Advanced detection for stealthy, zero-day malware
McAfee Advanced Threat Defense (Advanced Threat Defense) is an on-premise and virtual appliance that facilitates detection and prevention of malware.Advanced Threat Defense provides protection from known, near-zero day, and zero-day malware without compromising on the quality of service to your network users.
Features to support investigation include extensive unpacking, interactive mode, sample submission to multiple virtual environments, and unparalleled indicators of compromise (IoC) data that produces summary reports for action prioritization and analyst grade data on malware.
Tight product integration protects from advanced threats, enables efficient alert management, and maintains throughput and policy enforcement. Support for OpenIOC and STIX over TAXII further enhances integration.
Safeguarding email, the most highly exploited attack vector, continues to be a major challenge. McAfee Advanced Threat Defense works with any email gateway, including Cisco Email Security Appliance, and McAfee Security for Email Servers to detect email threats.
McAfee Advanced Threat Defense enhances protection from network edge to endpoint and enables investigation.
Virtual and physical appliances allow you to choose the deployment option best for your organization, including public cloud deployment in Azure. Centralized analysis covers multiple protocols and supported products including email gateways.
Targeted attacks are designed to defeat security systems by confusing or evading defenses. McAfee Advanced Threat Defense combines in-depth static code analysis, dynamic analysis (malware sandboxing) ,and machine learning to increase zero-day threat detection, including threats that use evasion techniques and ransomware.
Tight integration with other security solutions and support for open standards enables immediate sharing of threat intelligence across the entire infrastructure—including multi-vendor ecosystems—to enhance zero-day threat protection, reduce time from encounter to containment, and speed post-attack investigation.
Offline analysis options and advanced features enable security operations centers to validate threats, access critical indicators of compromise (IoCs), and map results to the MITRE ATT&CKâ„¢ framework for investigation and threat hunting.