McAfee Global Threat Intelligence Proxy (McAfee GTI Proxy) enables McAfee VirusScan Enterprise nodes to perform McAfee GTI file reputation (formerly known as Artemis) queries from within the enterprise network without requiring direct access to the public McAfee cloud from all McAfee VirusScan Enterprise (version 8.7 or later) endpoint systems. With McAfee GTI Proxy, organizations ensure that they have up-to-date threat protection and robust virus detection capabilities, including a strong defense against advanced persistent threats and botnets, even if Internet access is limited.
Consolidated cloud communications — Driven by compliance or other factors, organizations often have unique requirements for allowing applications to access resources on the Internet. For organizations operating limited Internet access environments, McAfee GTI Proxy consolidates communications between McAfee VirusScan Enterprise clients that have McAfee GTI file reputation queries activated and the McAfee cloud via a set of auditable proxy servers.
Streamlined deployment and management — McAfee GTI Proxy is delivered as a VMware virtual appliance and managed by the McAfee ePolicy Orchestrator (ePO) platform. Optimized for efficiency, McAfee GTI Proxy requires little additional network overhead.
Real-time threat protection — Leveraging McAfee GTI via the cloud to resolve real-time file reputation queries, McAfee GTI Proxy identifies suspicious files that may contain malware.
McAfee GTI Proxy supports custom reputation entries enabling local intelligence to override the McAfee Global Threat Intelligence reputation response. Administrators can specify whether a triggered file should have a clean or unclean response regardless of the reputation given by McAfee, enabling rapid response to suspected threats and false positive prevention.
Close the protection gap with McAfee Global Threat Intelligence (GTI). McAfee GTI offers comprehensive, real-time protection against both known and emerging threats and McAfee GTI Proxy enables GTI support for VirusScan Enterprise clients. McAfee GTI, a cloud-based service using reputation-based threat protection in addition to other techniques, correlates real-world data collected from millions of sensors globally and delivers automated intelligence to VirusScan Enterprise via the GTI Proxy.
Support up to 100,000 PCs per virtual appliance, reducing management costs.
Communications between GTI Proxy and the McAfee cloud are handled via UDP wrapped in SSL (which is DTLS on port 443).
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
Get answers to commonly asked questions about McAfee Global Threat Intelligence and McAfee GTI Proxy.
Tracking and disrupting the crime ring behind a polymorphic botnet. On April 8, global law enforcement, with the assistance of Intel Security/McAfee, took down the Beebone botnet, which propagates a particularly tricky polymorphic worm. Law enforcement and criminals often act like predators and prey, each evolving and adapting, trying to gain an advantage. A few […]
With organizations falling victim to costly cyber-attacks at an increasing rate, there is growing concern from information security professionals on how to reduce breach exposure. The recent high-profile data breaches are wake up calls for organizations and consumers alike. According to Ponemon Institute’s annual study on data breach preparedness 43% of companies have experienced a […]
The post Reducing your breach risk through vendor consolidation appeared first on McAfee.
By Kent Landfield, Director of Standards and Technology Policy, Intel Security, and Malcolm Harkins, Chief Security and Privacy Officer at Intel When the Administration released the Framework for Improving Critical Infrastructure Cybersecurity (the Framework) on February 12, 2014, many of us at Intel and Intel Security were familiar with the details, as we had participated […]
We’ll be releasing four blog posts over the next week. Each blog will contain a repeated clue word to help you solve the puzzle below. Track all four clues to help solve the final puzzle and a chance to win an Xbox One Gaming system!. To enter the contest, after the last blog, email us at with […]
Since the dawn of the mobile era, there has been a continuous fight for an increase in the security measures taken to protect user’s data sent through mobile apps. When various mobile messaging apps began rolling out encryption, it came as no surprise that consumers and security aficionados rejoiced. After all, encryption is more or […]
The post Personal Privacy vs. Security – Do We Have to Choose? appeared first on McAfee.