McAfee enhances Network Security Platform capabilities

Telecom Lead India: McAfee has added new capabilities to
its McAfee Network Security Platform.


The new capabilities include a scalable 80 Gbps IPS


McAfee offers threat protection across physical, virtual
and cloud environments and addresses the needs of private clouds in the data
center, telecom core networks and service providers’ networks.


“As organizations increase the capacity of their
networks, we have seen an increase in the need for high throughput security
solutions. We put the McAfee Network Security Platform XC Cluster through our
full network IPS test rigor and it successfully passed over 72 Gbps of
inspected traffic while maintaining an overall protection rating of 95
percent,” said Vikram Phatak, CTO, NSS Labs.


Data centers have high-density server environments that
require high switching and routing capacity. Visibility and management are key
concerns, as networks become more dynamic. McAfee addresses these issues with
its new XC Cluster solution.


The new McAfee Network Security Platform XC Cluster scales
to 80 Gbps throughput and 32 million concurrent connections. The latest release
of McAfee Network Security Platform enables enterprises to scale, providing the
following Next Generation Network IPS features for their environments.


McAfee said its Network Security Platform includes
granular multi-tenancy options that are built for service provider
environments.  Create up to 1000 virtual IPS policies per
appliance, with granular policy control in each and unique rule-set capability,
including features for mobile service providers, allowing management of network
policies for separate customers or services.


Moreover, a new Network Threat Behavior Analysis virtual
appliance extends IPS with enhanced visibility, leveraging the network’s Flow
data, including rich layer 7 information, to give context to IPS threats. The
correlation of network application flows to build a richer picture of threats
within the network allows for time-based analysis of threat and application


[email protected]