Cabinet Office is driving a series of programmes with a view to making government ICT more streamlined, more cost effective, and less complex.
One of these programmes is End User Device Strategy: Security Framework and Controls (EUD Security Framework). EUD Security Framework represents a simple set of guidelines for the security architecture for devices that will connect to government services. At its highest level, EUD Security Framework is about the use of transparent and open industry, standards, along with a good deal of common sense.
At a strategic and tactical level, McAfee assists customers in achieving these standards and guidelines with its portfolio of products and implementation methodology included in the Security Connected platform.
Computer Emergency Response Team (CERT) organizations perform critical incident analysis and handling and information dissemination in support of government, law enforcement, critical infrastructure, and other public sector customers. McAfee understands this mission and offers a number of products and services that enable the core missions of international CERT groups.
Solera Networks, a platform for network security analytics, provides full context to any security event identified by the McAfee Network Security Platform.
McAfee understands cybercrime investigation and offers a number of products and services to enable law enforcement investigators.
McAfee delivers comprehensive network intrusion prevention to protect the Army's network.
The interoperability between TITUS Document Classification software and McAfee Data Loss Prevention (DLP) further reduces your risk of data loss by capturing end users’ inherent knowledge about the sensitivity of documents and making that information available to McAfee host and network-based DLP as visual classification labels and corresponding metadata.
Through its optimized, connected security architecture and global threat intelligence, learn how McAfee delivers security that addresses the needs of the military, civilian government organizations, critical sectors, and systems integrators.
Learn about the three frameworks required for intelligence-driven response to be effective — decision, detection, and analysis.
Learn about the three cyber-readiness solution requirements: continuous asset intelligence, risk assessment across IT and operational assets, and integration with computerized decision support systems.
Continuous monitoring is a network lifestyle for greater resilience. It requires a shift in mindset, from reaction and documentation to proactive, data-centric, risk-based action.
The most menacing type of cyberattack is invisible. Using sophisticated techniques to hide its presence, a stealth attack may operate outside of the OS or move dynamically across endpoints to conceal the attackers’ actions. The risk to enterprises is real, with high-profile attacks such as Operation High Roller impacting companies around the globe. Traditional antivirus or intrusion prevention systems are no match for this new breed of attack; instead, enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
There are several solutions for protecting information that offer the added benefit of reducing costs and complexity.
There are a number of scenarios that can spawn from insiders, but information theft is squarely the primary issue.
The data center operations team is being tasked with responsibilities from building solutions for continuous compliance and virtualization to consolidation and leveraging the cloud.
For efficient vulnerability assessment, it is necessary to step beyond point products and disparate tools and integrate vulnerability assessment into a broader enterprise workflow. An ideal solution combines the following capabilities into a cohesive framework: asset discovery and management, comprehensive vulnerability scanning, flexible reporting, and remediation workflows into a single vulnerability assessment solution.
To attain situational awareness, your organization must break down technical walls that keep teams and critical data separated. You must allow the decision makers managing your risk to see not only your internal infrastructure as a whole, but see beyond your perimeter to external actors, external dependencies, and all associated threats.
The McAfee solution has two primary components: McAfee Firewall Enterprise and McAfee Network Security Platform. The McAfee Firewall and the IPS appliance both have add-on features that can optimize your visibility into the network. McAfee SIEM and other optional products help extend visibility and analytics to more aspects of network traffic.
The McAfee approach to database security monitors database activity and changes, offers protected auditing tools, enables virtual patching to avoid database downtime, and provides compliance and regulatory templates.
File servers hold sensitive data and require security controls that guard against data-stealing malware and unauthorized system changes. McAfee protects file servers with a solution that includes antimalware and antivirus protection, change monitoring and enforcement, dynamic whitelisting, network intrusion protection, and data loss prevention.
Avecto is a leader in Windows privilege management, helping organizations to deploy secure and compliant desktops, laptops, and servers. Avecto’s mission is to enable customers to lower operating costs and improve system security through the removal of user admin rights. By removing admin rights with Avecto’s award winning Privilege Guard technology, organizations empower all Windows-based users with the permissions they require to perform their roles, without compromising the integrity and security of their systems. Customers with up to 400,000 end users have chosen Avecto Privilege Guard to help them strengthen security across their Windows-based environments.
TITUS® is a leading provider of security and compliance software that helps organizations share information securely while meeting policy and compliance requirements. TITUS solutions raise awareness and meet regulatory compliance by visually alerting end users to the sensitivity of information. Products include TITUS Classification, a leading message, document, and file classification and labeling solution; TITUS Aware, products that enhance data loss prevention by detecting sensitive information at the desktop; and the TITUS family of security solutions for Microsoft SharePoint. TITUS solutions are deployed to more than 1.5 million users within more than 300 military, government, and enterprise customers worldwide.
