View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
July 20, 2010

McAfee unveils Risk Management offering

Claims to help businesses prioritise and mitigate IT risks

By CBR Staff Writer

McAfee has unveiled its risk management offering for IT security that combines real-time threat intelligence with global vulnerability scanning across applications, databases and networks.

The company said that its new offering correlates with security countermeasures already in place, to help organisations assess their highest priority risks. It consists of risk management dashboard Risk Advisor 2.5, vulnerability assessment product Vulnerability Manager 7.0 and Vulnerability Manager for Databases.

McAfee said that its new offering’s in-built Risk Advisor enables organisations to understand their risk posture across meaningful sector of their IT environment to know precisely what is needed to optimise their security. Risk Advisor 2.5 include risk scoring and advanced patch optimisation.

Risk Management’s embedded feature Vulnerability Manager 7.0 adds web application scanning and enables organisations to discover and scan web applications. Vulnerability Manager for Databases automatically finds databases on the network, determines if the new patches have been applied, and tests for weak passwords, default accounts, and other common vulnerabilities.

The company said that risk management offering, when combined with the ePolicy Orchestrator platform, endpoint and network defense products, and other partner products, delivers the ability for any-sized organisation to optimise its security posture and comply with regulatory mandates.

Stuart McClure, senior vice president and general manager of risk and compliance for McAfee, said: "That’s because those products are not designed to work together and do not tie the ability to identify and prioritise risks with the ability to mitigate them. McAfee is unique in delivering a holistic approach to managing risk that takes into account deployed countermeasures."

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU