Mcafee SIEM Device Support by Vendor

Total Page:16

File Type:pdf, Size:1020Kb

Mcafee SIEM Device Support by Vendor McAfee SIEM Device Support By Vendor Vendor Device Name Device Type Supported Logs Parser Method of Collection A10 Networks Load Balancer (AX Series) Load Balancer All ASP – Syslog Adtran NetVanta Network Switches & Routers All ASP – Syslog Airdefense Airdefense Network Switches & Routers WIPS Alerts Java Parser - Syslog Airtight Interactive Airtight Interactive Applications N/A ASP – Syslog InfoExpress ALLOW, DENY, EXIT, Alcatel-Lucent Authentication / Network Switches & Routers Java Parser - Syslog UDP CyberGatekeeper LAN CGATE type only Applications / Host / Server / Operating VitalQIP All ASP Systems / Web Content / Filtering / Proxies Apache Software Applications / Host / Server / Operating Java Parser - Local files; Apache Access Logs only Foundation Systems / Web Content / Filtering / Proxies syslog UDP Applications / Host / Server / Operating Access, Error and Apache ASP - Syslog Systems / Web Content / Filtering / Proxies ModSecurity Logs Access, Error and Arbor Arbor Peakflow DoS/SP Network Switches & Routers Java Parser - Syslog UDP ModSecurity Logs Arbor Peakflow X Network Switches & Routers Network Behavior Alerts Java Parser - Syslog UDP Arbor Peakflow X Network Switches & Routers Network Behavior Alerts ASP - Syslog UDP Aruba Aruba Wireless Access Points N/A Custom Aruba Parser Barracuda SPAM Filter Barracuda Barracuda SPAM Filter Security Appliances / UTMs ASP - Syslog UDP Messages Barracuda Web Barracuda Web Filter Security Appliances / UTMs ASP - Syslog UDP Security Gateways Messages Bit9 Bit9 Parity Suite Applications All CEF Blue Coat Blue Coat SG Series Web Content / Filtering / Proxies Proxy and System Log Java Parser - Syslog TCP Blue Coat SG Series Web Content / Filtering / Proxies Access Log ASP – Syslog UDP BlueLance LT Auditor + Java Parser - SQL Server Blue Lance Applications Netware Auditing for Novell Netware database (TCP port 1433) Parser Vendor Device Name Device Type Supported Logs Method of Collection Blue Martini Application All Code Based Blue Martini BoarderGuard 5000 & Blue Ridge All ASP - Syslog UDP 6000 Series Bradford Campus Bradford NAC / Network Switches & Routers All ASP – Syslog Manager Foundry BigIron, FastIron Foundary Syslog Brocade Network Switches & Routers ASP - Syslog UDP and NetIron Messages IronView Network NAC / Network Switches & Routers All ASP – Syslog Manager CA CA Datacom Mainframe Nitro Plugin Protocol Identity & Access IAM / IDM All Nitro Plugin Protocol Management Check Point Edge W32 & Check Point Firewall N/A OPSEC WU Check Point Enterprise & Firewall N/A OPSEC Enterprise Pro Check Point Express Firewall N/A OPSEC Check Point FW-1 Firewall N/A OPSEC Limited Check Point FW1, NG, Firewall N/A OPSEC NGX Standard Check Point Smart Firewall N/A OPSEC Center Enterprise Pro Check Point IPS-1 Sensory (formerly IDS / IPS NFR Alerts Nitro Plugin Protocol Network Flight Recorder) Check Point HA VPN-1 Virtual Private Networks N/A OPSEC Check Point VPN Pro Virtual Private Networks N/A OPSEC Check Point VPN-1 Edge Virtual Private Networks N/A OPSEC Check Point VPN-1 Virtual Private Networks N/A OPSEC Express SmartEvent Firewall All OPSEC Parser Vendor Device Name Device Type Supported Logs Method of Collection Cisco CSS (Content Cisco Other N/A ASP - Syslog UDP Services Switches) Cisco SDEE Application Protocol N/A ASP - SDEE TACACS+ Authentication N/A ASP – Syslog TACPlus Authentication Tacplus messages Java Parser – Syslog UDP Cisco ASA Firewall %ASA messages Java Parser - Syslog UDP Cisco ASA Firewall ASA messages ASP – Syslog UDP Cisco EAP N/A Java Parser - Syslog UDP Cisco Firewall & Service Firewall FWSM messages Java Parser - Syslog UDP Module Cisco PIX Firewall PIX messages Java Parser - Syslog UDP Cisco PIX IDS Firewall / IDS / IPS IDS