McAfee epolicy Orchestrator

Similar documents
Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

McAfee Endpoint Threat Defense and Response Family

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

GDPR: An Opportunity to Transform Your Security Operations

McAfee Public Cloud Server Security Suite

Sustainable Security Operations

SIEM Solutions from McAfee

Securing Your Microsoft Azure Virtual Networks

McAfee Database Security Insights

SIEM: Five Requirements that Solve the Bigger Business Issues

McAfee Application Control/ McAfee Change Control Administration

Comprehensive Database Security

Securing Your Amazon Web Services Virtual Networks

IBM Internet Security Systems Proventia Management SiteProtector

Symantec Security Monitoring Services

ForeScout ControlFabric TM Architecture

The McAfee MOVE Platform and Virtual Desktop Infrastructure

Total Protection for Compliance: Unified IT Policy Auditing

Defend Against the Unknown

McAfee Embedded Control

McAfee Skyhigh Security Cloud for Amazon Web Services

McAfee Advanced Threat Defense

McAfee Cloud Workload Security Product Guide

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

McAfee Skyhigh Security Cloud for Citrix ShareFile

Securing the Software-Defined Data Center

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security

Building Resilience in a Digital Enterprise

Seven Steps to Ease the Pain of Managing a SOC

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

McAfee Total Protection for Data Loss Prevention

McAfee Virtual Network Security Platform

Global Manufacturer MAUSER Realizes Dream of Interconnected, Adaptive Security a Reality

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Petroleum Refiner Overhauls Security Infrastructure

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

Best Practices in Securing a Multicloud World

SYMANTEC DATA CENTER SECURITY

McAfee Host Intrusion Prevention Administration Course

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

McAfee MVISION Cloud. Data Security for the Cloud Era

MITIGATE CYBER ATTACK RISK

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

Power, Patch, and Endpoint Managers Expand McAfee epolicy Orchestrator Platform Capabilities While Cutting Costs

Infoblox as Part of the Ecosystem

IT-Security Symposium in Stuttgart. Workshop McAfee Device-to-Cloud, Erweiterte Endpunktsicherheit für Microsoft Umgebungen

Expand Virtualization. Maintain Security.

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

McAfee Security Management Center

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

Services solutions for Managed Service Providers (MSPs)

McAfee Endpoint Security

Industrial Defender ASM. for Automation Systems Management

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

the SWIFT Customer Security

Tenable for McAfee epolicy Orchestrator

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

CloudSOC and Security.cloud for Microsoft Office 365

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

Tenable for McAfee epolicy Orchestrator

McAfee Embedded Control for Retail

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

The threat landscape is constantly

Cisco Cloud Application Centric Infrastructure

How to Secure Your Cloud with...a Cloud?

Aligning Agency Cybersecurity Practices with the Cybersecurity Framework

Decoding security frameworks for effective cyber defense. David Allott McAfee

McAfee Embedded Control for Healthcare

Sandboxing and the SOC

Security by Default: Enabling Transformation Through Cyber Resilience

Carbon Black PCI Compliance Mapping Checklist

McAfee Embedded Control

CA Security Management

McAfee MVISION Mobile epo Extension Product Guide

McAfee VirusScan and McAfee epolicy Orchestrator Administration Course

Public University Automates Security to Mitigate Risk

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

I D C T E C H N O L O G Y S P O T L I G H T. V i r t u a l and Cloud D a t a Center Management

Imperva Incapsula Website Security

Cisco Connected Factory Accelerator Bundles

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator)

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

AKAMAI CLOUD SECURITY SOLUTIONS

Xerox and Cisco Identity Services Engine (ISE) White Paper

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Understanding the McAfee Endpoint Security 10 Threat Prevention Module

DATA SHEET RSA NETWITNESS ENDPOINT DETECT UNKNOWN THREATS. REDUCE DWELL TIME. ACCELERATE RESPONSE.

