manuals.online logo
Brands
  1. Home
  2. •
  3. Brands
  4. •
  5. McAfee
  6. •
  7. Software
  8. •
  9. McAfee FOUNDSTONE ON-DEMAND User manual

McAfee FOUNDSTONE ON-DEMAND User manual

The Challenge
Every organization, from a small business to a global enter-
prise, faces a deluge of information about threats and
vulnerabilities—the sheer volume of data makes it nearly
impossible to determine which threats are critical and which
are less relevant. Yet while every asset, vulnerability, and
threat competes for an administrator’s attention, they are
not all equally important. Dealing with them in a haphazard,
reactive way almost guarantees that the most critical security
issues will not be given top priority.
Successful vulnerability management begins with determining
which assets are the most important, identifying vulnerabili-
ties on those assets, responding to breaking threats, and
remediating. Without an effective, priority-based risk manage-
ment system, an organization will always be at risk.
The McAfee Solution
McAfee®Foundstone®On-Demand Service is a hosted service
that delivers Foundstone’s award-winning, priority-based
vulnerability management solution via the McAfee Operations
Center. The On-Demand Service enables organizations of any
size to mitigate risk by carefully balancing asset value, vulnera-
bility severity, and threat criticality. Organizations can then
direct resources where they will have the greatest return,
while improving the security health for the organization.
Administrators log into McAfee’s Web portal to gain access
to realtime analysis of their network’s Internet-facing
devices, giving them a
hacker’s view
of their network. The
On-Demand Service is designed for organizations that want
the market-leading, priority-based approach to vulnerability
management of McAfee Foundstone Enterprise, without the
associated implementation and administration costs.
How the McAfee Solution Works
Customers simply log into the McAfee Web portal at any
time, from anywhere, to take control of the vulnerability
management life cycle:
• Discover and prioritize assets
• Pinpoint vulnerabilities
• Proactively address critical threats
• Conduct asset-based remediation
• Measure and report compliance
The McAfee Foundstone Enterprise hardware and software
that power the On-Demand Service reside in McAfee’s
Operations Center, not the customer environment. McAfee
security experts maintain all aspects of the On-Demand
Service, eliminating the need to deploy and update the
Foundstone Enterprise system.
Benefits
• Maximize scarce resources by focusing on the most
critical vulnerabilities, assets, and threats that create the
highest risk
• Fast, easy deployment means spending less time on
security and more time driving core business value
• Always up-to-date technology ensures maximum
accuracy and performance
• Intelligence alerts deliver specific, actionable information
on breaking threats
• Pioneering integration of threat intelligence alerts, threat
correlation, and compliance measurement
• Establish internal security standards and guidelines and
verify regulatory compliance
• Lower TCO with zero deployment or maintenance costs
Features
Key features include:
• Priority-based approach to vulnerability management
•Focus on the most critical vulnerabilities, assets, and
threats that present the highest risks
•Effectively leverage limited financial and human
resources
•Create a baseline and measure improvements against
compliance standards
•Strategically protect mission-critical assets against
breaking threats
McAfee Foundstone On-Demand
Hosted, Priority-Based Vulnerability Management
www.mcafee.com
Data Sheet
Threat Compliance View enables organizations to receive
up-to-the-minute alerts on breaking threats and measure
compliance by threat, business unit, and platform.
Data Sheet Page 2
McAfee Foundstone On-Demand
Hosted, Priority-Based Vulnerability Management
McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, 888.847.8766, www.mcafee.com
McAfee and Foundstone are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. The color red in connection with security is distinctive of
McAfee®brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. © 2005 McAfee, Inc. All Rights Reserved. 1-fs-ods-001-0405
• Hacker’s view of the network
•On-Demand delivers industry-leading vulnerability
management technology of all Internet-facing devices
in the network
• Unmatched threat visibility
•Regular, in-depth discovery and analysis of the full
spectrum of vulnerabilities and misconfigurations on
Internet-facing devices, including operating systems,
network devices, commercial applications, databases,
wireless devices, and custom Web applications
• Unique threat compliance module
•Up-to-the-minute
Threat Intelligence Alerts
from
McAfee Research, enabling an immediate response
to breaking events, such as worms and wide-scale
attacks; pioneering risk-ranking of each threat by
correlating events to asset and vulnerability information;
compliance measurement capabilities
• Integrated remediation management
•Closed-loop system automatically opens and assigns
tickets upon discovery of new of vulnerabilities, and
automatically verifies and closes them upon remediation
• Measurement and reporting
•Provides organizations with an effective means of
measuring and monitoring security risk to system and
network resources with easy-to-understand metrics:
FoundScore, MyFoundScore, and Risk Score.
Organizations can quickly assess their security
posture, benchmark business units or regions, and
track the progress of implemented security policies
and programs
• Lower TCO
•Foundstone On-Demand Service requires no installation
of hardware or updates. Organizations immediately
benefit from the unmatched performance, accuracy,
and end-to-end vulnerability management expertise
of McAfee
• Flexible user account system
•Comprehensive hierarchical model provides organiza-
tions with the flexibility they need to efficiently manage
security risk in any size of business; organize user
accounts by business functions, geographic regions,
technologies, or roles
System Requirements
• Web browser: IE 6.0 or later
McAfee Customer Care
For your business to thrive, your network and systems must
stay secure. If it is your charter to maximize protection, mini-
mize downtime, and solve security problems quickly,
McAfee’s industry-leading software and hardware technical
support programs are for you!
McAfee Gold Support gives you rapid access to our experi-
enced and highly skilled IT security support staff
around-the-clock. Along with access to McAfee’s award-
winning ServicePortal, and unlimited downloading of product
updates and upgrades, you receive 24/7/365 access to
McAfee’s security-certified technicians via phone and chat.
McAfee Platinum Support is for customers who value
personalized 24/7 proactive support from an assigned certified
Technical Account Manager (TAM). Your Platinum TAM will be
familiar with your McAfee deployment and support history,
and will proactively contact you as needed to optimize your
product performance and maximize your business uptime.
INVENTORY
Discover all assets across the network
POLICY
Establish process, standards, and guidelines
PRIORITIZE
Assign business value to assets
VULNERABILITIES
Determine vulnerabilities on assets
1
2
3
4
RISK
Determine risk level
REMEDIATION
Proactively fix vulnerabilities
MEASURE
Measure impact of security decisions and actions
COMPLIANCE
Review for policy compliance
6
8
BLOCK
Stop intrusions in real-time
7
9
10
THREATS
View potential threats
5
AxVxT
C C C
———
R =
McAfee Foundstone On-Demand Service’s priority-based
approach enables organizations to take control of the
vulnerability management life cycle.

