McAfee Asset Manager

McAfee Asset Manager

Continuous monitoring that scans your network in real time

Next Steps:

Overview

Unlike traditional discovery approaches, McAfee Asset Manager uses both passive and active scanning techniques to canvass everything on your network in real time. This continuous asset monitoring integrates with industry-leading vulnerability scanning and incident management workflows to enable continuous asset compliance.

Now you can uncover hidden devices on your network as well as smartphones, tablets, virtual machines, and laptops that come and go between scheduled scans. What you haven’t been seeing or scanning will surprise you — and could be jeopardizing compliance. If it has an IP address or is using your network, McAfee Asset Manager can discover and assess it in real time, revealing the compliance of all assets on your network.

McAfee Asset Manager gives you:

  • Real-time awareness of all devices on the network
  • True device tracking based on a media access control (MAC) address, preventing inaccurate device information if a device IP address changes
  • An agentless solution which provides a real-time inventory of all devices connected to the network, including device profiles and the identities of device users, and creates a physical network topology for each site
  • Virtual environments mapping showing the exact mapping of the virtual guest to its host
  • Rapid deployment with one-time installation, no agents, and no required infrastructure changes
  • Integration with McAfee ePolicy Orchestrator (McAfee ePO), and McAfee Vulnerability Manager to enable network-wide, up-to-date risk visibility

Features & Benefits

Know what you are protecting

Eliminate the guesswork. McAfee Asset Manager provides total visibility into your network, including managed, unmanaged, physical, and virtual devices. Essential network, device, and user intelligence provides the context needed to eliminate ambiguity and facilitate better decision making based on accurate and in-depth audit information. Network information is continuously collected in real time to reflect the current state of the network, enabling complete control over the security, management, and compliance status of your enterprise network.

Implement real-time operation

Detect changes to the network and the devices connected to it as they occur. For example, McAfee Asset Manager can detect a new device as it is being attached to the network, or match a user ID to the IP address it is using as soon as the user authenticates to the network.

Track devices according to their media access control (MAC) addresses

See changes with devices operating on the network. The information collected also includes changes made to the device reflecting the operation of third-party solutions.

Build a comprehensive asset profile

Maintain a comprehensive profile for each device operating on your network. An asset profile may include the following parameters: MAC address, vendor MAC ID, VLAN name and ID, IP address, device type and capability, operating system, patch information, switch and port connections, open network services, user intelligence information (e.g., user ID, user name, department, user group, phone number, and email address), installed software and hardware, running processes, switch- and router-related asset information (e.g., firmware, software, hardware versions, serial numbers, and physical cards), and more.

Enable user identity discovery

Correlate user identities with specific IP addresses. This enhanced user intelligence improves audit controls, boosts regulatory compliance, and significantly advances incident response by identifying vulnerable or exploited hosts, and eliminating manual efforts to track users.

Provide agentless virtualized environments mapping

Discover and track virtualized environments without the use of software-based agents, map between virtual guest devices and the physical system they depend on, and audit the configuration of virtual assets, generating information similar to what is provided for physical devices.

Build a physical network topology

Create and maintain, in real time, the physical topology of your network. McAfee Asset Manager makes it easy to locate devices throughout the enterprise network and use that information to troubleshoot management-related issues.

Get real-time network activity alerts

Receive notification of events happening on your network in real time and then export that activity to the syslog which integrates with third-party applications such as a SIEM.

Save time with rapid deployment

Generate results in just a few hours. With minimal prerequisites, no physical infrastructure changes, and agentless operation, it is easy to implement and configure McAfee Asset Manager.

Get a fast return on investment

Provide instant, complete, and accurate network, device, and user intelligence, allowing IT professionals to complete tasks both quickly and efficiently.

System Requirements

These are general sizing guidelines for McAfee Asset Manager Console and Sensor. Specific analysis may be required for more accurate and detailed planning and sizing of McAfee Asset Manager deployments, especially for large sites. For more information on specifications, download the McAfee Asset Manager 6.6 Deployment Guide.

