McAfee Threat Intelligence Exchange

McAfee Threat Intelligence Exchange

적응형 위협 방지

다음 단계:
  • McAfee와 상담
    McAfee를 구매할 준비가 되셨거나 구매 전에 알고싶은 내용이 있으십니까? McAfee 전문가와 상담해 보십시오. 월요일부터 금요일까지 상담 서비스를 이용하실 수 있습니다. 영어로만 제공됨.
  • 리셀러 찾기
  • 연락처
  • 전화: 82 2 3458 9800

개요

McAfee Threat Intelligence Exchange는 모든 보안 제품에서 위협을 정확히 찾아내고, 보안 회복력 및 감염에 대한 면역력을 제공하는 통합 위협 방어 시스템의 역할을 수행하는 유기적인 프레임워크를 제공합니다. Threat Intelligence Exchange는 발생에서 억제까지 며칠, 몇 주, 몇 개월이 걸리던 시간 격차를 밀리 초 단위로 줄여 위협 방지를 대폭 최적화합니다.

정보의 강점 활용 — Threat Intelligence Exchange는 관리자가 여러 인텔리전스 데이터 소스를 통해 종합적인 위협 인텔리전스를 손쉽게 활용할 수 있도록 합니다. 이러한 사용자 지정 기능은 관리자가 인텔리전스 소스 정보를 조합, 재정의 및 조정할 수 있도록 지원하므로 관리자는 해당 환경 및 조직을 위한 보호 방법을 수정할 수 있습니다.

실시간으로 조직화 — Threat Intelligence Exchange는 McAfee 데이터 교환 계층을 사용하는 최초의 솔루션이며, 이는 간편한 제품 통합 및 컨텍스트 공유를 통해 보안 인텔리전스 및 적응형 보안을 지원하는 양방향 통신 패브릭입니다. 데이터 교환 계층은 제품의 자동 구성을 지원하여 오류를 줄이며, 구현 작업을 줄이고 통합 운영 비용을 낮추기 위해 노력할 필요를 없애줍니다.

기존 엔드포인트 보호 극대화 — Threat Intelligence Exchange는 정확한 파일 실행을 결정하는 McAfee VirusScan Enterprise를 사용하여 획기적인 엔드포인트 보호를 제공합니다. 또한 네트워크 게이트웨이에서 탐지되는 악성 프로그램을 기반으로 엔드포인트를 보호함과 동시에, 네트워크 게이트웨이에서는 엔드포인트 확인을 기반으로 액세스를 차단합니다.

Discover how to stay ahead of threats with SIEM intelligence

Register for Webcast

Advanced targeted attacks: It takes a system

Read White Paper

기능 및 이점

종합적인 위협 인텔리전스

McAfee Threat Intelligence Exchange는 관리자가 엔드포인트, 게이트웨이 및 기타 보안 구성요소에서 수신되는 실시간 및 기록 이벤트 데이터에서 공급된 로컬 위협 인텔리전스와 함께, McAfee Global Threat Intelligence(GTI) 및 타사 피드 같은 전역 데이터 소스를 통해 위협 인텔리전스를 손쉽게 활용할 수 있도록 합니다.

고급 표적 공격의 존재 여부를 즉각적으로 가시화

McAfee 데이터 교환 계층은 보안 구성요소가 McAfee Threat Intelligence Exchange에 동적으로 결합되도록 지원합니다. 통찰력을 공유하여 조직을 표적으로 삼는 공격에 대한 인식을 더욱 강화합니다. 실시간 감시를 제공하기 위해 통합된 엔드포인트, 게이트웨이 및 기타 보안 구성요소를 통해 공격을 탐색합니다.

사전 예방 위협 방지

엔드포인트 및 네트워크 게이트웨이에 발생한 악성 프로그램에서 수집된 위협 세부 정보는 데이터 교환 계층을 통해 밀리 초 단위로 전달되어, 모든 보안 구성요소가 새로 탐지된 위협에 사전 예방으로 무장할 수 있도록 안내합니다.

뛰어난 운영 효율성으로 소유 보안 비용 절감

기존에 투자한 McAfee 보안 탐지, 방지 및 분석 기술을 확충하여 보안 회복력을 높이는 동시에 소유 보안 비용을 낮춤으로써, 위협이 발견되는 즉시 조직을 사전 예방이고 효과적인 방식으로 보호할 수 있습니다.

시스템 사양

McAfee Threat Intelligence Exchange에는 다음 제품이 필요합니다.

  • McAfee ePolicy Orchestrator 5.1
  • McAfee Agent 5.0
  • McAfee VirusScan Enterprise 8.8, 패치 4

 

비디오

비디오

McAfee Threat Intelligence Exchange integrates, automates, and simplifies to decisively reduce TCO and optimize enterprise security. It eliminates complexity, provides instantaneous speed, and illuminated knowledge that can lower operating costs while streamlining protection and response ― all while freeing valuable security team resources.

