McAfee Network Security Manager

McAfee Network Security Manager

Simple, centralized control for distributed McAfee intrusion prevention systems

Next Steps:

Overview

McAfee Network Security Manager gives you real-time visibility and control over all McAfee intrusion prevention systems deployed across your network. With its plug-and-play operation, easy-to-use functions, and web-based management, Network Security Manager saves you time, trouble, and operating costs.

Network Security Manager and Network Security Central Manager are available as a pre-configured, hardened appliance, or as a software-only option.

Network Security Manager delivers:

Fast deployment — Preconfigured templates, recommended-for-block policies, and a powerful and intuitive user interface enable administrators to rapidly bring up their network intrusion prevention systems.

Real-time control of real-time data — Manage, configure, and monitor all your McAfee intrusion prevention systems. An intuitive, customizable dashboard, accessible through any web browser, makes it easy — no matter where you are.

Faster time to resolution and faster time to confidence — Use up-to-the-minute input from all intrusion prevention system sensors to respond to threats quickly and make the right decisions.

Comprehensive protection — Count on proven management of intrusion prevention system configuration, policy, attack blocking, and automatic response actions for small networks, global enterprises, and high-traffic data centers.

Efficient compliance and reporting — Use our preconfigured threat-blocking policies or create your own policies. Easily define and automate distribution of custom graphical reports for audits and management reviews.

Features & Benefits

Gain consistent visibility and control

Manage and monitor multiple intrusion prevention devices from a single, centralized system. Get a complete threat and system summary in seconds from an at-a-glance dashboard.

Make better decisions faster

Get reliable, real-time information on all McAfee intrusion prevention systems across your network to accelerate your time to resolution and time to confidence. You can even simulate inline blocking to determine the potential impact when the intrusion prevention system recommends blocking an attack.

Streamline network management and lower costs

Reduce your administration and compliance workloads with integrated, automated policy creation and enforcement, plus enterprise-class auditing and reporting capabilities.

Implement policies to suit your needs

Create custom security policies for different enterprise locations, business units, and remote offices. Global policy editing makes it easy to set consistent policies across devices.

Block attacks from the minute you deploy

Stop hundreds of attacks right out of the box with 14 predefined intrusion prevention system security threat-blocking policies and hundreds of recommended-for-block intrusion prevention system signatures.

Demos / Tutorials

Tutorials

For guidance on how to use Network Security Manager, watch this Quick Tips video.

Customer Stories

Eagle Rock Energy

Eagle Rock Energy Partners is an energy company focused on upstream activities, including oil and gas drilling, production, and development. Eagle Rock has working oil and gas properties and development opportunities in the midcontinent area, Permian, and southeast regions of Texas, as well as Oklahoma, Arkansas, Southern Alabama, Mississippi, and Louisiana.

Highlights
  • Integrated security architecture paves the way for business expansion.
  • Comprehensive threat detection ensures that security events from every source are noted and logged.
  • The combination of McAfee Web Gateway and McAfee Advanced Threat Defense thwarts inbound threats from the Internet.
  • Intrusion prevention monitors both external and internal activity.

Resources

Data Sheets

McAfee Network Security Manager

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Network Security Central Manager

McAfee Network Security Central Manager eliminates policy maintenance bottlenecks to support compliance and improve efficiency.

Community

Blogs

  • At Intel Security, Protecting Customers Takes Precedence Over Seeking Headlines
    Christiaan Beek - November 21, 2014

    One question I often hear is “When will Intel Security (McAfee) publish a report on the latest threat?” It seems to be a hot trend today for security companies to offer reports with topics such as “Operation X” or “Malware Y,” or to trumpet how many zero-day vulnerabilities they have found. Do we now measure […]

    The post At Intel Security, Protecting Customers Takes Precedence Over Seeking Headlines appeared first on McAfee.

  • White Networks
    Tyson Macaulay - November 14, 2014

    Internet of Things (IoT) needs “white networks” to scale and deliver the assurance we require for machine-things; white as in “clean and pure”. The IoT will contain all the devices on the current internet, plus many new devices used for machine-to-machine and industrial applications and services.  In contrast to a “white network” I would assess […]

    The post White Networks appeared first on McAfee.

  • When Fingerprints Fail (Blog 1 of 4)
    Steve Grossenbacher - November 13, 2014

    We’ll be releasing four blog posts over the next week.  Each blog will contain a repeated clue word to help you solve the puzzle below.  Track all four clues to help solve the final puzzle and a chance to win a Nikon D3200 DSLR camera and 18-55mm lens!.   To enter the contest, after the […]

    The post When Fingerprints Fail (Blog 1 of 4) appeared first on McAfee.

  • Exploit Kits Improve Evasion Techniques
    Rajesh Nataraj KP - November 12, 2014

    Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers and programs that can be accessed through browsers. The most common exploit targets are Java, Flash, PDFs, and Silverlight. Exploit kits use lots of techniques to evade detection by security products. Exploit kits use several common techniques: Code […]

    The post Exploit Kits Improve Evasion Techniques appeared first on McAfee.

  • Farewell to FOCUS 14
    McAfee Enterprise - November 6, 2014

    While the dust in Las Vegas may still be settling from three jam-packed days of security discussions, demos, expert panels, and more, we‘ve brought back with us valuable takeaways and tales from FOCUS 14. During the 7th annual McAfee FOCUS conference, brought to you by Intel Security, we talked with partners about the future of […]

    The post Farewell to FOCUS 14 appeared first on McAfee.

Threats and Risks