SlideShare a Scribd company logo
Data Sheet
McAfee Threat Intelligence Exchange
Delivering adaptive threat prevention in real time
McAfee®
Threat Intelligence Exchange enables adaptive threat prevention by sharing
relevant security data across endpoints, gateways, and other security products.
Sharing of data allows these products to operate as one, exchanging and acting
on collective threat intelligence. By delivering a cohesive framework where security
products collectively pinpoint threats and expose threat trends within an organization,
McAfee Threat Intelligence Exchange significantly optimizes threat prevention.
McAfee narrows the gap from encounter to containment from days, weeks, and
months down to milliseconds.
Key Advantages
•	Adaptive threat protection
closes the gap from encounter
to containment for advanced
targeted attacks from days,
weeks, and months down to
milliseconds.
•	Provides collective threat
intelligence built out of global
intelligence data sources
combined with local threat
intelligence and customized
organizational knowledge.
•	Brings immediate visibility
into the presence of advanced
targeted attacks in your
organization.
•	Security components operate as
one, sharing relevant security
data in real time between
endpoint, gateway, and other
security products enabling
adaptive security.
•	Cutting-edge endpoint protec­
tion technology determines
file-execution decisions with
rule-based logic based on
endpoint context (file, process,
and environmental attributes)
blended with collective threat
intelligence.
•	Integration simplicity through
the McAfee data-exchange
layer reduces implementation
and operational costs and
enables unmatched operation
effectiveness advancing the
evolution of the McAfee
Security Connected Platform.
With McAfee Threat Intelligence Exchange,
security teams gain actionable insights and
security management efficiencies through the
real‑time exchange of threat intelligence. We
know that revealing a threat is most useful if
you can take actions against it. McAfee Threat
Intelligence Exchange automatically blocks
threats that are determined to be risky to your
organization. Leveraging your security detection,
prevention, and analytics technology, an
investment in McAfee allows the orchestration
of adaptive threat prevention across the entire
organization while significantly reducing total cost
of ownership. The result is a unified threat defense
system that is customizable and easily deployed,
providing resilience and immunity to infections.
If You See Something, Say Something
McAfee Threat Intelligence Exchange is the first
solution to make use of the McAfee data-exchange
layer that promotes security intelligence and
adaptive security through product integration and
context sharing. When components operate as
one, they immediately share relevant data between
endpoint, network, security applications, and
other security components. Integration simplicity,
enabled by the data-exchange layer, significantly
reduces implementation and operational costs and
provides unmatched security, operational efficiency,
and effectiveness.
Designed as an open framework, the data-
exchange layer enables security components to
dynamically join the McAfee Threat Intelligence
Exchange. Every shared insight encourages deeper
awareness of the battle against targeted threats.
Since these threats are laser-focused attacks by-
design, organizations need a local surveillance
system to capture the trends and any unique
assaults they encounter.
Apply the Power of Knowledge
McAfee Threat Intelligence Exchange makes
it possible for administrators to easily tailor
comprehensive threat intelligence from global
intelligence data sources. These can be McAfee
Global Threat Intelligence (McAfee GTI) or
third-party feeds, with local threat intelligence
sourced from real-time and historical event data
delivered via endpoints, gateways, and other
security components. Customers are empowered
to assemble, override, augment, and tune the
intelligence source information so that they
can customize data for their environment and
organization (for example, blacklists and whitelists
of files and certificates or certificates assigned to
and used by the organization).
The Threat Intelligence Exchange Server reflects
the current threat state across your organization.
Descriptive metadata about key objects are main­
tained and reflected in the collective intelligence
gathered. Administrators and security information
and event management (SIEM) products can
collaborate based on insight gathered to instantly
identify systems with a high chance of being
compromised based on past malicious activity.
McAfee Threat Intelligence Exchange brings
immediate visibility into the presence of advanced
targeted attacks by automatically assembling
events and valuable context as communicated
from the endpoints, gateways, and other security
components. Every new event is transformed into
actionable intelligence guiding investigations and
timelines. Protection effectiveness, detection, and
analysis capabilities are increased when multiple
intelligence sources are used.
Cutting-Edge Endpoint Protection
McAfee Threat Intelligence Exchange provides
innovative endpoint prevention through the use of
a McAfee Threat Intelligence Exchange VirusScan®
Enterprise Module. By using configurable rules, the
module makes accurate file execution decisions
and leverages the combined intelligence from local
endpoint context (file, process, and environmental
attributes) and the current available collective threat
intelligence (for example, organizational prevalence,
age, reputation, etc.).
When you customize the McAfee Threat Intelli­
gence Exchange VirusScan Enterprise Module