messages only Java Parser - Syslog UDP Cisco PIX and PIX IDS Firewall / IDS / IPS PIX and IDS messages ASP – Syslog UDP Cisco IOS ACL, IOS FW, Firewall / IDS / IPS / Network %SEC, %FW only, %IDS ASP - Syslog UDP IOS IDS Switches & Routers only Firewall / Network Switches & Cisco IOS Firewall %FW only Java Parser - Syslog UDP Routers Host / Server / Operating System / Cisco CSA CSA Events SQL/Text Parser IDS / IPS %(CONTROLLER|LINK|OSPF|LINEP Host / Server / Operating Systems / ROTO|DVLAN|FILESYS|IP|MGMT|SEC CATOS Java Parser - Syslog UDP Network Switches & Routers URITY|SYS|SEC|NTT|Login|FW|Parser ) Messages %(CONTROLLER|LINK|OSPF|LINEP Host / Server / Operating Systems / ROTO|DVLAN|FILESYS|IP|MGMT|SEC CATOS ASP - Syslog UDP Network Switches & Routers URITY|SYS|SEC|NTT|Login|FW|Parser ) Messages Failed/Passed/Radius Cisco ACS IDS / IPS Accounting/TACACS ASP –Syslog UDP Accounting & Administration Cisco Guard IDS / IPS N/A ASP – Syslog UDP Cisco IDS IDS / IPS IDS messages only SDEE Cisco IDSM IDS / IPS N/A SDEE Cisco IPS IDS / IPS N/A SDEE Cisco IOS IDS IDS / IPS / Network Switches & Routers %IDS only ASP - Syslog UDP IPS Alerts, DUAL, PFINIT- Cisco IOS IPS IDS / IPS / Network Switches & Routers ASP - Syslog UDP SP, HSRP Parser Vendor Device Name Device Type Supported Logs Method of Collection Cisco NAC Appliance Cisco NAC / Network Switches & Routers All ASP – Syslog (Clean Access) Cisco NAC Appliance NAC / Network Switches & Routers NAC Only Java Parser - HTTP based requests (Clean Access) NetFlow (Generic) Network Flow Collection N/A ASP - Nitro Netflow Collector Aaa, Arp, Auth, Authpriv, cert-enroll, dhcp_snoop, fs-daemon, Fspf, ftp, Fwm, Im, interface-vlan, Ip, Ipconf, IDS / IPS / Network Switches & Ipqos, Kernel, m2rib, Mail, Mfdm, Mfwd, NX-OS (Nexus) Ntp, Port, port-channel, port-resources, ASP – Syslog Routers Provision, Radius, Security, Snmpd, Sifmgr, spanning-tree, Syslog, Sysmgr, TACACS, TACACS+, Track, User, Uucp, vlan_mgr and zone Cisco IOS ACL Network Switches & Routers %SEC only Java Parser - Syslog UDP Cisco Wireless LAN Network Switches & Routers N/A ASP – Syslog Controllers Cisco MARS Security Management Incident Notification XMLs Java Parser - Email (SMTP) Cisco VPN Concentrator Virtual Private Networks VPN messages Java Parser - Syslog UDP Cisco VSM (VPN Switch Virtual Private Networks VPN messages Java Parser - Syslog UDP Blade) Java Parser - FTP Server on Cisco Content Engine Web Content / Filtering / Proxies Proxy Logs Receiver IronPort Syslog and Access Cisco IronPort Web Content / Filtering / Proxies ASP - Syslog Messages Citrix Secure Access Citrix Applications N/A ASP – Syslog Gateway Citrix NetScaler Web Content / Filtering / Proxies All ASP – Syslog Citrix NetScaler Web Web Content / Filtering / Proxies All ASP – Syslog Cluster Labs Pacemaker CRMD Applications All ASP-Syslog Cooper Power Cybectec Network Switches & Routers All ASP – Syslog Systems Yukon IMS Applications All ASP-Syslog CoreTrace CoreTrace Applications Bouncer Messages ASP – Syslog CyberGuard (includes CyberGuard Firewall FW messages Java Parser - Syslog UDP FS, SG, SL) Enterprise Password Cyber-Ark Applications All ASP – Syslog Vault Parser Vendor Device Name Device Type Supported Logs Method of Collection Dell PowerConnect Network Switches & Routers All ASP – Syslog EdgeWave iPrism Web Security Web Content / Filtering / Proxies All ASP – Syslog Vulnerability Assessment eEye eEye Retina Vulnerability Systems N/A data support eEye Retina Enterprise Vulnerability Assessment Vulnerability Systems N/A Manager data support Enterasys Dragon Java Parser - MySQL database (TCP Enterasys IDS / IPS NIDS and HIDS Messages Sensor/Squire connection) N Series Switches Network Switches & Routers All ASP – Syslog NAC NAC/Network Switches & Routers All ASP – Syslog S Series Switches Network Switches & Routers All ASP – Syslog Extreme