Content

Architecture

About McAfee

Today McAfee offers much more than anti-virus. Our portfolio includes blended threat protection, controls for content, device, and network access, data loss prevention, encryption, vulnerability management, and enablers for governance, risk, and compliance. These solutions come in a range of integrated McAfee® Total Protection suites, interlocking products, and services hosted in the cloud.

Our distinctive combination of security leadership, rich technologies, and centralized management allows us to build the most creative solutions for the complex requirements of security and compliance. We can tailor these solutions for any size business and extend them to protect at home.

For example, McAfee technology helps keep more than 80,000 e-commerce websites secure by scanning each customer's external-facing infrastructure—network perimeter and web applications—for vulnerabilities on a daily basis. This service combines our global threat research with deep knowledge of system, application, and network designs. We take full advantage of the cloud to both test the site and enable management of remediation and reporting processes.

More than just safeguarding the site, this service helps automate and document ongoing maintenance of the security controls required for PCI DSS compliance. Many clients also use the McAfee SECURE trustmark to assure online shoppers that transactions are safe.

McAfee Secure for Web Sites logo

The McAfee Web Security Service is just one instance of the way our relentless research and development turns into effective, efficient protections. It's one reason the most demanding analysts and evaluators consistently recognize McAfee solutions as leading the market.

Powerful results

McAfee helps secure 60 million business users, 70 million mobile devices, tens of millions of Internet users, and 75 million consumers. Our balanced approach relies on optimized processes, automation, and integrated solutions that interlock system, network, and cloud-based defenses.We protect your business from every angle with intelligent security.

Recent examples of McAfee innovations that help you secure more, with less effort:

McAfee Innovation Timeline

Intelligent Security—Managing Risk the McAfee Way

McAfee tackles tough security challenges with protection engineered from the ground up to reduce the costs and complexity of effective security and compliance. Instead of a patchwork of standalone defenses that may leave gaping holes in your security coverage, we provide suites, hosted services, and individual controls that use centralized management to improve response time and productivity.

Integrated data for integrated responses

In our approach, system, network, and cloud technologies share intelligence to improve your visibility and help you resolve events efficiently.

For example, when Microsoft announces a new patch or McAfee researchers flag a new threat, our security advisory services notify customers immediately. Integrated dashboards present data correlated from different sources, such as threats, vulnerabilities, asset values, and countermeasures in place. You can quickly navigate this information to gauge the relevance of a new vulnerability or the urgency of an alert, make accurate assessments of risk, and take appropriate action. Your personal dashboard will help you monitor progress in a single, consolidated view.

Integrations also help you define policy-based enforcement responses in advance, such as automatic blocking of access to the network or transparent encryption of a sensitive email. The controls interlock to save time and prevent costly mistakes. That’s why today more than 22,000 customers—including more than 52 percent of Fortune 500 companies—rely on McAfee network security.

McAfee and its partners help you secure your business from every angle with interlocking protections:

Chart: how ePolicy Orchestrator support customer initiatives
Integrated management and reporting

Beyond the security value, your organization will benefit from the operational efficiencies accruing from McAfee policy and process integration. More than 35,000 companies globally, including four out of the five largest organizations, depend on McAfee ePolicy Orchestrator to manage nearly 60 million PCs and servers. Our centralized management platform works with solutions from McAfee and our partners to bring together information and processes. ePO is the industry’s only single-agent single-console management system to manage endpoints, data, the network, and risk and compliance across both physical and virtual environments.

McAfee ePO unifies the information you need to help you understand your risks, define and document the right policies, and proactively configure and maintain your security systems. It provides a hub between McAfee and partner products that efficiently harvests and correlates data to make it actionable.

Where we use agents, you need only one installation on a host to maintain protections. When regulations or security policies change, you make just a few edits, and then automatically implement updates to all affected systems. It is simple, fast, and consistent.

For further savings, McAfee brings together data, tasks, and flexibility to lighten the burden of reporting.

  • Compliance reports? Use customizable templates maintained by our experts.
  • Executive reports? Define a graphical view that presents just the right information for the situation.
  • Monthly reports? Schedule an automated task and let the system generate and mail each edition.
  • Need to send data to a help desk or information management system? Products from McAfee and McAfee Security Innovation Alliance partners connect to your other infrastructure through open management interfaces and support for industry standards.

The result is optimized security and compliance: automated and actionable systems that help you make more rapid and effective decisions while you reduce your costs.

