McAfee ePolicy Orchestrator (ePO)

McAfee ePolicy Orchestrator (ePO)

Se connecter. Gérer. Automatiser.

Etapes suivantes :

Présentation

McAfee ePolicy Orchestrator (McAfee ePO) est le logiciel de gestion centralisée de la sécurité le plus avancé, extensible et évolutif du marché. McAfee ePO unifie la gestion de la sécurité par le biais d'une plate-forme ouverte de façon à simplifier et à optimiser la gestion des risques et de la conformité des entreprises de toutes tailles. Véritable fondement de la plate-forme de gestion de la sécurité McAfee, McAfee ePO permet aux clients de connecter des solutions de sécurisation de pointe à leur infrastructure d'entreprise afin d'accroître la visibilité sur leur environnement, de gagner en efficacité et de renforcer la protection.

Les clients utilisent les fonctionnalités d'automatisation flexibles de McAfee ePO pour rationaliser les workflows, réduisant ainsi considérablement les coûts et la complexité associés à l'administration de la sécurité et de la conformité.

Les fournisseurs de solutions de sécurisation et les intégrateurs système peuvent intégrer leur expertise et leurs meilleures pratiques à la plate-forme McAfee ePO afin d'élargir leur offre et de proposer des solutions différenciées.

McAfee ePO vous offre des avantages uniques :

Visibilité de bout en bout — Bénéficiez d'une vue unifiée de votre sécurité. Grâce à la fonction glisser-déposer et à la possibilité d'accéder à des informations détaillées, directement exploitables, les tableaux de bord fournissent des renseignements sur la sécurité des postes clients, des données, des équipements mobiles et des réseaux, garantissant ainsi une visibilité immédiate et des temps de réponse plus courts.

Simplification des opérations de sécurisation — Profitez d'une amélioration avérée de l'efficacité grâce à la rationalisation des workflows. Des études indépendantes montrent que le logiciel McAfee ePO aide les entreprises de toutes tailles à optimiser leurs tâches administratives, à alléger la charge d'audit et à réduire les coûts en matériel associés à la gestion de la sécurité.

Architecture ouverte et évolutive — Tirez parti de votre infrastructure informatique existante. Le logiciel McAfee ePO connecte les solutions de sécurité de McAfee et d'éditeurs tiers à vos outils de gestion des configurations, opérations informatiques et LDAP, en toute simplicité.

Featured case study: Leading Mexican bank

Read now

Les menaces n'attendent pas. Ne perdez pas de temps.

Real Time McAfee for ePO

Lire la fiche technique

Fonctions et avantages

Déploiement rapide et aisé

Intégrez des solutions étendues de gestion des risques et de la sécurité pour réduire les brèches de sécurité et la complexité de la gestion. Le déploiement immédiat d'un agent unique et la mise en œuvre de stratégies personnalisées garantissent une sécurisation rapide et durable de votre environnement.

Efficacité accrue

Optimisez les workflows de sécurité et de conformité à l'aide de fonctions d'automatisation et d'un espace de travail personnalisé. L'architecture du logiciel McAfee ePolicy Orchestrator (ePO), adaptée aux grandes entreprises, évolue pour répondre aux besoins des entreprises de toute taille, réduisant ainsi considérablement le nombre de serveurs à déployer.

Pérennité garantie de votre infrastructure de sécurité

Protégez votre entreprise contre les menaces d'aujourd'hui et de demain. Les informations sur les menaces délivrées en temps réel par McAfee Labs assurent une protection proactive à votre infrastructure. La plate-forme ouverte facilite l'adoption rapide des innovations en matière de sécurité lorsqu'apparaissent de nouvelles catégories de menaces.