based on your organization’s level of risk tolerance
at the endpoint, administrators get the flexibility
to set execution conditions driven by their specific
requirements. This can be as rigid as adhering to a
zero-tolerance policy for unknown or ‘grey’ files by
setting rules that no file is accessed unless it has a
known and acceptable reputation.
Endpoint Protection and Management
Anywhere, Anytime
McAfee Threat Intelligence Exchange provides
adaptive threat prevention and security manage­
ability with a global reach. McAfee Threat
Intelligence Exchange reaches endpoints no
matter where they are and provides the means
for management of threat policy, detections, and
security updates and remote investigation. Security
components operate as one, regardless of physical
boundaries. They immediately share relevant
security data between endpoint, gateway, and
other security products—regardless of location—
enabling adaptive threat prevention.
Other security management solutions are unable
to immediately push policy changes, content,
and program updates to the endpoints. This
leaves an open window when organizations are
exposed to increased risk. By utilizing the McAfee
data-exchange layer, McAfee Threat Intelligence
Exchange has the ability to maintain a persistent
connection regardless of network obstacles. It
effectively closes this risk gap and ensures that
no endpoint is left behind.
Adapt and Immunize Against Threats
Adaptive threat prevention is a technology
breakthrough, leapfrogging beyond loose
integrations as a means for security coordination.
Security teams need the ability to automate
security threat information and proactively apply
prevention policies and protections if they want
to break the barriers of organizational and
budgetary boundaries. By joining the security
infrastructure into a collaborative system, security
administrators are able to detect, share, and
immunize their environment from threats. McAfee
Threat Intelligence Exchange provides a significant
increase in resiliency and control in the battle
against threats. From a security standpoint, the
total cost of ownership decreases and you’re
better able to leverage the value of your existing
McAfee security detection, prevention, and
analytics technology investment. Plus, your
security components now operate as one.
Now, an encounter of recently-identified malware
at a network gateway can propagate through the
data exchange layer in milliseconds, reaching all
of the endpoints so they have the information
needed to proactively immunize against this threat.
A blocked compromise attempt on an endpoint
that reveals malware can be shared through
the data-exchange layer, reaching gateway and
other security components sealing the perimeter
against the threat. Endpoints are protected based
on malware detected by network gateways,
while network gateways block access based on
endpoint convictions.
Advanced Targeted Attacks:
Real‑World Challenge
Designed to thwart detection and
to establish a lasting foothold in
an organization that is exfiltrating
high-value data, advanced tar­
geted attacks continue to plague
organizations. According to data
recently released as part of the
Verizon 2013 Data Breach and
Investigations Report, in 80% of
cases a breach went undetected
for weeks. Once a detection was
made, it took days to contain the
threat in 79% of the cases.
For more information, visit
mcafee.com/TIE
2821 Mission College Boulevard
Santa Clara, CA 95054
888 847 8766
www.mcafee.com
McAfee, the McAfee logo, ePolicy Orchestrator, McAfee ePO, and VirusScan are registered trademarks or trademarks of McAfee, Inc. or its
subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans,
specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without
warranty of any kind, express or implied. Copyright © 2014 McAfee, Inc.
60943ds_threat-intelligence-exchange_0214_fnl_ETMG
Collaboration Benefits
One-click reputation query
Upon encountering an unknown file by any of
the security components in your organization—
gateway, endpoint, or network—reputation can
be easily determined. Single-click integration
to VirusTotal and McAfee GTI will return
immediate results.
Advanced threat analytics
McAfee Threat Intelligence Exchange coordinates
with McAfee Advanced Threat Defense to
imme­­­diately gain additional insight to potential
new threats. Together, they leverage the threat
analytics from static and dynamic code analysis to
determine the reputation of a file in question. All
of this is automated, documented, and collectively
shared through the data exchange so you can
extend the depth of threat prevention by adding
advanced threat analytics to comprehensive
threat intelligence.
Security event management
McAfee Enterprise Security Manager provides the
additional tool to dig deeper when investigating
indicators of compromise determined from
McAfee Threat Intelligence Exchange. Access to
historical security information and the ability to
create automated watch lists increase the security
efficiency for organizations.
Figure 1. Integration simplicity, through the McAfee data-exchange layer, reduces implementation and operational costs
and enables unmatched operational effectiveness while advancing the McAfee Security Connected Platform evolution.
McAfee ePolicy
Orchestrator®
(McAfee ePO™
)
Software
Core Components
Data Exchange Layer
Optional Components
McAfee Threat
Intelligence
Exchange Server
McAfee Advanced
Threat Defense
McAfee Enterprise
Security Manager
McAfee Next
Generation Firewall
McAfee Network
Security Platform
McAfee Email
Gateway
McAfee Web
Gateway
McAfee Threat Intelligence
Exchange VirusScan
Enterprise Module
McAfee Global
Threat Intelligence Third-Party Threat Feeds

