Introduction McAfee® Threat Intelligence Exchange (TIE) server provides context-aware adaptive security for your enterprise environment. The challenge in today's enterprise environment is the growing number of devices and systems and their inability to communicate security information with each other. These devices and systems include the cloud, BYOD, managed nodes, servers, and network appliances. Until now, they have acted independently and were not intelligently managed as a whole. Threat Intelligence Exchange server is changing that. It quickly analyzes files and content from several sources in your environment and makes informed security decisions. These decisions are based on a file's security reputation and your own criteria. Benefits of Threat Intelligence ExchangeImagine the systems and devices on your network communicating security information in real time, then acting immediately to prevent the threat from spreading, even to remote networks and systems. Threat Intelligence Exchange components Threat Intelligence Exchange includes these components. How Threat Intelligence Exchange worksThreat Intelligence Exchange server uses the Data Exchange Layer framework to share file and threat information instantly across the entire network. How a reputation is determinedFile and certificate reputation are determined when a file tries to run on a managed system.
Introduction McAfee® Threat Intelligence Exchange (TIE) server provides context-aware adaptive security for your enterprise environment. The challenge in today's enterprise environment is the growing number of devices and systems and their inability to communicate security information with each other. These devices and systems include the cloud, BYOD, managed nodes, servers, and network appliances. Until now, they have acted independently and were not intelligently managed as a whole. Threat Intelligence Exchange server is changing that. It quickly analyzes files and content from several sources in your environment and makes informed security decisions. These decisions are based on a file's security reputation and your own criteria. Benefits of Threat Intelligence ExchangeImagine the systems and devices on your network communicating security information in real time, then acting immediately to prevent the threat from spreading, even to remote networks and systems. Threat Intelligence Exchange components Threat Intelligence Exchange includes these components. How Threat Intelligence Exchange worksThreat Intelligence Exchange server uses the Data Exchange Layer framework to share file and threat information instantly across the entire network. How a reputation is determinedFile and certificate reputation are determined when a file tries to run on a managed system.