McAfee ePolicy Orchestrator (ePO)

McAfee ePolicy Orchestrator (ePO)

Verbinden. Verwalten. Automatisieren.

Nächste Schritte:
  • Chat mit McAfee
    Planen Sie eine Neuanschaffung, oder haben Sie vor dem Kauf noch Fragen? Chatten Sie mit einem Experten von McAfee. Die Experten stehen Montag bis Freitag zur Verfügung. Nur in englischer Sprache.
  • Fachhändler suchen
  • Kontakt
  • Rufen: 00800 122 55624

Überblick

McAfee ePolicy Orchestrator (McAfee ePO) ist die branchenweit fortschrittlichste, erweiterbarste und skalierbarste Software für zentrales Sicherheits-Management. McAfee ePO fasst die Sicherheitsverwaltung auf einer offenen Plattform zusammen und vereinfacht sowie verbessert dadurch das Risiko- und Compliance-Management für Organisationen jeder Größe. Als Grundlage der Sicherheits-Management-Plattform von McAfee ermöglicht McAfee ePO Kunden die Verbindung branchenführender Sicherheitslösungen mit ihren jeweiligen Unternehmensinfrastrukturen, um die Transparenz und die Effizienz zu steigern und den Schutz zu stärken.

Kunden nutzen die flexiblen Automatisierungsfähigkeiten von McAfee ePO, um Abläufe zu optimieren und damit sowohl die Kosten als auch die Komplexität der Sicherheits- und Compliance-Verwaltung wesentlich zu senken.

Dank der McAfee ePO-Plattform können Sicherheitsanbieter und Systemintegratoren ihre Fachkompetenz mit bewährten Vorgehensweisen kombinieren und mit den daraus entstehenden differenzierten Lösungen ihre Angebotspalette erweitern.

Nur McAfee ePO bietet folgende Möglichkeiten:

Durchgehende Transparenz: Schaffen Sie sich eine zentrale Übersicht über Ihre Sicherheitslage. Drag-and-Drop-Dashboards mit Detailanzeigefunktionen bieten Sicherheitsinformationen für alle Endgeräte, Daten, Mobilgeräte sowie Netzwerke und damit einen sofortigen Überblick und kürzere Reaktionszeiten.

Vereinfachter Sicherheitsbetrieb: Erwiesene Effizienzsteigerungen dank optimierter Abläufe. Unabhängige Studien zeigen, dass Unternehmen jeder Größe mit McAfee ePO Verwaltungsaufgaben optimieren, "Audit-Müdigkeit" verringern und die mit dem Sicherheits-Management verbundenen Hardware-Kosten senken können.

Eine offene, erweiterbare Architektur: Machen Sie sich Ihre vorhandene IT-Infrastruktur zunutze. McAfee ePO verbindet die Verwaltung von Sicherheitslösungen von McAfee sowie Drittanbietern mit Ihren Verwaltungs-Tools für LDAP, IT-Betrieb und Konfiguration.

Infographic: Real-time Security
McAfee a Leader in Gartner Magic Quadrant for Content-Aware DLP

Funktionen und Vorteile

Profitieren Sie von schneller und einfacher Ausbringung

Stellen Sie sicher, dass breit angelegte Lösungen für Sicherheit und Risiko-Management zusammenwirken, um Sicherheitslücken und die Komplexität zu verringern. Ausbringung eines Agenten ohne weitere Vorbereitung und anpassbare Richtlinienerzwingung sichern rasch Ihre Umgebung und halten ihren Schutz aufrecht.

Erhöhen Sie die Effizienz

Optimieren Sie Sicherheits- und Compliance-Abläufe mit Automatisierungen und einer personalisierten Arbeitsumgebung. Die für große Unternehmen geeignete Architektur von McAfee ePolicy Orchestrator (ePO) lässt sich für Unternehmen jeder Größe skalieren und reduziert damit wesentlich die Anzahl der auszubringenden Server.