More Related Content

What's hot

Layered Approach - Information Security Recommendations
Layered Approach - Information Security RecommendationsLayered Approach - Information Security Recommendations
Layered Approach - Information Security Recommendations
Michael Kaishar, MSIA | CISSP
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics
EMC
 
Cisco - See Everything, Secure Everything
Cisco - See Everything, Secure EverythingCisco - See Everything, Secure Everything
Cisco - See Everything, Secure Everything
Redington Value Distribution
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
Rajendra Menon
 
APT Monitoring and Compliance
APT Monitoring and ComplianceAPT Monitoring and Compliance
APT Monitoring and Compliance
Marcus Clarke
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
Symantec
 
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security Breach
CloudLock
 
MSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationMSSP - Security Orchestration & Automation
MSSP - Security Orchestration & Automation
Siemplify
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through Correlation
Anton Chuvakin
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
John Gilligan
 
Network Intrusion detection and Countermeasure sElection(NICE
Network Intrusion detection and Countermeasure sElection(NICENetwork Intrusion detection and Countermeasure sElection(NICE
Network Intrusion detection and Countermeasure sElection(NICE
Pranya Prabhakar
 
US Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security InitiativesiUS Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security InitiativesiLindsey Landolfi
 
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity ReportCisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
Geneva Business School Myanmar Campus
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
John Gilligan
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
Cisco Security
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
Christophe Foulon, CISSP
 
Top Level Cyber Security Strategy
Top Level Cyber Security Strategy Top Level Cyber Security Strategy
Top Level Cyber Security Strategy
John Gilligan
 
Cyber threat detection by siem tools
Cyber threat detection by siem toolsCyber threat detection by siem tools
Cyber threat detection by siem tools
mrigakshi goel
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
EC-Council
 

What's hot (20)

Layered Approach - Information Security Recommendations
Layered Approach - Information Security RecommendationsLayered Approach - Information Security Recommendations
Layered Approach - Information Security Recommendations
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics
 
Cisco - See Everything, Secure Everything
Cisco - See Everything, Secure EverythingCisco - See Everything, Secure Everything
Cisco - See Everything, Secure Everything
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
APT Monitoring and Compliance
APT Monitoring and ComplianceAPT Monitoring and Compliance
APT Monitoring and Compliance
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security Breach
 
MSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationMSSP - Security Orchestration & Automation
MSSP - Security Orchestration & Automation
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through Correlation
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
 
Network Intrusion detection and Countermeasure sElection(NICE
Network Intrusion detection and Countermeasure sElection(NICENetwork Intrusion detection and Countermeasure sElection(NICE
Network Intrusion detection and Countermeasure sElection(NICE
 
US Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security InitiativesiUS Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security Initiativesi
 
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity ReportCisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Top Level Cyber Security Strategy
Top Level Cyber Security Strategy Top Level Cyber Security Strategy
Top Level Cyber Security Strategy
 
Cyber threat detection by siem tools
Cyber threat detection by siem toolsCyber threat detection by siem tools
Cyber threat detection by siem tools
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
 

Viewers also liked

podvezi.by
podvezi.bypodvezi.by
podvezi.by
Poroshilov_Roman
 
Notiuni generale despre dezastre
Notiuni generale despre dezastreNotiuni generale despre dezastre
Notiuni generale despre dezastre
Pompierii Români
 
Deep Visibility for Production Microservices
Deep Visibility for Production MicroservicesDeep Visibility for Production Microservices
Deep Visibility for Production Microservices
Paul Bauer
 
şIrincan memmedova 126-hidir nebi̇ bayrami
şIrincan memmedova 126-hidir nebi̇ bayramişIrincan memmedova 126-hidir nebi̇ bayrami
şIrincan memmedova 126-hidir nebi̇ bayrami
Shirincan Mammadova
 
şIrincan mammadova 126
şIrincan mammadova 126şIrincan mammadova 126
şIrincan mammadova 126
Shirincan Mammadova
 
şIrincan məmmədova 126
şIrincan məmmədova 126şIrincan məmmədova 126
şIrincan məmmədova 126
Shirincan Mammadova
 
Legea nr. 80 din 1995 Statutul cadrelor militare
Legea nr. 80 din 1995 Statutul cadrelor militareLegea nr. 80 din 1995 Statutul cadrelor militare
Legea nr. 80 din 1995 Statutul cadrelor militare
Pompierii Români
 
Data Manipulation
Data ManipulationData Manipulation
Data ManipulationAsfi Bhai
 
Protectia populatiei,bunurilor materiale
Protectia populatiei,bunurilor  materialeProtectia populatiei,bunurilor  materiale
Protectia populatiei,bunurilor materiale
Pompierii Români
 
Introduction to Dr. Eric Tao at CSUMB - 4 slides
Introduction to Dr. Eric Tao at CSUMB -   4 slidesIntroduction to Dr. Eric Tao at CSUMB -   4 slides
Introduction to Dr. Eric Tao at CSUMB - 4 slides
Eric Tao
 

Viewers also liked (16)

Faceadd
FaceaddFaceadd
Faceadd
 
podvezi.by
podvezi.bypodvezi.by
podvezi.by
 
Faceadd
FaceaddFaceadd
Faceadd
 
Libertas.by
Libertas.byLibertas.by
Libertas.by
 
Faceadd
FaceaddFaceadd
Faceadd
 
Notiuni generale despre dezastre
Notiuni generale despre dezastreNotiuni generale despre dezastre
Notiuni generale despre dezastre
 
Deep Visibility for Production Microservices
Deep Visibility for Production MicroservicesDeep Visibility for Production Microservices
Deep Visibility for Production Microservices
 
Libertas.by
Libertas.byLibertas.by
Libertas.by
 
şIrincan memmedova 126-hidir nebi̇ bayrami
şIrincan memmedova 126-hidir nebi̇ bayramişIrincan memmedova 126-hidir nebi̇ bayrami
şIrincan memmedova 126-hidir nebi̇ bayrami
 
Algorithms
AlgorithmsAlgorithms
Algorithms
 
şIrincan mammadova 126
şIrincan mammadova 126şIrincan mammadova 126
şIrincan mammadova 126
 
şIrincan məmmədova 126
şIrincan məmmədova 126şIrincan məmmədova 126
şIrincan məmmədova 126
 
Legea nr. 80 din 1995 Statutul cadrelor militare
Legea nr. 80 din 1995 Statutul cadrelor militareLegea nr. 80 din 1995 Statutul cadrelor militare
Legea nr. 80 din 1995 Statutul cadrelor militare
 
