Content

McAfee Change Control

McAfee Change Control product shot
Enforce change policy by time window, source, or approved ticket

In many IT organizations, a gap persists between authorized and documented change, and actual change activity. McAfee Change Control bridges this gap by providing real-time visibility of changes being made, accountability to validate change activity, and technology-based enforcement of change policy to prevent unwanted or unauthorized changes.

Tab Navigation

Benefits and Features

Benefits:


  • Reduce operational costs
    By reducing the manual effort to track and account for changes made to systems, and by proactively preventing unauthorized or inappropriately applied changes, McAfee Change Control reduces outages, security breaches and compliance violations that result in additional IT costs
  • Gain visibility into changes happening across the entire IT infrastructure
    McAfee Change Control allows you to track changes, so you’ll have continuous knowledge of what is happening across the infrastructure. You can even create reports for rapid root-cause analysis.
  • Increase accountability for employees and outsourced IT providers
    Ensure changes are made according to authorized policy and process. McAfee Change Control provides automatic and accurate monitoring of actual changes, and identifies any changes made outside of policy.
  • Enforce change policy and processes
    McAfee Change Control ensures that only in-process changes are allowed by proactively blocking out-of-process and unwanted changes to systems before they occur
  • Enforce emergency change processes
    Unexpected incidents sometimes dictate the escalation of changes that have not been pre-approved, but still need to be executed. McAfee Change Control provides visibility into the emergency change activity for auditing purposes, and can enforce an emergency change process.

Features:


  • Continuous file integrity monitoring
    McAfee Change Control captures all changes to files. It allows administrators to quickly identify where policies are being challenged. Continuous monitoring captures server name, file name, time of change, change type, and change content. An intuitive search interface helps users quickly hone in on change event information.
  • Change prevention
    Change prevention capabilities within McAfee Change Control block out-of-policy changes before they occur. Protection is linked directly to policy, and changes are verified against the change source, time window, or approved change ticket. Changes that are attempted outside of policy on enabled servers are not allowed, but are logged and can be sent as alerts.
  • Rapidly configured
    McAfee Change Control is easily configurable to increase the availability of IT services, accelerate the successful implementation of Information Technology Infrastructure Library (ITIL) projects, and reduce the cost of compliance initiatives such as SOX, PCI DSS, and many others.
  • Easily integrated
    McAfee Change Control integrates with change management, data center automation, and configuration management database (CMDB) solutions from HP, BMC, IBM, and others

Description:

Critical IT systems such as financial systems and those running mission-critical IT services are usually governed by complex policies that define the proper procedure for making a change. These policies may include the proper procedure for approving changes, the correct approval authorities for different types of changes, in what time windows approved changes are to be implemented, and who/what applications are allowed to implement changes. Administrators often make changes that violate these policies without realizing the impact of their actions. Such violations can cause outages and cause material weaknesses in compliance standards, such as Sarbanes-Oxley and PCI DSS.

McAfee Change Control turns policy into reality by automatically enforcing change policies on enforcement-enabled servers. When a change attempt is made, it is first examined to see if it conforms to the defined policy, and if it does, the change is implemented on the system. If any out-of-policy change is attempted, it is blocked and a record is made of the change attempt. If blocking is not desirable, the system can also be configured to allow a change, and send out a policy alert in real-time, as well as provide detailed reporting.

 

System Requirements:

For a complete list of system requirements, see the Platform Support Matrix.