McAfee Global Threat Intelligence OverviewUNIXBusinessApplication

What is McAfee Global Threat Intelligence?

Based on activity from millions of sensors world-wide and an extensive research team, McAfee Labs publishes timely, relevant threat activity via McAfee Global Threat Intelligence (GTI). This always-on, cloud-based threat intelligence service enables accurate protection against known and fast-emerging threats by providing threat determination and contextual reputation metrics. McAfee GTI integrates directly with our security products, instantly protecting against emerging threats to reduce operational efforts and time between detection and containment.

Buyer's Guide

Download the Threat Intelligence Platforms Buyer's Guide including reviews and more. Updated: September 2021

McAfee Global Threat Intelligence Video

Pricing Advice

What users are saying about McAfee Global Threat Intelligence pricing:
  • "The cost is affordable and it also depends on the usage of the toolset."

Filter Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
reviewer1285209
Tech Lead at a tech services company with 1,001-5,000 employees
Real User
Top 5Leaderboard
Informative dashboards and integrates well with other products, but it needs artificial intelligence for more advanced threat detection

What is our primary use case?

Presently, I am using the Threat Intel solution for reputation checks in our daily SOC operations and threat hunting. We also use it for our alert detection and rule development in our SIEM solution. This can also be used for real-time suspicious threat detection. We use the technology for static threat hunting and looking for suspicious activities around the infrastructure. SOC Operations use the dashboards to look for active threats to present security posture to our client on a daily, weekly, and monthly basis.

Pros and Cons

  • "All of the feeds can be enriched by using the predefined content pack, which can be deployed and used by SOC operations, threat hunting teams, and engineering teams."
  • "The analytics and big data platform integration can be improved to provide better visibility of past data to look for existing threats or missed threats."

What other advice do I have?

My advice for anybody who is considering this product is to assess and look at the tool. After this, you can decide on using it.