ExtremeWare XOS NAC/Network Switches & Routers All ASP – Syslog Networks Access Policy Manager F5 NAC/Network Switches & Routers All ASP – Syslog (APM) Application Security Web Content / Filtering / Proxies N/A Nitro Plugin Protocol Manager (ASM) FirePass SSL VPN Virtual Private Network All ASP – Syslog Local Traffic Manager Web Content / Filtering / Proxies All ASP - Syslog UDP Fairwarning Privacy Fairwarning Application Security N/A Nitro Plugin Protocol Monitoring FireEye Malware FireEye Antivirus/Malware N/A CEF Parser Protection Fluke Networks AirMagnet Enterprise Network Switches & Routers All ASP – Syslog Force10 FTOS Network Routers & Switches All ASP – Syslog Networks ForeScout CounterACT NAC/Network & Switches All ASP – Syslog IPS , webfilter, spamfilter, Fortinet Fortinet Fortigate Firewall Java Parser - Syslog event, traffic type messages IPS , webfilter, spamfilter, Fortinet Fortigate Firewall ASP - Syslog event, traffic type messages Fortinet WAF Firewall All ASP – Syslog FreeRadius FreeRadius Authentication AUTH ASP – Syslog Funkwerk PacketAlarm IPS IDS / IPS IPS Alerts Java Parser - Syslog UDP GTA GNAT Firewall All ASP – Syslog Parser Vendor Device Name Device Type Supported Logs Method of Collection ssh/telnet/ftp/rsh/inetd/sendm HP HP-UX (Hewlett-Packard) Host / Server / Operating Systems Java Parser - Syslog UDP ail/syslogd/su LaserJet Printers All ASP – Syslog OpenVMS Operating Systems N/A ASP - Syslog HP ProCurve Network Switches & Routers Procurve Syslog Messages ASP - Syslog UDP Infoblox NIOS Applications All ASP – Syslog IBM Guardium Database Activity Monitoring All ASP – Syslog UDP I System Z DB2 Database N/A DBM Agent - 7.1.x, 8.x, 9.x System Z DB2 Database All Versions BSafe Agent RealSecure Network /Server ISS Real Secure Server Java Parser - SQL Server database Host / Server / Operating Systems Sensor, Proventia A/G/M Sensor (TCP port 1433) Series Applicances ssh/telnet/ftp/rsh/inetd/sendm IBM
Recommended publications
  • Cisco NAC Network Module for Integrated Services Routers
    Data Sheet Cisco NAC Network Module for Integrated Services Routers The Cisco ® NAC Network Module for Integrated Services Routers (NME-NAC-K9) brings the feature-rich Cisco NAC Appliance Server capabilities to Cisco 2800, 2900, 3800 and 3900 Series Integrated Services Routers. Cisco NAC Appliance (also known as Cisco Clean Access) is a rapidly deployable Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate, and remediate wired, wireless, and remote users and their machines prior to allowing them onto the network. Product Overview The Cisco NAC Network Module for Integrated Services Routers (NME-NAC-K9) extends the Cisco NAC Appliance portfolio of products to smaller locations, helping enable network admission control (NAC) capabilities from the headquarters to the branch office (Figure 1). The integration of NAC Appliance Server capabilities into a network module for Integrated Services Routers allows network administrators to manage a single device in the branch office for data, voice, and security requirements, reducing network complexity, IT staff training needs, equipment sparing requirements, and maintenance costs. The Cisco NAC Network Module for Integrated Services Routers deployed at the branch office remediates potential threats locally before they traverse the WAN and potentially infect the network. Figure 1. Cisco NAC Network Module for Integrated Services Routers (NME-NAC-K9) The Cisco NAC Network Module for Integrated Services Routers is an advanced network security product that: ● Recognizes users, their devices, and their roles in the network: This first step occurs at the point of authentication, before malicious code can cause damage. ● Evaluates machines to determine their compliance with security policies: Security policies can vary by user type, device type, or operating system.
