McAfee Network User Behavior Analysis

McAfee Network User Behavior Analysis

Continuous, cost-effective visibility inside your network

Next Steps:

Overview

McAfee Network User Behavior Analysis gives you a continuous, real-time view of user behavior and activity across your complex network environment. It replaces manual detection efforts, such as log analysis, with automated discovery and analysis based on existing network flow data, as well as application and identity data to deliver reliable results and a clear course of action.

With Network User Behavior Analysis, you get:

Intuitive, accurate information — In a single view, Network User Behavior Analysis shows you the actual user, group, and role associated with each action on the network. It correlates behavior with your existing security policies to show violations. It gives you this information in real time, not after the fact, so you can pinpoint potential risks and make decisions quickly and decisively.

Lowered costs and enhanced security — By automating labor-intensive detection and analysis tasks, Network User Behavior Analysis reduces the cost of keeping your network safe from risks, including insider threats.

Simplified compliance and auditing — Network User Behavior Analysis makes audit preparation faster and easier with ongoing monitoring to ensure compliance with PCI DSS, FISMA, SOX, HIPAA, and GLBA.

Features & Benefits

Reduce risk

Know what users are doing inside your network at all times. Compare user activity against security and business policies to minimize security risks and legal liability. Network User Behavior Analysis complements access control solutions by verifying that users are not bypassing access controls, and helps monitor post-connect user behavior.

Increase efficiency and lower costs

Automate labor-intensive discovery and analysis of what users are actually doing to save time and money. With more accurate and tamperproof information from Network User Behavior Analysis, you can identify and respond to threats more quickly and with greater confidence. Since it provides an intuitive, complete view of who is doing what and where across your network, Network User Behavior Analysis is proven to reduce the cost, effort, and risk associated with network planning and changes.

Enhance user-identity capabilities

Get detailed information about the users who access business-critical applications. Dynamic integration with user directories provides each user’s name, role, and policy context. Any changes made in the directory automatically filter down to Network User Behavior Analysis Monitors.

Simplify compliance and auditing

Make audit preparation faster and easier with ongoing monitoring to ensure compliance with PCI DSS requirements, as well as FISMA, SOX, HIPAA, and GLBA regulations.

Deploy cost-effective, scalable monitoring

Enable out-of-band monitoring with no network reconfiguration. Network User Behavior Analysis Monitor utilizes packet capture (pcap) and network flow data, requires no agents, no application integration, and no recoding. For identity-based monitoring, Network User Behavior Analysis builds on the identity and role information in your existing directories.

Leverage your existing infrastructure

Integrate Network User Behavior Analysis quickly and easily with Active Directory and LDAP-based directories, network routers and switches, non-Microsoft Windows identity clients like Centrify, and flow-based data from Cisco and Juniper.

System Requirements

These are minimum system requirements only. Actual requirements will vary depending on your environment. Technical information provided by Intel. Specifications may change at any time and without prior notice.

McAfee Network User Behavior Analysis Monitor Appliance

  • Technical specifications
    • 1 Intel Xeon 5130, 2 GHz, 1,333 MHz, 4-MB cache, dual-core CPU (for Monitor SE, Flow Monitor SE, and Flow Monitor: 1 Xeon 5150, 2.66-GHz CPU)
    • Two 250 GB, 32-MB cache, 7.5K RPM SATA II, 3.5" hard drives
    • 4 GB RAM
  • Power & BTU specifications
    • Max. surge amps = 9.5
    • Max. running amps = 8.5
    • Avg. running amps = 6.25
    • Watts = 750
    • BTU/hr. = 2,550
  • Dimensions
    • Rack-mountable 1U device
    • 17"W x 28 1/2"D x 1 3/4"H
  • Weight
    • 30 lbs.
  • Temperature
    • Operating temperature: 50°–90° F / 10°–35° C (maximum change rate not to exceed 10° C per hour)
    • Non-operating temperature: -40°–70° C
    • Non-operating humidity: 90%, non-condensing at 28° C
  • Compliance
    • UL60950 – CSA 60950 (USA/Canada)
    • EN60950 (Europe)
    • IE60950 (International)
    • CE – Low-voltage Directive 73/23/EEE (Europe)
  • Certification
    • Common Criteria EAL 3 Certified
    • U.S. Department of Defense accreditations for operating in SIPRNet, NIPRNet, and JWICS

