Security Compliance

Enforce Policy, Preventing Unauthorized Changes

McAfee Compliance products bring change monitoring and management to your systems. Effectively enforce policies to prevent unauthorized changes, track change event data, and implement continuous file integrity monitoring to improve the security of your environment.

McAfee Application Control
McAfee Application Control

McAfee Application Control software provides an effective way to block unauthorized applications and code on servers, corporate desktops, and fixed-function devices. This centrally managed whitelisting solution uses a dynamic trust model and innovative security features that thwart advanced persistent threats — without requiring signature updates or labor-intensive list management.

McAfee Change Control

McAfee Change Control blocks unauthorized changes to critical system files, directories, and configurations. Additionally, Change Control delivers enterprise-wide detection of authorized changes as they occur, and streamlines regulatory compliance.

McAfee Change Reconciliation

McAfee Change Reconciliation automates closed-loop processing of system changes for IT. It provides a comprehensive inventory of all changes and encapsulates the data within the ticketing system, flagging ad hoc changes and those made without approvals. Change Control easily integrates with other widely used change management systems.

McAfee Configuration Control

Ensure continuous compliance. McAfee Configuration Control prevents unauthorized changes on critical servers, boosts visibility into your environment, and streamlines internal and external IT audit processes.

McAfee Database Activity Monitoring

Boost your overall database security with reliable, real-time protection against external and internal threats across physical, virtual, and cloud environments. McAfee's activity monitoring sensors require no costly hardware or changes to your existing system architecture, giving you an easy-to-deploy, highly scalable database security solution. The sensors immediately detect any kind of unauthorized or malicious behavior and terminate it without significant impact to overall system performance. McAfee Database Activity Monitoring greatly simplifies your database security management and helps ensure compliance with PCI DSS, SOX, HIPAA/HITECH, SAS 70, and many other types of regulations.

McAfee Integrity Control

McAfee Integrity Control combines industry-leading whitelisting and change control technology, ensuring that only trusted applications run on fixed-function devices, such as point-of-service (POS) systems, ATMs, and kiosks.

McAfee Integrity Monitoring for Databases

With McAfee Integrity Monitoring for Databases, organizations gain visibility into important configuration parameters for database servers — as well as any changes to these settings that could impact database security — providing the necessary information to meet compliance requirements.

McAfee Policy Auditor

McAfee Policy Auditor automates data gathering and assessment processes required for internal and external system-level IT audits and IT security certification.

How To Buy