Machen Sie Ihre Sicherheits-Infrastruktur zukunftssicher

Schützen Sie Ihr Unternehmen vor den Bedrohungen von heute und morgen. Echtzeit-Bedrohungsaufklärung von McAfee Labs sichert präventiv Ihre Infrastruktur. Die offene Plattform erleichtert die schnelle Einführung von Sicherheits-Innovationen, wenn neue Bedrohungsarten auftreten.

Systemanforderungen

Unterstützte Plattformen

  • Server-Betriebssystem: 64 Bit
    • Windows Server 2008 mit SP2 Standard, Enterprise oder Datacenter
    • Windows Server 2008 R2 Standard, Enterprise oder Datacenter
    • Windows Server 2008 for Small Business Premium
    • Windows Server 2003 mit SP2 Standard, Enterprise oder Datacenter
  • Browser
    • Firefox 3.5
    • Firefox 3.6
    • Internet Explorer 7.0
    • Internet Explorer 8.0
  • Netzwerkunterstützung
    • IPv4
    • IPv6
  • Virtuelle Server
    • VMware ESX 3.5.x Update 4
    • VMware ESX 4.0 Update 1
    • Citrix XenServer 5.5 Update 2
    • Windows Server 2008 R2 Hyper-V
    • VMware ESX 5.1
  • Datenbank (32 Bit und 64 Bit)
    • SQL Server 2008 mit SP1/SP2/R2 Standard, Enterprise, Workgroup, Express
    • SQL Server 2005 mit SP3 Standard, Enterprise, Workgroup, Express

Zusätzliche Anforderungen

  • 1,5 GB freier Festplattenspeicher (2 GB empfohlen)
  • 1 GB Arbeitsspeicher (2 bis 4 GB empfohlen)
  • Mindestens Intel Premium 4-Prozessor, 1,3 GHz oder schneller
  • Monitor: 1024 x 768, 256 Farben, VGA
  • NIC: 100 Mbit/s oder schneller
  • Dateisystem: NTFS empfohlen
  • Bei Verwaltung von mehr als 250 Systemen wird ein eigener Server empfohlen.
  • IP-Adresse: McAfee empfiehlt eine statische IP-Adresse

Verwandte Produkte

Real Time for McAfee ePolicy Orchestrator
Mit Real Time for McAfee ePO wird McAfee ePO optimiert, sodass schnellere Abfragen und Aktionen möglich sind als je zuvor. Administratoren können den Sicherheitsstatus innerhalb weniger Augenblicke abrufen und Sicherheitsentscheidungen auf Basis von Echtzeit- anstelle von Verlaufsinformationen treffen. Real Time for McAfee ePO steht exklusiv den Benutzern der folgenden McAfee-Suites für Endgerätesicherheit zur Verfügung:

Demos und Tutorials

Demos

To learn more about the McAfee product listed above, please view the demonstration.

Tutorials

For guidance on how to use ePolicy Orchestrator, watch this Quick Tips video.

Anwenderberichte von Kunden

Arab National Bank (English)

Arab National Bank uses McAfee ePolicy Orchestrator (ePO) software to manage endpoint protection across 5,500 endpoints.

Kernpunkte
  • Reduces manpower required to manage endpoint security from six people to two
  • Accelerates deployment of data loss protection—70 percent faster than competitive solutions faster than competitive solutions
  • Cuts administrative reporting from several days to minutes
  • Saves $152,000 in reduced manual intervention, thanks to integration with third-party security solutions

Arab National Bank (English)

Arab National Bank uses McAfee ePolicy Orchestrator (ePO) software to manage endpoint protection across 5,500 endpoints.

Kernpunkte
  • Reduces manpower required to manage endpoint security from six people to two
  • Accelerates deployment of data loss protection—70 percent faster than competitive solutions faster than competitive solutions
  • Cuts administrative reporting from several days to minutes
  • Saves $152,000 in reduced manual intervention, thanks to integration with third-party security solutions

Bank Central Asia (English)

Bank Central Asia achieves compliance and saves time with McAfee ePO Software.