RSA NetWitness Suite Respond in Minutes, Not Months

McAfee Endpoint Security for Servers Product Guide

Traditional Security Solutions Have Reached Their Limit

Automating the Top 20 CIS Critical Security Controls

CyberArk Privileged Threat Analytics

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Transcription:

McAfee epolicy Orchestrator Centrally get, visualize, share, and act on security insights Security management requires cumbersome juggling between tools and data. This puts the adversary at an advantage by offering more time to exploit the gap not seen between the tools and do damage. In addition, the cybersecurity workforce is limited and needs to be empowered to manage cybersecurity complexity. The McAfee epolicy Orchestrator ( ) management platform removes the time-consuming and potential human error effort and inspires those responsible to manage security quicker and with higher efficacy. Fundamental Security Start with the fundamentals. Core to any security architecture is the ability to monitor and control the health of endpoints and systems. Industry standards such as Center for Internet Security (CIS) Controls and National Institute of Standards Technology (NIST) SP 800 153 security and privacy controls call this out as a must. The console allows you to gain critical visibility and set and automatically enforce policies to ensure a healthy security posture across your enterprise. Policy management and enforcement across security products for your entire enterprise is accomplished from a single console, removing the complexity of managing multiple products. This essential security is fundamental to your IT security compliance. Proven Advanced Security Management More than 30,000 businesses and organizations trust the console to manage security, streamline and automate compliance processes, and increase overall visibility across endpoint, network, and security operations. Big companies rely on the console s highly scalable architecture, allowing large enterprises to manage hundreds and thousands of nodes from a single console. The console provides an enterprise security administrator with the opportunity to simplify policy maintenance, pull in thirdparty threat intelligence leveraging Data Exchange Layer (), and integrate policies bi-directionally with an array of products. These operational efficiencies cut down process and data-sharing overhead, allowing a faster, more precise response. Connect With Us 1 McAfee epolicy Orchestrator

Efficiency Conquers Sprawl ESG research shows that 40% of organizations use 10 to 25 tools, while 30% use 26 to 50 tools to manage billions of new threats and devices. This diversity of product use creates complexity and multiplies the operational payoff of a unified management experience from installation through reporting. McAfee embraces these requirements with a Together is power approach to security management that allows you to consolidate the sprawl while protecting the breadth of your assets, supporting threat intelligence, managing open source data, and integrating third-party products. McAfee provides centralized command and control for compliance and management across a range of security products. You can quickly pivot across products to find the critical data and take the necessary policy action. The console also allows you to invest in next-generation technologies and integrate them with existing assets within a single framework. A Sample List of Products Managed by McAfee Products McAfee Endpoint Protection (Threat Prevention, Firewall, Web Control) McAfee Drive Encryption McAfee File and Removable Media Protection McAfee Active Response McAfee Management for Optimized Virtual Environments (McAfee MOVE) McAfee Data Loss Prevention (McAfee DLP) McAfee Policy Auditor McAfee Enterprise Security Manager McAfee Threat Intelligence Exchange McAfee Application Control McAfee Cloud Workload Security McAfee Advanced Threat Defense McAfee Content Security Reporter McAfee Database Activity Monitoring Third-Party Products Guidance Software: encase Enterprise Avecto: Privilege Guard AccessData: AccesData Enterprise Autonomic Software: Power Manager, Patch Manager Xerox MFP 2 McAfee epolicy Orchestrator

Use Case Examples: How the Console Creates Centralized Management of Security Products Product and Technology Sample Centralized Management Use Case Benefit McAfee Endpoint Security McAfee Endpoint Security discovers a known malicious file on an endpoint. The console sets a stricter policy on the endpoint to quarantine it. This is done in one common management interface. Quick containment of a bad endpoint McAfee DLP McAfee Enterprise Security Manager McAfee Enterprise Security Manager detects significant data exfiltration on an endpoint and tags it in the console. The console applies data loss protection policies to block the data and advise the user that this is not in compliance. Automatic data loss policy enforcement Integration Examples Product and Technology Integrated Use Case Benefit McAfee Endpoint Security Cisco Identity Service Engine (ISE) Cisco PxGrid McAfee Endpoint Security flags a suspicious host. The McAfee epo console can trigger additional scans. This is communicated to Cisco ISE via PxGrid and the exchange (the McAfee epo console). Cisco ISE can isolate the host until it is deemed acceptable. Increased proactive protection Avecto Defendpoint McAfee Threat Intelligence Exchange Rapid7 Nexpose Check Point NGTX Check Point NGTP McAfee Active Response McAfee Enterprise Security Manager Deploy and manage the industry-leading, privilege management solution, Avecto Defendpoint, from. Avecto Defendpoint configuration changes are informed by McAfee Threat Intelligence Exchange application reputation data. shares assets list to Nexpose. This enables you to gain an understanding of risk posture from your console and allows you to set policy accordingly. Vulnerability data is shared with the community of vendors. This integration facilitates bi-directional and real-time intelligence sharing between the network and endpoints. Events are shared with the community. Reduction in complexity No additional infrastructure, lowering TCO Privilege access changes based on threat intelligence Reduce complexity Gain a comprehensive and reliable posture and prioritize actions to minimize risk from one dashboard Decrease time to detect Block and remediate attacks 3 McAfee epolicy Orchestrator

