McAfee Solutions for Computer Emergency Response Teams

advertisement
Solution Brief
McAfee Solutions for Computer
Emergency Response Teams
Tools for improved incident analysis and response
Typical CERT Requirements
•Trained investigators
•Malware reverse engineering
•Data reconstruction
•System log analysis
•Network packet analysis
•Information sharing
•Incident tracking and reporting
•Vulnerability analysis and
reporting
Malware Intelligence System
Appliance
•Stand-alone 2-U appliance
•48 GB RAM
•1 TB HD
•2 Gbps net cards
•6 analyzers running in parallel
•Process up to 10,000 files/day
Malware Intelligence System Book
•4 core
•16 GB RAM HP EliteBook 8560W
•2-core for user partition
guaranteed separation and
process up to 1,000 files/day
•Analyzes malware along with
regular user computing
•Easy to carry along for field
investigations
The international Computer Emergency Response Team (CERT) is a key national
resource for many governments. CERT organizations perform critical incident
analysis and handling and information dissemination in support of government,
law enforcement, critical infrastructure, and other public sector customers. McAfee
understands this mission and offers a number of products and services that enable
the core missions of international CERT groups.
McAfee Malware Forensics and Incident Response Training
McAfee® Foundstone® Consulting’s Malware Forensics and Incident Response Education (MFIRE) course is
a comprehensive technically oriented course that enables you to respond to malware incidents successfully
and reinforce your security posture. IT professionals charged with protecting the environment can be
overwhelmed, ignoring malware attacks or mistakenly diagnosing them as system or network problems.
In this course, you’ll learn techniques to identify, respond to, and recover from malware incidents.
ValidEdge Malware Forensic Solutions
ValidEdge Malware Intelligence System (MIS) is a fully automated malware analysis tool that reverseengineers malware to assembly code. With patent-pending technology, ValidEdge offers the world’s
first series of appliances with separation-kernel technology for very fast and secure malware analysis.
With several malware-profiling engines, the ValidEdge appliances accurately analyze malware even if it
is designed to evade detection with packers and encryption. The ValidEdge solution delivers actionable
insight with malware family classification, behavior reports, and information about hidden payloads.
Designed for incident investigators, ValidEdge purpose-built appliances and laptops support both largescale malware sample analysis and remote field investigations. ValidEdge is a McAfee Security Innovation
Alliance technical partner.
Solera Network Forensic Solutions
Solera DS Appliances capture and classify everything that crosses your network (packet header and payload—
layers 2 through 7), giving you a complete and forensically sound record of network activity. Having a copy
of all the traffic on a network provides complete and accurate reconstruction of the incident, allowing
incident responders and investigators to definitively answer the questions of “what happened?” and “what
was lost?” Only Solera DS Appliances meet the grueling demands of investigators to swiftly reconstruct and
deliver real files from within terabytes of raw packet data. Solera is a McAfee Security Innovation Alliance
technology partner.
• Solera
DS Appliance Network Forensics Appliances—Full network capture, up to 10 Gbps with onboard
storage, up to 16 TB, expandable for extended storage
• Solera
DS Virtual Appliance—The only virtual security appliance on the market that provides complete
visibility into all virtual traffic
• Solera
DeepSee Analytics—Real-time, active reports provide visualization and web-like searching of
network traffic for instant artifact reconstruction and replay of network events
Malware Analysis as a Service
Online subscription service is
available for malware analysis.
McAfee Threat Intelligence Grid
In the ongoing fight against Internet-spawned malware, McAfee is building a threat intelligence grid to
collect malware strains early in their release, decreasing their spread and financial impact. Malware strain
variants typically have signatures characteristic of their regional origination, thus necessitating a distributed,
worldwide collection system. McAfee is proposing a partnership with CERTs, computer security incident
response teams (CSIRTs), and universities over a geographically dispersed area to participate in this project.
These selected entities would install a McAfee® Network Threat Response sensor on a switch span port
within their IT infrastructure. This sensor would down-select HTTP network objects deemed suspicious
either because of behavioral characteristics, signature, or reputation. These network objects would be sent
to the McAfee Cloud Analysis Service via SSL for automated deconstruction and analysis. Objects identified
as malicious would be kept and logged. All other data objects would be deleted. All collected data would
be shared with designated customer and McAfee researchers. This service requires a signed statement of
work for the service and software.
McAfee Online Threat Briefings
McAfee Labs and our partner companies produce periodic research reports on threat statistics and
trends, attack methods, or major cyberincidents. Members of the CERT community can contact the
McAfee Global Public Sector team at MB_GPS@mcafee.com for a briefing on the published reports.
2821 Mission College Boulevard
Santa Clara, CA 95054
888 847 8766
www.mcafee.com
McAfee, the McAfee logo, and Foundstone are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and
other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein
are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied.
Copyright © 2012 McAfee, Inc.
49002brf_cert_0812_fnl_ASD
Download