Kernpunkte
  • Eased compliance with internal and industry regulations
  • Saved time through centralized management
  • Provided protection to computers, network, and data through integrated solutions

Bank of China International (BOCI) (English)

Bank of China International slashes risk of data loss with McAfee data protection.

Kernpunkte
  • Delivered easy-to-manage security through an integrated central console
  • Prevented accidental or malicious data loss
  • Provided full visibility and control over use and movement of confidential data
  • Enabled proactive regulatory compliance and risk avoidance

Brelje & Race Consulting Engineers (English)

Brelje & Race Makes a Wise Investment

Kernpunkte
  • IT manager’s time spent configuring and updating individual workstations cut by 90%
  • Centralized management ensures that all workstations are up to date with latest protection
  • Protection running in the background without intruding on employees’ work
  • Comprehensive and centrallymanaged solution for same price as many standalone antivirus products

Cassling (English)

McAfee secures Cassling with smart, simple solutions.

Kernpunkte
  • Protected 140 servers, desktops, and mobile devices from viruses — zero problems in the past four years
  • Enabled effortless management of patches and updates from a central console
  • Eliminated virtually all spam from mailboxes and Microsoft Exchange servers

City of St. Paul (English)

McAfee bolsters security for the City of St. Paul, Minnesota.

Kernpunkte
  • Hardened network against intrusion
  • Protected 3,300 endpoints against virus and spam attacks
  • Safeguarded the city’s network 100% from attacks via unsecured physical sites
  • Delivered powerful functionality, ease of use, and simplified administration

CSTISA (English)

CSTISA uses McAfee ePolicy Orchestrator (ePO) software as a primary sales tool to sell McAfee Endpoint Protection solutions.

Kernpunkte
  • Supports year-over-year scalability and business continuity
  • Helps build trust as an IT security advisor to customers
  • Provides expert service to customers, from sales and installation through ongoing support
  • Allows expansion into new markets, such as cloud security services

GROB-WERKE (English)

GROB-WERKE relies on McAfee to provide data encryption on laptops and comprehensive endpoint protection.

Kernpunkte
  • Achieved a 10-year record of success mitigating 100% of security risks
  • Centralized management, reducing the amount of time it would otherwise take to perform administration and deployment by 50%
  • Closed security leaks immediately, allowing patches to be installed at a comfortable pace
  • Encrypted data on laptops, preventing unauthorized access to sensitive data in the event a laptop was lost or stolen

Idaho State Tax Commission (English)

Idaho State Tax Commission chooses McAfee to embed security in a new network infrastructure.

Kernpunkte
  • Identified vulnerabilities and blocked threats
  • Delivered reliable endpoint protection
  • Enabled compliance with National Institute of Standards and Technology (NIST) security guidelines
  • Provided support for the commission’s defense-in-depth security strategy
  • Helped increase security awareness among network users

Informa (English)

Informa used McAfee to centralize and standardize its security infrastructure to better protect against viruses, spyware, spam, pop-ups, and more.

Kernpunkte
  • Gained fast ROI through solid protection, reasonable pricing, and reduced internal costs
  • Created an environment of easy deployment and administration
  • Protected against malware with augmented malware detection abilities
  • Assured that the entire network is protected
  • Increased control over the security infrastructure

Intelsat (English)

Intelsat trusts McAfee to protect user and network devices globally.

Kernpunkte
  • Protected a diverse environment from internal and external threats, including the inherent risks of a fluctuating population of 250 to 500 contractors
  • Managed the entire server system with 1.5 full-time employees (FTEs)
  • Reduced solution cost by 75% over a la carte purchases from separate vendors
  • Standardized a security environment that previously required five vendors
  • Complied with regulations, including SOX, HIPAA, and Department of Defense (DoD)

Mairie de Saint Nazaire (English)

McAfee simplifies security management for French city’s local government.

