IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

McAfee’s MVISION XDR takes security beyond the endpoint

Cloud-native MVISION XDR tool detects threats and predicts countermeasures before a system is compromised

McAfee MVISION XDR diagram

McAfee has announced its new proactive threat detection and response tool for enterprises, MVISION extended detection and response (XDR).

Designed for endpoint, cloud, and network security management, MVISION XDR allows for faster security investigations, easier automated responses, and continued modernization of existing security operations centers (SOC).

“Security teams are struggling to replace reactive, manual and time-consuming investigation processes to combat more sophisticated and more frequent attacks – all while trying to decrease the cost and complexity of overall management,” said Shishir Singh, chief product officer at McAfee. 

“MVISION XDR provides proactive and actionable context across key vectors to simplify, accelerate and automate threat validation and response across the enterprise thereby making the most of SOC resources and mitigating potential disruption to the business.”

By granting analysts greater control and a more comprehensive view of threat context beyond endpoints, McAfee’s new cloud-native tool offers a better understanding of threats – before organizations incur damage. 

Other MVISION XDR benefits include:

  • Proactive and actionable intelligence that prioritizes threats and prescribes countermeasures
  • Artificial intelligence (AI)-guided investigations to simplify probes across sophisticated threat campaigns 
  • Cloud threat integration to provide context for web activity
  • Network telemetry prioritization to offer a better understanding of network threats by automatically correlating with curated threats
  • Efficient integration with existing SOC infrastructure and tools for maximum return on SOC investment
Related Resource

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

How to manage security risk and compliance - whitepaperDownload now

“Organizations can no longer afford ineffective disparate threat and response tools and context,” adds Jon Oltsik, senior principal analyst at Enterprise Strategy Group. 

“With XDR, we are seeing an opportunity to take the SOC as we know it to the next level – moving from operating in a time and resource intense reactive manner with existing, disparate tools to using a comprehensive and integrated XDR solution that can not only proactively predict mal-activity, but also help drive faster remediation decisions with automation.”

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

Mastering endpoint security implementation
Security

Mastering endpoint security implementation

18 May 2022
The Total Economic Impact™ of Apple Mac in Enterprise: M1 update
Whitepaper

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update

12 May 2022
Dell Technologies World 2022: Dell unveils fastest storage architecture in company history
Server & storage

Dell Technologies World 2022: Dell unveils fastest storage architecture in company history

4 May 2022
Dell Technologies World 2022: Dell unveils security offerings for major cloud providers
public cloud

Dell Technologies World 2022: Dell unveils security offerings for major cloud providers

3 May 2022

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
Researchers demonstrate how to install malware on iPhone after it's switched off
Security

Researchers demonstrate how to install malware on iPhone after it's switched off

18 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022