Welcome!

News Feed Item

McAfee Expands Comprehensive Threat Protection in Security Connected Platform

McAfee today announced expanded capabilities to find, freeze, and fix advanced threats faster to win the fight against advanced and evasive targeted attacks. Part of the McAfee Security Connected approach, the McAfee Comprehensive Threat Protection solution tightly binds and shares threat intelligence and workflows across endpoints, network and the cloud. It provides protection, performance, and operational savings that are not possible from point products, which aren’t designed to optimize security and risk management as an IT function and carry the overhead of manual integrations.

Enhanced Countermeasures, New Analytics, Context and Orchestration

Since last year McAfee has enhanced the countermeasures available to customers and added new analytics, context and orchestration to fully integrate and automate the threat protection processes.

  • Uncovers over 800 million advanced network evasion techniques: Next Generation Firewall detects malicious traffic that has attempted to disguise itself by splitting into pieces that travel across a variety of protocols through different layers of the OSI stack. Now, the McAfee Next Generation Firewall can communicate with the Security Connected platform to educate endpoints and other network security products about these events.
  • More details about malware: McAfee Advanced Threat Defense combines reputation, and real-time emulation defenses with in-depth static code and dynamic, malware analysis (sandboxing) to provide the most detailed assessment and data on malware classification. Integration with McAfee Threat Intelligence Exchange can share all these details plus dynamic file and IP reputation, prevalence, and malware to drive counter-responses and educate each security component in the corporate environment to recognize and block emerging and targeted threats.
  • Find, freeze, and fix within milliseconds: Unlike other sandboxing technologies, McAfee Advanced Threat Defense can directly receive files for analysis from and send results to endpoint, network, and management systems, leveraging the Security Connected platform to optimize advanced malware detection and analysis and stop malware in its tracks—with no time or effort spent on integration.

“At McAfee, we’re laser focused on helping customers find, freeze and fix threats before they become problems,” said Pat Calhoun, general manager of network security at McAfee. “Today’s advanced threats require custom defenses. The McAfee Comprehensive Threat Protection solution provides integrations that let customers implement the defense that works best for their business. Weaving protection throughout endpoints, network infrastructure, and the cloud, it now counters the most evasive and determined attacks—in milliseconds.”

Continuing to expand its Comprehensive Threat Protection solution, McAfee recently announced McAfee Threat Intelligence Exchange which orchestrates local and global threat intelligence information and enterprise-wide security products into one cohesive integrated security system to eliminate the gap between encounter and containment of advanced targeted attacks. The ability to quickly spot and pre-empt advanced threats is now a business differentiator as companies seek to protect their intellectual property and assure customers that their data is safe and secure.

The McAfee Security Connected strategy integrates data and workflows for automated response. Threat intelligence shared between the network and endpoint helps McAfee countermeasures to immediately shut down command-and-control communications and quarantine compromised systems. For example, the McAfee Network Security Platform can use guidance from the McAfee Enterprise Security Manager to block communications with infected hosts.

Visit McAfee at the RSA Conference in booth 3203 in the North Expo hall – meet the security professionals at our Expert Bar and learn more about Comprehensive Threat Protection.

For more information about McAfee Comprehensive Threat Protection, visit http://www.mcafee.com/us/solutions/comprehensive-threat-protection/comprehensive-threat-protection.aspx.

About McAfee

McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com

Note: McAfee is a registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
SaaS companies can greatly expand revenue potential by pushing beyond their own borders. The challenge is how to do this without degrading service quality. In his session at 18th Cloud Expo, Adam Rogers, Managing Director at Anexia, discussed how IaaS providers with a global presence and both virtual and dedicated infrastructure can help companies expand their service footprint with low “go-to-market” costs.
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...