM users and asked them to tell us about their primary issues with SIEM. This brief lists the top five issues along with corresponding customer case studies and use cases.

McAfee Network Security Platform: Services Solutions for Managed Service Providers (MSP) (English)

With attacks on the rise, IT budgets constrained, and experienced security personnel in short supply, businesses are looking to Managed Service Providers to help fill the gap. McAfee Network Security Platform is uniquely intelligent and purpose-built to offer unmatched protection, performance, and multitenant scale for your intrusion prevention system (IPS) services.

Potenziate la sicurezza

McAfee Network Security Platform and McAfee Enterprise Security Manager bring together real-time network protection, enterprise-wide situational awareness, and a responsive, investigation platform — in a seamlessly integrated solution that identifies and blocks more threats while ensuring rapid response to successful attacks as they emerge.

Rapporti

Analisi dei cinque principali metodi di attacco alla rete: il punto di vista di un ladro

This report offers forensic insight into five of the most common network attack methods that data thieves love to use. It also provides practical guidance on how criminals view your network, how to use that information to maintain a dynamic security profile, and ways to minimize the likelihood of a breach and its injurious repercussions.

The Top Five Network Attack Methods (English)

This report offers insight into five of the most common network attack methods cybercriminals love to use. It provides valuable insight on how attackers target sensitive data and steal intellectual property, as well as guidance on what you can do to minimize the likelihood of a breach and its repercussions.

Gartner Report: Avoid These Dirty Dozen Network Security Worst Practices (English)

This report identifies 12 commonly observed network security practices that reduce network availability, increase expenditure or risks, and alienate end users.

Magic Quadrant for Intrusion Prevention Systems: Leader and Visionary (English)

Leading research firm Gartner, Inc. has placed Intel Security in the leaders quadrant in its “Magic Quadrant for Intrusion Prevention Systems”. This marks the eighth consecutive time that McAfee was named a leader in this quadrant.

SANS: Critical Security Controls–From Adoption to Implementation (English)

A recent SANS survey provides an in-depth look at the primary industries adopting critical security controls and how they approach implementation.

AV-Test Signature-less IPS Report (English)

Signatures are great for blocking known attacks, but a comprehensive signature-less architecture is needed to block new and unknown attacks. AV-Test validated that McAfee signature-less inspection blocks 99.98% of malware without any signatures enabled. Read the report to learn how McAfee IPS has raised the bar on IPS inspection and enables security beyond the signature.

Data Center IPS Comparative Analysis: Total Cost of Ownership (English)

By using total cost of ownership (TCO) instead of purchase price, it is possible to factor in management of the device via labor costs associated with product installation, maintenance, upkeep, and tuning.

NSS Labs 2014 Comparative Analysis Report for McAfee Network Security Platform NS-9300 (English)

NSS Labs Ranks McAfee as a Leader in Security and Value.

NSS Labs 2013 Product Analysis Report for McAfee Network Security Platform NS-9200 (English)

NSS Labs Ranks McAfee as a Leader in Security and Value.

Next-Generation Network Security (English)

McAfee and Intel have joined forces to create next-generation network security that detects threats before they reach networks.

McAfee IPS Appliance Test (English)

AV-TEST performed a review of McAfee’s IPS solution for the enterprise to determine malware detection and blocking capabilities.

NSS Labs 2012 Product Analysis Report for McAfee Network Security Platform M-8000 (English)

NSS Labs tests the industry's leading Network Intrusion Prevention vendors on dozens of criteria and releases their finding in Product Analysis Reports. In this report, the McAfee Network Security Platform M-8000 is rated on its security effectiveness, performance, management, TCO and overall value.

Schede tecniche

McAfee Network Security Platform (NS-Series)

Per un riassunto tecnico sui prodotti McAfee elencati qui sopra, vedere la scheda tecnica del prodotto.

McAfee Network Security Platform (M-Series)

Per un riassunto tecnico sui prodotti McAfee elencati qui sopra, vedere la scheda tecnica del prodotto.

Virtual Network Security Platform

McAfee Network Security Platform virtual sensor is a full-featured advanced intrusion prevention system (IPS) solution ready for the unique demands of virtual environments. This intelligent security solution discovers and blocks sophisticated threats in virtual networks with unmatched speed, accuracy, and simplicity.

White paper

Protect Critical Assets with Virtual Patching (English)

This white paper discusses virtual patching and how using predictive threat coverage, automated vulnerability scanning, and risk visualization is a scalable and cost-effective approach to protecting critical assets.

The Business Value of Using McAfee IPS — IDC (English)

In this white paper, leading market intelligence firm IDC provides a compelling view of the business value and benefits gained from using McAfee Network Security Platform. Derived from in-depth interviews with existing McAfee IPS customers, the report data shows how an IPS can provide cost and time savings across an organization.

Signature-less IPS: Secure Beyond the Signature (English)

Learn how the McAfee signature-less intrusion prevention system (IPS) technology is changing the way malware is detected and blocked. Signature-based detection provides an important foundation for intrusion inspection, but a layered signature-less architecture greatly enhances malware detection and reduces the risk. Read about the seven signature-less detection methods McAfee offers and how they are transforming IPS.