Kernpunkte
  • Simplified security management with single, integrated central console
  • Deployed quickly and easily
  • Freed up time to focus on nonsecurity issues
  • Reduced spam significantly

Major Healthcare System (English)

The healthcare system uses McAfee solutions to gain compliance with HIPAA, PCI, DSS, and FTC regulations.

Kernpunkte
  • Optimize mobility management of corporate data
  • Protect corporate data from the data center to the mobile device
  • Set mobile policies that work while providing flexibility to users
  • Provide central dashboard for controlling entire security environment

MidWestOne Financial Group (English)

McAfee Firewall Enterprise, McAfee Web Gateway, and McAfee Email Gateway provide the foundation for MidWestOne’s Internet security strategy.

Kernpunkte
  • Comprehensive inbound threat protection and outbound data loss prevention for 250 email users
  • Strong antivirus protection for 550 desktops and laptops
  • Centrally managed security infrastructure through “single pane of glass” with McAfee ePO software
  • Significantly reduces helpdesk calls for spyware infections by half
  • Creates an improved standing with auditors and regulators

NYC Department of IT and Telecommunications (English)

NYC Department of IT and Telecommunications uses McAfee for for vulnerability management, endpoint encryption, and other areas of security functionality.

Kernpunkte
  • Increased protection with a savings of $18 million
  • Provided centralized control across highly distributed IT environment

Riverside Healthcare (English)

Riverside Healthcare protects more than 1,950 endpoints including mobile devices with McAfee software.

Kernpunkte
  • Optimize mobility management of corporate data
  • Protect corporate data from the data center to the mobile device
  • Set mobile policies that work while providing flexibility to users

TELUS International Philippines (English)

TELUS uses the Security Connected framework from McAfee as the foundation for its multilayered security infrastructure.

Kernpunkte
  • Improves visibility, control, and overall security posture with central security administration
  • Accelerates remediation of malware attacks daily
  • Provides two-fold defense against data loss
  • Increases customer confidence, willingness to do business

Texas Tech University Health Sciences Center (English)

Texas Tech University Health Sciences Center (TTUHSC) offers programs in medicine, nursing, pharmacy, biomedicine and health sciences.

Kernpunkte
  • Extensible compliance reporting.
  • Block thousands of attacks.
  • Security audits in minutes.
  • Improve visibility and productivity.

Tyco Electronics (English)

Tyco Electronics selected McAfee security solutions to enhance internal network security and simplify compliance.

Kernpunkte
  • Locked down internal security
  • Secured notebooks and desktops from viruses, worms, spyware, and other threats
  • Enabled rapid containment of any outbreak
  • Safeguarded data on mobile devices
  • Simplified patches and policy changes

WNS Limited (English)

WNS deployed McAfee Endpoint Encryption on all of its 1,500 laptops worldwide and McAfee Vulnerability Manager at each of its service sites.

Kernpunkte
  • Dramatically reduced time spent managing security
  • Centralized security management across multiple global sites
  • Improved administrative control and visibility across the extended enterprise

(English)

Kernpunkte

News und Veranstaltungen

Ressourcen

Datenblätter

McAfee Collector Plug-in (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee ePolicy Orchestrator

Eine technische Zusammenfassung zum oben genannten McAfee-Produkt finden Sie im entsprechenden Datenblatt.

Real Time for ePolicy Orchestrator

Eine technische Zusammenfassung zum oben genannten McAfee-Produkt finden Sie im entsprechenden Datenblatt.

Kurzvorstellungen

Improve Visibility and Control of Endpoints—Including Managed and BYOD (English)

ForeScout CounterACT integrates with McAfee ePO and ESM to provide this information in realtime for both managed and unmanaged hosts.

Create a Least Risk Microsoft Windows Desktop (English)

Avecto Privilege Guard and McAfee ePolicy Orchestrator (ePO) software enable organizations worldwide to deploy secure and compliant desktops—without compromising a user's ability to perform their day to day tasks.

