background image

Data Sheet

Page 2

McAfee Foundstone On-Demand 

Hosted, Priority-Based Vulnerability Management

McAfee, Inc.  

3965 Freedom Circle, Santa Clara, CA 95054, 888.847.8766, www.mcafee.com

McAfee and Foundstone are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. The color red in connection with security is distinctive of
McAfee

®

brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. © 2005 McAfee, Inc. All Rights Reserved.

1-fs-ods-001-0405

• Hacker’s view of the network

On-Demand delivers industry-leading vulnerability
management technology of all Internet-facing devices
in the network 

• Unmatched threat visibility

Regular, in-depth discovery and analysis of the full
spectrum of vulnerabilities and misconfigurations on
Internet-facing devices, including operating systems,
network devices, commercial applications, databases,
wireless devices, and custom Web applications 

• Unique threat compliance module 

Up-to-the-minute 

Threat Intelligence Alerts from

McAfee Research, enabling an immediate response 
to breaking events, such as worms and wide-scale
attacks; pioneering risk-ranking of each threat by 
correlating events to asset and vulnerability information;
compliance measurement capabilities 

• Integrated remediation management

Closed-loop system automatically opens and assigns
tickets upon discovery of new of vulnerabilities, and
automatically verifies and closes them upon remediation

• Measurement and reporting

Provides organizations with an effective means of
measuring and monitoring security risk to system and
network resources with easy-to-understand metrics:
FoundScore, MyFoundScore, and Risk Score.
Organizations can quickly assess their security
posture, benchmark business units or regions, and
track the progress of implemented security policies
and programs

• Lower TCO

Foundstone On-Demand Service requires no installation
of hardware or updates. Organizations immediately
benefit from the unmatched performance, accuracy,
and end-to-end vulnerability management expertise 
of McAfee

• Flexible user account system

Comprehensive hierarchical model provides organiza-
tions with the flexibility they need to efficiently manage
security risk in any size of business; organize user
accounts by business functions, geographic regions,
technologies, or roles

System Requirements

• Web browser: IE 6.0 or later

McAfee Customer Care 

For your business to thrive, your network and systems must
stay secure. If it is your charter to maximize protection, mini-
mize downtime, and solve security problems quickly,
McAfee’s industry-leading software and hardware technical
support programs are for you!

McAfee Gold Support gives you rapid access to our experi-
enced and highly skilled IT security support staff
around-the-clock. Along with access to McAfee’s award-
winning ServicePortal, and unlimited downloading of product
updates and upgrades, you receive 24/7/365 access to
McAfee’s security-certified technicians via phone and chat.

McAfee Platinum Support is for customers who value 
personalized 24/7 proactive support from an assigned certified
Technical Account Manager (TAM). Your Platinum TAM will be
familiar with your McAfee deployment and support history,
and will proactively contact you as needed to optimize your
product performance and maximize your business uptime.

INVENTORY

Discover all assets across the network

POLICY

 

Establish process, standards, and guidelines

PRIORITIZE

Assign business value to assets

VULNERABILITIES

Determine vulnerabilities on assets

1

2

3

4

RISK

Determine risk level 

REMEDIATION

Proactively fix vulnerabilities

MEASURE

Measure impact of security decisions and actions

COMPLIANCE

Review for policy compliance

6

8

BLOCK

Stop intrusions in real-time

7

9

10

THREATS

View potential threats

5

A x V x T

C   C   C

— — —

R =

McAfee Foundstone On-Demand Service’s priority-based
approach enables organizations to take control of the 
vulnerability management life cycle.

Reviews: