Preface; Introducing Mcafee Network Security Platform; About This Guide; Audience - McAfee M-1250 - Network Security Platform Deployment Manual

Deployment guide
Hide thumbs Also See for M-1250 - Network Security Platform:
Table of Contents

Advertisement

Preface

This preface provides a brief introduction to the product, discusses the information in this
document, and explains how this document is organized. It also provides information such
as, the supporting documents for this guide and how to contact McAfee Technical Support.

Introducing McAfee Network Security Platform

®
McAfee
Network Security Platform [formerly McAfee
comprehensive, accurate, and scalable Network Access Control (NAC), network Intrusion
Prevention System (IPS) and Network Threat Behavior Analysis (NTBA) for mission-critical
enterprise, carrier, and service provider networks, while providing unmatched protection
against spyware and known, zero-day, and encrypted attacks.
McAfee Network Threat Behavior Analysis Appliance provides the capability of monitoring
network traffic by analyzing NetFlow information flowing through the network in real time,
thus complementing the NAC and IPS capabilities in a scenario in which McAfee Network
Security Sensor, NAC Sensor, and NTBA Appliance are installed and managed through a
single Manager.

About this Guide

This guide contains information to help you in determining your network security needs
and provides basic information about deployment. Included are various deployment
scenarios for network technicians with different experience levels. With this information,
you can determine which McAfee
environment and which operating mode you will need to employ each McAfee Network
Security Sensor (Sensor) port.

Audience

This guide is intended for use by network technicians responsible for planning and
deploying company>
meets your security requirements, develop security mechanisms within the software
architecture, and ensure the integrity of the architectures (such as data center, software,
hardware, and network).

Conventions used in this guide

This document uses the following typographical conventions:
®
Network Security Sensor model(s) will best suit your
®
Network Security Manager as you ensure your system architecture
iv
®
®
IntruShield
] delivers the most

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security platform

Table of Contents