McAfee ePO(McAfee ePolicy Orchestrator)는 업계에서 가장 발전된 확장 가능한 중앙 집중식 보안 관리 소프트웨어입니다. McAfee ePO는 개방형 플랫폼을 통해 보안 관리를 통합하여 모든 크기의 조직에 대해 위험과 컴플라이언스 관리를 더 간단하고 더욱 성공적으로 만듭니다. McAfee Security Management Platform의 기초인 McAfee ePO를 사용하면 업계를 선도하는 보안 솔루션을 기업 인프라에 연결하여 가시성과 효율성을 높이고 보호를 강화할 수 있습니다.
고객은 McAfee ePO의 유연한 자동화 기능을 사용하여 워크플로를 원활하게 함으로써 보안 비용 및 복잡성과 컴플라이언스 관리를 크게 줄입니다.
보안업체와 시스템 통합업체는 자신들의 전문 지식과, McAfee ePO 플랫폼과 관련한 최적의 방법을 통합하여 차별화된 솔루션을 제공함으로써 자신들의 서비스 제공 범위를 확장할 수 있습니다.
McAfee ePO만이 다음을 제공합니다.
엔드 투 엔드 가시성 — 보안 태세에 대한 통합 시각을 확보합니다. 하위 단계를 볼 수 있는 끌어서 놓기 대시보드에서는 즉각적인 이해와 더욱 신속한 응답 시간을 위해 엔드포인트, 데이터, 모바일 및 네트워크 간 보안 정보를 제공합니다.
간소화된 보안 작업 — 워크플로를 능률적으로 개선하여 입증된 효율성을 제공합니다. 독자적인 조사에 따르면 McAfee ePO 소프트웨어는 모든 규모의 기업이 관리 작업을 단순화하면서 감사 작업을 덜고 보안 관리와 관련된 하드웨어 비용을 줄이도록 지원합니다.
확장 가능한 개방형 아키텍처 — 기존 IT 인프라를 활용합니다. ePO 소프트웨어는 McAfee와 타사 보안 솔루션의 관리 모두를 LDAP, IT 운영 및 구성 관리 도구에 연결합니다.
광범위한 영역을 기반으로 하는 보안 및 위험 관리 솔루션을 함께 사용하여 보안상의 약점과 복잡성을 줄입니다. 즉각적인 단일 에이전트 배포와 사용자 지정 가능한 정책 시행은 네트워크를 신속하고 안전하게 보호하고 보호된 상태로 유지합니다.
자동화 및 맞춤화된 작업 공간으로 보안과 컴플라이언스를 단순하게 합니다. McAfee ePolicy Orchestrator(ePO)의 엔터프라이즈급 아키텍처는 모든 규모의 기업에 확장되며 배치할 서버의 수를 현저하게 줄여줍니다.
오늘의 위협뿐만 아니라 내일의 위협으로부터도 기업을 보호합니다. McAfee Labs에서 제공되는 실시간 위협 정보는 사용자의 인프라를 사전에 보호합니다. 개방형 플랫폼은 새로운 종류의 위협이 출현할 때 혁신적인 보안 기능을 더욱 신속히 채택할 수 있도록 합니다.
Real Time for McAfee ePolicy Orchestrator
Real Time for McAfee ePO는 McAfee ePO에서 더욱 빠른 질문과 대응을 지원함으로써 관리자가 현재의 보안 상태를 파악하여 과거가 아닌 현재의 정보를 바탕으로 보안 결정을 내릴 수 있도록 돕습니다. Real Time for McAfee ePO는 다음 McAfee 엔드포인트 보안 제품군 사용자만을 위한 것입니다.
To learn more about the McAfee product listed above, please view the demonstration.
For guidance on how to use ePolicy Orchestrator, watch this Quick Tips video.
Arab National Bank, one of the largest banks in the Middle East, relies on McAfee data protection and endpoint security solutions to protect sensitive data across multiple locations and comply with financial regulations.
Bank Central Asia, a regional public bank in Indonesia, centralizes security management with McAfee ePolicy Orchestrator.
Blackburn with Darwen Council, a borough in the county of Lancashire, England, uses McAfee endpoint security, email management, and SIEM solutions to build an integrated, centrally managed security architecture.
This small business centralizes antivirus security management with McAfee ePolicy Orchestrator, saving time for the company's security administrator.
Leveraging the Security Connected strategy, the California Department of Corrections and Rehabilitation implemented SIEM, network IPS, data protection, and endpoint security solutions to secure its distributed IT environment over 37 locations.
CEMEX adopts a Security Connected approach to safeguard endpoint and network security and improve visibility.