McAfee Network User Behavior Analysis Control Center Appliance

  • Technical specifications
    • 1 Intel Xeon 5150, 2.66 GHz, 1,333 MHz, 4-MB cache, dual-core CPU
    • Two 150 GB, 16-MB cache, 10K RPM SATA hard drives
    • 4-GB RAM
  • Power & BTU specifications
    • Max. surge amps = 9.5
    • Max. running amps = 8.5
    • Avg. running amps = 6.25
    • Watts = 750
    • BTU/hr. = 2,550
  • Dimensions
    • Rack-mountable 1U device
    • Dimensions: 17"W x 28 1/2"D x 1 3/4"H
  • Weight
    • 30 lbs.
  • Temperature
    • Operating temperature: 50°–90° F / 10°–35° C (maximum change rate not to exceed 10° C per hour)
    • Non-operating temperature: -40°–70° C
    • Non-operating humidity: 90%, non-condensing at 28° C
  • Compliance
    • UL60950 – CSA 60950 (USA/Canada)
    • EN60950 (Europe)
    • IE60950 (International)
    • CE – Low-voltage Directive 73/23/EEE (Europe)
  • Certification
    • Common Criteria EAL 3 Certified
    • U.S. Department of Defense accreditations for operating in SIPRNet, NIPRNet, and JWICS

Customer Stories

Cardnet

Cardnet eliminates malware infections with comprehensive network, email, and endpoint security from McAfee.

Highlights
  • Total absence of known infections of any kind
  • Protected the entire IT infrastructure
  • Maintained IT security with a staff of three, versus 20 or more if the McAfee suite was not in place

Resources

Data Sheets

McAfee Network User Behavior Analysis

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Network User Behavior Analysis Studio

For a technical summary on the McAfee product listed above, please view the product data sheet.

Solution Briefs

User Behavior Analysis: Gaining Real-Time Cost-Effective Visibility into Who Is Doing What, Where on Your Network

McAfee Network User Behavior Analysis' automated, identity-based monitoring improves visibility into your network, reduces risk, and eases compliance.

Community

Blogs

  • Consumers Eager for Connected Technology
    Robert Siciliano - September 16, 2014

    Many of us are familiar with the Jetson’s TV cartoon that showed the life of a family in 2026 and how technology is a part of their everyday life. If you’re like me, some of the gadgets that George and his family had are probably things you thought were cool or would be convenient to […]

    The post Consumers Eager for Connected Technology appeared first on McAfee.

  • Network Security Perspective: One Phish, Two Phish
    Ruby Williams - September 9, 2014

    It’s hard to believe we’re already past the half way mark for the year, but I suppose that’s what happens when we live in a world with so much action and activity all around us.  As I’ve said before, the pace of business today is overwhelming.  We’re inundated with content and data coming at us […]

    The post Network Security Perspective: One Phish, Two Phish appeared first on McAfee.

  • Detection Effectiveness: the Beat Goes On
    McAfee Labs - August 27, 2014

    In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made this critical point: Stopping attacks before they breach and narrowing the breach discovery gap require the ability to detect threats at […]

    The post Detection Effectiveness: the Beat Goes On appeared first on McAfee.

  • Trust Is the Most Valuable Asset
    Jarno Limnell - August 15, 2014

    The most valuable asset for actors in cyberspace is trust. It is an important ingredient in successful business operations as well as in good governance. Trust and security are closely intertwined. One cannot exist without the other. Thus it is concerning that people at an increasing rate hesitate to trust the digital world. They are […]

    The post Trust Is the Most Valuable Asset appeared first on McAfee.

  • Cat “Hacker” Scouts Out Weak Wi-Fi Networks
    Gary Davis - August 12, 2014

    Man has always had an innate fascination with our feline friends. Ancient Egyptians famously worshiped them, some in the Middle Ages feared them, and today’s Internet denizens pay money to have their pictures taken with meme-generating kitties. But there’s another reason to consider the cat: it turns out that they’re expert when it comes to […]

    The post Cat “Hacker” Scouts Out Weak Wi-Fi Networks appeared first on McAfee.