The Challenge
Every organization, from a small business to a global enter-
prise, faces a deluge of information about threats and
vulnerabilities—the sheer volume of data makes it nearly
impossible to determine which threats are critical and which
are less relevant. Yet while every asset, vulnerability, and
threat competes for an administrator’s attention, they are
not all equally important. Dealing with them in a haphazard,
reactive way almost guarantees that the most critical security
issues will not be given top priority.
Successful vulnerability management begins with determining
which assets are the most important, identifying vulnerabili-
ties on those assets, responding to breaking threats, and
remediating. Without an effective, priority-based risk manage-
ment system, an organization will always be at risk.
The McAfee Solution
McAfee
®
Foundstone
®
On-Demand Service is a hosted service
that delivers Foundstone’s award-winning, priority-based
vulnerability management solution via the McAfee Operations
Center. The On-Demand Service enables organizations of any
size to mitigate risk by carefully balancing asset value, vulnera-
bility severity, and threat criticality. Organizations can then
direct resources where they will have the greatest return,
while improving the security health for the organization.
Administrators log into McAfee’s Web portal to gain access
to realtime analysis of their network’s Internet-facing
devices, giving them a
hacker’s view of their network. The
On-Demand Service is designed for organizations that want
the market-leading, priority-based approach to vulnerability
management of McAfee Foundstone Enterprise, without the
associated implementation and administration costs.
How the McAfee Solution Works
Customers simply log into the McAfee Web portal at any
time, from anywhere, to take control of the vulnerability
management life cycle:
• Discover and prioritize assets
• Pinpoint vulnerabilities
• Proactively address critical threats
• Conduct asset-based remediation
• Measure and report compliance
The McAfee Foundstone Enterprise hardware and software
that power the On-Demand Service reside in McAfee’s
Operations Center, not the customer environment. McAfee
security experts maintain all aspects of the On-Demand
Service, eliminating the need to deploy and update the
Foundstone Enterprise system.
Benefits
• Maximize scarce resources by focusing on the most
critical vulnerabilities, assets, and threats that create the
highest risk
• Fast, easy deployment means spending less time on
security and more time driving core business value
• Always up-to-date technology ensures maximum
accuracy and performance
• Intelligence alerts deliver specific, actionable information
on breaking threats
• Pioneering integration of threat intelligence alerts, threat
correlation, and compliance measurement
• Establish internal security standards and guidelines and
verify regulatory compliance
• Lower TCO with zero deployment or maintenance costs
Features
Key features include:
• Priority-based approach to vulnerability management
•
Focus on the most critical vulnerabilities, assets, and
threats that present the highest risks
•
Effectively leverage limited financial and human
resources
•
Create a baseline and measure improvements against
compliance standards
•
Strategically protect mission-critical assets against
breaking threats
McAfee Foundstone On-Demand
Hosted, Priority-Based Vulnerability Management
www.mcafee.com
Data Sheet
Threat Compliance View enables organizations to receive
up-to-the-minute alerts on breaking threats and measure
compliance by threat, business unit, and platform.