McAfee ePolicy Orchestrator (McAfee ePO) è il software di gestione centralizzata della sicurezza più avanzato, estendibile e scalabile del settore. Unificando la gestione della sicurezza attraverso una piattaforma aperta, McAfee ePO rende la gestione dei rischi e della conformità più semplice ed efficace per aziende di ogni dimensione. Basata sulla piattaforma McAfee Security Management Platform, McAfee ePO permette ai clienti di connettere soluzioni di sicurezza leader di mercato all'infrastrutture delle loro aziende per guadagnare in visibiltià, efficienza e maggiore protezione.
I clienti utilizzano le flessibili funzionalità di automazione di McAfee ePO per semplificare il workflow, diminuendo notevolmente i costi e la complessità dell'amministrazione della sicurezza e della conformità.
I fornitori di sicurezza e gli integratori di sistemi possono estendere la propria offerta incorporando l'esperienza e le migliori pratiche maturate con la piattaforma McAfee ePO per proporre soluzioni differenziate.
Solo McAfee ePO offre:
Visibilità end-to-end — Ottieni una visione unificata del tuo livello di sicurezza. Dashboard semplici da utilizzare e personalizzabili forniscono informazioni sulla sicurezza a livello di endpoint, dati, dispositivi mobili e reti per ottenere una visione approfondita e immediata in tempi rapidi.
Operazioni di sicurezza semplificate — Workflow più fluidi per un'efficienza comprovata. Ricerche indipendenti mostrano come il software McAfee ePO sia utile alle aziende di ogni dimensione nel semplificare le attività amministrative e di verifica e nel ridurre i costi hardware relativi alla gestione della sicurezza.
Un'architettura aperta e ampliabile — Sfrutta la tua infrastruttura IT esistente. Il software McAfee ePO collega la gestione delle soluzioni di sicurezza McAfee e di terze parti ai tuoi strumenti di gestione di LDAP, operazioni IT e configurazione.
Assicurati che le soluzioni di gestione dei rischi e della sicurezza broad-based operino insieme per ridurre le falle e la complessità della sicurezza. L'implementazione out-of-the-box e il rafforzamento delle policy personalizzabili mette in sicurezza il vostro ambiente più rapidamente e lo mantiene protetto.
Flussi di lavoro semplificati per la sicurezza e la conformità con automazione e spazi di lavoro personalizzati. L'architettura di classe enterprise di McAfee ePolicy Orchestrator (ePO) si adatta a organizzazioni di ogni dimensione, riducendo significativamente il numero di server da implementare.
Proteggi la tua azienda dalle minacce di oggi e di domani. Le informazioni sulle minacce in tempo reale consegnate dal coud, proteggono proattivamente la tua infrastruttura. API aperte facilitano la rapida adozione di innovazioni di sicurezza appena nuove categorie di minacce emergono.
Real Time for McAfee ePolicy Orchestrator
Real Time for McAfee ePO potenzia McAfee ePO velocizzando domande e azioni come mai prima d'ora e fornendo in pochi istanti lo stato della sicurezza. In tal modo gli amministratori possono prendere le decisioni in base a ciò che sta avvenendo, non in base a ciò che è già avvenuto. Real Time for McAfee ePO è una prerogativa esclusiva degli utenti delle seguenti suite McAfee per la protezione degli endpoint:
To learn more about the McAfee product listed above, please view the demonstration.
For guidance on how to use ePolicy Orchestrator, watch this Quick Tips video.
Arab National Bank, one of the largest banks in the Middle East, relies on McAfee data protection and endpoint security solutions to protect sensitive data across multiple locations and comply with financial regulations.
Bank Central Asia, a regional public bank in Indonesia, centralizes security management with McAfee ePolicy Orchestrator.
Berkshire Health Systems secures PCs, laptops, servers, and patient data with endpoint security, email security, and data protection solutions from McAfee.
This small business centralizes antivirus security management with McAfee ePolicy Orchestrator, saving time for the company's security administrator.
Leveraging the Security Connected strategy, the California Department of Corrections and Rehabilitation implemented SIEM, network IPS, data protection, and endpoint security solutions to secure its distributed IT environment over 37 locations.
CEMEX adopts a Security Connected approach to safeguard endpoint and network security and improve visibility.
Cognizant centralizes its security environment with a single-vendor solution from McAfee that unifies endpoint security and provides better security visibility across the organization.
CSS Corp., a long-time endpoint security customer, added network IPS and centralized management to further reduce security threats and improve network performance.
This Dominican Republic-based reseller of IT services relies on a portfolio of on-premises and cloud-based McAfee endpoint and data protection solutions to serve its base of SMB customers.
Deutsche Edelstahlwerke, the leading German producer of specialty stainless steel products, secures thousands of desktops while keeping production systems available with McAfee endpoint solutions.
Eagle Rock strengthens its security infrastructure with the addition of new security management and network security solutions.