Configuration système requise

Plates-formes prises en charge

  • Système d'exploitation serveur : 64 bits
    • Microsoft Windows Server 2008 avec Service Pack 2 Standard, Enterprise ou Datacenter Edition
    • Microsoft Windows Server 2008 R2 Standard, Enterprise ou Datacenter Edition
    • Microsoft Windows Small Business Server 2008 Premium
    • Microsoft Windows Server 2003 avec Service Pack 2 Standard, Enterprise ou Datacenter Edition
  • Navigateur
    • Firefox 3.5
    • Firefox 3.6
    • Microsoft Internet Explorer 7.0
    • Microsoft Internet Explorer 8.0
  • Prise en charge réseau
    • IPv4
    • IPv6
  • Serveur virtuel
    • VMware ESX 3.5.x Update 4
    • VMware ESX 4.0 Update 1
    • Citrix XenServer 5.5 Update 2
    • Windows Server 2008 R2 Hyper-V
    • VMware ESX 5.1
  • Base de données (32 bits et 64 bits)
    • Microsoft SQL Server 2008 avec Service Pack 1/2 ou R2 Standard, Enterprise, Workgroup ou Express Edition
    • Microsoft SQL Server 2005 avec Service Pack P3 Standard, Enterprise, Workgroup ou Express Edition

Configuration supplémentaire

  • 1,5 Go d'espace disque disponible (2 Go recommandés)
  • 1 Go de mémoire RAM (de 2 à 4 Go recommandés)
  • Processeur Intel Pentium IV ou ultérieur, 1,3 GHz ou supérieur
  • Moniteur : VGA, 1024x768, 256 couleurs
  • Carte réseau : 100 Mbit/s ou plus rapide
  • Système de fichiers : NTFS (recommandé)
  • Serveur dédié recommandé dans le cas où le nombre de systèmes managés est supérieur à 250
  • Adresse IP : McAfee recommande l'utilisation d'une adresse IP statique

Produits associés

Real Time for McAfee ePolicy Orchestrator
Solution conçue pour optimiser McAfee ePO et accélérer encore l'interrogation des systèmes et l'applications de mesures, Real Time for McAfee ePO aide les administrateurs à prendre instantanément des décisions de sécurité en fonction d'informations obtenues en temps réel, et non plus d'une vue historique des données. Real Time for McAfee ePO est réservé exclusivement aux détenteurs de licences pour les suites McAfee de sécurisation des postes clients suivantes :

Démonstrations et didacticiels

Démonstrations

To learn more about the McAfee product listed above, please view the demonstration.

Didacticiels

For guidance on how to use ePolicy Orchestrator, watch this Quick Tips video.

Témoignages de clients

Arab National Bank (English)

Arab National Bank, one of the largest banks in the Middle East, relies on McAfee data protection and endpoint security solutions to protect sensitive data across multiple locations and comply with financial regulations.

Points forts
  • Reduces manpower required to manage endpoint security from six people to two
  • Accelerates deployment of data loss protection—70 percent faster than competitive solutions
  • Cuts administrative reporting from several days to minutes
  • Saves $152,000 in reduced manual intervention, thanks to integration with third-party security solutions

Bank Central Asia (English)

Bank Central Asia, a regional public bank in Indonesia, centralizes security management with McAfee ePolicy Orchestrator.

Points forts
  • Eased compliance with internal and industry regulations.
  • Resulted in time savings with centralized management.
  • Provided integrated solutions to keep computers, the network, and data protected.

Blackburn with Darwen Council (English)

Blackburn with Darwen Council, a borough in the county of Lancashire, England, uses McAfee endpoint security, email management, and SIEM solutions to build an integrated, centrally managed security architecture.

Brelje & Race Consulting Engineers (English)

This small business centralizes antivirus security management with McAfee ePolicy Orchestrator, saving time for the company's security administrator.

Points forts
  • IT manager’s time spent configuring and updating individual workstations cut by 90%
  • Centralized management ensures that all workstations are up to date with latest protection
  • Protection running in the background without intruding on employees’ work
  • Comprehensive and centrallymanaged solution for same price as many standalone antivirus products

California Department of Corrections and Rehabilitation (CDCR) (English)

Leveraging the Security Connected strategy, the California Department of Corrections and Rehabilitation implemented SIEM, network IPS, data protection, and endpoint security solutions to secure its distributed IT environment over 37 locations.