Identify Sensitive Data and Prevent Data Leaks (English)

The interoperability between TITUS Document Classification software and McAfee Data Loss Prevention (DLP) further reduces your risk of data loss by capturing end users’ inherent knowledge about the sensitivity of documents and making that information available to McAfee host and network-based DLP as visual classification labels and corresponding metadata.

Privileged Identity Management (English)

Cyber-Ark Software solutions help reduce data breach risks, meet strict IT compliance and audit requirements, and improve security posture and operational efficiencies on corporate networks, whether on premises or in the cloud. Cyber-Ark delivers privileged password vaulting and user-access control, session recording and auditing, continuous monitoring, and forensics. Cyber-Ark solutions are integrated with McAfee® ePolicy Orchestrator® (McAfee ePO™) software, McAfee® Enterprise Security Manager, and McAfee® Vulnerability Manager.

Identify Threats to Business Performance (English)

The McAfee/Rev2 integration enables you to quickly score, classify, and combine hundreds of thousands of vulnerabilities and highlight the critical few risks.

Extend McAfee Data Protection with Tiversa P2P Breach Protection (English)

This solution enables detection notifications and forensic analysis data to be reported within the McAfee ePolicy Orchestrator (ePO) console.

Integrated Security Management for Unified Communications Applications (English)

The Sipera UC-Sec appliance ensures that the VoIP/UC infrastructure and endpoints (mobile or fixed) are protected and visible to the security manager for the first time with McAfee ePO software.

AccessData: Incident Response and Forensics (English)

Learn about the joint solution that extends AccessData’s forensic analysis technology to McAfee ePolicy Orchestrator software.

Security Event and Log Management (English)

ArcSight’s market-leading log and event management solutions are now integrated with the McAfee ePolicy Orchestrator (ePO) software.

Comprehensive Security Through Visibility (English)

BDNA Discover acts as a comprehensive source of information for the detection of invisible devices on enterprise networks.

Manage Security and Risk based on the Actual State of your Network (English)

Through comprehensive real-time network, device, and user intelligence, Insightix BSA Visibility provides total network visibility to McAfee ePolicy Orchestrator (McAfee ePO) software, enabling effective security and risk management for all devices across your entire network.

McAfee Security Management Platform (English)

The McAfee Security Management Platform combines and refines key aspects of security so IT staff can manage the expanding scale of enterprise security more easily than ever before.

Schutz von virtuellen Desktops: Überwindung der letzten Hürde für den breiten Einsatz

Erfahren Sie, wie McAfee und Citrix Partner Citrix XenDesktop Kunden ermöglicht die Verwaltung von Desktop-Sicherheit in virtuellen Umgebungen mit dem McAfee ePolicy Orchestrator-Software zu erweitern.

Application Security and Control (English)

Arxan Technologies, a leader in application security and control, has integrated their software security product, GuardIT, with McAfee ePolicy Orchestrator (McAfee ePO) software to provide security check and tampering alert information into the McAfee ePO software management console.

McAfee Compatible Solution: AirPatrol WPM 1.0 and McAfee ePO 4.0 (English)

AirPatrol’s Wireless Policy Manager (WPM) is now integrated with McAfee ePolicy Orchestrator (McAfee ePO) software. WPM secures wireless interfaces on enterprise endpoints and empowers IT administrators to easily enforce commonsense rules on governing how employees use their wireless connectivity.

SIEM and Log Management for Converging Network and Security Environments (English)

QRadar intelligently distills large amounts of information from a wide range of sources to augment incident response and compliance validation in McAfee ePolicy Orchestrator (ePO) software, McAfee’s centralized security and compliance management platform.

Virtual Infrastructure Security (English)

Catbird, a pioneer and leader in security and compliance solutions for virtual networks, has integrated its flagship product, V-Security, with network and endpoint systems technologies from McAfee to extend comprehensive security and compliance to the virtual infrastructure.

