Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

McAfee Unveils New Threat Intelligence Exchange

McAfee has shared details on a soon to be released threat sharing platform designed to help security teams develop and customize a threat intelligence solution from global data sources.

McAfee, a wholly owned subsidiary of Intel, says the solution provides new approaches for answering increasingly urgent problems customers face more often as targeted attacks increase.

McAfee has shared details on a soon to be released threat sharing platform designed to help security teams develop and customize a threat intelligence solution from global data sources.

McAfee, a wholly owned subsidiary of Intel, says the solution provides new approaches for answering increasingly urgent problems customers face more often as targeted attacks increase.

The solution, McAfee Threat Intelligence Exchange, is a significant evolution of the Security Connected Platform launched by McAfee in 2011, and gives organizations the ability to spot and pre-empt advanced threats to protect their sensitive data, McAfee said.

McAfee Threat Intelligence ExchangeUsing the platform, security teams can customize a threat intelligence solution from global data sources, such as McAfee’s own Global Threat Intelligence (GTI) and third-party feeds, with local threat intelligence sourced from real-time and historical event data coming from endpoints, gateways, and other security components.

“By sharing threat information across controls and directing preventative actions in real-time, McAfee is able to provide immediate protection against the threats posed by advanced targeted attacks across both network and endpoint controls,” the company said in an announcement. “What has traditionally taken days, weeks or months now only takes milliseconds.”

McAfee Threat Intelligence Exchange allows organizations to orchestrate security controls to identify patterns, immunize assets against newly-identified malware, and prevent data exfiltration in real-time – optimizing security for each organization.

Additionally, McAfee Threat Intelligence Exchange leverages a capability called SmartListing that allows security controls to extract and exchange contextual information from such examples as certificate information, reputation data, file characteristics and application behaviors within the environment.

The resulting actionable intelligence allows the organization to contain or allow any payload across the organization’s security controls, the company saud. Thus for the first time, as threats appear, defenses instantly shield assets much more intelligently and without the limitations of signatures or cloud lookups.

Benefits of McAfee Threat Intelligence Exchange include:

Advertisement. Scroll to continue reading.

• Replaces manual tasks with automated, real-time data exchange that allows security components to operate as one to share security intelligence in real-time across endpoint, network and other security components.

• Brings visibility to the presence of advanced targeted attacks in the organization 

• Protects based on collective threat intelligence built out of global and third party intelligence data sources combined with local threat intelligence and customized organizational knowledge.

• Enables endpoints to share contextual intelligence with each other to gain greater environmental threat context, which improves accuracy and effectiveness.

• Integration simplicity, through McAfee’s data exchange layer, reduces implementation and operational costs

The platform is expected to be available in Q2 2014.

Related News: IID Launches Threat Sharing and Collaboration Platform

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.