Mcafee FOUNDSTONE ON-DEMAND DATASHEET

The Challenge
Every organization, from a small business to a global enter­prise, faces a deluge of information about threats and vulnerabilities—the sheer volume of data makes it nearly impossible to determine which threats are critical and which are less relevant. Yet while every asset, vulnerability, and threat competes for an administrator’s attention, they are not all equally important. Dealing with them in a haphazard, reactive way almost guarantees that the most critical security issues will not be given top priority.
Successful vulnerability management begins with determining which assets are the most important, identifying vulnerabili­ties on those assets, responding to breaking threats, and remediating. Without an effective, priority-based risk manage­ment system, an organization will always be at risk.
The McAfee Solution
McAfee®Foundstone®On-Demand Service is a hosted service that delivers Foundstone’s award-winning, priority-based vulnerability management solution via the McAfee Operations Center. The On-Demand Service enables organizations of any size to mitigate risk by carefully balancing asset value, vulnera­bility severity, and threat criticality. Organizations can then direct resources where they will have the greatest return, while improving the security health for the organization.
Administrators log into McAfee’s Web portal to gain access to realtime analysis of their network’s Internet-facing devices, giving them a
hacker’s view
of their network. The On-Demand Service is designed for organizations that want the market-leading, priority-based approach to vulnerability management of McAfee Foundstone Enterprise, without the associated implementation and administration costs.
How the McAfee Solution Works
Customers simply log into the McAfee Web portal at any time, from anywhere, to take control of the vulnerability management life cycle:
• Discover and prioritize assets
• Pinpoint vulnerabilities
• Proactively address critical threats
• Conduct asset-based remediation
• Measure and report compliance
The McAfee Foundstone Enterprise hardware and software that power the On-Demand Service reside in McAfee’s Operations Center, not the customer environment. McAfee security experts maintain all aspects of the On-Demand Service, eliminating the need to deploy and update the Foundstone Enterprise system.
Benefits
• Maximize scarce resources by focusing on the most critical vulnerabilities, assets, and threats that create the highest risk
• Fast, easy deployment means spending less time on security and more time driving core business value
• Always up-to-date technology ensures maximum accuracy and performance
• Intelligence alerts deliver specific, actionable information on breaking threats
• Pioneering integration of threat intelligence alerts, threat correlation, and compliance measurement
• Establish internal security standards and guidelines and verify regulatory compliance
• Lower TCO with zero deployment or maintenance costs
Features
Key features include:
• Priority-based approach to vulnerability management
Focus on the most critical vulnerabilities, assets, and
threats that present the highest risks
Effectively leverage limited financial and human
resources
Create a baseline and measure improvements against
compliance standards
Strategically protect mission-critical assets against
breaking threats
McAfee Foundstone On-Demand
Hosted, Priority-Based Vulnerability Management
www.mcafee.com
Data Sheet
Threat Compliance View enables organizations to receive up-to-the-minute alerts on breaking threats and measure compliance by threat, business unit, and platform.
Data Sheet
Page 2
McAfee Foundstone On-Demand
Hosted, Priority-Based Vulnerability Management
McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, 888.847.8766, www.mcafee.com
McAfee and Foundstone are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. The color red in connection with security is distinctive of McAfee
®
brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. © 2005 McAfee, Inc. All Rights Reserved. 1-fs-ods-001-0405
• Hacker’s view of the network
On-Demand delivers industry-leading vulnerability
management technology of all Internet-facing devices in the network
• Unmatched threat visibility
Regular, in-depth discovery and analysis of the full
spectrum of vulnerabilities and misconfigurations on Internet-facing devices, including operating systems, network devices, commercial applications, databases, wireless devices, and custom Web applications
• Unique threat compliance module
Up-to-the-minute
Threat Intelligence Alerts
from McAfee Research, enabling an immediate response to breaking events, such as worms and wide-scale attacks; pioneering risk-ranking of each threat by correlating events to asset and vulnerability information; compliance measurement capabilities
• Integrated remediation management
Closed-loop system automatically opens and assigns
tickets upon discovery of new of vulnerabilities, and automatically verifies and closes them upon remediation
• Measurement and reporting
Provides organizations with an effective means of
measuring and monitoring security risk to system and network resources with easy-to-understand metrics: FoundScore, MyFoundScore, and Risk Score. Organizations can quickly assess their security posture, benchmark business units or regions, and track the progress of implemented security policies and programs
• Lower TCO
Foundstone On-Demand Service requires no installation
of hardware or updates. Organizations immediately benefit from the unmatched performance, accuracy, and end-to-end vulnerability management expertise of McAfee
• Flexible user account system
Comprehensive hierarchical model provides organiza-
tions with the flexibility they need to efficiently manage security risk in any size of business; organize user accounts by business functions, geographic regions, technologies, or roles
System Requirements
• Web browser: IE 6.0 or later
McAfee Customer Care
For your business to thrive, your network and systems must stay secure. If it is your charter to maximize protection, mini­mize downtime, and solve security problems quickly, McAfee’s industry-leading software and hardware technical support programs are for you!
McAfee Gold Support gives you rapid access to our experi­enced and highly skilled IT security support staff around-the-clock. Along with access to McAfee’s award­winning ServicePortal, and unlimited downloading of product updates and upgrades, you receive 24/7/365 access to McAfee’s security-certified technicians via phone and chat.
McAfee Platinum Support is for customers who value personalized 24/7 proactive support from an assigned certified Technical Account Manager (TAM). Your Platinum TAM will be familiar with your McAfee deployment and support history, and will proactively contact you as needed to optimize your product performance and maximize your business uptime.
McAfee Foundstone On-Demand Service’s priority-based approach enables organizations to take control of the vulnerability management life cycle.
POLICY
1
Establish process, standards, and guidelines
INVENTORY
2
Discover all assets across the network
MEASURE
9
Measure impact of security decisions and actions
10
COMPLIANCE
Review for policy compliance
PRIORITIZE
3
Assign business value to assets
VULNERABILITIES
4
Determine vulnerabilities on assets
BLOCK
7
Stop intrusions in real-time
REMEDIATION
8
Proactively fix vulnerabilities
THREATS
5
View potential threats
RISK
6
Determine risk level
AxVxT
R =
———
C C C
Loading...