manuals.online logo
Brands
  1. Home
  2. •
  3. Brands
  4. •
  5. McAfee
  6. •
  7. Software
  8. •
  9. McAfee FOUNDSTONE ON-DEMAND User manual

McAfee FOUNDSTONE ON-DEMAND User manual

The Challenge
Every organization, from a small business to a global enter-
prise, faces a deluge of information about threats and
vulnerabilities—the sheer volume of data makes it nearly
impossible to determine which threats are critical and which
are less relevant. Yet while every asset, vulnerability, and
threat competes for an administrator’s attention, they are
not all equally important. Dealing with them in a haphazard,
reactive way almost guarantees that the most critical security
issues will not be given top priority.
Successful vulnerability management begins with determining
which assets are the most important, identifying vulnerabili-
ties on those assets, responding to breaking threats, and
remediating. Without an effective, priority-based risk manage-
ment system, an organization will always be at risk.
The McAfee Solution
McAfee®Foundstone®On-Demand Service is a hosted service
that delivers Foundstone’s award-winning, priority-based
vulnerability management solution via the McAfee Operations
Center. The On-Demand Service enables organizations of any
size to mitigate risk by carefully balancing asset value, vulnera-
bility severity, and threat criticality. Organizations can then
direct resources where they will have the greatest return,
while improving the security health for the organization.
Administrators log into McAfee’s Web portal to gain access
to realtime analysis of their network’s Internet-facing
devices, giving them a
hacker’s view
of their network. The
On-Demand Service is designed for organizations that want
the market-leading, priority-based approach to vulnerability
management of McAfee Foundstone Enterprise, without the
associated implementation and administration costs.
How the McAfee Solution Works
Customers simply log into the McAfee Web portal at any
time, from anywhere, to take control of the vulnerability
management life cycle:
• Discover and prioritize assets
• Pinpoint vulnerabilities
• Proactively address critical threats
• Conduct asset-based remediation
• Measure and report compliance
The McAfee Foundstone Enterprise hardware and software
that power the On-Demand Service reside in McAfee’s
Operations Center, not the customer environment. McAfee
security experts maintain all aspects of the On-Demand
Service, eliminating the need to deploy and update the
Foundstone Enterprise system.
Benefits
• Maximize scarce resources by focusing on the most
critical vulnerabilities, assets, and threats that create the
highest risk
• Fast, easy deployment means spending less time on
security and more time driving core business value
• Always up-to-date technology ensures maximum
accuracy and performance
• Intelligence alerts deliver specific, actionable information
on breaking threats
• Pioneering integration of threat intelligence alerts, threat
correlation, and compliance measurement
• Establish internal security standards and guidelines and
verify regulatory compliance
• Lower TCO with zero deployment or maintenance costs
Features
Key features include:
• Priority-based approach to vulnerability management
•Focus on the most critical vulnerabilities, assets, and
threats that present the highest risks
•Effectively leverage limited financial and human
resources
•Create a baseline and measure improvements against
compliance standards
•Strategically protect mission-critical assets against
breaking threats
McAfee Foundstone On-Demand
Hosted, Priority-Based Vulnerability Management
www.mcafee.com
Data Sheet
Threat Compliance View enables organizations to receive
up-to-the-minute alerts on breaking threats and measure
compliance by threat, business unit, and platform.
Data Sheet Page 2
McAfee Foundstone On-Demand
