Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

McAfee Unveils New Threat Intelligence Exchange

McAfee has shared details on a soon to be released threat sharing platform designed to help security teams develop and customize a threat intelligence solution from global data sources.

McAfee, a wholly owned subsidiary of Intel, says the solution provides new approaches for answering increasingly urgent problems customers face more often as targeted attacks increase.

McAfee has shared details on a soon to be released threat sharing platform designed to help security teams develop and customize a threat intelligence solution from global data sources.

McAfee, a wholly owned subsidiary of Intel, says the solution provides new approaches for answering increasingly urgent problems customers face more often as targeted attacks increase.

The solution, McAfee Threat Intelligence Exchange, is a significant evolution of the Security Connected Platform launched by McAfee in 2011, and gives organizations the ability to spot and pre-empt advanced threats to protect their sensitive data, McAfee said.

McAfee Threat Intelligence ExchangeUsing the platform, security teams can customize a threat intelligence solution from global data sources, such as McAfee’s own Global Threat Intelligence (GTI) and third-party feeds, with local threat intelligence sourced from real-time and historical event data coming from endpoints, gateways, and other security components.

“By sharing threat information across controls and directing preventative actions in real-time, McAfee is able to provide immediate protection against the threats posed by advanced targeted attacks across both network and endpoint controls,” the company said in an announcement. “What has traditionally taken days, weeks or months now only takes milliseconds.”

McAfee Threat Intelligence Exchange allows organizations to orchestrate security controls to identify patterns, immunize assets against newly-identified malware, and prevent data exfiltration in real-time – optimizing security for each organization.

Additionally, McAfee Threat Intelligence Exchange leverages a capability called SmartListing that allows security controls to extract and exchange contextual information from such examples as certificate information, reputation data, file characteristics and application behaviors within the environment.

The resulting actionable intelligence allows the organization to contain or allow any payload across the organization’s security controls, the company saud. Thus for the first time, as threats appear, defenses instantly shield assets much more intelligently and without the limitations of signatures or cloud lookups.

Benefits of McAfee Threat Intelligence Exchange include:

• Replaces manual tasks with automated, real-time data exchange that allows security components to operate as one to share security intelligence in real-time across endpoint, network and other security components.

• Brings visibility to the presence of advanced targeted attacks in the organization 

• Protects based on collective threat intelligence built out of global and third party intelligence data sources combined with local threat intelligence and customized organizational knowledge.

• Enables endpoints to share contextual intelligence with each other to gain greater environmental threat context, which improves accuracy and effectiveness.

• Integration simplicity, through McAfee’s data exchange layer, reduces implementation and operational costs

The platform is expected to be available in Q2 2014.

Related News: IID Launches Threat Sharing and Collaboration Platform

Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Risk Management

A threat-based approach to security often focuses on a checklist to meet industry requirements but overlooked the key component of security: reducing risk.

Cybercrime

Cybercriminals earned significantly less from ransomware attacks in 2022 compared to 2021 as victims are increasingly refusing to pay ransom demands.

Risk Management

CISA has published a report detailing the cybersecurity risks to the K-12 education system and recommendations on how to secure it.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...