Points forts
  • Compliance with policy standards.
  • Dashboards enable centralized security management and provide easy access for executive reporting.

CEMEX (English)

CEMEX adopts a Security Connected approach to safeguard endpoint and network security and improve visibility.

Points forts
  • Safeguards against zero-day advanced persistent threats without signature updates.
  • Greatly diminishes administrative time, from defining policies to repairing workstations.
  • Protects more than 26,000 endpoints from email, web, and application-generated attacks.
  • Provides streamlined and integrated management of large, global security platform.

Cognizant (English)

Cognizant centralizes its security environment with a single-vendor solution from McAfee that unifies endpoint security and provides better security visibility across the organization.

Points forts
  • Easily demonstrated compliance with complex government regulations and client requirements
  • Centralized view into entire security environment eases deployment, reporting and management
  • Maximum confidence and trust from key stakeholders

Deutsche Edelstahlwerke (English)

Deutsche Edelstahlwerke, the leading German producer of specialty stainless steel products, secures thousands of desktops while keeping production systems available with McAfee endpoint solutions.

Eagle Rock Energy (English)

Eagle Rock strengthens its security infrastructure with the addition of new security management and network security solutions.

Points forts
  • Integrated security architecture paves the way for business expansion.
  • Comprehensive threat detection ensures that security events from every source are noted and logged.
  • The combination of McAfee Web Gateway and McAfee Advanced Threat Defense thwarts inbound threats from the Internet.
  • Intrusion prevention monitors both external and internal activity.

IRCEP (English)

This Mexican government agency protects endpoints and secures critical data with a range of McAfee solutions.

Kleberg Bank (English)

Kleberg Bank relies on Intel Security for comprehensive protection, time savings, and to support compliance.

Leading Mexican Bank (English)

The Mexican branch of a leading worldwide bank is at the forefront of security with McAfee Network Security Platform and McAfee Professional Services.

Macquarie Telecom (English)

This leading Australian hosted IT provider drives a growing managed services business with Security Connected.

Points forts
  • Fully integrated security platform easily managed from a central dashboard.
  • Visibility and control for clients over their hosted security environments.
  • Competitive advantage through partnership with a trusted technology provider.

Major U.S. State Government (English)

State Government Places its Trust in Intel Security for IT Consolidation Within this US state government, the Office of Technology is the central IT organization, serving almost 400 executive, judicial, and legislative agencies, which, in turn, administer programs for 4.4 million citizens. The Office of Technology oversees a network linking 1,500 locations and 35,000 users across the state.

San Francisco Police Credit Union (English)

McAfee security management solutions keep this San Francisco-based financial company compliant.

Points forts
  • Faster, easier compliance with GLBA and NCUA Part 748.
  • Automated and on-demand reporting.
  • Fast troubleshooting and remediation.
  • Comprehensive security management without increasing headcount.

Seagate Technology (English)

McAfee Application Control protects Seagate's intellectual property and complex IT environment.

Points forts
  • Custom end-user protection to boost employee productivity
  • Increased performance of single-use machines in the factory
  • Malware-free factory environment

Sicredi (English)

Sicredi, one of Brazil’s largest credit union systems, consolidated their comprehensive security environment with Intel Security.

State of Alaska (English)

The state of Alaska utilizes McAfee's product portfolio to protect data centers and networks across 16 state agencies, saving $3.8 million.

Points forts
  • Saved a projected $3.8 million and improved operational and team efficiency
  • Dramatically improved security posture without increasing headcount
  • Allowed for greater budget predictability with the flexibility to adapt and grow security as needs change

State of Colorado (English)

McAfee SIEM solutions help the state of Colorado meet compliance requirements and remain cost effective.

Points forts
  • Aggressively achieved first five controls per set goal
  • Ability to administer virus scans and obtain software inventory with McAfee ePO software
  • Vulnerability ranking within McAfee Enterprise Security Manager allows for more immediate and effective remediation

Sutherland Global Services (English)

The McAfee Security Connected framework drives compliance and protects 24,000 endpoints for this consulting company.