Beyond Layer-7 Visibility: A Simpler Path to Endpoint Intelligence (English)

Security products with layer-7 visibility are great. But in order to dramatically improve your understanding of security events, you need to extend your vision to the specific application processes responsible for initiating a connection. It’s something we call Beyond Layer-7 Visibility.

SANS Survey: Incident Response – How to Fight Back (English)

SANS recently surveyed incident response (IR) teams to get a clearer picture of what they're up against today. The results are in; most organizations lack formalized IR plans, they expressed a need to collect and correlate threat intelligence and SIEM tools are their focus for improving IR capabilities.

The Blended IPS: Leveraging Snort and Optimizing Malware Security (English)

This paper is to present the satisfied Snort user and open source security proponent with an effective way to add advanced malware detection and automated threat blocking to an existing Snort-based intrusion prevention system (IPS).

Conquer the Top 20 Critical Security Controls (English)

Critical Security Controls (CSCs) help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

Security Management 2.5 – Replacing Your SIEM Yet? (English)

This paper will walk you through the entire process — from soup to nuts — of evaluating, selecting, and deploying a SIEM. It offers pragmatic advice on how to get it done based on years working through this process as both consumers and vendors of SIEM technology. The process is not always painless, but we are certain it will help you avoid foundering on bad technology and inter-office politics. You owe it to yourself and your organization to ask the right questions and to get answers. It is time to slay the sacred cow of your substantial SIEM investment, and to figure out your best path forward.

The 7 Deadly Threats to 4G - 4G LTE Security Roadmap and Reference Design (English)

This paper provides a detailed review of seven threats that take on unique profiles within 4G networks. It also offers a security reference architecture to efficiently counter these threats with minimal cost or service disruption.

McAfee Security Connected: sicurezza completa e conveniente

With federal budgets trending downward and both cyberthreats and mandates heading upward, the question becomes, "Can you get comprehensive cybersecurity that provides real-time threat visibility and protection at a reasonable cost? The answer is yes."

A Prudent Approach to Next-Generation Network Security (English)

According to Enterprise Strategy Group, a prudent approach to next-generation network security requires more hands-on planning, product evaluations, and real-world testing — and less reliance on third-party lab testing and market reports alone.

McAfee Network Security Platform: l'IPS di rete di nuova generazione

This white paper discusses how the McAfee Network Security Platform can help organizations unify network security across physical and virtual environments, streamline security operations, and protect themselves from emerging malware, zero-day attacks, denial-of-service exploits and advanced targeted attacks.

Consolidate Network Security to Reduce Cost and Maximize Enterprise Protection (English)

Learn how McAfee Network Security Platform helps you realize greater consolidation benefits while minimizing project costs and disruption to your production environment.

Combating Advanced Persistent Threats (English)

Learn how to prevent, detect, and remediate APTs.

Solving Critical Challenges of the Virtualized Data Center (English)

Brocade and McAfee have partnered on a portfolio of offerings that seamlessly blend network innovations and security management to address the challenges of both physical and virtual environments.

Protezione delle risorse critiche con il patching virtuale

Chiusura delle finestre di vulnerabilità con una protezione preventiva dalle minacce.

Comunità

Blog

  • A Thief’s Perspective #5: Network and Resource Abuse Methods
    Nat Smith - luglio 20, 2015

    Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Cyber-criminals are the Hyenas of the Digital Ecosystem (my sincerest apologies to hyenas). Cyber-criminals […]

    The post A Thief’s Perspective #5: Network and Resource Abuse Methods appeared first on McAfee.

  • A Thief’s Perspective #4: SSL Attack Methods
    Steve Grossenbacher - luglio 20, 2015

    Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Coffee, Cocaine, and SSL Attacks. Today’s cybercriminals have borrowed a tried and true technique […]

    The post A Thief’s Perspective #4: SSL Attack Methods appeared first on McAfee.

  • A Thief’s Perspective #3: Stealthy Attack Methods
    Anne Aarness - luglio 20, 2015

    Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part blog series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Breaking Bad Code: Exposing the Walter White of Attack Methods The popular crime […]

    The post A Thief’s Perspective #3: Stealthy Attack Methods appeared first on McAfee.

  • A Thief’s Perspective #2: Evasive Attack Methods
    Nat Smith - luglio 20, 2015

    Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part blog series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. No Smoke. No Mirrors. No Misdirection: Evasive Thieves Attack with Houdini-like Prowess. Cyber-thieves […]

    The post A Thief’s Perspective #2: Evasive Attack Methods appeared first on McAfee.

  • A Thief’s Perspective #1: Browser Attack Methods
    Steve Grossenbacher - luglio 20, 2015

    Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part blog series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Employees Are So Helpful—Just Ask any Hacker. Everyone must choose their battles. Take […]

    The post A Thief’s Perspective #1: Browser Attack Methods appeared first on McAfee.