Content

Securing Critical Infrastructure Assets

Keep your IT networks and SCADA systems safe and compliant with government and industry regulations

Critical industries remain a favorite target for hackers and malware. McAfee meets the challenge with resilient, integrated solutions that protect your network from endpoint to core while enabling continuous compliance with strict regulations and policies. We secure your most important data wherever it travels—from servers and desktops to portable devices to email and web applications.

With government-mandated certifications, a 24/7 Global Threat Intelligence lab, and cost-effective centralized management, McAfee is the vendor of choice for critical sectors worldwide.

Tab Navigation

Overview:

Key Benefits

  • Secure your network with efficient, effective controls—Enable and control secure remote access for employees, contractors, and the supply chain. Protect against targeted attacks, application-layer attacks, insider attacks, spam, and malware delivered through email, web, and other protocols. Verify segregation of duties, and patrol trust boundaries at network interfaces. Use network shielding to limit emergency system patching.
  • Ensure safe use of applications and Web 2.0 technologies—Apply controls, such as application-layer firewalls and whitelisting, to manage the use of sensitive applications. Restrict the use of potentially risky software, such as peer-to-peer or social networking.
  • Protect systems with multilayer coverage—Layer anti-malware, intrusion prevention, and other protection on IT systems, including portable storage, laptops, email servers, and virtualized systems. Lock down configurations of highly critical assets, including field devices, to prevent compromise through malware and access violations.
  • Safeguard critical data with advanced encryption and controls—Enforce transparent encryption of mobile devices, endpoints, and network transmissions. Prevent the loss of critical asset information and regulated data through improved data controls, including advanced discovery, monitoring, and policy-based enforcement.
  • Meet strict regulations with prescriptive frameworks—Quickly and easily follow regulations, such as those from North American Electric Reliability Corp. (NERC), with a portfolio that supports a broad range of frameworks and regulations worldwide.
  • Gain real-time visibility into your security infrastructure—Ease administrative burdens and reduce complexity, from desktops to network edge, with McAfee ePolicy Orchestrator (ePO), the web-based management console that gives you a comprehensive view of your entire security system. Real-time functionality allows you to track anomalous user, application, and system activities that could signal the presence of malware, attacks, or an insider threat, and quickly assess, prioritize, and respond to new vulnerabilities.
  • Count on 24/7 security vigilance—Rely on McAfee Labs, our 24/7 Global Threat Intelligence team, to ensure your protections remain strong and up-to-date, even as applications and environments change.

Products and Services:

Network Control Products

McAfee Firewall Enterprise (Sidewinder)—A next-generation firewall with multilayer security

McAfee Network Access Control— Protect your network from noncompliant or infected systems

McAfee Network Security Platform— Faster time to protection. Faster time to resolution. Faster time to confidence.

McAfee Network User Behavior Analysis (Securify)—Find out who’s doing what and from where on your network

Application Control Products

McAfee Application Control—Reduce risk from unauthorized applications and gain stronger endpoint control

McAfee Change Control— Enforce change policy by time window, source, or approved ticket

McAfee Change Reconciliation—Ensure change policy effectiveness with McAfee Change Reconciliation

McAfee Web Gateway (formerly Webwasher)—Proactive web security for defeating Web 2.0 threats

System Control

McAfee Total Protection for Endpoint—Strong security with lower costs and simplified compliance

Data Control Products

McAfee Encrypted USB—Secure USB storage—avoid a moving liability

McAfee Endpoint Encryption—Prevent data loss using powerful encryption and strong access control

McAfee Integrity Monitor—Real-time file integrity monitoring (FIM)

McAfee Network DLP Discover—Identify and protect sensitive data

McAfee Network DLP Monitor—Monitor the movement of your sensitive information

McAfee Network DLP Prevent—Enforce policies to protect your data-in-motion

Situational Awareness Products

McAfee Network User Behavior Analysis (Securify)—Find out who’s doing what and from where on your network

McAfee Policy Auditor—Integration + Innovation = Compliance Efficiency

McAfee Risk Advisor—Take the guesswork out of where to focus your security efforts

McAfee Vulnerability Manager—Identify risk exposures and policy violations. Prioritize resources. Reduce risk.

Services

Critical Infrastructure Security Assessment
Foundstone's team of expert consultants can help you identify weaknesses in your SCADA security posture and develop actionable recommendations to mitigate the risks your environment faces from external attackers, insider threats, automated worms, and network management errors.

SCADA Emergency Incident Response
Our 911 SCADA package provides a proactive approach to minimizing the effects of a security incident for the utility industry. If a breach occurs, the Foundstone Professional Services Emergency Incident Response (IR) Team responds immediately and helps you through the crisis.

Take the Next Step

Learn more about how McAfee solutions for critical infrastructure protection can keep your infrastructure safe, available, and compliant.