McAfee M-1250 Deployment Guide - Page 4

Preface, Introducing McAfee Network Security Platform, About this Guide, Audience - network security sensor

Page 4 highlights

Preface This preface provides a brief introduction to the product, discusses the information in this document, and explains how this document is organized. It also provides information such as, the supporting documents for this guide and how to contact McAfee Technical Support. Introducing McAfee Network Security Platform McAfee® Network Security Platform [formerly McAfee® IntruShield®] delivers the most comprehensive, accurate, and scalable Network Access Control (NAC), network Intrusion Prevention System (IPS) and Network Threat Behavior Analysis (NTBA) for mission-critical enterprise, carrier, and service provider networks, while providing unmatched protection against spyware and known, zero-day, and encrypted attacks. McAfee Network Threat Behavior Analysis Appliance provides the capability of monitoring network traffic by analyzing NetFlow information flowing through the network in real time, thus complementing the NAC and IPS capabilities in a scenario in which McAfee Network Security Sensor, NAC Sensor, and NTBA Appliance are installed and managed through a single Manager. About this Guide This guide contains information to help you in determining your network security needs and provides basic information about deployment. Included are various deployment scenarios for network technicians with different experience levels. With this information, you can determine which McAfee® Network Security Sensor model(s) will best suit your environment and which operating mode you will need to employ each McAfee Network Security Sensor (Sensor) port. Audience This guide is intended for use by network technicians responsible for planning and deploying company>® Network Security Manager as you ensure your system architecture meets your security requirements, develop security mechanisms within the software architecture, and ensure the integrity of the architectures (such as data center, software, hardware, and network). Conventions used in this guide This document uses the following typographical conventions: iv

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36

iv
Preface
This preface provides a brief introduction to the product, discusses the information in this
document, and explains how this document is organized. It also provides information such
as, the supporting documents for this guide and how to contact McAfee Technical Support.
Introducing McAfee Network Security Platform
McAfee
®
Network Security Platform [formerly McAfee
®
IntruShield
®
] delivers the most
comprehensive, accurate, and scalable Network Access Control (NAC), network Intrusion
Prevention System (IPS) and Network Threat Behavior Analysis (NTBA) for mission-critical
enterprise, carrier, and service provider networks, while providing unmatched protection
against spyware and known, zero-day, and encrypted attacks.
McAfee Network Threat Behavior Analysis Appliance provides the capability of monitoring
network traffic by analyzing NetFlow information flowing through the network in real time,
thus complementing the NAC and IPS capabilities in a scenario in which McAfee Network
Security Sensor, NAC Sensor, and NTBA Appliance are installed and managed through a
single Manager.
About this Guide
This guide contains information to help you in determining your network security needs
and provides basic information about deployment. Included are various deployment
scenarios for network technicians with different experience levels. With this information,
you can determine which McAfee
®
Network Security Sensor model(s) will best suit your
environment and which operating mode you will need to employ each McAfee Network
Security Sensor (Sensor) port.
Audience
This guide is intended for use by network technicians responsible for planning and
deploying company>
®
Network Security Manager as you ensure your system architecture
meets your security requirements, develop security mechanisms within the software
architecture, and ensure the integrity of the architectures (such as data center, software,
hardware, and network).
Conventions used in this guide
This document uses the following typographical conventions: