McAfee Threat Intelligence Exchange delivers a cohesive framework where security products collectively pinpoint threats and act as a unified threat defense system providing security resilience and immunity to infections. Threat Intelligence Exchange significantly optimizes threat prevention by narrowing the gap from encounter to containment from days, weeks, and months down to milliseconds.
Apply the power of knowledge — Threat Intelligence Exchange makes it possible for administrators to easily tailor comprehensive threat intelligence from multiple intelligence data sources. This customization empowers administrators to assemble, override, and tune the intelligence source information so that they can modify protection for their environment and organization.
Orchestrate in real time — Threat Intelligence Exchange is the first solution to use the McAfee data exchange layer, a bidirectional communications fabric enabling security intelligence, and adaptive security through product integration simplicity and context sharing. The data exchange layer supports the automatic configuration of products, reducing errors and eliminating effort to lower implementation and operational costs of integration.
Supercharge existing endpoint protection — Threat Intelligence Exchange provides breakthrough endpoint protection, using McAfee VirusScan Enterprise to make accurate file execution decisions. Endpoints will also be protected based on malware detected by network gateways, while network gateways block access based on endpoint convictions.
McAfee Threat Intelligence Exchange makes it possible for administrators to easily tailor comprehensive threat intelligence from global data sources, such as McAfee Global Threat Intelligence (GTI) and third-party feeds, with local threat intelligence sourced from real-time and historical event data coming from endpoints, gateways, and other security components.
The McAfee data exchange layer enables security components to dynamically join the McAfee Threat Intelligence Exchange. Shared insights bring deeper awareness of the threats targeting an organization. Attacks are discovered through the endpoints, gateways, and other security components united in providing real-time surveillance.
Threat details collected from malware encounters at endpoints and network gateways can propagate through the data exchange layer in milliseconds, educating all security components to proactively immunize against newly detected threats.
While increasing security resiliency, security cost of ownership is lowered by extending existing McAfee security detection, prevention, and analytic technology investments to proactively and efficiently protect your organization as soon as a threat is revealed.
McAfee Threat Intelligence Exchange consists of the following components:
Additional requirements for McAfee Threat Intelligence Exchange include:
For a technical summary on the McAfee product listed above, please view the product data sheet.
Adaptive intelligence and real-time communications orchestrate protection in the McAfee Security Connected Platform.
Following the highly publicized celebrity photo breaches occurring earlier this month, cloud security has been thrust into the spotlight. While the appeal of cloud options is obvious in terms of efficiency and scalability, security issues have triggered some (much deserved) hesitancy among information security professionals. The challenges of securing cloud platforms may seem daunting, but […]
The post September #SecChat: The Evolution of Cloud & Server Security appeared first on McAfee.
A busy week at the Intel Developer Forum has just come to a close. Over the course of three (somewhat) sunny days in San Francisco, we got a chance to see what the developers, makers and creators of today’s technologies have in store for the upcoming year. Just in case you didn’t get a chance […]
The post IDF 2014 – Where There’s a Developer, There’s a Way! appeared first on McAfee.
If there’s one term that can make a CISO squirm whenever mentioned, it’s “Shadow IT.” After all, when tasked with securing an enterprise-scale network, most CISOs frown on business units and employees procuring their own tech solutions — like Dropbox, Flickr, or Gmail — without notifying IT for proper vetting. But that discomfort isn’t stopping […]
The post Shadow IT and the Future of the Cloud: How CISOs Lost Visibility and How They Can Regain It appeared first on McAfee.
As cybercrime continues to cause financial upset among both brands and individuals, it becomes increasingly critical to address the security measures necessary to suppress the impact it has on the global economy. In our September EMEA #SecChat, we discussed the state of global cybercrime and resulting economic damage. This discussion built on many of the […]
The post September EMEA #SecChat Recap – The Economic Impact of Cybercrime appeared first on McAfee.
Although VMworld wrapped a few weeks ago, we’re still spinning over the excitement and buzz that was generated around the event. VMworld 2014 was a special benchmark for both McAfee and Intel, as we presented the first Intel Security product (the Intel Security Controller), and also showcased Intel Security’s capabilities with a united booth presence […]
The post Comprehensive Server Security: The Star of VMworld 2014 appeared first on McAfee.