Points forts
  • Virus attacks are virtually nonexistent throughout the globally distributed enterprise.
  • Central McAfee ePO console enables global management of entire IT infrastructure by only a two-person IT staff.
  • Industry-leading reporting tools facilitate compliance.
  • Automatic updates improve operational efficiency and ease burden on IT staff.
  • McAfee updates and notifications enable proactive response to threats.

Ressources

Fiches techniques

McAfee Rogue System Detection (English)

This data sheet explains how McAfee Rogue System Detection fully integrates with McAfee ePolicy Orchestrator to provide real-time discovery of rogue systems connected to the network to offer greater network visibility and protection.

McAfee ePO Cloud (English)

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

McAfee Embedded Control

Pour un compte rendu technique sur le produit McAfee présenté ci-dessus, veuillez consulter la fiche technique correspondante.

McAfee Collector Plug-in (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

Livres blancs

Protect Critical Assets with Virtual Patching (English)

This white paper discusses virtual patching and how using predictive threat coverage, automated vulnerability scanning, and risk visualization is a scalable and cost-effective approach to protecting critical assets.

Security Management 2.5 – Replacing Your SIEM Yet? (English)

This paper will walk you through the entire process — from soup to nuts — of evaluating, selecting, and deploying a SIEM. It offers pragmatic advice on how to get it done based on years working through this process as both consumers and vendors of SIEM technology. The process is not always painless, but we are certain it will help you avoid foundering on bad technology and inter-office politics. You owe it to yourself and your organization to ask the right questions and to get answers. It is time to slay the sacred cow of your substantial SIEM investment, and to figure out your best path forward.

SANS Institute: Correlating Event Data for Vulnerability Detection & Remediation (English)

Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.

Log Management—The Foundation for Federal Security and Compliance (English)

In this paper, we will explore the fundamental requirements for a sound log management solution and review some examples of less than optimum product deployments. Finally, we will examine what a US federal agency should be looking for in an extensible log management strategy, and propose a workable solution for tighter integration into and support of an organization’s applicable and prospective security and compliance programs and initiatives.

Need for Speed: Streamlining Response and Reaction to Attacks (English)

Today’s faster, newer and greatly improved malicious user requires a faster, newer and greatly improved response. Smarter attackers require more intelligent countermeasures, including faster and more reliable analysis, to react to security issues.

McAfee ePolicy Orchestrator: Creating an Apache HTTP Repository (English)

This document describes how to configure Apache and Samba running on a Linux operating systems (OS) platform for the purpose of creating an Apache HTTP Repository for McAfee ePolicy Orchestrator. The Apache repository will allow customers to meet the requirement to have a Linux repository.

Top Five McAfee ePolicy Orchestrator Tips

This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.

La plate-forme McAfee Security Management

Cette solution offre à l‘entreprise un niveau encore inégalé en matière d‘automatisation et d‘exploitation d‘informations. Elle intègre les diverses composantes de la sécurité informatique dans une protection globale unique, qui permet une maîtrise optimale des risques.

Le bon, le mauvais et l'inconnu

Limiter les risques associés aux applications non autorisées et bénéficier d'un contrôle renforcé des postes clients.

Présentations de solution

Create a Least Risk Microsoft Windows Desktop (English)

Avecto Privilege Guard and McAfee ePolicy Orchestrator (ePO) software enable organizations worldwide to deploy secure and compliant desktops—without compromising a user's ability to perform their day to day tasks.

Improve Visibility and Control of Endpoints—Including Managed and BYOD (English)

ForeScout CounterACT integrates with McAfee ePO and ESM to provide this information in realtime for both managed and unmanaged hosts.

McAfee Security Innovation Alliance Accelerator Program from Accuvant (English)

By leveraging the McAfee Security Innovation Alliance Accelerator Program from Accuvant, you can make your technology more compelling to McAfee customers.

