76 - IntruShield 1200 Datasheet
76 - IntruShield 1200 Datasheet
No business is immune to security threats, no matter and critical network infrastructure from known, zero-
day, and DoS attacks, as well as threats like spyware, VoIP
how large or small. The risks to small and medium-
vulnerabilities, botnets, malware, network worms, Trojans,
sized businesses (SMBs) and other organizations and peer-to-peer applications.
continue to grow as the rising number of new
IntruShield’s unparalleled technology preemptively
vulnerabilities and the speed and sophistication of blocks attacks before they reach their intended targets,
attacks that exploit those vulnerabilities pose an while providing absolute accuracy and mission-critical
ever-increasing threat to your business. The rise and performance for all network environments. Its integrated
protection and easy-to-manage platform delivers broad
evolution of new hybrid attacks that use multiple
asset protection, maximized business availability, reduced
techniques to attack your network infrastructure liability, and security-cost avoidance. And IntruShield’s
means that enterprises of all sizes must constantly powerful policy enforcement, advanced forensics, and
defend themselves against these shifting threats. comprehensive reporting capabilities help small and large
businesses comply with audit and regulatory requirements.
Traditional, reactive security technology alone cannot ensure
network availability, integrity, and data confidentiality. Due IntruShield is the industry’s first risk-aware intrusion
to the inadequate ability of traditional technology to provide prevention solution, enabling SMBs to deploy prioritized
proactive threat detection and prevention, businesses remain risk management through intelligent, highly targeted threat
vulnerable to sophisticated and highly targeted zero-day and prevention. By integrating with market-leading McAfee
Denial of Service (DoS) attacks, as well as spyware, malware, Foundstone® vulnerability management (VM) solutions—as
and Voice over IP (VoIP) threats. Small businesses need to well as open-source vulnerability assessment (VA) systems
defend their critical network infrastructure by deploying such as Nessus—IntruShield reduces business risk,
advanced, proactive protection against vulnerability-based increases operational efficiencies, and maximizes security
threats and attacks. Furthermore, companies of every size by providing the ability to identify and block the most
are under intense regulatory and audit pressure to ensure the relevant threats and attacks targeting your network.
privacy of confidential data and decrease business risk. IntruShield’s built-in VoIP protection, spyware prevention,
For comprehensive, proactive network protection against a and advanced Web-client protection maintains business-
broad range of today’s threats and attacks, SMBs and other critical applications, reduces IT costs, and secures
organizations need to deploy next-generation intrusion confidential information by blocking spyware, malware,
prevention. The proven and award-winning McAfee® botnets, and VoIP threats. Its unrivaled ASIC-based
IntruShield® network intrusion prevention system (IPS) architecture, deep packet inspection, and patented shell-
delivers the most comprehensive, accurate, and scalable code detection deliver unequaled zero-day protection.
threat protection. IntruShield helps SMBs assure the The innovative IntruShield architecture is purpose-built
availability and security of critical network infrastructure for long product life cycles, providing continuous next-
through proactive and comprehensive threat prevention. generation security and feature enhancements. This allows
for continuous protection against the latest threats and
The McAfee IntruShield IPS Solution vulnerabilities—including spyware, malware, botnets, SYN
flood, and VoIP threats—while never requiring hardware
The McAfee IntruShield family of award-wining, next-
upgrades. IntruShield’s architecture integrates patented
generation IPS appliances enables SMBs and enterprises
signature, anomaly, DoS, and distributed DoS (DDoS)
to reduce business risk by deploying the industry’s most
analysis techniques, enabling highly accurate threat
comprehensive and proven network IPS solution. Their
detection and prevention that blocks attacks before they
purpose-built platforms proactively protect endpoints
inflict damage. IntruShield’s next-generation technology k Unrivaled botnet prevention —Industry’s only network-
delivers unparalleled features, including “out-of-the-box” based security solution to provide comprehensive,
default IPS blocking, pre-configured Recommended for layered, and proactive blocking of malicious distributed
Blocking policies, built-in spyware and VoIP protection, botnets. IntruShield protects against the growing threat
virtual IPS, and an integrated internal firewall. And the of botnets by identifying them as a distinctive category
IntruShield portfolio of appliances is backed by McAfee— of attack and proactively blocking their installation,
the largest dedicated security company and the most communication, and activation through the Internet
trusted name in the industry. k VoIP vulnerability protection —IntruShield’s integrated
VoIP security proactively protects mission-critical VoIP
Features and Benefits infrastructure and applications by accurately detecting
and blocking known, zero-day, and DoS attacks.