Data Manipulation
Data ManipulationData Manipulation
Data Manipulation
 
Protectia populatiei,bunurilor materiale
Protectia populatiei,bunurilor  materialeProtectia populatiei,bunurilor  materiale
Protectia populatiei,bunurilor materiale
 
Introduction to Dr. Eric Tao at CSUMB - 4 slides
Introduction to Dr. Eric Tao at CSUMB -   4 slidesIntroduction to Dr. Eric Tao at CSUMB -   4 slides
Introduction to Dr. Eric Tao at CSUMB - 4 slides
 

Similar to ds-threat-intelligence-exchange

Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networks
Cisco Canada
 
Connect security to your business with mc afee epo software
Connect security to your business with mc afee epo softwareConnect security to your business with mc afee epo software
Connect security to your business with mc afee epo software
wardell henley
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
Cisco Canada
 
Cisco amp for meraki
Cisco amp for merakiCisco amp for meraki
Cisco amp for meraki
Cisco Canada
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
Cristian Garcia G.
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpoints
Cisco Canada
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
Ricardo Resnik
 
McAfee CDCR Case Study
McAfee CDCR Case StudyMcAfee CDCR Case Study
McAfee CDCR Case Studyjoepanora
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
George Wainblat
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
SonaliG6
 
Advanced Endpoint Protection
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
Mustafa YÜKSEL
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
Amazon Web Services
 
Buy McAfee Antivirus Software Online at Best Prices in USA .pptx
Buy McAfee Antivirus Software Online at Best Prices in USA .pptxBuy McAfee Antivirus Software Online at Best Prices in USA .pptx
Buy McAfee Antivirus Software Online at Best Prices in USA .pptx
Dealsonantivirus
 
Buy McAfee Antivirus Software Online at Best Prices in USA .pdf
Buy McAfee Antivirus Software Online at Best Prices in USA .pdfBuy McAfee Antivirus Software Online at Best Prices in USA .pdf
Buy McAfee Antivirus Software Online at Best Prices in USA .pdf
Dealsonantivirus
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
Prime Infoserv
 
Esteban Próspero
Esteban PrósperoEsteban Próspero
Esteban Próspero
ClusterCba
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
gemmarie1
 
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)Sam Kumarsamy
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
Anthony Daniel
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
NBBNOC
 

Similar to ds-threat-intelligence-exchange (20)

Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networks
 
Connect security to your business with mc afee epo software
Connect security to your business with mc afee epo softwareConnect security to your business with mc afee epo software
Connect security to your business with mc afee epo software
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
 
Cisco amp for meraki
Cisco amp for merakiCisco amp for meraki
Cisco amp for meraki
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpoints
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
McAfee CDCR Case Study
McAfee CDCR Case StudyMcAfee CDCR Case Study
McAfee CDCR Case Study
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
 
Advanced Endpoint Protection
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
Buy McAfee Antivirus Software Online at Best Prices in USA .pptx
Buy McAfee Antivirus Software Online at Best Prices in USA .pptxBuy McAfee Antivirus Software Online at Best Prices in USA .pptx
Buy McAfee Antivirus Software Online at Best Prices in USA .pptx
 
Buy McAfee Antivirus Software Online at Best Prices in USA .pdf
Buy McAfee Antivirus Software Online at Best Prices in USA .pdfBuy McAfee Antivirus Software Online at Best Prices in USA .pdf
Buy McAfee Antivirus Software Online at Best Prices in USA .pdf
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
Esteban Próspero
Esteban PrósperoEsteban Próspero
Esteban Próspero
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
 
