Protect the Data Center

Stronger security for today's dynamic data centers

Data centers are the operational backbone of your organization, storing sensitive data and providing business-critical services. But what makes data centers so essential to your business also makes them a prime target for threats.

Until now, protecting data centers has typically required implementing numerous, complex point controls that are expensive and don’t work together. The Security Connected approach from McAfee recognizes the need for data center initiatives to leverage cost-effective security that is agile enough to defend against new threats and targeted attacks, support virtualized and cloud services, and generate frequent reports to demonstrate compliance — all while minimizing downtime.

In this solution guide, McAfee outlines the framework for implementing data center security that ensures business agility, allows streamlined security management, promotes data center availability and integrity, and optimizes protection with efficient solutions that minimize operational costs. Through this approach, McAfee can help companies securely adapt to the changing face of data centers, as consolidation, virtualization, and cloud platforms become more widespread.

Download the Solution Guide

Technology Blueprints
thumbnail image

Assess Your Vulnerabilities
McAfee integrates data and processes to make vulnerability management more effective and efficient. Our approach combines asset discovery and management, comprehensive vulnerability scanning, flexible reporting, and remediation workflows into a single vulnerability assessment solution.
Topics: Reference Architecture

thumbnail image

Defending Against Denial-of-Service Attacks
The McAfee solution is multifaceted, integrated, and built on the real-time sharing of information.
Topics: Reference Architecture

thumbnail image

Enforcing Endpoint Compliance
Address the challenge of supporting unmanaged endpoints such as smartphones, tablets, and employee-owned laptops. McAfee helps enterprises implement a network access architecture that can effectively handle both managed and unmanaged clients, rogue devices, and various user privileges — enforcing endpoint policies across all devices to ensure compliance.
Topics: Reference Architecture

thumbnail image

Fighting Rootkits
McAfee fights rootkits by using real-time memory and CPU protection, protecting against known and unknown attacks, and getting beneath the operating system.
Topics: Endpoint Protection, Reference Architecture

thumbnail image

Look Inside Network Traffic
The McAfee solution has two primary components: McAfee Firewall Enterprise and McAfee Network Security Platform. The McAfee Firewall and the IPS appliance both have add-on features that can optimize your visibility into the network. McAfee SIEM and other optional products help extend visibility and analytics to more aspects of network traffic.
Topics: Network Security, Reference Architecture

thumbnail image

Protect AIX and *NIX Servers
The McAfee solution includes McAfee VirusScan Enterprise, McAfee Application Control, McAfee Change Control, and McAfee Policy Auditor. Each control can be implemented standalone and thus allows an easy entry with minimal dependencies.
Topics: Reference Architecture

thumbnail image

Protect Your Databases
The McAfee approach to database security monitors database activity and changes, offers protected auditing tools, enables virtual patching to avoid database downtime, and provides compliance and regulatory templates.
Topics: Reference Architecture

thumbnail image

Protect Your File Servers
File servers hold sensitive data and require security controls that guard against data-stealing malware and unauthorized system changes. McAfee protects file servers with a solution that includes antimalware and antivirus protection, change monitoring and enforcement, dynamic whitelisting, network intrusion protection, and data loss prevention.
Topics: Reference Architecture

thumbnail image

Protect Your Virtual Servers
McAfee helps optimize your virtual server security environment while achieving the same level of security that you demand in traditional server environments. We have reduced the antimalware resource footprint and increased the virtual server density, returning valuable server resources to the operating system.
Topics: Reference Architecture

thumbnail image

Protecting Application Servers
McAfee safeguards mission-critical application servers with a security solution that protects against malware, vulnerabilities, and exploits; enforces change management processes; prevents the installation of unauthorized applications; and manages compliance.
Topics: Reference Architecture

thumbnail image

Protecting Email Servers
McAfee products provide a multi-layered email security solution managed by a single console for the visibility and control needed to effectively protect against emerging email threats.
Topics: Reference Architecture

thumbnail image

Protecting the Network Perimeter
McAfee protects the network perimeter with a solution that integrates firewall and network intrusion prevention. It effectively inspects inbound traffic at the network edge; leverages real-time file and network connection reputation data from McAfee Global Threat Intelligence; enforces policies; implements comprehensive antivirus, antispam, and encryption technologies; and inspects for emerging malware, zero-day attacks, botnets, denial-of-service attempts, and advanced targeted attacks.
Topics: Reference Architecture

thumbnail image

Protecting VoIP/SIP Servers
Improperly secured VoIP and SIP servers can compromise your voice network. Address the security implications of rolling out a VoIP infrastructure with a McAfee solution that guards against denial-of-service attacks, remediates SIP vulnerabilities, secures VoIP servers, blocks malware, safeguards against eavesdropping, and keeps your network up and running.
Topics: Reference Architecture

thumbnail image

Protecting Web Servers
McAfee solutions will help you understand your web server infrastructure and protect each web server against the vulnerabilities, attacks, and threat agents that could disrupt it.
Topics: Reference Architecture

thumbnail image

Secure DHCP Servers
The McAfee solution provides real-time protection against attacks on your DHCP servers through multiple levels of protection. McAfee VirusScan Enterprise, McAfee Application Control, and McAfee Change Control are deployed directly on the DHCP servers. In addition, McAfee Policy Auditor can be used to perform regularly scheduled security audits to ensure that security policies applied to the DHCP servers are always being enforced. McAfee ePolicy Orchestrator (McAfee ePO) connects all of these elements into a single management environment, so you can view status and monitor events within one console.
Topics: Network Security, Reference Architecture

thumbnail image

Secure Your DNS Servers
The McAfee solution provides real-time protection against attacks on your DNS Servers through deployment of McAfee VirusScan Enterprise, McAfee Application Control, and McAfee Change Control on your DNS Servers. In addition, McAfee Policy Auditor can perform regularly scheduled security audits to ensure that security policies applied to the DNS Servers are always being enforced.
Topics: Reference Architecture

thumbnail image

Securing Cloud-Based Communications
Explore and embrace new options for using the cloud. McAfee technologies secure cloud-based communications with a risk-based approach that helps businesses to safely use web and email channels, protect against data leakage and intellectual property loss, and reduce support and audit costs.
Topics: Reference Architecture

thumbnail image

Securing LDAP and AD Servers
The McAfee products work in concert to proactively mitigate the risks to your domain controllers from malicious and unauthorized code execution, out-of-band configuration changes, and software updates that expose security holes.
Topics: Reference Architecture

thumbnail image

Securing Legacy Systems
With the McAfee solution, you can get the full value out of legacy OS machines while keeping them secure. The whitelisting approach uses less overhead, because it eliminates scanning and updating. The memory protection eliminates exploits on unpatchable machines. Change Control prevents corruption for any part of the system to assure uptime.
Topics: Reference Architecture

Top 10 security topics for executives

Read Brochure
How to Buy