McAfee Network Threat Behavior Analysis

McAfee Network Threat Behavior Analysis

Network-wide threat visibility and assessment for enterprises

Next Steps:


Get cost-effective, network-wide visibility with McAfee Network Threat Behavior Analysis. Network Threat Behavior Analysis monitors and reports unusual network behavior by analyzing traffic from switches and routers from vendors such as Cisco, Juniper Networks, and Extreme Networks. It comes fully equipped with quad-core processors, a RAID array, distinct flow capacity, gigabit Ethernet connectivity, and offline storage area network connectivity.

Network Threat Behavior Analysis collects and analyzes traffic from the entire network — host and applications — to detect worms, botnets, zero-day threats, spam, and reconnaissance attacks. It reports any unusual behavior to help you maintain a comprehensive and efficient network security infrastructure.

Network Threat Behavior Analysis seamlessly integrates with the McAfee Network Security Platform intrusion prevention system to build a comprehensive and robust security infrastructure.

Enhanced security powered by McAfee Global Threat Intelligence
McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Network Threat Behavior Analysis uses the McAfee GTI network connection reputation service to identify domains and IP addresses that are infected or hosting malware attacks, and block those attacks.

Features & Benefits

Minimize IT and business risk

Detect behavior-based threats — even those that are unknown. McAfee Network Threat Behavior Analysis monitors and reports unusual behavior by analyzing network traffic, so you can identify and quickly respond to unauthorized application usage.

Maximize coverage and value

Pinpoint problem segments with cost-effective, network-wide visibility. Sort and analyze network traffic effortlessly and eliminate manual diagnosis of network-related traffic problems.

Get network-wide visibility and insight

Collect and analyze traffic from the entire network through a single Network Threat Behavior Analysis sensor. Analyze host and application behavior, identify threats through behavior-based algorithms, and inspect networks for worms, botnets, spam, zero-day threats, reconnaissance attacks, and associated behaviors.

Integrate Network Threat Behavior Analysis into your existing security infrastructure

Use Network Threat Behavior Analysis with your current network defenses. Seamlessly integrate Network Threat Behavior Analysis with the McAfee Network Security Platform intrusion prevention system to correlate unusual network behavior caused by intrusions. It also works with the McAfee ePolicy Orchestrator (ePO) software, McAfee Network Security Manager, and McAfee Vulnerability Manager, and is compatible with switches and routers from vendors such as Cisco, Juniper Networks, and Extreme Networks.

Improve security asset value

Protect against attacks arising from almost anywhere in your network — without extensive footprint expansion. With Network Threat Behavior Analysis, McAfee's Network Security Platform can see attacks emerging from the farthest regions of your network to deliver a better return on your network security investment.

System Requirements

McAfee Network Threat Behavior Analysis is a self-contained device. There are no minimum software or hardware system requirements.

Demos / Tutorials


Learn about McAfee Network Threat Behavior Analysis and how it provides real-time monitoring of the network to detect malicious behavior and previously unknown attacks.

Learn how to download and install a virtual Network Threat Behavior Analysis appliance on a VMware server.

Learn how to configure McAfee Network Threat Behavior Analysis through our step-by-step installation tutorial.

For guidance on how to use this McAfee product, watch the Quick Tips video listed above.

Awards / Reviews

CRN Ranks McAfee in their 2013 Top 25 Best Companies to Partner With
CRN Ranks McAfee in their 2013 Top 25 Best Companies to Partner With

Ranked by IT solution providers (SPs), CRN Research ranks the Top 25 must-have technology suppliers from a list of nearly 230 companies in 12 product categories that SPs need to consider when formalizing their partnerships today and for the future. 1,000 unique SPs of all types and sizes were surveyed.



  • At Intel Security, Protecting Customers Takes Precedence Over Seeking Headlines
    Christiaan Beek - November 21, 2014

    One question I often hear is “When will Intel Security (McAfee) publish a report on the latest threat?” It seems to be a hot trend today for security companies to offer reports with topics such as “Operation X” or “Malware Y,” or to trumpet how many zero-day vulnerabilities they have found. Do we now measure […]

    The post At Intel Security, Protecting Customers Takes Precedence Over Seeking Headlines appeared first on McAfee.

  • White Networks
    Tyson Macaulay - November 14, 2014

    Internet of Things (IoT) needs “white networks” to scale and deliver the assurance we require for machine-things; white as in “clean and pure”. The IoT will contain all the devices on the current internet, plus many new devices used for machine-to-machine and industrial applications and services.  In contrast to a “white network” I would assess […]

    The post White Networks appeared first on McAfee.

  • When Fingerprints Fail (Blog 1 of 4)
    Steve Grossenbacher - November 13, 2014

    We’ll be releasing four blog posts over the next week.  Each blog will contain a repeated clue word to help you solve the puzzle below.  Track all four clues to help solve the final puzzle and a chance to win a Nikon D3200 DSLR camera and 18-55mm lens!.   To enter the contest, after the […]

    The post When Fingerprints Fail (Blog 1 of 4) appeared first on McAfee.

  • Exploit Kits Improve Evasion Techniques
    Rajesh Nataraj KP - November 12, 2014

    Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers and programs that can be accessed through browsers. The most common exploit targets are Java, Flash, PDFs, and Silverlight. Exploit kits use lots of techniques to evade detection by security products. Exploit kits use several common techniques: Code […]

    The post Exploit Kits Improve Evasion Techniques appeared first on McAfee.

  • Farewell to FOCUS 14
    McAfee Enterprise - November 6, 2014

    While the dust in Las Vegas may still be settling from three jam-packed days of security discussions, demos, expert panels, and more, we‘ve brought back with us valuable takeaways and tales from FOCUS 14. During the 7th annual McAfee FOCUS conference, brought to you by Intel Security, we talked with partners about the future of […]

    The post Farewell to FOCUS 14 appeared first on McAfee.

Related Solutions
Threats and Risks