McAfee Network Threat Response is a software package that captures, deconstructs, and analyzes malware that is resident inside your network today. Network Threat Response is a powerful cybertool for security analysts. It automatically identifies malware targeting internal network vulnerabilities, and instantly captures and analyzes it to aid in rapid remediation and ongoing network defense.
Reveals what attackers don't want us to see
Network Threat Response combs through PDFs, Microsoft Office files, and all other network activities looking for attempts to hide or obscure malicious content, providing analysts with instant visibility into attacks.
Uncovers persistent attacks
Network Threat Response identifies and accumulates portions of attacks that trickle in over time, piecing together threat puzzles that sneak into networks at a snail’s pace.
Cuts analysis time down to minutes
Network Threat Response automates security analysts’ tasks by combing through network traffic, looking for signature patterns of malware activity. These attack vectors are automatically forwarded for full analysis and presented to the analyst who can view all the facets of an attack and make appropriate, targeted security changes. These targeted changes allow networks to maintain optimal protection with minimal impact on internal IT operations.
High-performance, high-security platform
Customers seeking to lower the hardware maintenance and management costs can now deploy Network Threat Response on the scalable and multifunctional CloudShield CS-4000 platform. Network Threat Response on the CS-4000 platform provides security-conscious enterprises with a scalable, physically secure, and cybertough approach to finding and avoiding security breaches caused by advanced malware attacks.
A single McAfee Network Threat Response device gives any security team the power of 20 analysts and reverse engineers without requiring a single hire. Unlike other security devices, which can generate thousands of events a day, analysts can review every event generated by McAfee Network Threat Response within minutes.
A distinguishing characteristic of advanced malware is its ability to evade detection. McAfee Network Threat Response looks at PDFs, Microsoft Office files, and all other network activities for attempts to hide or obscure traffic. NTR doesn’t just alert to the presence of obfuscation; it decodes the traffic, providing analysts with visibility into the attack that is not possible with other existing tools.
IPS solutions that are deployed in-line are forced to make difficult trade-offs due to performance pressures. That means more complicated threats may go undetected. NTR sits out of band, which frees it to perform more in-depth analysis without having to worry about time contstraints.
Network Threat Response has the unique ability to uncover slow moving, persistent attacks, identifying and accumulating portions of attacks that trickle in over time. Nothing else gives our customers the ability to piece together threat puzzles that sneak into their network at a snail’s pace.
Most tools are one-dimensional in their detections, but NTR utilizes a host of different methodologies that increase detection rates and allow for the detection of complicated attacks. NTR deploys a suite of commercial AV engines for validating network objects, in addition to McAfee AV. Sandbox Analysis? NTR deploys both ValidEdge and Cuckoo for executing and studying the impact of suspicious network objects in a virtual environment. In addition to these engines, NTR employs many other detection and analysis algorithms including JAR analysis, PDF analysis, Office document analysis, etc.
Shellcode is the set of instructions used by malware to infect and control a device. McAfee Network Threat Response uses patent-pending heuristics to detect the presence of shellcode, without requiring prior knowledge of the ever-changing, encrypted attack payload. Even obfuscated shellcode is detected with NTR’s suite of analysis engines, and it takes it a step further, deobfuscating the detected code and presenting it for easy analysis by security professionals.
NTR automates the Security Analysts task by combing through network traffic looking for signature patterns of malware activity and attack. Once identified, these “attack vectors” are automatically forwarded into the full suite of NTR analysis services. The result of this processing is presented to the analyst who can view all the facets of the attack and make appropriate, targeted security changes. These targeted security changes allow networks to maintain optimal protection with minimal impact on internal IT operations.
McAfee Network Threat Response accelerates the analysis of the captured data via its PCAP import capabilities. Captured data can be replayed through the McAfee Network Threat Response analysis engines where hidden traffic is decoded and key indicators are highlighted. As a result, an analyst has anchor points from which to start the investigation—shaving days off of analysis time. Netwitness and Solera are excellent sources of captured PCAP data.
McAfee Network Threat Response is a software solution that can run on a variety of hardware platforms. For optimal security and performance, we recommend running Network Threat Response on the CloudShield CS-4000 platform. Please see the data sheet for appliance specifications and details.
Topics : Network Security
For a technical summary of the CloudShield product listed above, please view the product data sheet and learn how McAfee Network Threat Response on the CloudShield CS-4000 platform complements your existing network defenses.
For a technical summary of the CloudShield product listed above, please view the product data sheet and learn how it is used with McAfee Network Threat Response software.
For a technical summary on the McAfee product listed above, please view the product data sheet.