1
You’re steps away from smarter, faster security. McAfee Threat Intelligence Exchange Visit www.mcafee.com/TIE to learn more. 1. Verizon. “2013 Data Breach Investigations Report.” http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf. You need connected security. Connect Protect Respond Adapt Months In 62% of cases, months passed before infiltration was discovered. 1 Days or weeks In 55% of cases it took days or weeks to contain a breach. 1 (22% of cases took months.) Hours In 33% of cases it took mere hours from infiltration to data loss. 1 Poor Visibility Incomplete Protection Costly Delays Detect and stop targeted threats in milliseconds: Isolated security components can lead to: McAfee® endpoint, network, and gateway technologies McAfee® Global Threat Intelligence Local reputation knowledge Third-party intelligence and products Combined insight forms a more complete security picture Infrastructure learns and adapts automatically 3 4 Connected Security Yields Smarter Defenses. Stop emerging threats with applied knowledge—everywhere, instantly. © 2014 McAfee 61117info-tie-0714 McAfee® Threat Intelligence Exchange: the brains behind adaptive security. SECURITY COMPONENTS UNITE LIKE NEVER BEFORE Environmental knowledge protects, reacts, and adapts to threats. McAFEE® THREAT INTELLIGENCE EXCHANGE SERVER Ultra-fast, bidirectional messaging fabric connects disparate security products to operate as one. McAFEE® DATA EXCHANGE LAYER Advanced threat interrogation, file execution visibility, and policy enforcement across the endpoint environment. McAFEE® THREAT INTELLIGENCE EXCHANGE ENDPOINT MODULE Today’s security system Security components are effective as-is, but imagine them sharing insight. Firewall Endpoint Protection Gateway Security External Threat Intelligence Network Intrusion prevention system (IPS) Security Event and Incident Management Security events are encountered by the system Components share insights instantly 1 2 Intelligent security creates an integrated ecosystem.

Infographic: Connected Security Yields Smarter Defensesmedia.zones.com/images/pdf/infographic-connected-security-yields-smarter-defenses.pdfIsolated security components can lead to:

  • Upload
    others

  • View
    10

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Infographic: Connected Security Yields Smarter Defensesmedia.zones.com/images/pdf/infographic-connected-security-yields-smarter-defenses.pdfIsolated security components can lead to:

You’re steps away from smarter, faster security.McAfee Threat Intelligence ExchangeVisit www.mcafee.com/TIE to learn more.

1. Verizon. “2013 Data Breach Investigations Report.” http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf.

You need connected security.

Connect Protect Respond Adapt

MonthsIn 62% of cases, months passed before infiltration was discovered.1

Days or weeksIn 55% of cases it took days or weeks to contain a breach.1(22% of cases took months.)

HoursIn 33% of cases it took mere hours from infiltration to data loss.1

Poor Visibility

Incomplete Protection

Costly Delays

Detect and stop targeted threats in milliseconds:

Isolated security components can lead to:

McAfee® endpoint, network, and

gateway technologies

McAfee® Global Threat Intelligence

Local reputationknowledge

Third-party intelligence and products

Combined insight forms a more complete security picture

Infrastructure learns and adapts automatically

3 4

Connected Security Yields Smarter Defenses.Stop emerging threats with applied knowledge—everywhere, instantly.

© 2014 McAfee61117info-tie-0714

McAfee® Threat Intelligence Exchange: the brains behind adaptive security.

SECURITY COMPONENTS UNITE LIKE NEVER BEFORE

Environmental knowledgeprotects, reacts, and

adapts to threats.

McAFEE® THREAT INTELLIGENCE

EXCHANGE SERVER

Ultra-fast, bidirectional messaging fabric connects disparate security products to operate as one.

McAFEE® DATA EXCHANGE LAYER

Advanced threat interrogation,file execution visibility, and

policy enforcement across theendpoint environment.

McAFEE® THREAT INTELLIGENCE EXCHANGE

ENDPOINT MODULE

Today’s security system

Security components are effective as-is, but imagine them sharing insight.

FirewallEndpointProtection

GatewaySecurity

External ThreatIntelligence

Network Intrusion prevention

system (IPS)

Security Event and Incident Management

Security events are encountered by the system

Components share insights instantly1 2

Intelligent security creates an integrated ecosystem.