Identify Sensitive Data and Prevent Data Leaks (English)

The interoperability between TITUS Document Classification software and McAfee Data Loss Prevention (DLP) further reduces your risk of data loss by capturing end users’ inherent knowledge about the sensitivity of documents and making that information available to McAfee host and network-based DLP as visual classification labels and corresponding metadata.

Privileged Identity Management (English)

Cyber-Ark Software solutions help reduce data breach risks, meet strict IT compliance and audit requirements, and improve security posture and operational efficiencies on corporate networks, whether on premises or in the cloud. Cyber-Ark delivers privileged password vaulting and user-access control, session recording and auditing, continuous monitoring, and forensics. Cyber-Ark solutions are integrated with McAfee® ePolicy Orchestrator® (McAfee ePO™) software, McAfee® Enterprise Security Manager, and McAfee® Vulnerability Manager.

Identify Threats to Business Performance (English)

The McAfee/Rev2 integration enables you to quickly score, classify, and combine hundreds of thousands of vulnerabilities and highlight the critical few risks.

Extend McAfee Data Protection with Tiversa P2P Breach Protection (English)

This solution enables detection notifications and forensic analysis data to be reported within the McAfee ePolicy Orchestrator (ePO) console.

Integrated Security Management for Unified Communications Applications (English)

The Sipera UC-Sec appliance ensures that the VoIP/UC infrastructure and endpoints (mobile or fixed) are protected and visible to the security manager for the first time with McAfee ePO software.

AccessData: Incident Response and Forensics (English)

Learn about the joint solution that extends AccessData’s forensic analysis technology to McAfee ePolicy Orchestrator software.

Security Event and Log Management (English)

ArcSight’s market-leading log and event management solutions are now integrated with the McAfee ePolicy Orchestrator (ePO) software.

Comprehensive Security Through Visibility (English)

BDNA Discover acts as a comprehensive source of information for the detection of invisible devices on enterprise networks.

Manage Security and Risk based on the Actual State of your Network (English)

Through comprehensive real-time network, device, and user intelligence, Insightix BSA Visibility provides total network visibility to McAfee ePolicy Orchestrator (McAfee ePO) software, enabling effective security and risk management for all devices across your entire network.

La sécurisation des postes de travail virtuels — Dernier obstacle levé pour une adoption généralisée

Apprenez comment le partenariat McAfee et Citrix Citrix XenDesktop permet aux clients d'étendre la gestion de la sécurité de bureau pour les environnements virtuels en utilisant le logiciel McAfee ePolicy Orchestrator.

McAfee Security Management Platform — Se donner les moyens de sécuriser efficacement l’entreprise

The McAfee Security Management Platform combines and refines key aspects of security so IT staff can manage the expanding scale of enterprise security more easily than ever before.

Application Security and Control (English)

Arxan Technologies, a leader in application security and control, has integrated their software security product, GuardIT, with McAfee ePolicy Orchestrator (McAfee ePO) software to provide security check and tampering alert information into the McAfee ePO software management console.

McAfee Compatible Solution: AirPatrol WPM 1.0 and McAfee ePO 4.0 (English)

AirPatrol’s Wireless Policy Manager (WPM) is now integrated with McAfee ePolicy Orchestrator (McAfee ePO) software. WPM secures wireless interfaces on enterprise endpoints and empowers IT administrators to easily enforce commonsense rules on governing how employees use their wireless connectivity.

SIEM and Log Management for Converging Network and Security Environments (English)

QRadar intelligently distills large amounts of information from a wide range of sources to augment incident response and compliance validation in McAfee ePolicy Orchestrator (ePO) software, McAfee’s centralized security and compliance management platform.

Virtual Infrastructure Security (English)

Catbird, a pioneer and leader in security and compliance solutions for virtual networks, has integrated its flagship product, V-Security, with network and endpoint systems technologies from McAfee to extend comprehensive security and compliance to the virtual infrastructure.

