Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

McAfee Risk Management Solution Correlates Risks, Countermeasures

McAfee today announced a Risk Management solution the company claims will help organizations maximize their IT security spending by correlating actual risks with current security efforts.

McAfee today announced a Risk Management solution the company claims will help organizations maximize their IT security spending by correlating actual risks with current security efforts. The solution combines real-time threat intelligence with global vulnerability scanning across applications, databases and networks, and correlates that with security countermeasures already in place to help organizations assess their highest priority risks.McAfee Risk Management

Unlike existing point-product approaches, which require IT Security specialists to manually correlate information, the McAfee Risk Management solution automatically pulls information together into a real-time risk analytics engine.

“Enterprises are realizing that they can no longer rely on point products to mitigate risk,” said Stuart McClure, senior vice president and general manager, risk and compliance for McAfee. “That’s because those products are not designed to work together and do not tie the ability to identify and prioritize risks with the ability to mitigate them. McAfee is unique in delivering a holistic approach to managing risk that takes into account deployed countermeasures.”

The McAfee Risk Management solution consist of three products: McAfee Risk Advisor (a risk management dashboard), McAfee Vulnerability Manager (a vulnerability assessment product for web applications) and McAfee Vulnerability Manager for Databases, which automatically finds databases on the network, determines if the latest patches have been applied, and tests for weak passwords, default accounts, and other common vulnerabilities

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...