Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
NTR Methodology Slides

NTR Methodology Slides

Ratings: (0)|Views: 126|Likes:
Published by opexxx

More info:

Published by: opexxx on Jun 17, 2012
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less





McAfee Confidential—Internal Use Only
 Advanced Malware Protection
Chris JordanVP Threat Intelligence
McAfee Confidential—Internal Use Only
User Attacks
Server Side Attacks (Scan and Exploit) Still exist
New Wave of Attacks are User Side, strongly related to APT andCrimeware
Seen through the increase of Malware –
Users’ Interaction with the Internet is the primary means of lost intellectualproperty and business disruption:
 Aurora, Night Dragon, Zeus –
Web Gateways provide a basic solution
NTR is McAfee’s Premier APT Solution and User Attack Detection
McAfee Confidential—Internal Use Only
NTR Architecture
Sensor Manager Services

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->