Automated Security Configuration and Compliance Management (English)

Triumfant detects and analyzes changes and unexpected conditions on endpoints to determine if those changes are problematic to the security, configuration, or performance of assets managed by McAfee ePolicy Orchestrator (ePO).

Optimisation de la gestion de la sécurité avec McAfee ePolicy Orchestrator

La preuve par la recherche

Projets technologiques

Investigate Data Breaches (English)

McAfee enables enterprises to collect, analyze, and preserve security forensic information. With a solution that includes content- and context-aware SIEM, McAfee provides alerts to security events, as well analysis on how the attacked occurred, affected users, and compromised data — so you can better understand the severity of a security breach.

Achieve Situational Awareness (English)

The McAfee solution has two primary components: McAfee ePolicy Orchestrator (McAfee ePO) software and McAfee Enterprise Security Manager, with additional integrations to extend visibility and control across the entire security and compliance management environment.

Look Inside Network Traffic (English)

The McAfee solution has two primary components: McAfee Firewall Enterprise and McAfee Network Security Platform. The McAfee Firewall and the IPS appliance both have add-on features that can optimize your visibility into the network. McAfee SIEM and other optional products help extend visibility and analytics to more aspects of network traffic.

Living with Social Media (English)

To enable the secure and controlled use of social media in the workplace, McAfee recommends a layered approach, including firewall and data loss prevention (DLP) built around a solid web proxy solution. With McAfee security solutions, enterprises can address bandwidth concerns around the use of social media, encourage the productive use of time among employees, scan for malware, filter HTTPS content, and stop data leakage.

Rapports

SANS Analytics & Intelligence Survey (English)

This paper explores the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.

Communauté

Blogs

  • Root of Trust vs. Root of Evil: Part 3
    Tyson Macaulay - juillet 19, 2015

    This is the third of three parts about root of trust and the Internet of Things. In Part 1 and Part 2, I covered how root of trust is an important approach to managing risk in virtualized network—especially compliance risks. The first two posts in this series examined several reasons to consider root-of-trust technologies. In […]

    The post Root of Trust vs. Root of Evil: Part 3 appeared first on McAfee.

  • Root of Trust vs. Root of Evil: Part 2
    Tyson Macaulay - juillet 17, 2015

    This is the second of three posts about the root of trust and the Internet of Things. In my first post I wrote about the burden of technology compliance and how it may be changing as virtualization enters service provider and enterprise networks and underlies the Internet of Things (IoT). I also wrote about a […]

    The post Root of Trust vs. Root of Evil: Part 2 appeared first on McAfee.

  • Root of Trust vs. Root of Evil: Part 1
    Tyson Macaulay - juillet 15, 2015

    Regulatory compliance is an unloved cost of goods—an expense to be managed, like cafeteria subsidies or fleet fuel costs. Major regulatory gaps are opening around the Internet and Internet of Things (IoT), and especially in the plumbing under the IoT, which is rapidly evolving in a process known as network function virtualization (NFV). This future […]

    The post Root of Trust vs. Root of Evil: Part 1 appeared first on McAfee.

  • Insider Threats Deserve Attention, Solutions in Government: Report
    Tom Gann - juin 25, 2015

    As the persistence of insider threats remain a critical issue for government agencies to face. Security leaders like Intel Security have responded by prioritizing solutions that can mitigate insider threats in their pipeline. Government agencies have begun implementing policy changes that can help reduce the risk of an insider threat that can lead to critical […]

    The post Insider Threats Deserve Attention, Solutions in Government: Report appeared first on McAfee.

  • Astros’ Chief Recruiter Commits Cardinal Sin of Security
    Scott Montgomery - juin 22, 2015

    The F.B.I. and Justice Department are investigating whether or not officials associated with the St. Louis Cardinals gained unauthorized access to networks belonging to the Houston Astros, a rival baseball team. If the accusations hold true it would represent the first known case of corporate espionage through hacking between professional sports teams, according to The […]

    The post Astros’ Chief Recruiter Commits Cardinal Sin of Security appeared first on McAfee.