Your savings may be significant. According to research by InsightExpress, a typical large ePO customer cuts the costs of security operations by 62 percent4.

Non-stop McAfee Avert Labs research from the cloud

A crucial piece of intelligent security is non-stop vigilance. But who can keep up when cybercrime is 24/7/365?

We can. Our pioneering “security-in-a-cloud” technologies use collective threat intelligence to monitor and analyze threats in real time, nonstop. Data feeds from more than 125 million points around the Internet give us foresight into emerging threats. By analyzing hundreds of billions of messages and millions of URLs per month, we develop highly accurate reputation and behavioral threat assessments that reduce your exposure. We can protect your systems before signatures are available and warn users before they visit a seemingly innocent website that harbors dangerous content.

McAfee Avert Labs uses tools, experience, and the insight of a community around the world to keep you protected against evolving threats:

Chart on how McAfee Avert Labs keeps you protected

Unlike niche vendors, McAfee researchers take a multi-disciplinary view of security, with teams proficient inmalware, potentially unwanted programs, host and network intrusions, network behavioral analysis, web reputation, virtualization, mobile malware, and ethical vulnerability disclosure. The non-stop collaboration at Avert Labs helps you secure your business with real-time protection, automated updates, and enhanced products, as well as free education through the McAfee threat center.

Sustainable compliance

With McAfee, compliance with regulations and governance policies does not derail IT plans and staff. Instead of diverting security budgets to fund reactive compliance projects, McAfee customers get protection and compliance integrated in one sustainable system: two for one.

Integrated governance, risk, and compliance processes

The integration of data, access, and vulnerability controls is central to our product design, but we also help you with the larger landscape of governance, risk, and compliance (GRC) processes. McAfee GRC solutions help you unify your system and network security controls and activities under a single set of policies and processes. We make it easier to both improve the effectiveness of controls and gain operational efficiencies.

Our GRC solutions apply the ISO and COBIT risk management frameworks to improve risk programs and translate paper policies into workable, industry-standard processes. McAfee products simplify policy assessment, vulnerability management, remediation, and reporting to yield sustainable compliance.

Constant content updates

As regulations change, our experts update control content and reporting templates that you can download over the Internet. As your business needs evolve, you can build on our materials or easily import industry content to update policies and maintain compliance despite shifting guidance. As you adopt hosted services, change business partners, and adjust staffing, look to our automated controls to enforce policies so you can avoid regulatory violations, such as the loss or theft of confidential customer data or intellectual property.

For those of you who want to make compliance someone else's problem, we do what we can. Our online assessment and range of certification services make it simple to detect violations and prove compliance, including the ongoing quarterly reporting of PCI.

Take The Next Step

Investigate the McAfee portfolio of system, network, and cloud-based protections:

  • Integrated Suites—McAfee Total Protection suites provide convenient combinations of protections with hosted service options.
  • Award-winning support—Our global team of over 1,000 support professionals and 200 threat researchers are available around the world and around the clock providing services to 250,000 corporate customers and 25 million consumers.
  • Services and Education—McAfee and its partners can help you get the most effective protection with the highest operational efficiency. These experts provide business and technical assessments, strategy, planning, implementation, hands-on training, and optimization services worldwide.
  • McAfee Technology PartnersMcAfee Security Innovation Alliance (SIA) and McAfee Global SecurityAlliance™ partners integrate with McAfee products such as ePO and Endpoint Encryption.  Through these integrations, you can do much more, much more easily. Partners work with McAfee to deploy third party security agents, bridge security monitoring with countermeasure response and compliance auditing, improve data protection, and provide smart hooks into vast log management databases for root cause investigation.

    We do more than just publish a software development kit (SDK). Our partners are screened for leadership and innovation in their respective market segments. We provide developer support for their integrations and then test the results in our labs to make sure they meet our compatibility and quality standards. With dozens of vendors in various stages of integration, McAfee is fast becoming the security industry’s premier technology partner.

We do more than just publish a software development kit (SDK). Our partners are screened for leadership and innovation in their respective market segments. We provide developer support for their integrations and then test the results in our labs to make sure they meet our compatibility and quality standards. With dozens of vendors in various stages of integration, McAfee is fast becoming the security industry’s premier technology partner.

 

McAfee Compatible logo

 

 

1 June 2008 Ponemon Survey.
2 McAfee Avert Labs.
3 2008 CSI Computer Crime and Security Survey.
4 Source: InsightExpress research into ePO customer experiences, June 2007.