Operationalizing Threat Intelligence

Solution Brief the massive amount of data to analyze, correlate, and prioritize threat intelligence and determine what’s relevant for their industry, their geography, and their company. And they need to be able to gain insights on unique attacks that may be occurring in the present, as well as insights on trends based on historical security event data. As Forrester points out, operationalizing threat intelligence is critical, as 75% of attacks spread from one victim to the next within 24 hours. Enterprises need to close the gap between “sharing speed and attack speed.”5 Leverage Intel Security’s Integrated Architecture Intel Security provides a unified, collaborative platform with all the components for operationalizing threat intelligence, including global threat intelligence feeds, local intelligence creation, realtime sharing of threat information across the IT infrastructure, security information and event management, and delivery of automated, adaptive protection. Threat Intelligence McAfee® Threat requirements Intelligence Exchange McAfee Advanced Threat Defense McAfee Enterprise Security Manager McAfee Global Threat Intelligence McAfee GTI, TAXII/STIX import, and HTTP threat feeds via the McAfee Enterprise Security Manager cyberthreat manager McAfee GTI aggregates threat intelligence from multiple Cyber Threat Alliance partners and public sources. McAfee GTI extracts threat intelligence from millions of sensors on customer-deployed Intel Security products such as endpoint, web, mail, network intrusion prevention systems (IPS), and firewall devices. Collects threat intelligence from external sources McAfee GTI Import STIX, McAfee Global Threat Intelligence (McAfee GTi) import, and VirusTotal Collects internal threat intelligence Collects samples from McAfee VirusScan®, McAfee Application Control, McAfee Web Gateway, McAfee Advanced Threat Defense, McAfee Enterprise Security Manager, and from thirdparty vendor products sending information over McAfee Data Exchange Layer Consumes sample files for detonation from McAfee Threat Intelligence Exchange or via the network Via STIX/TAXII and McAfee Data Exchange Layer Produces local threat intelligence Records incidents of suspicious files and creates a local database that records first contact and the trajectory of threats Dissects and convicts malware, generates local threat intelligence, and distributes over McAfee Data Exchange Layer or as a STIX-formatted API Creates threat intelligence watchlists, reports, and views based on correlated events Distributes threat intelligence across security controls Via McAfee Data Exchange Layer Via McAfee Data Exchange Layer and product API Via McAfee Data Exchange Layer, product API and script integration McAfee GTI is integrated with numerous Intel Security products, such as McAfee Web Gateway, McAfee Enterprise Security Manager, and McAfee endpoint solutions Via reports Via dashboards, views, and reports provided in content packs or customer-generated Via McAfee Threat Center and quarterly McAfee Threats Report Offers visibility into Via McAfee Threat Intelligence Exchange collected threat dashboards intelligence Table 1. Intel Security’s integrated threat intelligence platform Operationalizing Threat Intelligence 3 Solution Brief Ingest, Analyze, and Propagate McAfee Global Threat Intelligence A good place to start building your integrated threat intelligence platform is McAfee Global Threat Intelligence (McAfee GTI), a comprehensive, real-time, cloud-based reputation service that is fully integrated into Intel Security products and enables them to better block cyberthreats across all vectors—file, web, message, and network—swiftly. McAfee GTI provides reputation scores for billions of files, URLs, domains, and IP addresses based on threat data gathered from multiple sources: millions of global sensors monitored and analyzed by McAfee Labs, threat feeds from research partners and via the Cyber Threat Alliance, and cross-vector intelligence from web, email, and network threat data. Backed by high-quality, relevant threat feeds, McAfee GTI provides accurate risk advice that fosters informed policy decision-making and enables controls to block, clean, or allow, as required. McAfee Enterprise Security Manager McAfee Enterprise Security Manager (SIEM) takes threat intelligence ingestion and analysis to the next level, providing a consolidation, analysis, and action hub for every type of threat intelligence. This 360-degree view allows full visibility and situational awareness to speed detection and response to targeted attacks. Its advanced data management system is purpose-built to store and assimilate high volumes of contextual data in real time. McAfee Enterprise Security Manager collects activity and event data from all your systems, databases, networks, and applications. It also imports global threat feeds and consumes threat intelligence in standard formats and transports, such as Structured Threat Information eXpression (STIX)/Trusted Automated eXchange of Indicator Information (TAXII) and Cybox, typically published by community or industry groups like the Financial Services Information Sharing and Analysis Center (FS-ISAC). Through advanced analytics, it translates the gathered information into understandable, actionable security intelligence. More significantly, it provides deeper visibility to emerging threats via real-time views and access to historical security information. This allows you to investigate backwards in time to understand the prevalence and patterns of an attack and also to create automated watchlists to detect occurrence or re-occurrence of events in the future. By enriching your system’s sensitivity to events known to be malicious, you increase your ability to detect suspicious activities and patterns of activity at various phases of the attack chain and then prioritize response. What Is the Cyber Threat Alliance? The Cyber Threat Alliance is a group of security practitioners from organizations that work together to share threat information and help improve defenses against adversaries across member organizations and their customers. Intel Security is among the founding members who have dedicated their resources to determine the most effective ways to share threat data, foster collaboration among members, and make united progress in the fight against sophisticated cybercriminals. Figure 2. McAfee GTI view. Operationalizing Threat Intelligence 4
Please complete the form to gain access to this content