Cognizant centralizes its security environment with a single-vendor solution from McAfee that unifies endpoint security and provides better security visibility across the organization.
Deutsche Edelstahlwerke, the leading German producer of specialty stainless steel products, secures thousands of desktops while keeping production systems available with McAfee endpoint solutions.
Eagle Rock strengthens its security infrastructure with the addition of new security management and network security solutions.
This Mexican government agency protects endpoints and secures critical data with a range of McAfee solutions.
Kleberg Bank relies on Intel Security for comprehensive protection, time savings, and to support compliance.
The Mexican branch of a leading worldwide bank is at the forefront of security with McAfee Network Security Platform and McAfee Professional Services.
This leading Australian hosted IT provider drives a growing managed services business with Security Connected.
State Government Places its Trust in Intel Security for IT Consolidation Within this US state government, the Office of Technology is the central IT organization, serving almost 400 executive, judicial, and legislative agencies, which, in turn, administer programs for 4.4 million citizens. The Office of Technology oversees a network linking 1,500 locations and 35,000 users across the state.
McAfee security management solutions keep this San Francisco-based financial company compliant.
McAfee Application Control protects Seagate's intellectual property and complex IT environment.
Sicredi, one of Brazil’s largest credit union systems, consolidated their comprehensive security environment with Intel Security.
The state of Alaska utilizes McAfee's product portfolio to protect data centers and networks across 16 state agencies, saving $3.8 million.
McAfee SIEM solutions help the state of Colorado meet compliance requirements and remain cost effective.
The McAfee Security Connected framework drives compliance and protects 24,000 endpoints for this consulting company.
UAES relies on Intel Security for Comprehensive Security.
The McAfee solution has two primary components: McAfee Firewall Enterprise and McAfee Network Security Platform. The McAfee Firewall and the IPS appliance both have add-on features that can optimize your visibility into the network. McAfee SIEM and other optional products help extend visibility and analytics to more aspects of network traffic.
To enable the secure and controlled use of social media in the workplace, McAfee recommends a layered approach, including firewall and data loss prevention (DLP) built around a solid web proxy solution. With McAfee security solutions, enterprises can address bandwidth concerns around the use of social media, encourage the productive use of time among employees, scan for malware, filter HTTPS content, and stop data leakage.
위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.
This data sheet explains how McAfee Rogue System Detection fully integrates with McAfee ePolicy Orchestrator to provide real-time discovery of rogue systems connected to the network to offer greater network visibility and protection.
For a technical summary on the McAfee product integration listed above, please view the product data sheet.
For a technical summary on the McAfee product listed above, please view the product data sheet.
This white paper discusses virtual patching and how using predictive threat coverage, automated vulnerability scanning, and risk visualization is a scalable and cost-effective approach to protecting critical assets.
Reduce risk from unauthorized applications, gain stronger endpoint control, and live to tell the tale.
Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.
In this paper, we will explore the fundamental requirements for a sound log management solution and review some examples of less than optimum product deployments. Finally, we will examine what a US federal agency should be looking for in an extensible log management strategy, and propose a workable solution for tighter integration into and support of an organization’s applicable and prospective security and compliance programs and initiatives.
Today’s faster, newer and greatly improved malicious user requires a faster, newer and greatly improved response. Smarter attackers require more intelligent countermeasures, including faster and more reliable analysis, to react to security issues.
This document describes how to configure Apache and Samba running on a Linux operating systems (OS) platform for the purpose of creating an Apache HTTP Repository for McAfee ePolicy Orchestrator. The Apache repository will allow customers to meet the requirement to have a Linux repository.
This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.
McAfee Security Management Platform brings a new level of intelligence and automation to the enterprise, effectively interlocking the various components of IT security into a single, overarching, risk-minimizing shield.
This paper explores the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.
Avecto Privilege Guard and McAfee ePolicy Orchestrator (ePO) software enable organizations worldwide to deploy secure and compliant desktops—without compromising a user's ability to perform their day to day tasks.
ForeScout CounterACT integrates with McAfee ePO and ESM to provide this information in realtime for both managed and unmanaged hosts.
By leveraging the McAfee Security Innovation Alliance Accelerator Program from Accuvant, you can make your technology more compelling to McAfee customers.
Stream the latest threat data and alerts on compromised networks directly to the McAfee ePO console to block future malicious communications.
The interoperability between TITUS Document Classification software and McAfee Data Loss Prevention (DLP) further reduces your risk of data loss by capturing end users’ inherent knowledge about the sensitivity of documents and making that information available to McAfee host and network-based DLP as visual classification labels and corresponding metadata.