Hosted, Priority-Based Vulnerability Management
McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, 888.847.8766, www.mcafee.com
McAfee and Foundstone are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. The color red in connection with security is distinctive of
McAfee®brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. © 2005 McAfee, Inc. All Rights Reserved. 1-fs-ods-001-0405
• Hacker’s view of the network
•On-Demand delivers industry-leading vulnerability
management technology of all Internet-facing devices
in the network
• Unmatched threat visibility
•Regular, in-depth discovery and analysis of the full
spectrum of vulnerabilities and misconfigurations on
Internet-facing devices, including operating systems,
network devices, commercial applications, databases,
wireless devices, and custom Web applications
• Unique threat compliance module
•Up-to-the-minute
Threat Intelligence Alerts
from
McAfee Research, enabling an immediate response
to breaking events, such as worms and wide-scale
attacks; pioneering risk-ranking of each threat by
correlating events to asset and vulnerability information;
compliance measurement capabilities
• Integrated remediation management
•Closed-loop system automatically opens and assigns
tickets upon discovery of new of vulnerabilities, and
automatically verifies and closes them upon remediation
• Measurement and reporting
•Provides organizations with an effective means of
measuring and monitoring security risk to system and
network resources with easy-to-understand metrics:
FoundScore, MyFoundScore, and Risk Score.
Organizations can quickly assess their security
posture, benchmark business units or regions, and
track the progress of implemented security policies
and programs
• Lower TCO
•Foundstone On-Demand Service requires no installation
of hardware or updates. Organizations immediately
benefit from the unmatched performance, accuracy,
and end-to-end vulnerability management expertise
of McAfee
• Flexible user account system
•Comprehensive hierarchical model provides organiza-
tions with the flexibility they need to efficiently manage
security risk in any size of business; organize user
accounts by business functions, geographic regions,
technologies, or roles
System Requirements
• Web browser: IE 6.0 or later
McAfee Customer Care
For your business to thrive, your network and systems must
stay secure. If it is your charter to maximize protection, mini-
mize downtime, and solve security problems quickly,
McAfee’s industry-leading software and hardware technical
support programs are for you!
McAfee Gold Support gives you rapid access to our experi-
enced and highly skilled IT security support staff
around-the-clock. Along with access to McAfee’s award-
winning ServicePortal, and unlimited downloading of product
updates and upgrades, you receive 24/7/365 access to
McAfee’s security-certified technicians via phone and chat.
McAfee Platinum Support is for customers who value
personalized 24/7 proactive support from an assigned certified
Technical Account Manager (TAM). Your Platinum TAM will be
familiar with your McAfee deployment and support history,
and will proactively contact you as needed to optimize your
product performance and maximize your business uptime.
INVENTORY
Discover all assets across the network
POLICY
Establish process, standards, and guidelines
PRIORITIZE
Assign business value to assets
VULNERABILITIES
Determine vulnerabilities on assets
1
2
3
4
RISK
Determine risk level
REMEDIATION
Proactively fix vulnerabilities
MEASURE
Measure impact of security decisions and actions
COMPLIANCE
Review for policy compliance
6
8
BLOCK
Stop intrusions in real-time
7
9
10
THREATS
View potential threats
5
AxVxT
C C C
———
R =
McAfee Foundstone On-Demand Service’s priority-based
approach enables organizations to take control of the
vulnerability management life cycle.