    [Show full text]
  • Mcafee Epolicy Orchestrator DATA SHEET
    DATA SHEET McAfee ePolicy Orchestrator Centrally get, visualize, share, and act on security insights Security management requires cumbersome juggling between tools and data. This puts the adversary at an advantage by offering more time to exploit the gap not seen between the tools and do damage. In addition, the cybersecurity workforce is limited and needs to be empowered to manage cybersecurity complexity. The McAfee® ePolicy Orchestrator® (McAfee ePO™) management platform removes the time-consuming and potential human error effort and inspires those responsible to manage security quicker and with higher efficacy. Fundamental Security Proven Advanced Security Management Start with the fundamentals. Core to any security More than 30,000 businesses and organizations trust architecture is the ability to monitor and control the the McAfee ePO console to manage security, streamline health of endpoints and systems. Industry standards and automate compliance processes, and increase such as Center for Internet Security (CIS) Controls and overall visibility across endpoint, network, and security National Institute of Standards Technology (NIST) SP operations. Big companies rely on the McAfee ePO 800 153 security and privacy controls call this out as console’s highly scalable architecture, allowing large a must. The McAfee ePO console allows you to gain enterprises to manage hundreds and thousands of critical visibility and set and automatically enforce nodes from a single console. The McAfee ePO console policies to ensure a healthy security posture across provides an enterprise security administrator with the your enterprise. Policy management and enforcement opportunity to simplify policy maintenance, pull in third- across security products for your entire enterprise party threat intelligence leveraging Data Exchange Layer is accomplished from a single console, removing the (DXL), and integrate policies bi-directionally with an array complexity of managing multiple products.
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Q3 Consumer Endpoint Protection Jul-Sep 2020
    HOME ANTI- MALWARE PROTECTION JUL - SEP 2020 selabs.uk [email protected] @SELabsUK www.facebook.com/selabsuk blog.selabs.uk SE Labs tested a variety of anti-malware (aka ‘anti-virus’; aka ‘endpoint security’) products from a range of well-known vendors in an effort to judge which were the most effective. Each product was exposed to the same threats, which were a mixture of targeted attacks using well-established techniques and public email and web-based threats that were found to be live on the internet at the time of the test. The results indicate how effectively the products were at detecting and/or protecting against those threats in real time. 2 Home Anti-Malware Protection July - September 2020 MANAGEMENT Chief Executive Officer Simon Edwards CONTENTS Chief Operations Officer Marc Briggs Chief Human Resources Officer Magdalena Jurenko Chief Technical Officer Stefan Dumitrascu Introduction 04 TEstING TEAM Executive Summary 05 Nikki Albesa Zaynab Bawa 1. Total Accuracy Ratings 06 Thomas Bean Solandra Brewster Home Anti-Malware Protection Awards 07 Liam Fisher Gia Gorbold Joseph Pike 2. Threat Responses 08 Dave Togneri Jake Warren 3. Protection Ratings 10 Stephen Withey 4. Protection Scores 12 IT SUPPORT Danny King-Smith 5. Protection Details 13 Chris Short 6. Legitimate Software Ratings 14 PUBLICatION Sara Claridge 6.1 Interaction Ratings 15 Colin Mackleworth 6.2 Prevalence Ratings 16 Website selabs.uk Twitter @SELabsUK 6.3 Accuracy Ratings 16 Email [email protected] Facebook www.facebook.com/selabsuk 6.4 Distribution of Impact Categories 17 Blog blog.selabs.uk Phone +44 (0)203 875 5000 7.
