Protecting Critical Infrastructure

Provide resilience, efficient compliance measures, and instant intelligence for changing threat environments

Next Steps:


Organizations tasked with running critical infrastructure such as oil and gas, energy, water, and chemical must do so across three disparate yet interconnected zones: enterprise IT, SCADA, and Industrial Control Systems (ICS). Where gaps once existed between these zones and communication was conducted along serial connections on proprietary systems, today’s environments are more interconnected than ever, leveraging the older frameworks plus expanded communication channels across IP, wireless, and mobile, and running common operating systems and applications. This has created greater efficiencies and effectiveness in terms of overall operations and measurement, but it has also introduced risk.

Securing critical networks in the era of sophisticated cyber attacks means that multiple products must operate together without introducing complexity or impacting availability. By working with our customers and partners, we have defined four areas that are required for a successful security strategy:

  1. Situational awareness gives customers visibility into security and operations across enterprise IT, SCADA, and ICS zones.
  2. Multi-zone protection allows discovery, prevention, detection, response, audit, and management across data, network, and endpoint within enterprise IT, SCADA, and ICS zones.
  3. Native support means that McAfee customers have the broadest range of out-of-the-box support for traditional IT solutions, as well as SCADA and ICS applications and protocols for truly holistic security.
  4. Continuous compliance helps easily demonstrate adherence to multiple regulatory mandates.

McAfee solutions provide resilience, efficient compliance measures, and instant intelligence for changing threat environments, along with the power of real-time visibility and centralized management through a single platform.

Protect critical infrastructure and industrial controls

Read White Paper

Is cloud computing viable for critical infrastructure?

Watch Webcast

Best practices for safeguarding smart grids.

Watch Webcast



McAfee demonstrates, through a live video presentation, how our solutions are leveraged to protect substations within the utility industry.

In an age of ever-changing technology threats, McAfee helps protect critical infrastructure industries in all sectors with a cloud-to-endpoint security portfolio. Backed by the highest level of Global Threat Intelligence, McAfee delivers real-time visibility, the latest protections, and quick proof of compliance, plus optimized solutions for proprietary SCADA systems.


Endpoint Protection

McAfee Embedded Control
McAfee Embedded Control

McAfee Embedded Control focuses on solving the problem of increased security risk arising from the adoption of commercial operating systems in embedded systems. Embedded Control is a small-footprint, low-overhead, application-independent solution that provides “deploy-and-forget” security.

Risk & Compliance

McAfee Integrity Control
McAfee Integrity Control

McAfee Integrity Control combines industry-leading whitelisting and change control technology, ensuring that only trusted applications run on fixed-function devices, such as point-of-service (POS) systems, ATMs, and kiosks.

McAfee Vulnerability Manager
McAfee Vulnerability Manager

McAfee Vulnerability Manager finds and prioritizes vulnerabilities and policy violations on your network. It balances asset criticality with vulnerability severity, enabling you to focus protection on your most important assets.

Database Security

McAfee Database Activity Monitoring
McAfee Database Activity Monitoring

Boost your overall database security with reliable, real-time protection against external and internal threats across physical, virtual, and cloud environments. McAfee's activity monitoring sensors require no costly hardware or changes to your existing system architecture, giving you an easy-to-deploy, highly scalable database security solution. The sensors immediately detect any kind of unauthorized or malicious behavior and terminate it without significant impact to overall system performance. McAfee Database Activity Monitoring greatly simplifies your database security management and helps ensure compliance with PCI DSS, SOX, HIPAA/HITECH, SAS 70, and many other types of regulations.

Data Protection

McAfee DLP Monitor
McAfee DLP Monitor

McAfee DLP Monitor enables you to find, track, and protect sensitive information from any application or location, in any format, over any protocol or port, over time. Unrivaled data analytics support easy, accurate policy creation and rapid, flexible response.

