McAfee Security Management 5 available

December 2010 Products & Solutions, Information Security

Workgroup IT’s dedicated McAfee division has announced the local availability of McAfee’s Security Management 5, a unified monitoring, management and reporting system that scales to any-sized organisation and ensures all endpoints, networks and content are secure.

“Business’ security purchases today are mostly tactical, creating a patchwork of independent security products that are separately managed,” says Andrea van der Westhuizen, product manager: McAfee at Workgroup IT. “Threats are accelerating at a rate that far surpasses the existing approach to managing multiple products and layers of security independently.

“In order to effectively stay ahead of security threats, companies must be able to view all risks associated with mobile devices via a centralised view.”

McAfee Security management 5 zones in on four key areas in an attempt to address these requirements and they are:

Application enablement – new interfaces and software development kits (SDKs) provide an open platform for companies, developers and partners to integrate centralised security management into existing business processes. McAfee ePolicy Orchestrator (ePO) platform offers a Web API that enables customers and partners to integrate security operations into change and systems management frameworks.

A new version of McAfee’s Risk Advisor includes a SDK that enables rapid integration of new security countermeasures, broadening the risk profile view and reducing operational costs.

Shared intelligence – provides coordinated defences across security layers so that endpoints, networks, e-mail, Web and data layers work together to minimise or eliminate security attacks.

McAfee has integrated its Global Threat Intelligence across its broad portfolio of products, delivering a shared threat intelligence model, says Van der Westhuizen. McAfee Host Intrusion Prevention is integrated with file and network connection reputation intelligence enabling customers to identify and drop suspicious network connections.

The company has also ported its threat intelligence to the iPhone and iPad enabling IT security professionals to have real-time access to threat information wherever and whenever they need it.

Unified management – McAfee Security Management can administer the security of any device, data, network, application, or database across security implementations that range from hosted/SaaS to on-premises as well as hybrid and virtual and physical environments.

McAfee recently announced the McAfee Management for Optimised Virtualised Environments (MOVE) platform providing advanced endpoint protection for virtualised systems. The McAfee MOVE platform includes the automated ability for security management policies to follow the virtual host they are associated with regardless of where it is located and how often it is moved.

Situational awareness – allows businesses to monitor, manage and report on metrics to reduce risk, focus security efforts and investments, and reduce costs. On the SaaS Platform, McAfee provides automatic asset discovery and synchronisation through integration with Microsoft Active Directory that eliminates manual asset entry and out-of-sync security policies.

ePO also adds the ability to create Situational Policy Assignments – logical groupings of policies that security administrators can apply to assets based on business or security posture need. Furthermore, the new version of McAfee Risk Advisor includes selective threat and asset analysis to display risk profiles for sub-groups like specific departments or geographies, giving organisations the ability to increase threat detection and reduce response time.

For more information contact Andrea van der Westhuizen, Workgroup IT, +27 (0)11 654 6000, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Streamlining security operations in the financial industry
Secutel Technologies Products & Solutions
In the banking and financial industry, false alarms can lead to significant financial implications and operational disruptions for security companies. Unnecessary responses to high-risk commercial sites with valuable assets can result in costly mistakes and inefficiencies.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...
Save energy with Paxton’s Net2 Access Control
Paxton Power Management Products & Solutions
Paxton offers access control systems that can help save building energy by utilising smart features. This not only has a positive environmental impact but, importantly, helps save businesses money.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...