    [Show full text]
  • Consumer Security Products Performance Benchmarks (Edition 2) Antivirus & Internet Security Windows 10
    Consumer Security Products Performance Benchmarks (Edition 2) Antivirus & Internet Security Windows 10 January 2020 Document: Consumer Security Products Performance Benchmarks (Edition 2) Authors: J. Han, D. Wren Company: PassMark Software Date: 13 January 2020 Edition: 2 File: Consumer_Security_Products_Performance_Benchmarks_2020_Ed_2.docx Consumer Security Performance Benchmarks 2019 PassMark Software Table of Contents TABLE OF CONTENTS ......................................................................................................................................... 2 REVISION HISTORY ............................................................................................................................................ 3 REFERENCES ...................................................................................................................................................... 3 EXECUTIVE SUMMARY ...................................................................................................................................... 4 OVERALL SCORE ................................................................................................................................................ 5 PRODUCTS AND VERSIONS ............................................................................................................................... 6 PERFORMANCE METRICS SUMMARY ................................................................................................................ 7 TEST RESULTS ................................................................................................................................................
    [Show full text]
  • Ten Strategies of a World-Class Cybersecurity Operations Center Conveys MITRE’S Expertise on Accumulated Expertise on Enterprise-Grade Computer Network Defense
    Bleed rule--remove from file Bleed rule--remove from file MITRE’s accumulated Ten Strategies of a World-Class Cybersecurity Operations Center conveys MITRE’s expertise on accumulated expertise on enterprise-grade computer network defense. It covers ten key qualities enterprise- grade of leading Cybersecurity Operations Centers (CSOCs), ranging from their structure and organization, computer MITRE network to processes that best enable effective and efficient operations, to approaches that extract maximum defense Ten Strategies of a World-Class value from CSOC technology investments. This book offers perspective and context for key decision Cybersecurity Operations Center points in structuring a CSOC and shows how to: • Find the right size and structure for the CSOC team Cybersecurity Operations Center a World-Class of Strategies Ten The MITRE Corporation is • Achieve effective placement within a larger organization that a not-for-profit organization enables CSOC operations that operates federally funded • Attract, retain, and grow the right staff and skills research and development • Prepare the CSOC team, technologies, and processes for agile, centers (FFRDCs). FFRDCs threat-based response are unique organizations that • Architect for large-scale data collection and analysis with a assist the U.S. government with limited budget scientific research and analysis, • Prioritize sensor placement and data feed choices across development and acquisition, enteprise systems, enclaves, networks, and perimeters and systems engineering and integration. We’re proud to have If you manage, work in, or are standing up a CSOC, this book is for you. served the public interest for It is also available on MITRE’s website, www.mitre.org. more than 50 years.
    [Show full text]
  • Release Notes
    ESAP 2.6.2 Release Notes SDK Version: Mac and Windows 3.6.9026.2 (V2 Unified + V3) Noteworthy changes: Starting ESAP 2.6.1, each release contains additional files in preparation of new features that will be enabled in the next major release of SA and IC. ESAP 2.6.2 and Junos Pulse Secure Access/Access Control Service Compatibility Chart: This ESAP package can be installed on the following Junos Pulse Secure Access/Access Control Service software versions. o SA 8.0Rx o SA 7.4Rx o SA 7.3Rx o SA 7.2Rx o SA 7.1Rx o SA 7.0Rx o SA 6.5Rx o UAC 5.0Rx o UAC 4.4Rx o UAC 4.3Rx o UAC 4.2Rx o UAC 4.1Rx o UAC 4.0Rx o UAC 3.1Rx Note: The ESAP package may install and function without any errors on older releases however as the install has not been tested, we recommend that it be used only on the above versions of software releases. Support has been added for the following products in ESAP2.6.2 Windows OS Antivirus Products [Comodo Group] COMODO Antivirus (7.x) [McAfee, Inc.] McAfee Endpoint Security Threat Prevention (10.x) [Trend Micro, Inc.] Trend Micro Worry Free Business Security Agent (19.x) Antispyware Products [Comodo Group] COMODO Antivirus (7.x) [McAfee, Inc.] McAfee Endpoint Security Threat Prevention (10.x) [Trend Micro, Inc.] Trend Micro Worry Free Business Security Agent (19.x) Firewall Products [Comodo Group] COMODO Firewall (7.x) [McAfee, Inc.] McAfee Endpoint Security Firewall (10.x) [Trend Micro, Inc.] Trend Micro Worry Free Business Security Agent (19.x) Mac OS Antivirus Products [F-Secure Corp.] F-Secure Anti-Virus for Mac (0.x) Support has been removed for the following products in ESAP2.6.2 Mac OS Antivirus Products [SPAMfighter] VIRUSfighter (7.x) Issues Fixed in ESAP2.6.2 OPSWAT issues fixed: 1.
