Feeds:
Posts
Comments

Posts Tagged ‘McAfee’

For those who was not able to attend to the E-SPIN McAfee Device Control Technical Overview training,

please refer to the attached video above.

Enjoy it and stay tune for more video from us.

For further information, please contact us or visit to our website on http://www.e-spincorp.com

Advertisements

Read Full Post »

For those who was not able to attend to the E-SPIN McAfee Data Loss Prevention Technical Overview training,

please refer to the attached video above.

Enjoy it and stay tune.

For further information, please contact us or visit to our website on http://www.e-spincorp.com

Read Full Post »

For those who was not able to attend to the E-SPIN McAfee Data Loss Prevention (DLP) Product Overview training,

please refer to the attached video above.

Enjoy it and stay tune.

For further information, please contact us or visit to our website on http://www.e-spincorp.com

Read Full Post »

A proactive approach to SIEM

As the old adage goes “the best defense is a strong offense”, McAfee Risk Advisor seeks to replicate that through a proactive approach to risk management. With the goal to reduce the grab in the dark approach organizations take to procuring and deploying security measures, Risk Advisor pinpoints critical assets which require immediate attention. Leveraging McAfee Lab’s ability to gather threat data from millions of collection points, it is kept up to date with thread analysis and any potential remedies.

Risk Advisor has an inbuilt scoring system which quantifies an organization’s risk mitigation efforts. It uses the vulnerability and threat status, criticality of an asset, and any pre-existing countermeasures to generate a current risk score. This allows managers to look at what effect their risk mitigation efforts has had on their asset.

MRA2

Risk Advisor is designed to work out of box with a multitude of other McAfee products such as McAfee’s Virus Scanner, Host Intrusion Prevention, Vulnerability Manager, Policy Auditor and Network Security Manager to provide countermeasure information across various functions. It has even been integrated into non-McAfee products such as SAP BusinessObjects to extend its risk analysis to business decisions.

MRA1

Read Full Post »

Giving you a better picture of your Data

It was Ronald Reagan who said “Information is the oxygen of the modern age” and although it was at a time where virtual data was incomparable to what it is now – it has only become more evident how true those words were. In 2010 Verizon’s Data Breach Investigation reported an astounding 92% of all records comprised stemmed from database breaches (which comprised the majority of breaches at 25%), a marginal increase from the 2009’s 75%.

Organizations store data ranging from customer records (credit card numbers, billing information), employe records (salary, PII) and finances (revenue, assets, proprietary data). All of which is highly damaging if in the wrong hands. All of this makes it a highly enticing target for malicious attacks. With the increasing complexity of databases and applications directly interacting with them leading to the people responsible having no idea where their databases are or how secure their configurations are. Another issue on the rise in recent times is the greater demand for uptime of services leads to organizations holding off on patching vulnerabilities in favor of meeting up-time goals.

dbss

McAfee’s Security Scanner (DSS) aims to alleviate the headache for database personnel by providing three key features. DSS acts as a tactical database scanner seeking out database throughout the entirety of your network ensuring a global picture is developed. A clear view into the organization’s security posture with the capabilities to thoroughly check for over 3,500 vulnerabilities, and lastly to provide actionable data to address discovered risks.

DSS’ ability to discover databases provides an unmatched ability to not only seek and discover, but to highlight areas of key critical data such as PII, in-depth information about patch status, and security compliance levels. Its reports are built upon the concept of “less is more”, providing detailed priority levels of each threat based on advice from experts in the database security audit field combined with fix scripts wherever possible.

The entirety of these features are made available through a detailed centralized database browser allowing users to concurrently view hundreds of databases saving hours of work.

Read Full Post »

« Newer Posts