Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

What is the TrustedSource “Intelligence” Tab?

0
10 Posted

What is the TrustedSource “Intelligence” Tab?

0

TrustedSource Intelligence is a paid portal service from McAfee to provide a view of your network as seen by our appliances worldwide. Traditional network monitoring is done via equipment on premises, whereas trusted source intelligence enables a network administrator or compliance officer to view activity generating from their network as others see it – complementing traditional monitoring. For example, compliance and outbound activity detection is only as good as the traffic directed through it. If machines are compromised and sending high volumes of malicious traffic not directed through the designated equipment, the only way to detect this in real-time is by seeing it from the outside and being alerted through Trusted Source Intelligence. Trusted Source intelligence portals offer a view into the entire Trusted Source database, with extended data mining, trending and aggregation capability to highlight correlated activity involving entities that you own across the internet ecosystem

0

TrustedSource Intelligence is a paid portal service from McAfee to provide a view of your network as seen by our appliances worldwide. Traditional network monitoring is done via equipment on premises, whereas TrustedSource Intelligence enables a network administrator or compliance officer to view activity generating from their network as others see it – complementing traditional monitoring. For example, compliance and outbound activity detection is only as good as the traffic directed through it. If machines are compromised and sending high volumes of malicious traffic not directed through the designated equipment, the only way to detect this in real-time is by seeing it from the outside and being alerted through Trusted Source Intelligence. Trusted Source intelligence portals offer a view into the entire Trusted Source database, with extended data mining, trending and aggregation capability to highlight correlated activity involving entities that you own across the internet ecosystem.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.