Cyber-Ark Software solutions help reduce data breach risks, meet strict IT compliance and audit requirements, and improve security posture and operational efficiencies on corporate networks, whether on premises or in the cloud. Cyber-Ark delivers privileged password vaulting and user-access control, session recording and auditing, continuous monitoring, and forensics. Cyber-Ark solutions are integrated with McAfee® ePolicy Orchestrator® (McAfee ePO™) software, McAfee® Enterprise Security Manager, and McAfee® Vulnerability Manager.
The McAfee/Rev2 integration enables you to quickly score, classify, and combine hundreds of thousands of vulnerabilities and highlight the critical few risks.
This solution enables detection notifications and forensic analysis data to be reported within the McAfee ePolicy Orchestrator (ePO) console.
The Sipera UC-Sec appliance ensures that the VoIP/UC infrastructure and endpoints (mobile or fixed) are protected and visible to the security manager for the first time with McAfee ePO software.
Learn about the joint solution that extends AccessData’s forensic analysis technology to McAfee ePolicy Orchestrator software.
ArcSight’s market-leading log and event management solutions are now integrated with the McAfee ePolicy Orchestrator (ePO) software.
BDNA Discover acts as a comprehensive source of information for the detection of invisible devices on enterprise networks.
Through comprehensive real-time network, device, and user intelligence, Insightix BSA Visibility provides total network visibility to McAfee ePolicy Orchestrator (McAfee ePO) software, enabling effective security and risk management for all devices across your entire network.
The McAfee Security Management Platform combines and refines key aspects of security so IT staff can manage the expanding scale of enterprise security more easily than ever before.
Arxan Technologies, a leader in application security and control, has integrated their software security product, GuardIT, with McAfee ePolicy Orchestrator (McAfee ePO) software to provide security check and tampering alert information into the McAfee ePO software management console.
HP Compliance Log Warehouse (CLW) 2.0 works seamlessly across products in the McAfee portfolio to simplify the complexity of IT operations and reporting for governance, risk, and compliance management.
Guidance Software’s EnCase Enterprise product is now integrated with McAfee ePolicy Orchestrator (ePO), allowing an organization to streamline internal digital investigations on any ePO-managed asset.
AirPatrol’s Wireless Policy Manager (WPM) is now integrated with McAfee ePolicy Orchestrator (McAfee ePO) software. WPM secures wireless interfaces on enterprise endpoints and empowers IT administrators to easily enforce commonsense rules on governing how employees use their wireless connectivity.
QRadar intelligently distills large amounts of information from a wide range of sources to augment incident response and compliance validation in McAfee ePolicy Orchestrator (ePO) software, McAfee’s centralized security and compliance management platform.
Catbird, a pioneer and leader in security and compliance solutions for virtual networks, has integrated its flagship product, V-Security, with network and endpoint systems technologies from McAfee to extend comprehensive security and compliance to the virtual infrastructure.
Triumfant detects and analyzes changes and unexpected conditions on endpoints to determine if those changes are problematic to the security, configuration, or performance of assets managed by McAfee ePolicy Orchestrator (ePO).
Examine how the McAfee ePolicy Orchestrator platform boosts security, saves time, and lowers costs with a centrally managed solution that enables immediate threat response.
Malware development continues to remain healthy. Intel Security Group’s McAfee Labs Threat Report: August 2015 shows malware’s quarterly growth at 12% for the second quarter of 2015. The overall count of known unique malware samples has reached a mesmerizing 433 million. Oddly, this confirms a very stable trend. For many years malware detection rates have […]
For the fourth year in a row, McAfee landed in the leader’s quadrant of the Magic Quadrant for Security Information and Event Management (SIEM) report, published by Gartner, Inc. The annual report, which came out in late July, evaluates vendors who offer SIEM products on both the ability to execute and completeness of vision. The […]
The post Intel Security Named a Leader in Gartner Magic Quadrant for Security Information and Event Management appeared first on McAfee.
This is the third of three parts about root of trust and the Internet of Things. In Part 1 and Part 2, I covered how root of trust is an important approach to managing risk in virtualized network—especially compliance risks. The first two posts in this series examined several reasons to consider root-of-trust technologies. In […]
This is the second of three posts about the root of trust and the Internet of Things. In my first post I wrote about the burden of technology compliance and how it may be changing as virtualization enters service provider and enterprise networks and underlies the Internet of Things (IoT). I also wrote about a […]
Regulatory compliance is an unloved cost of goods—an expense to be managed, like cafeteria subsidies or fleet fuel costs. Major regulatory gaps are opening around the Internet and Internet of Things (IoT), and especially in the plumbing under the IoT, which is rapidly evolving in a process known as network function virtualization (NFV). This future […]