    [Show full text]
  • EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response
    EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response The more data sources you have in your security incident and event management (SIEM), the better equipped you are to detect attacks. And the more security orchestration and automation response (SOAR) connections you have between your SIEM and your IT and security systems the quicker LIMITLESS SCALE WITH FLAT, PREDICTABLE PRICING you can respond. Every log and every security event matters. Not retaining your log data can create security blinds spots that prevent Exabeam Security Management Platform (SMP) has compliance or leave your organization vulnerable to attack. approximately 350 integrations with IT and security products Exabeam is designed to scale without penalizing you for the to help your analysts work smarter - providing inbound amount of data you ingest. Our flat pricing model is based integrations with data sources from vendors to easily on the number of users and devices in your environment, allow you to ingest as much data as possible; and SOAR not data volume. integrations with 3rd party vendors to help you automate and orchestrate your security response. CENTRALIZED SECURITY AUTOMATION AND ORCHESTRATION WITH 3RD PARTY INTEGRATIONS EXTENSIVE DATA SOURCES Exabeam Incident Responder integrates with approximately Exabeam ingests data from approximately 300 different 70 third party IT and security products. These integrations IT and security products to provide security analysts with help your analysts to gather evidence and attach them as the full scope of events. Exabeam Data Lake, Exabeam artifacts to incidents or quarantine affected users and assets Advanced Analytics and Exabeam Entity Analytics ingest logs until incidents are mitigated.
    [Show full text]
  • Cisco Self Defending Network
    Cisco Self Defending Network Mai 2007 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Intelligent Networking Using the Network to Enable Business Processes Cisco Network Strategy Utilize the Network to Unite Isolated Layers and Domains to Enable Business Processes Connectivity Intelligent Networking Business Networked Processes Infrastructure • Active participation in application and service delivery • A systems approach integrates Resilient technology layers to reduce Integrated complexity Adaptive • Flexible policy controls adapt this intelligent system to your Applications business though business rules and Services Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 When it comes to information security, what are the objectives? Adaptive On Demand Agile Align security practice Organization Organization and policy to business requirements. Security that’s a business enabler, not an inhibitor. Keep costs appropriate: It’s not necessarily about reducing costs, but rather, spending where it counts the most • The network touches all Reduce complexity of parts of the infrastructure the overall environment • It is uniquely positioned to Control and contain threats so help solve these issues they don’t control you Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3 Self-Defending Network Defined Efficient Security Management, Control, Operational Management and Response and Policy Control Advanced technologies and security services to
    [Show full text]
  • Mcafee Virusscan Enterprise Protect Your Desktops and File Servers from Malicious Threats
    DATA SHEET McAfee VirusScan Enterprise Protect your desktops and file servers from malicious threats Keeping networks free from a wide range of threats—viruses, worms, rootkits, and Trojans— Key Advantages is more challenging than ever. Whether your organization is a global enterprise with full-time security staff or a small or medium-size business, McAfee® VirusScan® Enterprise software Unbeatable malware detection and removal ensures that your endpoint servers, desktops, and laptops remain free from malware. Protect your files from viruses, worms, rootkits, Trojans, and other threats. McAfee VirusScan Enterprise software combines techniques. With port blocking, file-name blocking, antivirus, antispyware, firewall, and intrusion prevention folder/directory lockdown, file share lockdown, and Proactive protection from zero- technologies to proactively detect and remove malware. infection trace and block, you can stop many new and day attacks Proactive protection against new It reduces the cost of managing outbreak responses, unknown malware files cold. and unknown buffer-overflow stops zero-day threats, and mitigates the window of Proactive Protection from Attacks exploits that target vulnerabilities in vulnerability—the time between the discovery of a Microsoft applications vulnerability and when fixes are deployed. Plus, with McAfee VirusScan Enterprise software is the industry’s first anti-malware software to offer patented intrusion Leverage McAfee GTI McAfee VirusScan Enterprise software, you have The worldwide presence of McAfee prevention with application-specific buffer-overflow the flexibility to detect and block malware based on Labs enables McAfee VirusScan your business needs: on access, on demand, or on a technology. Now, you can protect your users Enterprise software to leverage schedule.