리소스

Infographics

Connected Security Yields Smarter Defenses (English)

Stop emerging threats with applied knowledge — everywhere, instantly.

데이터시트

McAfee Threat Intelligence Exchange

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

백서

Securosis: Applied Threat Intelligence (English)

One of the most compelling uses for threat intelligence is helping to detect attacks earlier. Examining for attack patterns identified via threat intelligence in your security monitoring and analytics processes shortens the window between compromise and detection. This Securosis white paper focuses on how to use threat intelligence to improve your ability to detect, prevent, and investigate attacks.

SANS White Paper: Be Ready for a Breach with Intelligent Response (English)

How do we get more visibility into attacks across our environments, improve our response, and reduce response time? The solution is automating functions that should be automated and connecting the dots between detection systems and response. Connecting these dots and applying intelligence provides responders rich context into the observed behaviors for taking action. Integrating these processes improves accuracy, while reducing time, manpower, and costs involved in detecting and managing events. This white paper explores how to achieve this.

Advanced Targeted Attacks: It Takes a System (English)

Adaptive intelligence and real-time communications orchestrate protection in the McAfee Security Connected Platform.

보고서

ESG Report: Tackling Attack Detection and Incident Response (English)

This report examines organizations’ security strategies, cyber-attack environments, incident response challenges and needs. A survey found that security professionals are inundated with security incidents and struggle with timely identification and resolution of targeted attacks. A lack of visibility into user and network activity, shortage of investigative skills and experience, and poor security analytics capabilities are key factors in slowing organizations’ response to incidents.

SANS Analytics and Intelligence Survey (English)

This paper explores the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.

솔루션 개요

McAfee Threat Intelligence Exchange and Endpoint Protection (English)

McAfee Threat Intelligence Exchange delivers innovative endpoint protection with a system that adapts and learns from threat encounters, and immediately neutralizes emerging attacks.

Abuse of Trust (English)

Attackers prey upon the institution of trust in many ways, with exploiting unsuspecting victims the primary pursuit. Learn how McAfee security technology can help protect against attacks seeking to abuse the trust your company has in its day-to-day operations.

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange (English)

There’s no doubt that organizations face significant challenges protecting their intellectual property and critical assets from the emerging threats that target their environments. This solutions brief highlights how McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight today’s advanced threats.

Security in Unison (English)

McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threat response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

커뮤니티

블로그

  • Franchising Ransomware
    Vincent Weafer - 7월 2, 2015

    Got a great business idea? Want to expand with less risk? Build a good product, develop some training, put them together into a repeatable formula, and collect the royalties from your franchisees. This model, used successfully for everything from fast food to hair salons to tax preparation, is now available for criminal ransomware. Cybercriminals have […]

    The post Franchising Ransomware appeared first on McAfee.

  • Beat the Ticking Clock Against Emerging Threats
    Paul Zimski - 7월 1, 2015

    In order to beat todays advanced threats, your security defense system relies on good communication. However, when your security posture is dependent on a slew of different products from a spread of vendors, communication can break down. This breakdown in communication means you’re losing valuable time in detecting cyberthreats. To address this communication breakdown, there […]

    The post Beat the Ticking Clock Against Emerging Threats appeared first on McAfee.

  • Securing Critical Infrastructure
    Lorie Wigle - 7월 1, 2015

    Protecting the Industrial Internet of Things from cyberthreats is a national priority.  Industrial automation and control systems are increasingly online, sending out information and receiving commands from local and remote control centers and corporate data systems. Technologies in this Industrial Internet of Things (IIoT) have tremendous potential to improve operations, reduce costs, enhance safety, increase […]

    The post Securing Critical Infrastructure appeared first on McAfee.

  • Cyber Resilience And Spear Phishing
    Mo Cashman - 6월 29, 2015

    Balanced security capability, defense in depth, integrated countermeasures, and a threat-intelligence strategy are critical to defending your business from spear-phishing attacks. Spear phishing continues to be the most successful means of gaining entry to an enterprise network and to valuable business or personal data. According to the latest Verizon Data Breach Investigations Report, two-thirds of […]

    The post Cyber Resilience And Spear Phishing appeared first on McAfee.

  • Government Agencies Should Turn to CDM During 30-Day Sprint
    Tom Gann - 6월 29, 2015

    The fallout from the OPM breach continues with news that clearance information may have been stolen and that more than 10 million federal employee records may have been breached. In response, the White House has ordered every agency to engage in a “30 day sprint” to shore up and bolster their defensive cybersecurity capabilities. During […]

    The post Government Agencies Should Turn to CDM During 30-Day Sprint appeared first on McAfee.