Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
The Business Problem Security practioners can see at a glance the current
In modern cyberwarfare, we do not know where the risk posture of any entity, such as a user, file, machine,
next attack will come from or which form it will take. project, server, IP address, or printer. Interset measures
Attack vectors are intentionally stealthy and multifaceted the unique digital footprint of each entity. It dynamically
to avoid detection by traditional security tools, which learns what is normal and what is anomalous,
are rigid by nature. Attackers take advantage of hard- considering the unique context of each entity’s behavior.
coded rules and thresholds, which produce far too many Using the risk dashboard, security practioners can then
alerts and false positives for human investigation. To drill down into why an entity’s characteristics, usage
truly assess the risk impact of a threat, it needs to be patterns, and behaviors are deemed high risk. What
holistically evaluated through all relevant angles and used to take days or months, now takes only minutes.
data points. This is only possible with contextual Big For the first time, a security team can have a measured
Data analytics and machine learning. response to a measured threat. Those measured
McAfee and Interset Joint Solution responses can be leveraged:
The focus of cybersecurity practices is now detection ■■ Inside of McAfee Enterprise Security Manager SIEM for
and not prevention. Yet detection is challenging due prioritization and investigation
to stealthy and asymmetrical attack surfaces. To tip ■■ Inside of McAfee® ePolicy Orchestrator® (McAfee
the scale of power towards the defender, McAfee and ePO™) software to set active and passive tags on the
Interset work together to narrow down billions of real- relative entities
time security events to a handful of actionable leads ■■ Through McAfee Active Response reactions for
where security teams can focus their efforts.
remediation
These security leads provide clear views of measured ■■ Inside of the Interset Security Analytics Platform for
risk generated through dynamic machine learning in-depth investigation
and advanced mathematical models. No human can
match the rate at which a computational system can Based on automatically measured risk postures, even those
process and correlate vast amounts of data from with scarce cyberhunting resources can initiate measured
multiple sources. In this way, Interset’s analytics bring an responses to a prioritized list of security leads. This human-
unprecendented level of productivity to security teams. machine approach to containing cyberthreats is profoundly
advantageous to security teams.
About Interset
Interset is a pioneer in security analytics, machine
learning, Big Data, and risk forensics to radically McAfee
McAfee ESM
accelerate threat detection. Interset actively measures ESM
the unique digital risk footprint of different systems and
users using mathematical models and machine learning. McAfee
This distills billions of events into a list of prioritized ESM
2821 Mission College Boulevard McAfee and the McAfee logo, ePolicy Orchestrator, and McAfee ePO are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in
Santa Clara, CA 95054 the US and other countries. Other marks and brands may be claimed as the property of others. Copyright © 2017 McAfee, LLC. 3589_1017
888 847 8766 OCTOBER 2017
www.mcafee.com