ITB - IT Solutions for the next generation
linkedin logo twitter logo facebook logo google+ logo

Endpoint Threat Defence – ETD

Back to Partner
Endpoint Threat Defence – ETD

McAfee Endpoint Threat Defence secures patient-zero attacks at the first sign of malicious activity and immediately shares threat intelligence across components to protect all endpoints in your enterprise.

Key Advantages

  1. Detect, protect, and correct while proactively adapting your defences against zero-day malware, greyware, and ransomware.
  2. Protect more effectively using dynamic reputations, behavioural analysis, and machine-learning.
  3. Minimise impact to users and trusted enterprise applications with enhanced protection.
  4. Respond and remediate more threats, faster with threat intelligence shared across your security ecosystem.
  5. Streamline incident investigation and remediation with unified workflows and a single console for management through McAfee ePolicy Orchestrator (McAfee ePO™) software.

Detect zero-day malware, secure patient-zero, and combat advanced attacks

The escalating sophistication of cyberthreats requires a new generation of protection for endpoints. Advancing threats and the increasing risk of unknown vulnerabilities are causing organizations to piece together overlapping, disconnected security solutions that provide limited visibility and increased complexity. McAfee solves this problem with McAfee Endpoint

Threat Defence and McAfee Endpoint Threat Defence and Response. Both solutions leverage static and behavioural analysis and synthesised intelligence to protect, detect, correct, and adapt to combat emerging threats. Unified security components act as one through an open, integrated approach with shared visibility and threat intelligence and simplified workflows. Connected security and actionable threat forensics provide a secure infrastructure to quickly and confidently convict threats and stay ahead of potential attackers.

Defeat Zero-Day Malware, Greyware, and Ransomware

Stay ahead of emerging threats with static and dynamic threat analysis leveraging enhanced reputation and behavioural analytics to detect potential exploits. Apply synthesised intelligence with McAfee Threat Intelligence Exchange to immediately block and contain threats and instantly update threat reputation to prevent future attacks.

McAfee Endpoint Threat Defence and McAfee Endpoint Threat Defence and Response defeat zero-day malware by identifying similarities between exhibited malicious behaviours and the extensive Real Protect threat models using a cloud lookup (data centres hosted in the United States). This behavioural classification technique is used to root out live threats that may have evaded other security software defences. It provides actionable threat intelligence through McAfee ePolicy Orchestrator software to enable zero-day discovery and real-time remediation. Behavioural classification is automatically evolved through dynamic machine-learning, providing maximum protection and efficiency while limiting security exposure.

Secure Patient-Zero

Detect and stop zero-day malware from making malicious changes to endpoint systems. Dynamic Application Containment watches the behaviour of greyware and prevents malicious changes to effectively stop exploits before they begin. Secure endpoints on and off networks and contain malicious behaviour with protection that is invisible to users.

McAfee Endpoint Threat Defence brings together powerful threat detection and correction tools:

Real Protect – Real Protect applies state-of-the-art machine learning techniques to identify malicious code based on both what it looks
like it might do (pre-execution analysis) and what it does (dynamic behavioural analysis)—all without signatures. It peels away the latest obfuscation techniques to unmask hidden threats so that zero-day malware has no place to hide.

Dynamic Application Containment (DAC) – DAC makes it easy to protect systems from infection without sacrificing productivity. When an endpoint detects a suspicious file, DAC immediately blocks the behaviours that malware often uses (such as changing the registry, writing to a temporary directory, or deleting files). Unlike techniques that would hold up the file and the user for minutes at a time, DAC lets the suspicious file load into memory—it just can’t make changes to the endpoint or infect other systems. The endpoint and user can remain fully productive while providing an opportunity for security tools to perform in-depth analysis.

McAfee Threat Intelligence Exchange – This product provides comprehensive threat intelligence—from McAfee Global Threat Intelligence (McAfee GTI), third-party intelligence sources, and an organisation’s own environment—to accelerate threat detection and response. Security teams gain organisation-wide context and visibility to pinpoint where threats are attempting to establish a foothold and close the exposure gap from days to seconds.

McAfee Data Exchange Layer – This advanced technology connects an organization’s security components into a unified, adaptive defence fabric. It enables real-time information sharing and coordinated response among endpoints and security components without needing point-to-point application programming interface (API) connections. Security teams can streamline operations—moving from detect to correct to proactively protect in much less time and with much less effort.

McAfee ePolicy Orchestrator (McAfee ePO™) software – McAfee ePO software breaks down the silos between disparate security tools. It simplifies management by providing a single dashboard for all endpoint defence components, as well as third-party products from multiple vendors. Security teams can operate the entire endpoint threat defence fabric as a unified system, from a single pane of glass.

Speak to ITB about McAfee Endpoint Threat Defence – ETD licences today:
CALL for Information and Pricing