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 

ds-threat-intelligence-exchange

  • 1. Data Sheet McAfee Threat Intelligence Exchange Delivering adaptive threat prevention in real time McAfee® Threat Intelligence Exchange enables adaptive threat prevention by sharing relevant security data across endpoints, gateways, and other security products. Sharing of data allows these products to operate as one, exchanging and acting on collective threat intelligence. By delivering a cohesive framework where security products collectively pinpoint threats and expose threat trends within an organization, McAfee Threat Intelligence Exchange significantly optimizes threat prevention. McAfee narrows the gap from encounter to containment from days, weeks, and months down to milliseconds. Key Advantages • Adaptive threat protection closes the gap from encounter to containment for advanced targeted attacks from days, weeks, and months down to milliseconds. • Provides collective threat intelligence built out of global intelligence data sources combined with local threat intelligence and customized organizational knowledge. • Brings immediate visibility into the presence of advanced targeted attacks in your organization. • Security components operate as one, sharing relevant security data in real time between endpoint, gateway, and other security products enabling adaptive security. • Cutting-edge endpoint protec­ tion technology determines file-execution decisions with rule-based logic based on endpoint context (file, process, and environmental attributes) blended with collective threat intelligence. • Integration simplicity through the McAfee data-exchange layer reduces implementation and operational costs and enables unmatched operation effectiveness advancing the evolution of the McAfee Security Connected Platform. With McAfee Threat Intelligence Exchange, security teams gain actionable insights and security management efficiencies through the real‑time exchange of threat intelligence. We know that revealing a threat is most useful if you can take actions against it. McAfee Threat Intelligence Exchange automatically blocks threats that are determined to be risky to your organization. Leveraging your security detection, prevention, and analytics technology, an investment in McAfee allows the orchestration of adaptive threat prevention across the entire organization while significantly reducing total cost of ownership. The result is a unified threat defense system that is customizable and easily deployed, providing resilience and immunity to infections. If You See Something, Say Something McAfee Threat Intelligence Exchange is the first solution to make use of the McAfee data-exchange layer that promotes security intelligence and adaptive security through product integration and context sharing. When components operate as one, they immediately share relevant data between endpoint, network, security applications, and other security components. Integration simplicity, enabled by the data-exchange layer, significantly reduces implementation and operational costs and provides unmatched security, operational efficiency, and effectiveness. Designed as an open framework, the data- exchange layer enables security components to dynamically join the McAfee Threat Intelligence Exchange. Every shared insight encourages deeper awareness of the battle against targeted threats. Since these threats are laser-focused attacks by- design, organizations need a local surveillance system to capture the trends and any unique assaults they encounter. Apply the Power of Knowledge McAfee Threat Intelligence Exchange makes it possible for administrators to easily tailor comprehensive threat intelligence from global intelligence data sources. These can be McAfee Global Threat Intelligence (McAfee GTI) or third-party feeds, with local threat intelligence sourced from real-time and historical event data delivered via endpoints, gateways, and other security components. Customers are empowered to assemble, override, augment, and tune the intelligence source information so that they can customize data for their environment and organization (for example, blacklists and whitelists of files and certificates or certificates assigned to and used by the organization). The Threat Intelligence Exchange Server reflects the current threat state across your organization. Descriptive metadata about key objects are main­ tained and reflected in the collective intelligence
  • 2. gathered. Administrators and security information and event management (SIEM) products can collaborate based on insight gathered to instantly identify systems with a high chance of being compromised based on past malicious activity. McAfee Threat Intelligence Exchange brings immediate visibility into the presence of advanced targeted attacks by automatically assembling events and valuable context as communicated from the endpoints, gateways, and other security components. Every new event is transformed into actionable intelligence guiding investigations and timelines. Protection effectiveness, detection, and analysis capabilities are increased when multiple intelligence sources are used. Cutting-Edge Endpoint Protection McAfee Threat Intelligence Exchange provides innovative endpoint prevention through the use of a McAfee Threat Intelligence Exchange VirusScan® Enterprise Module. By using configurable rules, the module makes accurate file execution decisions and leverages the combined intelligence from local endpoint context (file, process, and environmental attributes) and the current available collective threat intelligence (for example, organizational