A single console for all your security management. The most advanced, extensible, and scalable centralized security management software in the industry.
Guided configuration, automated work stream, and predefined dashboards make getting started a snap.
Tag-based policy assignment precisely targets assignment of predefined security profiles to systems based on their business role or at-risk status.
Task catalog and automated management capabilities streamline administrative processes and reduce overhead.
A single web interface aligns security processes for maximum visibility, while a single agent reduces the risk of endpoint conflicts. Scale for enterprise deployments
Enterprise-class architecture supports hundreds of thousands of devices on a single server.
Supports complex and heterogeneous IT environments.
Enterprise reporting across on-premises and Securityas-a-Service (SaaS) security information.
A single console for all your security management. The most advanced, extensible, and scalable centralized security management software in the industry. Get a unified view of your security posture with drag-and-drop dashboards that provide security intelligence across endpoints, data, mobile and networks. Simplify security operations with streamlined workflows for proven efficiencies. Flexible security management options allow you to select either a traditional premises-based or a cloud-based management version of McAfee ePO.
Leverage your existing third-party IT infrastructure from a single security management console with our extensible architecture.
Bolster your defenses beyond foundational endpoint protection with endpoint threat detection and response.
Designed to monitor, control and alert when endpoints are compromised.
An endpoint detection and response tool for advanced threats.
Bolster your defenses beyond foundational endpoint protection with endpoint threat detection and response. McAfee Active Response is a leading innovation in finding and responding to advanced threats. As a key part of an integrated security architecture, it offers continuous visibility and powerful insights into your endpoints, so you can identify breaches faster and gain more control over the threat defense lifecycle. McAfee Active Response gives you the tools you need to correct security issues faster in the way that makes the most sense for your business. Key features include:
Collectors: Find and visualize data from systems.
Triggers and persistent collectors: Continuously monitor critical events or state change with one set of instructions.
Reactions: Get pre-configured and customizable actions when triggered, so you can target and eliminate threats.
Centralized management with McAfee ePolicy Orchestrator: Use a single console for comprehensive security management and automation.
Supported client operating systems
- CentOS 6.5, 32-bit
- RedHat 6.5, 32-bit
- Microsoft Windows
- Windows 8.0, Base, 32-bit, and 64-bit
- Windows 8.1, Base, U1; 32-bit and 64-bit
- Windows 2012, Server Base, R2; U1; 64-bit
- Windows 2008 R2 Enterprise, SP1, 64-bit
- Windows 2008 R2 Standard, SP1, 64-bit
- Windows 7 Enterprise, up to SP1; 32-bit and 64-bit
- Windows 7 Professional, up to SP1; 32-bit and 64-bit
Information Systems Audit
An information technology audit, or information systems (IS) audit, is an examination of the management controls for IT infrastructure and a complete review of the security of computer systems.
The frequency of an IS audit will sometimes be mandated by a regulator, but for any organisation managing or processing personal or financial information – whatever its sector or size – annual audits are the absolute minimum. Regular audits are essential to keep pace with changes to IT infrastructure and systems – and with changes in the risk landscape.
An information technology audit, or information systems (IS) audit, is an examination of the management controls for IT infrastructure and a complete review of the security of computer systems. It determines if information systems are safeguarding assets, maintaining data integrity and operating effectively to achieve an organisation’s goals. Normally required by regulators or legislators, they can be based on many different frameworks, such as ISO 27001, COBIT and HIPAA, or one of the many industry-specific security standards. However, they all serve the same purpose: to provide assurance that the necessary controls have been put in place and the risks of a data breach reduced to an acceptable level.
Systems and Applications: An audit to verify that systems and applications are appropriate, are efficient, and are adequately controlled to ensure valid, reliable, timely, and secure input, processing, and output at all levels of a system’s activity. Information Processing Facilities: An audit to verify that the processing facility is controlled to ensure timely, accurate, and efficient processing of applications under normal and potentially disruptive conditions. Systems Development: An audit to verify that the systems under development meet the objectives of the organization, and to ensure that the systems are developed in accordance with generally accepted standards for systems development. Management of IT and Enterprise Architecture: An audit to verify that IT management has developed an organizational structure and procedures to ensure a controlled and efficient environment for information processing. Client/Server, Telecommunications, Intranets, and Extranets: An audit to verify that telecommunications controls are in place on the client (computer receiving services), server, and on the network connecting the clients and servers.
The overall objective of penetration testing is to provide an independent and reliable view of the security of the internet-facing infrastructure of an IT environment.
Penetration testing is recommended annually, and in the event of major changes to your infrastructure. It is essential for companies holding intellectual property, information linked to personal identities, or financial information such as credit card data – and is often mandated by regulators. Penetration testing will help:
- Prevent severe financial losses that could arise due to unreliable infrastructure or fraud
- Provide the necessary proof of due diligence for regulators, customers, and shareholders
- Protect the brand from the dreadful loss of reputation
Penetration testing is a crucial element in securing your IT systems. Our team of experts can simulate an attack on multiple levels to determine whether sensitive data is at risk. The overall objective of penetration testing is to provide an independent and reliable view of the security of the internet-facing infrastructure of an IT environment. The assessment identifies weaknesses and vulnerabilities and quantifies the severity thereof – providing the information needed to address and control the threats.
Penetration testing is a ‘mock’ or staged attack to identify vulnerabilities in information systems. Our testers, ‘white hat hackers’, put themselves in the position of someone determined to gain access to resources without knowledge of usernames, passwords and other normal means. Like a hacker or cyber criminal, they try every trick in the book, every possible plan of attack. They find the ways applications could be modified, and confidential information such as price lists or customer databases stolen or subverted. They then provide a report – explaining how they ‘broke in’ and how an organisation can avoid it happening ‘for real’.