background image

The Challenge 

Every organization, from a small business to a global enter-
prise, faces a deluge of information about threats and
vulnerabilities—the sheer volume of data makes it nearly
impossible to determine which threats are critical and which
are less relevant. Yet while every asset, vulnerability, and
threat competes for an administrator’s attention, they are 
not all equally important. Dealing with them in a haphazard,
reactive way almost guarantees that the most critical security
issues will not be given top priority.

Successful vulnerability management begins with determining
which assets are the most important, identifying vulnerabili-
ties on those assets, responding to breaking threats, and
remediating. Without an effective, priority-based risk manage-
ment system, an organization will always be at risk.

The McAfee Solution 

McAfee

®

Foundstone

®

On-Demand Service is a hosted service

that delivers Foundstone’s award-winning, priority-based
vulnerability management solution via the McAfee Operations
Center. The On-Demand Service enables organizations of any
size to mitigate risk by carefully balancing asset value, vulnera-
bility severity, and threat criticality. Organizations can then
direct resources where they will have the greatest return,
while improving the security health for the organization.

Administrators log into McAfee’s Web portal to gain access
to realtime analysis of their network’s Internet-facing
devices, giving them a 

hacker’s view of their network. The

On-Demand Service is designed for organizations that want
the market-leading, priority-based approach to vulnerability
management of McAfee Foundstone Enterprise, without the
associated implementation and administration costs. 

How the McAfee Solution Works

Customers simply log into the McAfee Web portal at any
time, from anywhere, to take control of the vulnerability
management life cycle:

• Discover and prioritize assets

• Pinpoint vulnerabilities

• Proactively address critical threats

• Conduct asset-based remediation

• Measure and report compliance

The McAfee Foundstone Enterprise hardware and software
that power the On-Demand Service reside in McAfee’s
Operations Center, not the customer environment. McAfee
security experts maintain all aspects of the On-Demand
Service, eliminating the need to deploy and update the
Foundstone Enterprise system.

Benefits 

• Maximize scarce resources by focusing on the most 

critical vulnerabilities, assets, and threats that create the
highest risk

• Fast, easy deployment means spending less time on

security and more time driving core business value 

• Always up-to-date technology ensures maximum 

accuracy and performance

• Intelligence alerts deliver specific, actionable information

on breaking threats

• Pioneering integration of threat intelligence alerts, threat

correlation, and compliance measurement 

• Establish internal security standards and guidelines and

verify regulatory compliance 

• Lower TCO with zero deployment or maintenance costs 

Features

Key features include:

• Priority-based approach to vulnerability management

Focus on the most critical vulnerabilities, assets, and
threats that present the highest risks

Effectively leverage limited financial and human
resources

Create a baseline and measure improvements against
compliance standards

Strategically protect mission-critical assets against
breaking threats

McAfee Foundstone On-Demand 

Hosted, Priority-Based Vulnerability Management

www.mcafee.com

Data Sheet

Threat Compliance View enables organizations to receive 
up-to-the-minute alerts on breaking threats and measure
compliance by threat, business unit, and platform.

Reviews: