infographic: connected security yields smarter...

Post on 26-May-2020

9 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

You’re steps away from smarter, faster security.McAfee Threat Intelligence ExchangeVisit www.mcafee.com/TIE to learn more.

1. Verizon. “2013 Data Breach Investigations Report.” http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf.

You need connected security.

Connect Protect Respond Adapt

MonthsIn 62% of cases, months passed before infiltration was discovered.1

Days or weeksIn 55% of cases it took days or weeks to contain a breach.1(22% of cases took months.)

HoursIn 33% of cases it took mere hours from infiltration to data loss.1

Poor Visibility

Incomplete Protection

Costly Delays

Detect and stop targeted threats in milliseconds:

Isolated security components can lead to:

McAfee® endpoint, network, and

gateway technologies

McAfee® Global Threat Intelligence

Local reputationknowledge

Third-party intelligence and products

Combined insight forms a more complete security picture

Infrastructure learns and adapts automatically

3 4

Connected Security Yields Smarter Defenses.Stop emerging threats with applied knowledge—everywhere, instantly.

© 2014 McAfee61117info-tie-0714

McAfee® Threat Intelligence Exchange: the brains behind adaptive security.

SECURITY COMPONENTS UNITE LIKE NEVER BEFORE

Environmental knowledgeprotects, reacts, and

adapts to threats.

McAFEE® THREAT INTELLIGENCE

EXCHANGE SERVER

Ultra-fast, bidirectional messaging fabric connects disparate security products to operate as one.

McAFEE® DATA EXCHANGE LAYER

Advanced threat interrogation,file execution visibility, and

policy enforcement across theendpoint environment.

McAFEE® THREAT INTELLIGENCE EXCHANGE

ENDPOINT MODULE

Today’s security system

Security components are effective as-is, but imagine them sharing insight.

FirewallEndpointProtection

GatewaySecurity

External ThreatIntelligence

Network Intrusion prevention

system (IPS)

Security Event and Incident Management

Security events are encountered by the system

Components share insights instantly1 2

Intelligent security creates an integrated ecosystem.

top related