This blog was written by Nat Smith.
We’ll be releasing four blog posts over the next week. Each blog will contain a repeated clue word to help you solve the puzzle below. Track all four clues to help solve the final puzzle and a chance to win an Xbox One Gaming system!. To enter the contest, after the last blog, email us at with the right answer and the clue words. Submissions should be sent in be in by end of 2/16/2015
Puzzle: This adventure epic is a successful franchise on TV and in film
Blog 1 hint (1/29/2015) : The Setting
Blog 2 hint (2/3/2015): An Organization
Blog 3 hint (2/5/2015): The Theme
Blog 4 hint (2/10/2015): A Ship
Recently we’ve been talking about integration across the security environment. Actually we’ve been talking about the lack of such integration, and how it impairs our ability to detect and respond to advanced malware attacks. As counter examples we’ve looked at how McAfee Advanced Threat Defense and Enterprise Security Manager share data and process workflows with other front line security controls to enhance threat detection and incident response across regions of an enterprise security environment.
But while both of these examples are great improvements on the status quo, I’d now like to raise our gaze to the next level. I’d like to contemplate what’s possible when every byte of new security information is gathered, correlated, distilled to actionable intelligence, and shared with every active security control in near real time. I’d like to consider what’s possible when every silo, bottleneck, and barrier to the free flow of security intelligence is razed. I’m talking, of course, about the effect of McAfee Threat Intelligence Exchange (TIE) on the enterprise security environment. I’ve come to think of it as the security singularity.
With Threat Intelligence Exchange, point-to-point integrations between devices are replaced by the McAfee Data Exchange Layer (DXL), a brokered, bidirectional communications fabric. The DXL allows participating members of McAfee TIE to share intelligence with security controls across the enterprise in real time regardless of their location. Instead of manual integration through low-level APIs on a one-to-one basis, the DXL communications fabric allows McAfee security controls to integrate automatically, with a common information model that supports a variety of communications methodologies. It not only improves communication, it reduces labor, errors, and costs.
If DXL gives the security environment a shared nervous system, McAfee Threat Intelligence Exchange Server gives it a brain. It aggregates data feeds from McAfee Global Threat Intelligence (McAfee GTI), VirusTotal, and other third-party feeds, combining them with local intelligence (both real-time and historical) sourced from endpoints, gateways, and other security components.
Threat Intelligence exchange Server allows security administrators to assemble, override, augment, and fine-tune intelligence data feeds to drive actions that are appropriate in their own environments. The combined metadata collected from endpoints, gateways, and network edge security components provides visibility and enables protective actions that are perfectly attuned to the threat status and sensitivity that is unique to the enterprise.
A recent McAfee white paper, Advanced Targeted Attacks: It Takes a system describes how McAfee Threat Intelligence Exchange transforms the security environment by knitting endpoints, gateways, and other security components into a full-fledged advanced targeted attack defense system. It collapses the interval from encounter to containment from days, weeks and months down to milliseconds. It reduces the risks and operational costs associated with siloed security systems, replacing them with the sustainable advantages of adaptive threat prevention. With Threat Intelligence Exchange, McAfee is changing the dynamics of the fight against targeted attacks and advanced malware. Seamless integration across the enterprise security environment is the key, and Threat Intelligence Exchange makes it a reality.
About the Author