Organizations with integrated platforms are better protected and achieve faster response times than their counterparts without integrated platforms. Integrated Organizations Not Integrated Organizations Suffered less than five breaches last year 78% 55% Discovered threats in eight hours 80% 54% 2016 Penn Schoen Berland Extensible Workflows Streamline Processes The database provides flexible, automated management capabilities so you can rapidly identify, manage, and respond to vulnerabilities, changes in security postures. and known threats from single console. You define how the console should direct alerts and security responses based on the type and criticality of security events for your environment and your policies and tools. To support development operations and security operations, the platform allows you to create automated workflows between your security and IT operations systems to quickly remediate issues. Use the console to trigger remediation actions by your IT operations systems, like assigning stricter policies. Leveraging its web application programming interfaces (APIs) reduces manual effort. Common Use Cases Save time and eliminate redundant and labor-intensive efforts by scheduling security compliance reports to meet the needs of each stakeholder. Easily integrate the console into your existing business processes and functions by leveraging its robust set of APIs to gain more insight and accelerate workflows (for example, integrate with ticketing systems, web applications, or self-service portals). Maintain your security posture by deploying agent and security solutions as new machines are added to your corporate network by syncing the console with Active Directory. The most powerful endpoint management platform on the market today, McAfee epolicy Orchestrator, this product is the underlying management tool for all of the company s security products, and it offers the power and flexibility that enterprise buyers desire. The security capabilities are broad and tightly integrated through a common policy engine and intelligence stream. Forrester Wave: Endpoint Security Suites 2016 4 McAfee epolicy Orchestrator

Rapid Mitigation and Remediation The platform has built-in, advanced capabilities to increase the efficiency of the security operations staff when they mitigate a threat or make a change to restore compliance. Automatic Response can trigger an action based on an event that occurs. Actions can be simple notifications or approved remediation. Scalable/ Enterprise Grade Centralized Security Management Workflow Automation Common Use Cases for Automatic Response Notifying administrators of new threats, failed updates, or high-priority errors via email or SMS based on predetermined thresholds Applying policies based on client or threat events, such as a policy to prevent external communications when a host may be compromised (this would deny command and control activities) or blocking data exfiltration/outbound transfer until the administrator resets the policy Tagging systems and running additional tasks for remediation, such as on-demand memory scans when threats are detected Triggering registered executables to run external scripts and server commands, like generating a ticket in the service desk or integrating into other business processes Automatically quarantining the endpoint with more restricted policies Security Partner Ecosystem APIs for Integration McAfee epolicy Orchestrator Centralized Deployment Figure 1. Centralized security management using the console. Dashboards and Compliance Reporting 5 McAfee epolicy Orchestrator

Secure Across Your Organization with the Console Centrally manage security Distinctive single console for centralized management and visibility into up to hundreds of thousands of nodes across the enterprise Open framework for broad security management of systems secure by McAfee and third-party solutions Extensible platform integrates with and leverages your existing IT infrastructure to reduce operational friction Accelerate response times with confidence Comprehensive views and insight to proactively address internal and external security issues Swift centralized deployment of security updates and definitions to ensure that endpoints are protected from the latest threats Accelerated response times through actionable dashboards and advanced query and reporting capabilities Reduce complexity and streamline processes Ability to get up and running quickly with guided configuration, automated policy management work streams, and predefined dashboards Tag-based policy assignment to precisely target application of predefined security profiles to individual or groups of systems based on their business roles or risk status Task catalog and automated management capabilities to streamline administrative processes and reduce overhead Single agent to manage multiple endpoint products reduces your risk of endpoint conflicts Scale for enterprise deployments Enterprise-class architecture to support managing hundreds of thousands of devices with a single server Supported and proven within complex, heterogeneous IT environments Enterprise reporting, which aggregates a comprehensive view of your security posture and compliance software stands out compared to other solutions. It is a one-stop shop for our endpoint protection. I can see everything I need to see for all of our McAfee products from one pane of glass. Its easy-to-use dashboards and built-in functionality make everything visibility, reporting, deployment, updating, maintenance, decision making so much easier. Christopher Sacharok, Information Security Engineer, Computer Sciences Corporation 2821 Mission College Blvd. Santa Clara, CA 95054 888.847.8766 www.mcafee.com McAfee and the McAfee logo, epolicy Orchestrator, and are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. Copyright 2017 McAfee, LLC. 3718_0118 JANUARY 2018 6 McAfee epolicy Orchestrator