Other McAfee Software manuals

McAfee TSA00M005PAA - Total Protection Service User manual

McAfee

McAfee TSA00M005PAA - Total Protection Service User manual

McAfee VCLCDE-AA-DA - VirusScan Command Line Scanner... User manual

McAfee

McAfee VCLCDE-AA-DA - VirusScan Command Line Scanner... User manual

McAfee MANAGEMENT EDITION 2.5 Service manual

McAfee

McAfee MANAGEMENT EDITION 2.5 Service manual

McAfee OFFICE 3.1 User manual

McAfee

McAfee OFFICE 3.1 User manual

McAfee VSF09EMB1RAA - VirusScan Plus 2009 User manual

McAfee

McAfee VSF09EMB1RAA - VirusScan Plus 2009 User manual

McAfee VIRUSSCAN 4.5 - Service manual

McAfee

McAfee VIRUSSCAN 4.5 - Service manual

McAfee SMB EDITIONS User manual

McAfee

McAfee SMB EDITIONS User manual

McAfee TEECDE-AA-AA - Total Protection For Endpoint User manual

McAfee

McAfee TEECDE-AA-AA - Total Protection For Endpoint User manual

McAfee INTERNET SECURITY 2010 User manual

McAfee

McAfee INTERNET SECURITY 2010 User manual

McAfee MTP09EMB1RAA - Total Protection 2009 User manual

McAfee

McAfee MTP09EMB1RAA - Total Protection 2009 User manual

McAfee INTERNET SECURITY 5.0 User manual

McAfee

McAfee INTERNET SECURITY 5.0 User manual

McAfee SAV85E - Active VirusScan - PC Owner's manual

McAfee

McAfee SAV85E - Active VirusScan - PC Owner's manual

McAfee EPOLICY ORCHESTRATOR 4.5 - User manual

McAfee

McAfee EPOLICY ORCHESTRATOR 4.5 - User manual

McAfee DR SOLOMON S ANTI-VIRUS 8.5 User manual

McAfee

McAfee DR SOLOMON S ANTI-VIRUS 8.5 User manual

McAfee VIRUSSCAN 5.1 Service manual

McAfee

McAfee VIRUSSCAN 5.1 Service manual

McAfee PASCDE-AB-IA - Policy Auditor For Servers User manual

McAfee

McAfee PASCDE-AB-IA - Policy Auditor For Servers User manual

McAfee VIRUSSCAN 5.1 User manual

McAfee

McAfee VIRUSSCAN 5.1 User manual

McAfee INTERNET SECURITY 2009 User manual

McAfee

McAfee INTERNET SECURITY 2009 User manual

McAfee VIRUSSCAN ENTERPRISE User manual

McAfee

McAfee VIRUSSCAN ENTERPRISE User manual

McAfee INTERNET SECURITY 2008 User manual

McAfee

McAfee INTERNET SECURITY 2008 User manual

McAfee VPF40E001RAA - VirusScan 2005 - PC User manual

McAfee

McAfee VPF40E001RAA - VirusScan 2005 - PC User manual

McAfee MANAGEMENT EDITION 2.5 User manual

McAfee

McAfee MANAGEMENT EDITION 2.5 User manual

McAfee TSA00M005PAA - Total Protection Service User manual

McAfee

McAfee TSA00M005PAA - Total Protection Service User manual

McAfee EPOLICY ORCHESTRATOR 4.0 PATCH 5 - S... Instruction Manual

McAfee

McAfee EPOLICY ORCHESTRATOR 4.0 PATCH 5 - S... Instruction Manual

Popular Software manuals by other brands

TANDBERG GW Dataport Command Interface D13202 user guide

TANDBERG

TANDBERG GW Dataport Command Interface D13202 user guide

Brother BES Lettering installation guide

Brother

Brother BES Lettering installation guide

McDATA Enterprise Operating System user manual

McDATA

McDATA Enterprise Operating System user manual

Oracle B31540-02 Implementation guide

Oracle

Oracle B31540-02 Implementation guide

FieldServer FS-8700-87 Driver manual

FieldServer

FieldServer FS-8700-87 Driver manual

ASCOM OPENACCESS - BROCHURE 1 brochure

ASCOM

ASCOM OPENACCESS - BROCHURE 1 brochure

Generic Media PEGA-SA500 gMovie v1.4 operating instructions

Generic Media

Generic Media PEGA-SA500 gMovie v1.4 operating instructions

AMIGOPOD PowerConnect W Clearpass 100 Software Integration guide

AMIGOPOD

AMIGOPOD PowerConnect W Clearpass 100 Software Integration guide

LinPlug RMV 5.03 Reference manual

LinPlug

LinPlug RMV 5.03 Reference manual

TerraTec AUREON 5.1 SKY Product information

TerraTec

TerraTec AUREON 5.1 SKY Product information

Adaptec Command Line Utility user guide

Adaptec

Adaptec Command Line Utility user guide

Juniper JUNOSE SOFTWARE FOR E SERIES 11.0.X - BGP AND MPLS CONFIGURATION GUIDE... Configuration guide

Juniper

Juniper JUNOSE SOFTWARE FOR E SERIES 11.0.X - BGP AND MPLS CONFIGURATION GUIDE... Configuration guide

Microtek ScanWizard Pro Reference manual

Microtek

Microtek ScanWizard Pro Reference manual

HP Deskjet 812c release note

HP

HP Deskjet 812c release note

HP 201723-B21 - HP StorageWorks Modular SAN Array 1000 Hard... release note

HP

HP 201723-B21 - HP StorageWorks Modular SAN Array 1000 Hard... release note

RGB Spectrum DGy 201x user guide

RGB Spectrum

RGB Spectrum DGy 201x user guide

Olympus CAMEDIA Master Software installation guide

Olympus

Olympus CAMEDIA Master Software installation guide

Cisco DVD-ROM Upgrade guide

Cisco

Cisco DVD-ROM Upgrade guide

manuals.online logo
manuals.online logoBrands
  • About & Mission
  • Contact us
  • Privacy Policy
  • Terms and Conditions

Copyright 2025 Manuals.Online. All Rights Reserved.