Security Connected by the McAfee Channel (by Alex Thurber)

By on

As part of the Mcafee Security Connected initiative launched at FOCUS10, we announced McAfee Security Management 5, which provides a unified monitoring, management, and reporting system that scales to any-sized organization and ensures all endpoints, networks and content are secure.

Businesses’ security purchases today are mostly tactical, typically resulting in a multi-vendor approach that is unpractical for many reasons. Threats are accelerating at a rate that far surpasses the existing approach to managing multiple products and layers of security independently. In order to effectively stay ahead of these security threats, transparency to all risks associated with mobile devices via centralized view.

McAfee ePO has been a favorite among McAfee partners because if it’s ease of management, integration, and level of intelligence. I’d like to share the new features and benefits that you will be able to share with your customers.

  • Application Enablement:  New interfaces and Software Development Kits (SDK’s) provide an open platform for companies, developers, and partners to integrate centralized security management into existing business processes.  McAfee® ePolicy Orchestrator® (“McAfee ePO”) platform now offers a Web API that enables customers and partners to integrate security operations into change and systems management frameworks.  A new version of McAfee® Risk Advisor includes a SDK that enables rapid integration of new security countermeasures – broadening the risk profile view and reducing operational costs.  In support of this new SDK, McAfee is also announcing McAfee Application Control as a newly recognized countermeasure within McAfee Risk Advisor.  

 

  • Shared Intelligence: Provides coordinated defenses across security layers so that endpoints, networks, email, web, and data layers work together to minimize or eliminate security attacks.  McAfee has integrated its Global Threat Intelligence across its broad portfolio of products, delivering a shared threat intelligence model. McAfee has developed game-changing enhancements – such as the evolution of its reputation services and use of the cloud to hunt for threats proactively. McAfee has also ported its threat intelligence to the iPhone and iPad enabling IT security professionals to have real-time access to threat information wherever and whenever they need it.

 

  • Unified Management: McAfee Security Management can administer the security of any device, data, network, application, or database across security implementations that range from hosted/SaaS to on-premises as well as a hybrid and virtual and physical environments.  Due to the dynamic nature of virtual environment, the McAfee MOVE platform also includes the automated ability for security management policies to follow the virtual host they are associated with regardless of where it is located and how often it is moved. 

 

  • Situational Awareness: Allows businesses to monitor, manage and report on metrics to reduce risk, focus security efforts and investments, and reduce costs.   On the SaaS Platform, McAfee provides automatic asset discovery and synchronization through integration with Microsoft Active Directory that eliminates manual asset entry and out-of-sync security policies. McAfee ePO platform also adds the ability to create Situational Policy Assignments – logical groupings of policies that security administrators can apply to assets based on business or security posture need. 

 

For more information about the McAfee Security Management platform visit www.mcafee.com/securitymanagement

Leave a Comment

Similar articles

These days, cyberattacks can feel relentless. Due to the interconnected nature of the world we live in, cybercriminals have managed to infiltrate our personal devices, our networks, and even our homes. That’s why we at McAfee believe it’s important now more than ever to secure every facet of the modern consumer lifestyle. And we’ve partnered with ...
Read Blog
Few fields and industries change as rapidly as those in the technology sector. This fast-moving, adaptable and growing sector creates new applications, new devices, and new efficiencies designed to make our everyday lives easier — sometimes in ways we’ve never imagined. But more devices and applications, from a security standpoint, means cybercriminals could have more ...
Read Blog