    [Show full text]
  • Mcafee Epolicy Orchestrator Inspiring and Empowering the Security Professional
    DATA SHEET McAfee ePolicy Orchestrator Inspiring and empowering the security professional Security management requires cumbersome juggling between tools and data, often with Key Advantages limited visibility into external threats. This puts the adversary at an advantage by having ■ Industry-acclaimed centralized more time to exploit the gaps not seen between the tools so they can do more damage. management with unique, The cybersecurity workforce is limited and needs to be empowered to simply orchestrate integrated single pane of glass for complex cybersecurity environments. They need to be less reactive and become more great simplicity—available from the cloud or on premises proactive to get ahead of adversaries. ■ Proactive actionable intelligence to get ahead of the adversary Your organization needs to respond quickly to threats on any type of device to minimize ■ Automated workflows to the damage and when upper management demands evidence of security effectiveness. streamline administrative duties The McAfee® ePolicy Orchestrator® (McAfee ePO™) management platform—available and achieve higher efficiency ■ Open and comprehensive platform on premises and from the cloud (with two models to choose from: SaaS or IaaS)—helps integrates McAfee and more than eliminate the time-consuming effort and potential for human error. It also helps those 150 third-party solutions for faster and more accurate responses responsible for managing security respond proactively, faster, and with higher efficacy. ■ Common security management for ® Unique to the McAfee ePO console is McAfee MVISION Insights, the first technology the largest share of devices on the to proactively prioritize threats and campaigns before they hit you, predict if your market ■ Leverages and enhances native countermeasures can withhold the threat, and prescribe what you need to do to counter controls built into operating the threat concurrently.
    [Show full text]
  • Cisco Identity Services Engine Supported Windows AV/AS/PM/DE
    Cisco Identity Services Engine Supported Windows AS/AV, Patch Management and Disk Encryption Products Compliance Module Version 3.6.10363.2 This document provides Windows AS/AV, Patch Management and Disk Encryption support information on the the Cisco AnyConnect Agent Version 4.2. Supported Windows Antispyware Products Vendor_Name Product_Version Product_Name Check_FSRTP Set_FSRTP VirDef_Signature VirDef_Time VirDef_Version 360Safe.com 10.x 360安全卫士 vX X v v 360Safe.com 4.x 360安全卫士 vX X v v 360Safe.com 5.x 360安全卫士 vX X v v 360Safe.com 6.x 360安全卫士 vX X v v 360Safe.com 7.x 360安全卫士 vX X v v 360Safe.com 8.x 360安全卫士 vX X v v 360Safe.com 9.x 360安全卫士 vX X v v 360Safe.com x Other 360Safe.com Antispyware Z X X Z X Agnitum Ltd. 7.x Outpost Firewall Pro vX X X O Agnitum Ltd. 6.x Outpost Firewall Pro 2008 [AntiSpyware] v X X v O Agnitum Ltd. x Other Agnitum Ltd. Antispyware Z X X Z X AhnLab, Inc. 2.x AhnLab SpyZero 2.0 vv O v O AhnLab, Inc. 3.x AhnLab SpyZero 2007 X X O v O AhnLab, Inc. 7.x AhnLab V3 Internet Security 2007 Platinum AntiSpyware v X O v O AhnLab, Inc. 7.x AhnLab V3 Internet Security 2008 Platinum AntiSpyware v X O v O AhnLab, Inc. 7.x AhnLab V3 Internet Security 2009 Platinum AntiSpyware v v O v O AhnLab, Inc. 7.x AhnLab V3 Internet Security 7.0 Platinum Enterprise AntiSpyware v X O v O AhnLab, Inc. 8.x AhnLab V3 Internet Security 8.0 AntiSpyware v v O v O AhnLab, Inc.
    [Show full text]