TITUS email and document classification complements McAfee Data Loss Prevention (DLP). The integration between TITUS products and McAfee DLP further reduces an organization’s risk of data loss. It does this by capturing end users' inherent knowledge about the sensitivity of documents and making that information available to McAfee host- and network-based DLP in the form of metadata for more accurate decisions and reduced false positives.
McAfee Endpoint Encryption delivers powerful data encryption integrated with centralized management that helps prevent unauthorized access and loss or theft of sensitive data. Endpoint Encryption software enables data protection anytime, anywhere with full disk, file, folder, and removable media encryption solutions.
McAfee Cloud Identity Manager enforces corporate standards for cloud application access and improves productivity for IT and end users by relieving password reset requests.
McAfee Application Control software provides an effective way to block unauthorized applications and code on servers, corporate desktops, and fixed-function devices. This centrally managed whitelisting solution uses a dynamic trust model and innovative security features that thwart advanced persistent threats — without requiring signature updates or labor-intensive list management.
McAfee Deep Defender helps stop advanced stealth attacks with the industry's first hardware-assisted security enabled by McAfee DeepSAFE technology. Unlike traditional security solutions, Deep Defender operates beyond the operating system to provide real-time kernel monitoring to reveal and remove advanced, hidden attacks.
McAfee Host Intrusion Prevention for Desktop helps keep your business safe and productive by monitoring and blocking unwanted activity with a comprehensive three-part threat defense — signature analysis, behavioral analysis, and system firewall — all easily managed from one central console, the McAfee ePolicy Orchestrator (ePO) platform.
McAfee VirusScan Enterprise combines anti-virus, anti-spyware, firewall, and intrusion prevention technologies to stop and remove malicious software. It also extends coverage to new security risks and reduces the cost of responding to outbreaks with the industry’s lowest impact on system performance.
McAfee VirusScan Enterprise for Linux offers superior, continuous protection against the growing number of viruses, worms, and malicious code that target Linux systems. Designed for today’s fast-moving businesses, VirusScan Enterprise for Linux scales easily, updates automatically, and can be managed centrally from a single console, the McAfee ePolicy Orchestrator (ePO) platform.
McAfee VirusScan for Mac detects and removes viruses and other malware threats that target Mac OS X. It automatically scans files and emails, and makes security management seamless through the McAfee ePolicy Orchestrator (ePO) platform, an integrated management console that manages all your endpoints, including both Macs and PCs.
McAfee Network Security Platform is a uniquely intelligent security solution that discovers and blocks sophisticated threats in the network. Using advanced threat detection techniques, it defends against stealthy attacks with extreme accuracy at speeds of up to 80 Gbps, while providing rich contextual data about users, devices, and applications for fast, accurate responses to network-borne attacks.
McAfee Change Control blocks unauthorized changes to critical system files, directories, and configurations. Additionally, Change Control delivers enterprise-wide detection of authorized changes as they occur, and streamlines regulatory compliance.
McAfee Policy Auditor automates data gathering and assessment processes required for internal and external system-level IT audits and IT security certification.
McAfee Enterprise Log Manager automates log management and analysis for all log types, including Windows Event logs, Database logs, Application logs, and Syslogs. Logs are signed and validated, ensuring authenticity and integrity — a necessity for regulatory compliance and forensics. Out-of-the-box compliance rule sets and reports make it simple to prove your organization is in compliance with regulations and internal policies.
McAfee Enterprise Security Manager provides the speed and rich context required to identify critical threats, respond quickly, and easily address compliance requirements. Continuous global threat and enterprise risk feeds deliver adaptive and autonomous risk management, allowing remediation of threats and compliance reporting in minutes instead of hours.
McAfee Event Receiver collects third-party events and logs — and performs native network flow collection — faster and more reliably than any other solution.
McAfee ePolicy Orchestrator (ePO) is a key component of the McAfee Security Management Platform, and the only enterprise-class software, to provide unified management of endpoint, network, and data security. With end-to-end visibility and powerful automations that slash incident response times, McAfee ePO software dramatically strengthens protection and drives down the cost and complexity of managing risk and security.
McAfee Foundstone guides enterprises of all sizes on the best ways to maintain a strong security posture. Our teams of security experts assess network vulnerabilities, evaluate gaps in information security programs, offer strategies that meet compliance goals, and even help develop programs to prepare for security emergencies. McAfee Foundstone’s range of strategic and technical consulting services ensures businesses learn where they are at risk and build effective solutions to remediate security vulnerabilities.