Our secure web-based vulnerability management system provides extensive vulnerability data along with complete patch information, enabling rapid prioritization and remediation. Configuration of both device (port level) and domain (protocol level) scanning is available. On-demand security audits can be initiated at any time. Multiple user accounts can be created with appropriate roles and privilege levels providing information access and alert levels tailored to your organization. From protecting a single web site to auditing a complex network, McAfee provides the appropriate tools for each task.
McAfee doesn’t just provide you with a 10 page list of the vulnerabilities we find - we give you an interactive vulnerability management tool. You may view vulnerabilities by type, severity, patch difficulty, device or device group. Sort and view detailed remediation steps and track delegated remediation progress. Create custom alert levels for each user or group role. Compare recent audits with data going back up to three years. Configure and generate HTML or PDF format technical, management or compliance reports.
Our vulnerability management portal enables you to effectively manage vulnerability data for large networks by assigning any network device, device group, or IP address to one or more specific groups and then assign these groups to individual or grouped users. Using McAfee’s device and vulnerability classification capabilities, individual devices, or entire IP blocks can be easily sorted and grouped by vulnerability, device type, business function, geographic location, or other criteria- and then assigned to a user or user-profile group. You can then use the power of this flexible system to drive audit schedules, alerting, remediation activities and compliance reporting throughout your organization.
Scanning time may be scheduled by individual device, device group, or separate schedules defined for web application and port-level scans one each device. Manual scans may be run at any time, while special "denial of service" and "full exploit" scans may only be run in the manual mode. Manual scans of only current vulnerabilities are available to help speed remediation efforts and patch verification.
We provide a hierarchical multi-user environment with role-based access, alerting and reporting. These powerful user management capabilities enable delegation of vulnerability assessment and remediation tasks to multiple users with pre-assigned device-level audit access, while maintaining centralized control and reporting for the Security Manager. This functionality simplifies delegation and management of network security maintenance, facilitates enterprise-wide compliance reporting, and provides all levels of staff and management with appropriate and up-to-date security information.
Extensive PDF and HTML reporting capabilities include easily customizable report templates with the flexibility to create executive-level summary reports with trend analysis, detailed technical reports with specific patch information and Reports On Compliance to meet various federal and industry requirements such as GLBA, SOX, HIPAA, Visa CISP/AIS and MasterCard SDP.