Risk Management

McAfee Risk Management Solution Correlates Risks, Countermeasures

McAfee today announced a Risk Management solution the company claims will help organizations maximize their IT security spending by correlating actual risks with current security efforts.

<p><strong>McAfee</strong> today announced a Risk Management solution the company claims will help organizations maximize their IT security spending by correlating actual risks with current security efforts.

McAfee today announced a Risk Management solution the company claims will help organizations maximize their IT security spending by correlating actual risks with current security efforts. The solution combines real-time threat intelligence with global vulnerability scanning across applications, databases and networks, and correlates that with security countermeasures already in place to help organizations assess their highest priority risks.

Unlike existing point-product approaches, which require IT Security specialists to manually correlate information, the McAfee Risk Management solution automatically pulls information together into a real-time risk analytics engine.

“Enterprises are realizing that they can no longer rely on point products to mitigate risk,” said Stuart McClure, senior vice president and general manager, risk and compliance for McAfee. “That’s because those products are not designed to work together and do not tie the ability to identify and prioritize risks with the ability to mitigate them. McAfee is unique in delivering a holistic approach to managing risk that takes into account deployed countermeasures.”

The McAfee Risk Management solution consist of three products: McAfee Risk Advisor (a risk management dashboard), McAfee Vulnerability Manager (a vulnerability assessment product for web applications) and McAfee Vulnerability Manager for Databases, which automatically finds databases on the network, determines if the latest patches have been applied, and tests for weak passwords, default accounts, and other common vulnerabilities

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version