Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword
Like this
1Activity
×
0 of .
Results for:
No results containing your search query
P. 1
NTR Methodology Slides

NTR Methodology Slides

Ratings: (0)|Views: 126|Likes:
Published by opexxx

More info:

Published by: opexxx on Jun 17, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

11/24/2013

pdf

text

original

 
McAfee Confidential—Internal Use Only
 
 Advanced Malware Protection
Chris JordanVP Threat Intelligence
 
McAfee Confidential—Internal Use Only
User Attacks
 
Server Side Attacks (Scan and Exploit) Still exist
 
New Wave of Attacks are User Side, strongly related to APT andCrimeware
 –
 
Seen through the increase of Malware –
 
Users’ Interaction with the Internet is the primary means of lost intellectualproperty and business disruption:
 
 Aurora, Night Dragon, Zeus –
 
Web Gateways provide a basic solution
 
NTR is McAfee’s Premier APT Solution and User Attack Detection
 
McAfee Confidential—Internal Use Only
NTR Architecture
Internet
Sensor Manager Services

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->