1
Request a demo by contacting your McAfee representative at www.mcafee.com/contact-us, or learn more at www.mcafee.com/NSP . Why fight 21st century threats with 20th century technology? The best signatures are the ones you don’t have. Signature-based protections are effective against a wide range of identified threats, but can leave you exposed to unknown attacks. Sophisticated tools streamline investigations. Quickly find and block real threats, not false positives. McAfee advanced signature-less analysis McAfee IPS signatures/ Your Snort signatures Real-time McAfee Global Threat Intelligence 1,500 new vulnerabilities reported in the last three months. 1 1 National Vulnerability Database. Results from March through May 2014. http://web.nvd.nist.gov/view/vuln/search 2 McAfee, Black Hat 2013 Survey of IT Professionals. http://blogs.mcafee.com/business/combating-advanced-malware-mcafee-survey-at-black-hat-usa-2013 3 NSS Labs IPS Data Center Comparative Analysis, Q1 2014. http://www.mcafee.com/us/resources/reports/rp-nss-ips-svm-ns9300.pdf 4 McAfee, Needle in a Datastack Report. http://www.mcafee.com/us/resources/reports/rp-needle-in-a-datastack.pdf The information in this document is provided only for educational purposes and for the convenience of McAfee customers. The information contained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance. McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Intel is a trademark of Intel Corporation in the U.S. and/or other countries. Other names and brands may be claimed as the property of others. 10 hours Time required to spot an intrusion by 20% of companies surveyed. 4 surveyed claim they cannot properly detect malware. 2 35% Go beyond signatures for a true understanding of malware DNA. Advanced technologies watch for behavioral changes that identify unknown attacks infiltrating your network. of admins call false positives their biggest challenge. 2 20% McAfee Network Security Platform puts it all together. Use McAfee’s best-of-breed IPS signatures or import your existing Snort signatures. 1 Let McAfee’s advanced signature-less approach help eliminate holes in your defenses where new threats can infiltrate. 2 McAfee signature-less protections go beyond fingerprinting with advanced techniques to help keep your network safer. © 2014 McAfee, Inc. 61174info_0714 Fight stealth attacks with next-generation technology. 99.6% Number of exploits blocked by McAfee's IPS (McAfee Network Security Platform). 3

Understanding Malware DNA

  • Upload
    mcafee

  • View
    1.807

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Understanding Malware DNA

Request a demo by contacting your McAfee representative at www.mcafee.com/contact-us, or learn more at www.mcafee.com/NSP.

Why fight 21st century threats with 20th century technology?

The best signatures are the ones you don’t have.Signature-based protections are effective against a wide range of identified threats, but can leave you exposed to unknown attacks.

Sophisticated tools streamline investigations.

Quickly find and block real threats, not false positives.

McAfee advanced signature-less analysis

McAfee IPS signatures/Your Snort signatures

Real-time McAfee Global Threat Intelligence

1,500new vulnerabilities reported in the last three months.1

1 National Vulnerability Database. Results from March through May 2014. http://web.nvd.nist.gov/view/vuln/search 2 McAfee, Black Hat 2013 Survey of IT Professionals. http://blogs.mcafee.com/business/combating-advanced-malware-mcafee-survey-at-black-hat-usa-2013 3 NSS Labs IPS Data Center Comparative Analysis, Q1 2014. http://www.mcafee.com/us/resources/reports/rp-nss-ips-svm-ns9300.pdf 4 McAfee, Needle in a Datastack Report. http://www.mcafee.com/us/resources/reports/rp-needle-in-a-datastack.pdf

The information in this document is provided only for educational purposes and for the convenience of McAfee customers. The information contained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance.

McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Intel is a trademark of Intel Corporation in the U.S. and/or other countries. Other names and brands may be claimed as the property of others.

10 hoursTime required to spot an intrusion by 20% of companies surveyed.4

surveyed claim they cannot properly detect malware.2

35%

Go beyond signatures for a true understanding of malware DNA.Advanced technologies watch for behavioral changes that identify unknown attacks infiltrating your network.

of admins call false positives their biggest challenge.2

20%

McAfee Network Security Platform puts it all together.

Use McAfee’s best-of-breed IPS signatures or import your existing Snort signatures.

1 Let McAfee’s advanced signature-less approach help eliminate holes in your defenses where new threats can infiltrate.

2

McAfee signature-less protections go beyond fingerprinting with advanced techniques to help keep your network safer.

© 2014 McAfee, Inc.61174info_0714

Fight stealth attacks with next-generation technology.

99.6%Number of exploits blocked by McAfee's IPS (McAfee Network Security Platform).3