Informa standardized its security with a single vendor, reducing costs and increasing protection against various types of malware.
This Mexican government agency protects endpoints and secures critical data with a range of McAfee solutions.
McAfee protects critical infrastructure in multiple locations for this large oil company in the Middle East.
This leading Australian hosted IT provider drives a growing managed services business with Security Connected.
This community bank has built a strong security foundation and continues to protect customer data from emerging threats with McAfee solutions.
McAfee security management solutions keep this San Francisco-based financial company compliant.
McAfee Application Control protects Seagate's intellectual property and complex IT environment.
The state of Alaska utilizes McAfee's product portfolio to protect data centers and networks across 16 state agencies, saving $3.8 million.
McAfee SIEM solutions help the state of Colorado meet compliance requirements and remain cost effective.
The McAfee Security Connected framework drives compliance and protects 24,000 endpoints for this consulting company.
U.K. partner Sysec gains 30% year-over-year growth by selling the complete McAfee solution portfolio.
McAfee's innovative prevent, detect, respond approach to threats secures customers' networks, systems, and data.
McAfee enables enterprises to collect, analyze, and preserve security forensic information. With a solution that includes content- and context-aware SIEM, McAfee provides alerts to security events, as well analysis on how the attacked occurred, affected users, and compromised data — so you can better understand the severity of a security breach.
The McAfee solution has two primary components: McAfee ePolicy Orchestrator (McAfee ePO) software and McAfee Enterprise Security Manager, with additional integrations to extend visibility and control across the entire security and compliance management environment.
The McAfee solution has two primary components: McAfee Firewall Enterprise and McAfee Network Security Platform. The McAfee Firewall and the IPS appliance both have add-on features that can optimize your visibility into the network. McAfee SIEM and other optional products help extend visibility and analytics to more aspects of network traffic.
To enable the secure and controlled use of social media in the workplace, McAfee recommends a layered approach, including firewall and data loss prevention (DLP) built around a solid web proxy solution. With McAfee security solutions, enterprises can address bandwidth concerns around the use of social media, encourage the productive use of time among employees, scan for malware, filter HTTPS content, and stop data leakage.
ForeScout CounterACT integrates with McAfee ePO and ESM to provide this information in realtime for both managed and unmanaged hosts.
Avecto Privilege Guard and McAfee ePolicy Orchestrator (ePO) software enable organizations worldwide to deploy secure and compliant desktops—without compromising a user's ability to perform their day to day tasks.
By leveraging the McAfee Security Innovation Alliance Accelerator Program from Accuvant, you can make your technology more compelling to McAfee customers.
The interoperability between TITUS Document Classification software and McAfee Data Loss Prevention (DLP) further reduces your risk of data loss by capturing end users’ inherent knowledge about the sensitivity of documents and making that information available to McAfee host and network-based DLP as visual classification labels and corresponding metadata.
Cyber-Ark Software solutions help reduce data breach risks, meet strict IT compliance and audit requirements, and improve security posture and operational efficiencies on corporate networks, whether on premises or in the cloud. Cyber-Ark delivers privileged password vaulting and user-access control, session recording and auditing, continuous monitoring, and forensics. Cyber-Ark solutions are integrated with McAfee® ePolicy Orchestrator® (McAfee ePO™) software, McAfee® Enterprise Security Manager, and McAfee® Vulnerability Manager.
The McAfee/Rev2 integration enables you to quickly score, classify, and combine hundreds of thousands of vulnerabilities and highlight the critical few risks.
This solution enables detection notifications and forensic analysis data to be reported within the McAfee ePolicy Orchestrator (ePO) console.
The Sipera UC-Sec appliance ensures that the VoIP/UC infrastructure and endpoints (mobile or fixed) are protected and visible to the security manager for the first time with McAfee ePO software.
Learn about the joint solution that extends AccessData’s forensic analysis technology to McAfee ePolicy Orchestrator software.
ArcSight’s market-leading log and event management solutions are now integrated with the McAfee ePolicy Orchestrator (ePO) software.
BDNA Discover acts as a comprehensive source of information for the detection of invisible devices on enterprise networks.
Through comprehensive real-time network, device, and user intelligence, Insightix BSA Visibility provides total network visibility to McAfee ePolicy Orchestrator (McAfee ePO) software, enabling effective security and risk management for all devices across your entire network.
The McAfee Security Management Platform combines and refines key aspects of security so IT staff can manage the expanding scale of enterprise security more easily than ever before.
Ulteriori informazioni su come il McAfee e Citrix XenDesktop Citrix partnership consente ai clienti di estendere la gestione della sicurezza desktop per ambienti virtuali utilizzando il software McAfee ePolicy Orchestrator.
Arxan Technologies, a leader in application security and control, has integrated their software security product, GuardIT, with McAfee ePolicy Orchestrator (McAfee ePO) software to provide security check and tampering alert information into the McAfee ePO software management console.