Comprehensive protection IntruShield protects against underlying VoIP protocol
k Broad threat prevention —IntruShield’s purpose- vulnerabilities while preserving VoIP application and
built intrusion prevention appliances deliver the voice-quality integrity
most comprehensive threat prevention by proactively k Encrypted attack prevention —Industry’s first and
protecting endpoints and network infrastructure from only network IPS to securely and proactively protect
known, zero-day, and DoS attacks, as well as threats like against both clear-text and encrypted attacks (I-2700).
spyware, VoIP vulnerabilities, malware, botnets, network IntruShield’s advanced, real-time SSL decryption and
worms, Trojans, and peer-to-peer applications inspection technology dramatically increases network
k Built-in anti-spyware protection—Provides enhanced security coverage by protecting critical e-commerce
security by integrating multi-layered protection against infrastructure
spyware, adware, dialers, keyloggers, password crackers, k IPS and internal firewall —Integrated network IPS and
and remote-control programs. IntruShield’s spyware stateful internal firewall capabilities deliver unrivaled
protection helps reduce IT costs, prevents potential privacy internal system protection, network infrastructure
breaches, and protects confidentiality by proactively protection, and enterprise-wide policy enforcement
preventing the download of these unwanted programs
while blocking spyware communication and propagation Accurate protection
k Built-in, advanced Web-client protection —Proactively k Risk-aware intrusion prevention—Risk-aware IPS
protects Web browsers and desktops from cyber- delivers significant operational efficiencies by providing
attacks, spyware, botnets, and other forms of malware. the ability to intelligently identify and block the most
It prevents the download of unwanted programs while relevant alerts and attacks. Integration with market-
protecting against unauthorized network access. leading Foundstone VM solutions automatically identifies
IntruShield’s built-in Web-client protection complements and highlights risks. Enables targeted, prioritized
McAfee Perimeter and System Protection Solutions by risk management by importing and correlating risk
providing an additional layer of network protection assessment information from Foundstone, as well as
open-source VA systems such as Nessus
k Next-generation DoS prevention —The industry’s most
advanced, next-generation DoS-prevention technology k Signature, anomaly, and DoS analysis —IntruShield’s
delivers comprehensive, real-time protection against unmatched architecture integrates a variety of advanced
sophisticated DoS attacks, cyber-attacks, and cyber detection methods—including signature, application,
extortion. Multi-layered threshold, profile-based, and protocol anomaly, shell-code detection algorithms,
and SYN cookie technology—in combination with and next-generation DoS/DDoS prevention—to deliver
IntruShield’s unrivaled virtual IPS capabilities—deliver the most accurate protection available against today’s
highly granular protection against a broad spectrum of threats and attacks
DoS attacks, including DoS, DDoS, and SYN flood attacks
k Unmatched detection accuracy —IntruShield performs
k Infrastructure protection —Provides preemptive, zero- stateful traffic inspection with thorough parsing of over 100
day vulnerability protection against threats and attacks protocols, while leveraging over 3,000 high-quality, multi-
that target mission-critical routers, switches, perimeter token, multi-trigger signatures to provide the most accurate
firewalls, and DNS servers. Provides the only effective detection in the industry. IntruShield’s unmatched
means to protect critical network infrastructure during accuracy allows you to confidently block threats and
windows of vulnerability attacks in real time without affecting legitimate traffic
McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, 888.847.8766, www.mcafee.com
McAfee and/or additional marks herein are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with
security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. © 2006 McAfee, Inc. All
rights reserved. 1-sps-ins-006-0306