Analytics
2/12/2013
01:01 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

McAfee Launches New Security Management Products, Including McAfee Real-Time For ePO And Security Connected SIEM

Enhancements reinforce McAfee Security Connected platform with Integrated Management and Intelligent Solutions

SANTA CLARA, Calif.--McAfee is raising the bar on intelligent threat identification, time to respond and robust, unified security management with the latest updates to its security management solutions delivering on its recently announced security connected vision. McAfee Real Time for ePolicy Orchestrator software is the first security management system that lets businesses instantly find information about any computer, deploy products or update configurations in a matter of seconds.

Additionally, McAfee Enterprise Security Manager is now actively connected to the McAfee ePolicy Orchestrator (McAfee ePO) platform, McAfee Vulnerability Manager, and the McAfee Network Security Platform - automatically initiating endpoint and network security policy changes based on its powerful correlation capability. Together, these solutions set a new industry standard for time to respond, situational awareness and operational efficiency.

"We are always looking for ways to improve our security defenses," said Ben Shackelford, IT security manager at Cobham North America. "McAfee's security connected approach bridges operational silos and strengthens management. We are excited to take advantage of the latest innovations on this front in order to improve our security visibility and shorten our response time. We rely on McAfee ePolicy Orchestrator and McAfee Enterprise Security Manager to manage security operations and security monitoring, and now Real Time for ePO combined with active integration with SIEM, we can do an even better job."

Security Management Solutions:

McAfee Real Time for ePO adds real-time security investigation capabilities to McAfee ePolicy Orchestrator software, the leading security management platform. McAfee Real Time for ePO lets security administrators query thousands of assets across their enterprise in seconds, enabling them to make security decisions based on "what is" versus "what was." This ground-breaking technology dramatically increases situational awareness and reduces exposure, risk, and cost of security. The McAfee ePO platform provides the most complete, scalable security management solution. It now moves even farther ahead of alternative security operations management systems that take hours or days to collect endpoint data and then days to remediate at-risk systems.

McAfee Enterprise Security Manager now provides active integration with ePolicy Orchestrator software, McAfee Network Security Platform and McAfee Vulnerability Manager. McAfee Enterprise Security Manager is the only SIEM that is smart and fast at the same time – providing real-time actionable security intelligence. With this release, SIEM moves from passive monitoring to an automated incident response platform by leveraging its powerful correlation engine to identify threats and respond immediately – automatically sending policy commands to McAfee software and integrated partner solutions.

"As attacks grow more complex, our customers require simpler, faster and more effective methods to manage security," said Ken Levine, senior vice president and general manager of Security Management at McAfee. "With this release, endpoint, network and security management are brought together in a highly integrated, intelligently connected system. McAfee is the only security provider that can deliver this based on the depth and breadth of our solution offering, combined with the security management power of McAfee ePO software and McAfee Enterprise Security Manager."

Availability

For more information on McAfee Security Management visit http://www.mcafee.com/us/solutions/security-management-platform/security-management-platform.aspx

About McAfee

McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3154
Published: 2014-04-17
DistUpgrade/DistUpgradeViewKDE.py in Update Manager before 1:0.87.31.1, 1:0.134.x before 1:0.134.11.1, 1:0.142.x before 1:0.142.23.1, 1:0.150.x before 1:0.150.5.1, and 1:0.152.x before 1:0.152.25.5 does not properly create temporary files, which allows local users to obtain the XAUTHORITY file conte...

CVE-2013-2143
Published: 2014-04-17
The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.

CVE-2014-0036
Published: 2014-04-17
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.

CVE-2014-0054
Published: 2014-04-17
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External ...

CVE-2014-0071
Published: 2014-04-17
PackStack in Red Hat OpenStack 4.0 does not enforce the default security groups when deployed to Neutron, which allows remote attackers to bypass intended access restrictions and make unauthorized connections.

Best of the Web