AirPatrol’s Wireless Policy Manager (WPM) is now integrated with McAfee ePolicy Orchestrator (McAfee ePO) software. WPM secures wireless interfaces on enterprise endpoints and empowers IT administrators to easily enforce commonsense rules on governing how employees use their wireless connectivity.
QRadar intelligently distills large amounts of information from a wide range of sources to augment incident response and compliance validation in McAfee ePolicy Orchestrator (ePO) software, McAfee’s centralized security and compliance management platform.
Catbird, a pioneer and leader in security and compliance solutions for virtual networks, has integrated its flagship product, V-Security, with network and endpoint systems technologies from McAfee to extend comprehensive security and compliance to the virtual infrastructure.
Triumfant detects and analyzes changes and unexpected conditions on endpoints to determine if those changes are problematic to the security, configuration, or performance of assets managed by McAfee ePolicy Orchestrator (ePO).
Efficacia comprovata dalle ricerche
This paper explores the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.
This data sheet explains how McAfee Rogue System Detection fully integrates with McAfee ePolicy Orchestrator to provide real-time discovery of rogue systems connected to the network to offer greater network visibility and protection.
For a technical summary on the McAfee product integration listed above, please view the product data sheet.
For a technical summary on the McAfee product listed above, please view the product data sheet.
Per un riassunto tecnico sui prodotti McAfee elencati qui sopra, vedere la scheda tecnica del prodotto.
Per un riassunto tecnico sui prodotti McAfee elencati qui sopra, vedere la scheda tecnica del prodotto.
This paper will walk you through the entire process — from soup to nuts — of evaluating, selecting, and deploying a SIEM. It offers pragmatic advice on how to get it done based on years working through this process as both consumers and vendors of SIEM technology. The process is not always painless, but we are certain it will help you avoid foundering on bad technology and inter-office politics. You owe it to yourself and your organization to ask the right questions and to get answers. It is time to slay the sacred cow of your substantial SIEM investment, and to figure out your best path forward.
Reduce risk from unauthorized applications, gain stronger endpoint control, and live to tell the tale.
Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.
In this paper, we will explore the fundamental requirements for a sound log management solution and review some examples of less than optimum product deployments. Finally, we will examine what a US federal agency should be looking for in an extensible log management strategy, and propose a workable solution for tighter integration into and support of an organization’s applicable and prospective security and compliance programs and initiatives.
Today’s faster, newer and greatly improved malicious user requires a faster, newer and greatly improved response. Smarter attackers require more intelligent countermeasures, including faster and more reliable analysis, to react to security issues.
This document describes how to configure Apache and Samba running on a Linux operating systems (OS) platform for the purpose of creating an Apache HTTP Repository for McAfee ePolicy Orchestrator. The Apache repository will allow customers to meet the requirement to have a Linux repository.
This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.
McAfee Security Management Platform brings a new level of intelligence and automation to the enterprise, effectively interlocking the various components of IT security into a single, overarching, risk-minimizing shield.
Driven by the misfortune of many, Cyber Threat Intelligence exchange and consumption is becoming more proliferated, accessible and standardized. Together with legacy security technologies like Firewall, IPS and Vulnerability Assessment tools, SIEMs have used threat intelligence initially for the most common use-case of detection and – unique for SIEM – as context during attacks. However, […]
The post Cyber Threat Management: A Perfect Fit for McAfee SIEM appeared first on McAfee.
Focus your energies on building a comprehensive security strategy and turning to experts for guidance. Panic: a sudden overwhelming fear that produces hysterical or irrational behavior and that often spreads quickly through a group. Puzzle: a thing that is difficult to understand or explain. A new year always brings with it a round of predictions. […]
We all know that 2014 has been marked by a huge uptick in high-profile data breaches in both the public and private sectors. What everyone is asking is this: How do we avoid a repeat of this situation in 2015? This is an especially important question in government. With the sensitivity of the data government […]
The post McAfee SIEM Offers Real Time Information on Data Breaches – When Minutes Count appeared first on McAfee.
McAfee recently worked with the Atlantic Council to launch a report in Washington, D.C. on how cybersecurity can help enable e-voting. The launch event, which featured a diverse panel of speakers, was illuminating and is continuing to ignite interest from the media. We’re delighted, of course, but not just because of the possibilities for e-voting. Even […]
The post How Cybersecurity Can Unlock the Potential of E-Voting: A Pivot to the Positive appeared first on McAfee.
As the largest dedicated security vendor, McAfee’s goal is to help customers and consumers feel secure in the digital world. It’s certainly not simple, and it’s challenging to keep up with the bad guys. One way to do that is to match our adversaries’ aggressive drive to innovate with our own deeper commitment to collaborate […]
The post McAfee Founds Cyber Threat Alliance With Industry Partners appeared first on McAfee.