Data Sheet
Page 2
McAfee Foundstone On-Demand
Hosted, Priority-Based Vulnerability Management
McAfee, Inc.
3965 Freedom Circle, Santa Clara, CA 95054, 888.847.8766, www.mcafee.com
McAfee and Foundstone are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. The color red in connection with security is distinctive of
McAfee
®
brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. © 2005 McAfee, Inc. All Rights Reserved.
1-fs-ods-001-0405
• Hacker’s view of the network
•
On-Demand delivers industry-leading vulnerability
management technology of all Internet-facing devices
in the network
• Unmatched threat visibility
•
Regular, in-depth discovery and analysis of the full
spectrum of vulnerabilities and misconfigurations on
Internet-facing devices, including operating systems,
network devices, commercial applications, databases,
wireless devices, and custom Web applications
• Unique threat compliance module
•
Up-to-the-minute
Threat Intelligence Alerts from
McAfee Research, enabling an immediate response
to breaking events, such as worms and wide-scale
attacks; pioneering risk-ranking of each threat by
correlating events to asset and vulnerability information;
compliance measurement capabilities
• Integrated remediation management
•
Closed-loop system automatically opens and assigns
tickets upon discovery of new of vulnerabilities, and
automatically verifies and closes them upon remediation
• Measurement and reporting
•
Provides organizations with an effective means of
measuring and monitoring security risk to system and
network resources with easy-to-understand metrics:
FoundScore, MyFoundScore, and Risk Score.
Organizations can quickly assess their security
posture, benchmark business units or regions, and
track the progress of implemented security policies
and programs
• Lower TCO
•
Foundstone On-Demand Service requires no installation
of hardware or updates. Organizations immediately
benefit from the unmatched performance, accuracy,
and end-to-end vulnerability management expertise
of McAfee
• Flexible user account system
•
Comprehensive hierarchical model provides organiza-
tions with the flexibility they need to efficiently manage
security risk in any size of business; organize user
accounts by business functions, geographic regions,
technologies, or roles
System Requirements
• Web browser: IE 6.0 or later
McAfee Customer Care
For your business to thrive, your network and systems must
stay secure. If it is your charter to maximize protection, mini-
mize downtime, and solve security problems quickly,
McAfee’s industry-leading software and hardware technical
support programs are for you!
McAfee Gold Support gives you rapid access to our experi-
enced and highly skilled IT security support staff
around-the-clock. Along with access to McAfee’s award-
winning ServicePortal, and unlimited downloading of product
updates and upgrades, you receive 24/7/365 access to
McAfee’s security-certified technicians via phone and chat.
McAfee Platinum Support is for customers who value
personalized 24/7 proactive support from an assigned certified
Technical Account Manager (TAM). Your Platinum TAM will be
familiar with your McAfee deployment and support history,
and will proactively contact you as needed to optimize your
product performance and maximize your business uptime.
INVENTORY
Discover all assets across the network
POLICY
Establish process, standards, and guidelines
PRIORITIZE
Assign business value to assets
VULNERABILITIES
Determine vulnerabilities on assets
1
2
3
4
RISK
Determine risk level
REMEDIATION
Proactively fix vulnerabilities
MEASURE
Measure impact of security decisions and actions
COMPLIANCE
Review for policy compliance
6
8
BLOCK
Stop intrusions in real-time
7
9
10
THREATS
View potential threats
5
A x V x T
C C C
— — —
R =
McAfee Foundstone On-Demand Service’s priority-based
approach enables organizations to take control of the
vulnerability management life cycle.