prevalence, age, reputation, etc.). When you customize the McAfee Threat Intelli­ gence Exchange VirusScan Enterprise Module based on your organization’s level of risk tolerance at the endpoint, administrators get the flexibility to set execution conditions driven by their specific requirements. This can be as rigid as adhering to a zero-tolerance policy for unknown or ‘grey’ files by setting rules that no file is accessed unless it has a known and acceptable reputation. Endpoint Protection and Management Anywhere, Anytime McAfee Threat Intelligence Exchange provides adaptive threat prevention and security manage­ ability with a global reach. McAfee Threat Intelligence Exchange reaches endpoints no matter where they are and provides the means for management of threat policy, detections, and security updates and remote investigation. Security components operate as one, regardless of physical boundaries. They immediately share relevant security data between endpoint, gateway, and other security products—regardless of location— enabling adaptive threat prevention. Other security management solutions are unable to immediately push policy changes, content, and program updates to the endpoints. This leaves an open window when organizations are exposed to increased risk. By utilizing the McAfee data-exchange layer, McAfee Threat Intelligence Exchange has the ability to maintain a persistent connection regardless of network obstacles. It effectively closes this risk gap and ensures that no endpoint is left behind. Adapt and Immunize Against Threats Adaptive threat prevention is a technology breakthrough, leapfrogging beyond loose integrations as a means for security coordination. Security teams need the ability to automate security threat information and proactively apply prevention policies and protections if they want to break the barriers of organizational and budgetary boundaries. By joining the security infrastructure into a collaborative system, security administrators are able to detect, share, and immunize their environment from threats. McAfee Threat Intelligence Exchange provides a significant increase in resiliency and control in the battle against threats. From a security standpoint, the total cost of ownership decreases and you’re better able to leverage the value of your existing McAfee security detection, prevention, and analytics technology investment. Plus, your security components now operate as one. Now, an encounter of recently-identified malware at a network gateway can propagate through the data exchange layer in milliseconds, reaching all of the endpoints so they have the information needed to proactively immunize against this threat. A blocked compromise attempt on an endpoint that reveals malware can be shared through the data-exchange layer, reaching gateway and other security components sealing the perimeter against the threat. Endpoints are protected based on malware detected by network gateways, while network gateways block access based on endpoint convictions. Advanced Targeted Attacks: Real‑World Challenge Designed to thwart detection and to establish a lasting foothold in an organization that is exfiltrating high-value data, advanced tar­ geted attacks continue to plague organizations. According to data recently released as part of the Verizon 2013 Data Breach and Investigations Report, in 80% of cases a breach went undetected for weeks. Once a detection was made, it took days to contain the threat in 79% of the cases. For more information, visit mcafee.com/TIE
  • 3. 2821 Mission College Boulevard Santa Clara, CA 95054 888 847 8766 www.mcafee.com McAfee, the McAfee logo, ePolicy Orchestrator, McAfee ePO, and VirusScan are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright © 2014 McAfee, Inc. 60943ds_threat-intelligence-exchange_0214_fnl_ETMG Collaboration Benefits One-click reputation query Upon encountering an unknown file by any of the security components in your organization— gateway, endpoint, or network—reputation can be easily determined. Single-click integration to VirusTotal and McAfee GTI will return immediate results. Advanced threat analytics McAfee Threat Intelligence Exchange coordinates with McAfee Advanced Threat Defense to imme­­­diately gain additional insight to potential new threats. Together, they leverage the threat analytics from static and dynamic code analysis to determine the reputation of a file in question. All of this is automated, documented, and collectively shared through the data exchange so you can extend the depth of threat prevention by adding advanced threat analytics to comprehensive threat intelligence. Security event management McAfee Enterprise Security Manager provides the additional tool to dig deeper when investigating indicators of compromise determined from McAfee Threat Intelligence Exchange. Access to historical security information and the ability to create automated watch lists increase the security efficiency for organizations. Figure 1. Integration simplicity, through the McAfee data-exchange layer, reduces implementation and operational costs and enables unmatched operational effectiveness while advancing the McAfee Security Connected Platform evolution. McAfee ePolicy Orchestrator® (McAfee ePO™ ) Software Core Components Data Exchange Layer Optional Components McAfee Threat Intelligence Exchange Server McAfee Advanced Threat Defense McAfee Enterprise Security Manager McAfee Next Generation Firewall McAfee Network Security Platform McAfee Email Gateway McAfee Web Gateway McAfee Threat Intelligence Exchange VirusScan Enterprise Module McAfee Global Threat Intelligence Third-Party Threat Feeds