Minimum hardware configurations for McAfee Asset Manager Sensor deployments

Site Type Number of Devices Minimum CPU Specifications Minimum RAM Specifications Minimum Number of Gigabit NICs
Small Up to 250 (single class C) Intel Atom (or equivalent) 1 GB 2
Medium 251 to 1,000 Intel Celeron (or equivalent) 2 GB 2 to 4 (depending on the number of subnets/VLANs)
Large 1,001 to 3,000 Intel Xeon with a single CPU and 4 cores (or equivalent) 4 GB 4 (assuming the active interface is connected to a Trunk port)
Large More than 3,001 Intel Xeon with 2 CPUs and 4 cores each (or equivalent) 4 GB, 8GB recommended 4 (assuming the active interface is connected to a Trunk port)

 

Minimum hardware configurations for McAfee Asset Manager Console deployments

Deployment Type Overall Number of Devices Minimum CPU Specifications Minimum RAM Specifications
Small/Medium Up to 50,000 Intel Xeon with a single CPU and 4 cores (or equivalent) 4 GB, 8 GB recommended
Large 50,000 to 100,000 Intel Xeon with 2 CPUs and 4 cores each (or equivalent) 8 GB

News / Events

Resources

Data Sheets

McAfee Vulnerability Manager

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Asset Manager

For a technical summary on the McAfee product listed above, please view the product data sheet.

Reports

Gartner MarketScope for Vulnerability Assessment

McAfee receives the highest possible rating of "Strong Positive" in the latest MarketScope for Vulnerability Assessment (VA) where VA vendors compete on management features, configuration assessment, price, reporting, and integration with other security products.

Solution Briefs

Ensure Compliance and Automate Change Management of McAfee Enterprise Firewalls

The combination of McAfee Firewall Enterprise and Skybox Firewall Assurance, Skybox Network Assurance, and Skybox Change Manager continuously validate that your McAfee Firewall Enterprise solutions are optimally and securely configured to ensure continuous compliance, block unauthorized activity, and securely automate change management.

Continuous, Comprehensive Monitoring

Learn how you can move to real-time vulnerability management with always-on discovery and integrated risk assessment.

Scanning Web Applications for Vulnerabilities

McAfee Vulnerability Manager has a new web scanning capability, allowing you to discover, crawl, assess, report, and manage the vulnerabilities discovered in any number of internal or external web applications.

Quantitative Metrics to Measure, Model, and Manage IT Risk

Prevari’s Technology Risk Manager (TRM) solution uses existing enterprise data combined with actuarial risk information to provide repeatable, quantitative, and predictive risk analytics.

Automated Vulnerability Assessment That Streamlines Risk Assessment and Action

McAfee Vulnerability Manager and Skybox Risk Exposure Analyzer (REA) combine to give customers an advanced solution to identify IT vulnerabilities, prioritize and evaluate security risks and attack scenarios, and mitigate critical risks before they cause harm.

Preventing Information Leaks

Raytheon SureView integration with McAfee ePolicy Orchestrator (McAfee ePO) software enables governmental and commercial enterprises to deploy and seamlessly manage command and control of SureView clients across the entire organization through their existing infrastructure, allowing for speedy implementation and efficient management of an effective cyberaudit program.

Security Posture and Risk Management

RedSeal Vulnerability Advisor analyzes the results of McAfee Vulnerability Manager in the context of the network to prioritize vulnerabilities requiring attention and offer network mitigation options.

Technology Blueprints

Assess Your Vulnerabilities

McAfee integrates data and processes to make vulnerability management more effective and efficient. Our approach combines asset discovery and management, comprehensive vulnerability scanning, flexible reporting, and remediation workflows into a single vulnerability assessment solution.

User Guide/Handbook

McAfee Asset Manager Console 6.6

This guide provides the information you need to configure, use, and maintain your McAfee product.

McAfee Asset Manager Sensor 6.6

This document describes the various modules and features of the McAfee Asset Manager Sensor software.

McAfee Asset Manager 6.6 Deployment Guide

This document provides guidelines and information related to planning the successful deployment of McAfee Asset Manager.

White Papers

SANS Institute: Correlating Event Data for Vulnerability Detection & Remediation

Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.

Discover. Evaluate. Act.

This paper explains how to apply McAfee Vulnerability Manager with the McAfee Asset Manager feature to discover, evaluate, and promptly manage evolving risk. Through continuous network-based monitoring and the application of enterprise security intelligence, enterprises can mitigate security and compliance risks from IP-enabled devices that users install without administrator support, including servers, desktops, smartphones, tablets, virtualized systems, printers, and networking equipment.

Protect Critical Assets with Virtual Patching—Closing the Vulnerability Window Using Predictive Threat Protection

The McAfee virtual patching solution provides a layered approach to security risk management, while adding the ability to apply a virtual patching strategy to your existing change-management process. It combines proven defenses and security insight with real-time Global Threat Intelligence to close the vulnerability window until patching can occur through your regular change-management processes.

Community

Blogs

Threats and Risks