데이터 센터는 조직의 운영 중심 요소이며 중요한 데이터를 저장하고 비즈니스에 중요한 서비스를 제공합니다. 하지만 데이터 센터를 비즈니스의 중요한 요소로 만든 바로 그 이유 때문에 데이터 센터가 위협의 주요 대상이 될 수도 있습니다.
일반적으로 지금까지 데이터 센터를 보호하기 위해서는 비용이 많이 들고 함께 작동하지 않는 여러 가지 복잡한 포인트 제어를 구현해야 했습니다. McAfee의 Security Connected 접근 방식은 데이터 센터 이니셔티브에 대한 요구를 인식하고 있습니다. 여기서 이러한 요구는 가동 중단을 최소화하면서, 새로운 위협과 대상 설정 공격으로부터 시스템을 보호하고, 가상화된 서비스 및 클라우드 서비스를 지원하고, 보고서를 자주 작성하여 컴플라이언스를 입증할 수 있는 충분히 민첩하고 비용 효과적인 보안을 활용하기 위한 요구입니다.
이 솔루션 안내서에서 McAfee는 비즈니스 민첩성을 보장하고, 간소화된 보안 관리를 허용하고, 데이터 센터의 가용성과 무결성을 증진하고, 운영 비용을 최소화하는 효율적인 솔루션으로 보호를 최적화하는 데이터 센터 보안 구현을 위한 프레임워크를 간략히 설명합니다. 이 접근 방식을 통해 McAfee는 통합, 가상화 및 클라우드 플랫폼이 보다 광범위하게 되면서 데이터 센터의 변화하는 특성에 맞춰 기업이 안전하게 적응하도록 지원할 수 있습니다.
McAfee integrates data and processes to make vulnerability management more effective and efficient. Our approach combines asset discovery and management, comprehensive vulnerability scanning, flexible reporting, and remediation workflows into a single vulnerability assessment solution.
The McAfee solution is multifaceted, integrated, and built on the real-time sharing of information.
Address the challenge of supporting unmanaged endpoints such as smartphones, tablets, and employee-owned laptops. McAfee helps enterprises implement a network access architecture that can effectively handle both managed and unmanaged clients, rogue devices, and various user privileges — enforcing endpoint policies across all devices to ensure compliance.
McAfee fights rootkits by using real-time memory and CPU protection, protecting against known and unknown attacks, and getting beneath the operating system.
The McAfee solution has two primary components: McAfee Firewall Enterprise and McAfee Network Security Platform. The McAfee Firewall and the IPS appliance both have add-on features that can optimize your visibility into the network. McAfee SIEM and other optional products help extend visibility and analytics to more aspects of network traffic.
The McAfee solution includes McAfee VirusScan Enterprise, McAfee Application Control, McAfee Change Control, and McAfee Policy Auditor. Each control can be implemented standalone and thus allows an easy entry with minimal dependencies.
McAfee helps optimize your virtual server security environment while achieving the same level of security that you demand in traditional server environments. We have reduced the antimalware resource footprint and increased the virtual server density, returning valuable server resources to the operating system.
McAfee safeguards mission-critical application servers with a security solution that protects against malware, vulnerabilities, and exploits; enforces change management processes; prevents the installation of unauthorized applications; and manages compliance.
The McAfee approach to database security monitors database activity and changes, offers protected auditing tools, enables virtual patching to avoid database downtime, and provides compliance and regulatory templates.
McAfee products provide a multi-layered email security solution managed by a single console for the visibility and control needed to effectively protect against emerging email threats.
File servers hold sensitive data and require security controls that guard against data-stealing malware and unauthorized system changes. McAfee protects file servers with a solution that includes antimalware and antivirus protection, change monitoring and enforcement, dynamic whitelisting, network intrusion protection, and data loss prevention.
McAfee protects the network perimeter with a solution that integrates firewall and network intrusion prevention. It effectively inspects inbound traffic at the network edge; leverages real-time file and network connection reputation data from McAfee Global Threat Intelligence; enforces policies; implements comprehensive antivirus, antispam, and encryption technologies; and inspects for emerging malware, zero-day attacks, botnets, denial-of-service attempts, and advanced targeted attacks.
Improperly secured VoIP and SIP servers can compromise your voice network. Address the security implications of rolling out a VoIP infrastructure with a McAfee solution that guards against denial-of-service attacks, remediates SIP vulnerabilities, secures VoIP servers, blocks malware, safeguards against eavesdropping, and keeps your network up and running.
McAfee solutions will help you understand your web server infrastructure and protect each web server against the vulnerabilities, attacks, and threat agents that could disrupt it.
The McAfee solution provides real-time protection against attacks on your DHCP servers through multiple levels of protection. McAfee VirusScan Enterprise, McAfee Application Control, and McAfee Change Control are deployed directly on the DHCP servers. In addition, McAfee Policy Auditor can be used to perform regularly scheduled security audits to ensure that security policies applied to the DHCP servers are always being enforced. McAfee ePolicy Orchestrator (McAfee ePO) connects all of these elements into a single management environment, so you can view status and monitor events within one console.
The McAfee solution provides real-time protection against attacks on your DNS Servers through deployment of McAfee VirusScan Enterprise, McAfee Application Control, and McAfee Change Control on your DNS Servers. In addition, McAfee Policy Auditor can perform regularly scheduled security audits to ensure that security policies applied to the DNS Servers are always being enforced.
Explore and embrace new options for using the cloud. McAfee technologies secure cloud-based communications with a risk-based approach that helps businesses to safely use web and email channels, protect against data leakage and intellectual property loss, and reduce support and audit costs.
The McAfee products work in concert to proactively mitigate the risks to your domain controllers from malicious and unauthorized code execution, out-of-band configuration changes, and software updates that expose security holes.
With the McAfee solution, you can get the full value out of legacy OS machines while keeping them secure. The whitelisting approach uses less overhead, because it eliminates scanning and updating. The memory protection eliminates exploits on unpatchable machines. Change Control prevents corruption for any part of the system to assure uptime.