McAfee Network Security Manager

McAfee Network Security Manager

Simple, centralized control for distributed McAfee intrusion prevention systems

Overview

McAfee Network Security Manager gives you real-time visibility and control over all McAfee intrusion prevention systems deployed across your network. With its plug-and-play operation, easy-to-use functions, and web-based management, Network Security Manager saves you time, trouble, and operating costs.

Network Security Manager and Network Security Central Manager are available as a pre-configured, hardened appliance, or as a software-only option.

Network Security Manager delivers:

Fast deployment — Preconfigured templates, recommended-for-block policies, and a powerful and intuitive user interface enable administrators to rapidly bring up their network intrusion prevention systems.

Real-time control of real-time data — Manage, configure, and monitor all your McAfee intrusion prevention systems. An intuitive, customizable dashboard, accessible through any web browser, makes it easy — no matter where you are.

Faster time to resolution and faster time to confidence — Use up-to-the-minute input from all intrusion prevention system sensors to respond to threats quickly and make the right decisions.

Comprehensive protection — Count on proven management of intrusion prevention system configuration, policy, attack blocking, and automatic response actions for small networks, global enterprises, and high-traffic data centers.

Efficient compliance and reporting — Use our preconfigured threat-blocking policies or create your own policies. Easily define and automate distribution of custom graphical reports for audits and management reviews.

Features & Benefits

Gain consistent visibility and control

Manage and monitor multiple intrusion prevention devices from a single, centralized system. Get a complete threat and system summary in seconds from an at-a-glance dashboard.

Make better decisions faster

Get reliable, real-time information on all McAfee intrusion prevention systems across your network to accelerate your time to resolution and time to confidence. You can even simulate inline blocking to determine the potential impact when the intrusion prevention system recommends blocking an attack.

Streamline network management and lower costs

Reduce your administration and compliance workloads with integrated, automated policy creation and enforcement, plus enterprise-class auditing and reporting capabilities.

Implement policies to suit your needs

Create custom security policies for different enterprise locations, business units, and remote offices. Global policy editing makes it easy to set consistent policies across devices.

Block attacks from the minute you deploy

Stop hundreds of attacks right out of the box with 14 predefined intrusion prevention system security threat-blocking policies and hundreds of recommended-for-block intrusion prevention system signatures.

Demos / Tutorials

Tutorials

For guidance on how to use Network Security Manager, watch this Quick Tips video.

Customer Stories

Eagle Rock Energy

Eagle Rock strengthens its security infrastructure with the addition of new security management and network security solutions.

Highlights
  • Integrated security architecture paves the way for business expansion.
  • Comprehensive threat detection ensures that security events from every source are noted and logged.
  • The combination of McAfee Web Gateway and McAfee Advanced Threat Defense thwarts inbound threats from the Internet.
  • Intrusion prevention monitors both external and internal activity.

Resources

Data Sheets

McAfee Network Security Manager

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Network Security Central Manager

McAfee Network Security Central Manager eliminates policy maintenance bottlenecks to support compliance and improve efficiency.

Community

Blogs

  • Government Agencies Should Turn to CDM During 30-Day Sprint
    Tom Gann - June 29, 2015

    The fallout from the OPM breach continues with news that clearance information may have been stolen and that more than 10 million federal employee records may have been breached. In response, the White House has ordered every agency to engage in a “30 day sprint” to shore up and bolster their defensive cybersecurity capabilities. During […]

    The post Government Agencies Should Turn to CDM During 30-Day Sprint appeared first on McAfee.

  • Hackers Gonna Hack! Here’s How to Fight Back
    Paul Zimski - June 23, 2015

    Nobody ever said network defense was easy. If you’re in charge of protecting your enterprise’s digital assets, the one thing you always seem to be fighting is time. Even after you have read every security analyst report on the market and deployed best-of-breed security products, if your IT security and data protection tools don’t work […]

    The post Hackers Gonna Hack! Here’s How to Fight Back appeared first on McAfee.

  • Securing Private and Hybrid Clouds
    Raja Patel - June 5, 2015

    As-a-service models offer huge opportunities, but also complicate security. Sometimes the easiest way to migrate to a new architectural modelis to let others do the work, others who are experts in their field. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While […]

    The post Securing Private and Hybrid Clouds appeared first on McAfee.

  • ESG Lab Spotlight on SIEM
    Karl Klaessig - June 2, 2015

    It’s no secret that today’s attack surface is growing. Everywhere you turn there’s news of a new breach or targeted attack. Look around you – is your mobile device nearby? The answer is most likely yes. In a world of connected devices and people on the go, our affinity for multi-tasking is in turn causing […]

    The post ESG Lab Spotlight on SIEM appeared first on McAfee.

  • Did a Hacker Take Control of a Commercial Airplane?
    Gary Davis - May 20, 2015

    As the popular saying goes, what goes up must come down. And if you’re on a flight, both elements should be done in a controlled manner. Thankfully, we have a lot of people working across industries to make sure that all flights take off and land safely — and that includes the cybersecurity industry. But […]

    The post Did a Hacker Take Control of a Commercial Airplane? appeared first on McAfee.

Threats and Risks