Automated Security Configuration and Compliance Management (English)

Triumfant detects and analyzes changes and unexpected conditions on endpoints to determine if those changes are problematic to the security, configuration, or performance of assets managed by McAfee ePolicy Orchestrator (ePO).

Optimierung des Sicherheits-Managements mit McAfee ePolicy Orchestrator

Den Beweis erbringt die Forschung

Technologie-Entwürfe

Achieve Situational Awareness (English)

The McAfee solution has two primary components: McAfee ePolicy Orchestrator (McAfee ePO) software and McAfee Enterprise Security Manager, with additional integrations to extend visibility and control across the entire security and compliance management environment.

Investigate Data Breaches (English)

McAfee enables enterprises to collect, analyze, and preserve security forensic information. With a solution that includes content- and context-aware SIEM, McAfee provides alerts to security events, as well analysis on how the attacked occurred, affected users, and compromised data — so you can better understand the severity of a security breach.

Look Inside Network Traffic (English)

The McAfee solution has two primary components: McAfee Firewall Enterprise and McAfee Network Security Platform. The McAfee Firewall and the IPS appliance both have add-on features that can optimize your visibility into the network. McAfee SIEM and other optional products help extend visibility and analytics to more aspects of network traffic.

Living with Social Media (English)

To enable the secure and controlled use of social media in the workplace, McAfee recommends a layered approach, including firewall and data loss prevention (DLP) built around a solid web proxy solution. With McAfee security solutions, enterprises can address bandwidth concerns around the use of social media, encourage the productive use of time among employees, scan for malware, filter HTTPS content, and stop data leakage.

Whitepaper

Security Management 2.5 – Replacing Your SIEM Yet? (English)

This paper will walk you through the entire process — from soup to nuts — of evaluating, selecting, and deploying a SIEM. It offers pragmatic advice on how to get it done based on years working through this process as both consumers and vendors of SIEM technology. The process is not always painless, but we are certain it will help you avoid foundering on bad technology and inter-office politics. You owe it to yourself and your organization to ask the right questions and to get answers. It is time to slay the sacred cow of your substantial SIEM investment, and to figure out your best path forward.

SANS Institute: Correlating Event Data for Vulnerability Detection & Remediation (English)

Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.

Log Management—The Foundation for Federal Security and Compliance (English)

In this paper, we will explore the fundamental requirements for a sound log management solution and review some examples of less than optimum product deployments. Finally, we will examine what a US federal agency should be looking for in an extensible log management strategy, and propose a workable solution for tighter integration into and support of an organization’s applicable and prospective security and compliance programs and initiatives.

Need for Speed: Streamlining Response and Reaction to Attacks (English)

Today’s faster, newer and greatly improved malicious user requires a faster, newer and greatly improved response. Smarter attackers require more intelligent countermeasures, including faster and more reliable analysis, to react to security issues.

McAfee ePolicy Orchestrator: Creating an Apache HTTP Repository (English)

This document describes how to configure Apache and Samba running on a Linux operating systems (OS) platform for the purpose of creating an Apache HTTP Repository for McAfee ePolicy Orchestrator. The Apache repository will allow customers to meet the requirement to have a Linux repository.

McAfee Security Management Platform

Die Sicherheits-Management-Plattform von McAfee erschließt Unternehmen neue Bedrohungsdaten und bietet Automatisierungsmethoden, die die verschiedenen IT-Sicherheitskomponenten zu einem einzigen, alles umfassenden Risiko-minimierenden Schutzschild zusammenfassen.

Die Guten, die Bösen und die Unbekannten

Reduzieren Sie Risiken, die von nicht autorisierten Anwendungen ausgehen, optimieren Sie die Kontrolle über Ihre Endgeräte, und erzählen Sie es weiter.

McAfee beleuchtet die Komplexität des Endgeräteschutzes

Mehr Sicherheit. Geringere Betriebskosten. Vereinfachte Compliance.

Community

Blogs

Foren

McAfee Communities : All Content - ePolicy Orchestrator (ePO)