Sie sind auf Seite 1von 3

SOLUTION BRIEF

Human and Machine Threat Hunting


A list of prioritized leads to accelerate security team efforts

McAfee Compatible Solution

Security analytics give cyberhunters radical advantages ■■


Interset 5.4+ with McAfee

in containing cyberthreats. Powered by dynamic machine ■■


Enterprise Security Manager
Interset 5.4+ with DXL
learning, Interset distills billions of real-time events into a ■■
Interset 5.4+ with McAfee ePO

prioritized list of high-risk entities. This, in turn, is sent back


to the McAfee® product ecosystem to focus cyberhunting
efforts on actionable, high-value threats. The combination of
the Interset Security Analytics Platform with McAfee solutions
delivers human-machine threat-hunting for a force-multiplying
productivity gain in cybersecurity defense.

1 Human and Machine Threat Hunting


SOLUTION BRIEF

The Business Problem Security practioners can see at a glance the current
In modern cyberwarfare, we do not know where the risk posture of any entity, such as a user, file, machine,
next attack will come from or which form it will take. project, server, IP address, or printer. Interset measures
Attack vectors are intentionally stealthy and multifaceted the unique digital footprint of each entity. It dynamically
to avoid detection by traditional security tools, which learns what is normal and what is anomalous,
are rigid by nature. Attackers take advantage of hard- considering the unique context of each entity’s behavior.
coded rules and thresholds, which produce far too many Using the risk dashboard, security practioners can then
alerts and false positives for human investigation. To drill down into why an entity’s characteristics, usage
truly assess the risk impact of a threat, it needs to be patterns, and behaviors are deemed high risk. What
holistically evaluated through all relevant angles and used to take days or months, now takes only minutes.
data points. This is only possible with contextual Big For the first time, a security team can have a measured
Data analytics and machine learning. response to a measured threat. Those measured
McAfee and Interset Joint Solution responses can be leveraged:

The focus of cybersecurity practices is now detection ■■ Inside of McAfee Enterprise Security Manager SIEM for
and not prevention. Yet detection is challenging due prioritization and investigation
to stealthy and asymmetrical attack surfaces. To tip ■■ Inside of McAfee® ePolicy Orchestrator® (McAfee
the scale of power towards the defender, McAfee and ePO™) software to set active and passive tags on the
Interset work together to narrow down billions of real- relative entities
time security events to a handful of actionable leads ■■ Through McAfee Active Response reactions for
where security teams can focus their efforts.
remediation
These security leads provide clear views of measured ■■ Inside of the Interset Security Analytics Platform for
risk generated through dynamic machine learning in-depth investigation
and advanced mathematical models. No human can
match the rate at which a computational system can Based on automatically measured risk postures, even those
process and correlate vast amounts of data from with scarce cyberhunting resources can initiate measured
multiple sources. In this way, Interset’s analytics bring an responses to a prioritized list of security leads. This human-
unprecendented level of productivity to security teams. machine approach to containing cyberthreats is profoundly
advantageous to security teams.

2 Human and Machine Threat Hunting


SOLUTION BRIEF

About Interset
Interset is a pioneer in security analytics, machine
learning, Big Data, and risk forensics to radically McAfee
McAfee ESM
accelerate threat detection. Interset actively measures ESM
the unique digital risk footprint of different systems and
users using mathematical models and machine learning. McAfee
This distills billions of events into a list of prioritized ESM

security leads for efficient threat detection. McAfee


ESM and
About McAfee ePolicy Orchestrator Software DLP
McAfee
McAfee ePO software is the industry-leading security and MAR

compliance management platform. With its single-agent


and single-console architecture, McAfee ePO software Entity
McAfee Dashboard
provides intelligent protection that is automated and MAR
actionable, enabling organizations to reduce costs and
Human +
improve threat protection and compliance. Billions Millions Hundreds Tens Machine
EVENTS ANOMALIES RISKY ENTITIES HIGH RISKS INVESTIGATE
About McAfee Enterprise Security Manager
Figure 1. The Interset Security Analytics Platform in action.
McAfee Enterprise Security Manager—the foundation of
the security information and event management (SIEM)
solution family from McAfee—delivers the performance, About Data Exchange Layer
actionable intelligence, and real-time situational Bringing high-speed messaging to security systems,
awareness at the speed and scale required for security the Data Exchange Layer provides a universal fabric
organizations to identify, understand, and respond for exchanging data in real time. It leverages a one-to-
to stealthy threats, while the embedded compliance many integration model so that each application can
framework simplifies compliance. publish and subscribe to messages over a common
communication system.

2821 Mission College Boulevard McAfee and the McAfee logo, ePolicy Orchestrator, and McAfee ePO are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in
Santa Clara, CA 95054 the US and other countries. Other marks and brands may be claimed as the property of others. Copyright © 2017 McAfee, LLC. 3589_1017
888 847 8766 OCTOBER 2017
www.mcafee.com

3 Human and Machine Threat Hunting

Das könnte Ihnen auch gefallen