McAfee Real Time Command

McAfee Real Time Command

Revolutionizing security management with instant visibility and response

Next Steps:

Overview

McAfee Real Time Command revolutionizes security and systems management with immediate visibility into data and instant interventions. This powerful solution lets customers use plain English to find facts quickly and exert control over their IT environment with confidence. From stalking targeted malware and forbidden applications to large-scale remediation of noncompliance, McAfee Real Time Command empowers administrators to manage incident response, outbreaks, patching issues, security policies, and software compliance proactively.

Instant answers — Reduces audit and data collection bottlenecks and increases the number of events responders can handle.

Instant actions — Cuts costly incident remediation and software distribution timelines from days and hours to minutes and seconds.

Plain English — Uses a simple natural language interface to ask questions with no scripting or special expertise required. This enables administrators and auditors to ask complex questions without being a security expert.

Enterprise ready — Includes features critical to security and scalability: FIPS-ready cryptography, rigorous management rights, large-scale support for administrators and managed assets.

Simple peer-to-peer infrastructure — Uses a single server to expedite time-sensitive processes across globally distributed networks and large organizations.

Protect your devices today for tomorrow's threats

View Infographic

Features & Benefits

Get instant answers

Query every computer in your enterprise and get the answers back within seconds to reduce data collection and audit bottlenecks and increase the number of events to which administrators can respond.

Save time

Act fast and reduce costly incident remediation and software distribution timelines from days and hours to minutes and seconds.

Manage security using plain English

Use a natural language interface to pose queries, permitting prompt data access for everyone, from novice administrators to auditors.

Deploy an enterprise-ready solution

Leverage features critical to security and large-scale operations: FIPS 140-2 certified cryptography for message authentication and scalability to support hundreds of administrators and hundreds of thousands of managed assets.

Simplify processes with a client-to-client infrastructure

Install a single server and accelerate time-sensitive processes across your entire enterprise, regardless of its size or number of locations.

System Requirements

Platform Support

  • Server O/S: 64-bit
    • Windows Server 2008 with SP2 Standard, Enterprise, or Datacenter
    • Windows Server 2008 R2 Standard, Enterprise, or Datacenter
    • Windows Server 2008 for Small Business Premium
    • Windows Server 2003 with SP2 Standard, Enterprise, or Datacenter
  • Browser
    • Firefox 3.5
    • Firefox 3.6
    • Internet Explorer 7.0
    • Internet Explorer 8.0
  • Network Support
    • IPv4
    • IPv6
  • Virtual Server
    • VMware ESX 3.5.x Update 4
    • VMware ESX 4.0 Update 1
    • Citrix XenServer 5.5 Update 2
    • Windows Server 2008 R2 Hyper-V
    • VMware ESX 5.1
  • Database (32-bit and 64-bit)
    • SQL Server 2008 with SP1/SP2/R2 Standard, Enterprise, Workgroup, Express
    • SQL Server 2005 with SP3 Standard, Enterprise, Workgroup, Express

Additional Requirements

  • 1.5 GB free disk space (2 GB recommended)
  • 1 GB RAM (2-4 GB recommended)
  • Intel Premium 4 Processor or later, 1.3 GHz or faster
  • Monitor: 1024x768, 256 color, VGA
  • NIC: 100 MB or higher
  • File System: NTFS recommended
  • Dedicated server recommended if managing more than 250 systems
  • IP Address: McAfee recommends using a static IP address

Related Products

Real Time for McAfee ePolicy Orchestrator
Enhancing McAfee ePO to enable faster questions and actions than ever before possible, Real Time for McAfee ePO helps administrators make security decisions based on "what is" versus "what was" by getting security status in moments. Real Time for McAfee ePO is an entitlement exclusively for users of the following McAfee endpoint security suites:

Resources

Data Sheets

Intel Solid State Drive Management with McAfee Real Time Command

McAfee Real Time Command revolutionizes security systems management with immediate visibility into system data and prompt interventions. Using McAfee Real Time Command and the Intel SSD Pro dynamic link library (DLL), IT professionals can more effectively track the health of Intel SSD Pro 1500 Series Opal-compliant drives and take proactive measures to reduce customer downtime.

McAfee Real Time Command

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Real Time Command — Executive Summary

For a technical summary on the McAfee product listed above, please view the product data sheet.

Real Time for McAfee ePolicy Orchestrator

For a technical summary on the McAfee product listed above, please view the product data sheet.

Reports

Tolly Test Report – Leveraging Peer Communications to Deliver Rapid Response to Security Threats in Large, Distributed Environments

Tolly evaluated McAfee Real Time Command and verified its capability to rapidly gather endpoint management data and provide a unified management platform for problem mitigation, in a McAfee commissioned test. Tests showed that McAfee Real Time Command can quickly collect data — 95% of 500 stations were collected in as little as 9 seconds — and effectively manage problem mitigation.

Five Hundred Endpoints in Five Seconds – Tolly Test Report Summary

Tolly Group confirms McAfee Real Time Command performance

Solution Briefs

Rapid Incident Response with McAfee Real Time Command

McAfee Real Time Command provides the precision necessary for rapid incident response to defuse risky situations, without requiring substantial knowledge of systems software or deep forensics training. Security administrators can now collect information and take action assuredly and quickly—in seconds.

Security Awareness with McAfee Real Time Command

McAfee Real Time Command provides instant visibility into the security posture and activities of hosts throughout your network. Using the simplicity of plain English, your administrators can query hosts for the current state of their security and then take action and set automated tasks to reduce risk, improve compliance, and protect against data loss.

Systems Management with McAfee Real Time Command

McAfee Real Time Command provides fast data access and automated tools to help you improve and maintain your security and compliance posture.

McAfee Real Time Command

McAfee Real Time Command is a security management platform that allows for the retrieval and distribution of information on large enterprise networks, built around a peer-to-peer architecture designed to expedite those processes.

White Papers

Improving Security Management with Real-Time Queries

As threats become more stealthy and persistent, understanding organizational security posture at all times and reacting quickly to potential attacks becomes paramount. In this report SANS reviews McAfee Real Time products, exploring several use cases with a focus on features and ease of use.

McAfee Real Time Command

McAfee Real Time Command is a systems management platform that allows the retrieval and distribution of information on large enterprise networks, built around a peer-to-peer architecture designed to expedite those processes.

McAfee Real Time Command – Technical Paper

This technical white paper is intended for administrators of McAfee Real Time Command and process reviewers within organizations installing McAfee Real Time Command, and describes the components, communication pathways, security architecture, and functionality of the system.

SANS Institute: Correlating Event Data for Vulnerability Detection & Remediation

Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.

Threats and Risks