Network Security

McAfee Next Generation Firewall
McAfee Next Generation Firewall

McAfee Next Generation Firewall (NGFW) secures enterprises against the most advanced attacks with highly-available, scalable, and flexible cutting-edge protections, all supported by Security Connected, the industry’s broadest and most sophisticated anti-threat ecosystem.

McAfee Network Security Platform
McAfee Network Security Platform

McAfee Network Security Platform is the industry's most secure network intrusion prevention system (IPS). Backed by McAfee Labs, it protects customers on average 80 days ahead of the threat. It blocks attacks in real time, before they can cause damage, and protects every network-connected device. With Network Security Platform, you can automatically manage risk and enforce compliance — while improving operational efficiency and reducing IT efforts.

Security Management

McAfee ePolicy Orchestrator (ePO)
McAfee ePolicy Orchestrator (ePO)

McAfee ePolicy Orchestrator (ePO) is a key component of the McAfee Security Management Platform, and the only enterprise-class software, to provide unified management of endpoint, network, and data security. With end-to-end visibility and powerful automations that slash incident response times, McAfee ePO software dramatically strengthens protection and drives down the cost and complexity of managing risk and security.


McAfee Enterprise Security Manager
McAfee Enterprise Security Manager

McAfee Enterprise Security Manager provides the speed and rich context required to identify critical threats, respond quickly, and easily address compliance requirements. Continuous global threat and enterprise risk feeds deliver adaptive and autonomous risk management, allowing remediation of threats and compliance reporting in minutes instead of hours.

McAfee Enterprise Log Manager
McAfee Enterprise Log Manager

McAfee Enterprise Log Manager automates log management and analysis for all log types, including Windows Event logs, Database logs, Application logs, and Syslogs. Logs are signed and validated, ensuring authenticity and integrity — a necessity for regulatory compliance and forensics. Out-of-the-box compliance rule sets and reports make it simple to prove your organization is in compliance with regulations and internal policies.

McAfee Advanced Correlation Engine
McAfee Advanced Correlation Engine

McAfee Advanced Correlation Engine monitors real-time data, allowing you to simultaneously use both rule-based and rule-less correlation engines to detect risks and threats before they occur. You can deploy Advanced Correlation Engine in either real-time or historical modes.

McAfee Application Data Monitor
McAfee Application Data Monitor

McAfee Application Data Monitor decodes an entire application session to Layer 7, providing a full analysis of everything from the underlying protocols and session integrity all the way up to the actual contents of the application (such as the text of an email or its attachments). This level of detail supports accurate analysis of real application use, while also enabling you to enforce application use policies and detect malicious, covert traffic.

McAfee Database Event Monitor for SIEM
McAfee Database Event Monitor for SIEM

McAfee Database Event Monitor for SIEM delivers non-intrusive, detailed security logging of database transactions by monitoring access to database configurations and data. It not only consolidates database activity into a central audit repository, but integrates with McAfee Enterprise Security Manager to intelligently analyze and detect suspicious activity.


Critical Infrastructure Security Assessment

Foundstone’s expert team of consultants identify weaknesses in your security posture and develop actionable recommendations to mitigate the risks your environment faces from external attackers, insider threats, automated worms, and network management errors.

SCADA Emergency Incident Response

A security breach has been identified on your network, and the compromise could result in disruption of service, instability of control systems, or even loss of human lives. How can you reduce these risks by being prepared?



Seriously Powerful Solutions: Security Connected for Critical Infrastructure

The Security Connected framework from McAfee integrates multiple products, services, and partnerships to provide centralized, efficient, and effective risk mitigation. Across IT, SCADA, and ICS, Security Connected addresses endpoint, data, and network security.

Focus on 5: DoD Critical Infrastructure Requirements

McAfee has a tremendous amount of experience securing critical infrastructure and working with the DoD. McAfee solutions protect endpoint, network, and data throughout the IT and ICS zones, including SCADA, and deliver a more resilient security posture.

