SANTA CLARA, Calif.—Feb. 12, 2013 – McAfee is raising the bar on intelligent threat identification, time to respond and robust, unified security management with the latest updates to its security management solutions delivering on its recently announced security connected vision. McAfee Real Time for ePolicy Orchestrator software is the first security management system that lets businesses instantly find information about any computer, deploy products or update configurations in a matter of seconds.
Additionally, McAfee Enterprise Security Manager is now actively connected to the McAfee ePolicy Orchestrator (McAfee ePO) platform, McAfee Vulnerability Manager, and the McAfee Network Security Platform - automatically initiating endpoint and network security policy changes based on its powerful correlation capability. Together, these solutions set a new industry standard for time to respond, situational awareness and operational efficiency.
“We are always looking for ways to improve our security defenses,” said Ben Shackelford, IT security manager at Cobham North America. “McAfee’s security connected approach bridges operational silos and strengthens management. We are excited to take advantage of the latest innovations on this front in order to improve our security visibility and shorten our response time. We rely on McAfee ePolicy Orchestrator and McAfee Enterprise Security Manager to manage security operations and security monitoring, and now Real Time for ePO combined with active integration with SIEM, we can do an even better job.”
Security Management Solutions: • McAfee Real Time for ePO adds real-time security investigation capabilities to McAfee ePolicy Orchestrator software, the leading security management platform. McAfee Real Time for ePO lets security administrators query thousands of assets across their enterprise in seconds, enabling them to make security decisions based on “what is” versus “what was.” This ground-breaking technology, coupled with the real-time asset discovery of McAfee Asset Manager, dramatically increases situational awareness and reduces exposure, risk, and cost of security. The McAfee ePO platform provides the most complete, scalable security management solution. It now moves even farther ahead of alternative security operations management systems that take hours or days to collect endpoint data and then days to remediate at-risk systems. • McAfee Enterprise Security Manager now provides active integration with ePolicy Orchestrator software, McAfee Network Security Platform and McAfee Vulnerability Manager. McAfee Enterprise Security Manager is the only SIEM that is smart and fast at the same time – providing real-time actionable security intelligence. With this release, SIEM moves from passive monitoring to an automated incident response platform by leveraging its powerful correlation engine to identify threats and respond immediately – automatically sending policy commands to McAfee software and integrated partner solutions. “As attacks grow more complex, our customers require simpler, faster and more effective methods to manage security,” said Ken Levine, senior vice president and general manager of Security Management at McAfee. “With this release, endpoint, network and security management are brought together in a highly integrated, intelligently connected system. McAfee is the only security provider that can deliver this based on the depth and breadth of our solution offering, combined with the security management power of McAfee ePO software and McAfee Enterprise Security Manager.”
Availability For more information on McAfee Security Management visit http://www.mcafee.com/us/solutions/security-management-platform/security-management-platform.aspx
About McAfee McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com ### Note: McAfee and ePolicy Orchestrator are trademarks or registered trademarks of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.
Media Contact: Sabine Leroy Spectrum Communications +61 2 9469 5700 email@example.com
Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator
Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint
Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.
Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation
CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)