Tuesday, November 20, 2012

McAfee Security Management


Say goodbye to silos that splinter your visibility. McAfee® Security Management solutions make security operations efficient and effective, integrating, automating, and correlating data and processes within each system and across the IT environment. Our open platform offers complete visibility into your security posture, proactive risk analytics, and integration of security and compliance with other business operations. You gain a coordinated and holistic approach to managing security that scales and adapts to any enterprise.

A sea of events. Reams of logs. Alerts galore. With changing threats and fluid business conditions, the IT world is a live situation room awash in information, but distributed across many different physical locations. Each administrator navigates a small portion of the security and compliance universe: mobile devices, endpoints, servers, network, email, web, or database. If they remain isolated, how can they collaborate to diagnose and resolve issues successfully? How can managers work together to prioritize, plan, and execute security projects that enable business agility? How can executives understand and manage overall risk?
Today’s enterprise requires a different approach to security management. It’s no longer simply enough to secure the data center or network perimeter or endpoint. Security needs to be wherever your assets are, connecting to give you visibility across all key business and operational processes. Maintaining security and demonstrating compliance requires harnessing intelligence and reducing friction throughout operations. Once your organization can keep up with change, you can get proactive about managing security and mitigating risk.

  1. McAfee Security Management - McAfee Security Management solutions merge security products, management, and real-time intelligence to make your security effective for your business. It starts with deep integration within the system stack and across the IT environment. We add global, contextual visibility into changing events—within and beyond your organization’s boundaries—and connect all your systems with a cross-product command and control core. To enhance situational awareness and support stronger countermeasures, our security management solutions assemble information into evidence, acting to block attacks and reduce vulnerability as risks change. Our solutions also provide crucial operational intelligence, organizing data and placing it in context for at-a-glance visibility across your IT infrastructure and easier proof of compliance. 
  2. See the situation - McAfee ePolicy Orchestrator® (McAfee ePO™) software and McAfee Enterprise Security Manager (McAfee ESM) extend visibility and control across your entire security, risk, and compliance management environment, including third-party solutions. Within a system, we connect visibility and protection from the lowest levels of the hardware and hypervisor up to the top of the system and the cloud. By connecting endpoints to networks, mobile devices, and data centers, McAfee Security Management products, including security information event management (SIEM) and vulnerability management, unify your view of events, risk, and threats.
  3. Assess what matters - We add intelligence to this integrated environment so you can decide how to protect your most critical assets. Our security management offerings organize ever-changing information about threats and vulnerabilities from McAfee Global Threat Intelligence™, McAfee Risk Advisor, McAfee ePO software, and McAfee ESM. You can see evolving threat, reputation, and vulnerability data correlated to dynamic events, users, systems, and countermeasures within your organization. It’s not just information, it’s wisdom. You can pinpoint network probing and active attacks from known bad actors and immediately shut them down. You can confirm or deny that a breaking threat might affect your most business-critical database by validating that you have relevant patches and behavioral shielding in place.
  4. Mitigate damage - Beyond helping you find out what’s happening, we also help you take action. The interlacing of realtime intelligence and risk management processes permits McAfee Security Management solutions to minimize the window of vulnerability and instantly block damaging attacks. Diagnostic services within McAfee ESM work constantly to assess the changing environment and launch automated responses or generate alerts based on risk and event thresholds, asset values, and organizational priorities. We draw your attention to the important events and give you the information to handle it quickly and accurately.
  5. Manage all the layers - This integrated, intelligent, active approach creates a security “command and control” core that spans devices, applications, networks, and databases. Deep, actionable integration within each system and across the environment provides a single lens to manage and report on your security state. Built for “Big Security Data,” McAfee solutions reliably handle increasing data volumes from expanding data streams. Not only do you have the horsepower to maintain a state-of-the-art picture of your organization’s risk posture, you also have access to “what if” technology unique to McAfee and click-through access to the details you need. For example, you can show management how the organization can improve its security posture by deploying specific countermeasures, such as white-listing  Integration with our McAfee Security Innovation Alliance partners allows for two-way conduits between security from McAfee and the rest of your IT and security world, supporting more efficient workflows, correlation, analysis, and reporting. You can extract more value from every investment—in products and operational resources.
  6. Comply Continuously - From policy creation leveraging standard content protocols to support for the Unified Compliance Framework, McAfee eases the burden of being a regulated business. You can leverage one infrastructure to achieve, monitor, and prove continuous compliance with hundreds of regulations.