Security Connected for Public Sector: Situation Under Control

Through its optimized, connected security architecture and global threat intelligence, learn how McAfee delivers security that addresses the needs of the military, civilian government organizations, critical sectors, and systems integrators.


Critical Infrastructure Readiness Report: Holding the Line Against Cyberthreats

Technology and security professionals in North America and Europe profess a great deal of confidence in their cyberdefenses despite the current spate of high-profile breaches worldwide, according to a new survey made possible by the Aspen Institute Homeland Security Program and Intel Security.

Technology Security Assessment for Capabilities and Applicability in Energy Sector Industrial Control Systems

Pacific Northwest National Laboratory and McAfee will continue to challenge the cybersecurity threat landscape by diligently assessing the applicability, value, and effectiveness of the security solutions necessary to support the national security mission to secure critical energy resources.

In the Dark — Crucial Industries Confront Cyberattacks

Learn about protecting critical infrastructures — power, oil, and water industrial control systems — and the security gaps that still remain.

Solution Briefs

Protect Critical Infrastructure

Securing critical infrastructure requires protecting multiple zones, including enterprise IT, SCADA, and industrial control systems (ICS), to meet compliance regulations and ensure continuous system availability. The Security Connected framework from McAfee enables you to establish a robust security posture with integrated solutions that protect endpoint, network, and data across IT, SCADA, and ICS — without impacting system availability.

EO 13636: Improving Critical Infrastructure Cybersecurity

This solution brief describes the core Executive Order activities, progress to date, and McAfee contributions toward the success of this initiative. It should help affected entities — owners and operators of critical infrastructure — participate in the process, drive positive incentives rather than punitive regulations, and show innovation in securing these crucial systems.

Technology Blueprints

Protect Your Databases

The McAfee approach to database security monitors database activity and changes, offers protected auditing tools, enables virtual patching to avoid database downtime, and provides compliance and regulatory templates.

Achieve Situational Awareness

The McAfee solution has two primary components: McAfee ePolicy Orchestrator (McAfee ePO) software and McAfee Enterprise Security Manager, with additional integrations to extend visibility and control across the entire security and compliance management environment.

Deliver Continuous Compliance

McAfee interconnects components to allow you to define compliance benchmarks and audit for compliance, detect and prevent compliance drift, manage the workflow associated with audit remediation, and provide central management and reporting for the entire solution.

White Papers

Strategies to Mitigate Targeted Cyber Intrusions McAfee Capabilities

Strategies to mitigate targeted cyber institutions are mapped to McAfee capabilities — addressing the Top 35 Mitigation Strategies from the Australian Defence Signals Directorate (DSD).

Factory of the Future

This paper discusses, in a question-and-answer format, insights shared by Vice President and Chief Security and Privacy Officer (CSPO) Malcolm Harkins and team members at Intel Corporation and Intel Security on the process of reshaping security for its fabrication plant infrastructure.

Smart Grid Deployment Requires a New End-to-End Security Approach

Cyber security is a growing concern and a key success factor for smart grid deployment. Alstom Grid, Intel, and McAfee have teamed up to move on smart grid opportunities in a secure and effective way.

The 7 Deadly Threats to 4G: A 4G LTE Security Roadmap & Reference Design

This paper provides a detailed review of seven threats that take on unique profiles within 4G networks. It also offers a security reference architecture to efficiently counter these threats with minimal cost or service disruption.

Global Energy Cyberattacks: “Night Dragon”

This white paper examines the Night Dragon attacks, a series of coordinated covert and targeted cyberattacks that are being conducted against global oil, energy, and petrochemical companies. These attacks involve social engineering, spearphishing attacks, exploitation of Microsoft Windows operating systems vulnerabilities, Microsoft Active Directory compromises, and the use of remote administration tools (RATs) in targeting and harvesting sensitive competitive proprietary operations information. In this paper, McAfee analyzes the techniques used in these continuing attacks and identifies features to assist companies with detection and investigation.

Threats and Risks