Other McAfee Software manuals

McAfee VIRUSSCAN 4.5 - Service manual

McAfee

McAfee VIRUSSCAN 4.5 - Service manual

McAfee VIRUSSCAN HOME EDITION 7.0 User manual

McAfee

McAfee VIRUSSCAN HOME EDITION 7.0 User manual

McAfee MTP09EMB1RAA - Total Protection 2009 User manual

McAfee

McAfee MTP09EMB1RAA - Total Protection 2009 User manual

McAfee DR SOLOMON S ANTI-VIRUS 8.5 Service manual

McAfee

McAfee DR SOLOMON S ANTI-VIRUS 8.5 Service manual

McAfee QUICKCLEAN 3.0 User manual

McAfee

McAfee QUICKCLEAN 3.0 User manual

McAfee FIREWALL 2.1-GETTING STARTED User manual

McAfee

McAfee FIREWALL 2.1-GETTING STARTED User manual

McAfee SAV85E - Active VirusScan - PC Owner's manual

McAfee

McAfee SAV85E - Active VirusScan - PC Owner's manual

McAfee MFN10EMB3RAA - Family Protection - PC User manual

McAfee

McAfee MFN10EMB3RAA - Family Protection - PC User manual

McAfee EPOLICY ORCHESTRATOR 4.5 RELEA Instruction Manual

McAfee

McAfee EPOLICY ORCHESTRATOR 4.5 RELEA Instruction Manual

McAfee MIS80E001RAI - Internet Security Suite 2006 User manual

McAfee

McAfee MIS80E001RAI - Internet Security Suite 2006 User manual

McAfee VIRUSSCAN ENTERPRISE 8.7I PATCH 4 - S Instruction Manual

McAfee

McAfee VIRUSSCAN ENTERPRISE 8.7I PATCH 4 - S Instruction Manual

McAfee EPOLICY ORCHESTRATOR 4.0 PATCH 5 - S... Instruction Manual

McAfee

McAfee EPOLICY ORCHESTRATOR 4.0 PATCH 5 - S... Instruction Manual

McAfee VPM80E005RAA - VirusScan Professional 2004 User manual

McAfee

McAfee VPM80E005RAA - VirusScan Professional 2004 User manual

McAfee NETSHIELD - FOR NETWARE SERVERS User manual

McAfee

McAfee NETSHIELD - FOR NETWARE SERVERS User manual

McAfee INTERNET SECURITY 5.0 User manual

McAfee

McAfee INTERNET SECURITY 5.0 User manual

McAfee DFFCDE-AA-DA - Endpoint Encryption For Files User manual

McAfee

McAfee DFFCDE-AA-DA - Endpoint Encryption For Files User manual

McAfee VIRUSSCAN WIRELESS 1.0 - User manual

McAfee

McAfee VIRUSSCAN WIRELESS 1.0 - User manual

McAfee VIRUSSCAN 8.7I Instruction Manual

McAfee

McAfee VIRUSSCAN 8.7I Instruction Manual

McAfee VIRUSSCAN ENTERPRISE 8.7I PATCH 1 - S... Instruction Manual

McAfee

McAfee VIRUSSCAN ENTERPRISE 8.7I PATCH 1 - S... Instruction Manual

McAfee AVDCDE-AA-AA - Active Virus Defense Suite User manual

McAfee

McAfee AVDCDE-AA-AA - Active Virus Defense Suite User manual

McAfee DTP-1650-MGRA - Network DLP Manager 1650... User manual

McAfee

McAfee DTP-1650-MGRA - Network DLP Manager 1650... User manual

McAfee VIRUSSCAN 5.1 Service manual

McAfee

McAfee VIRUSSCAN 5.1 Service manual

McAfee EPOCDE-AA-BA - ePolicy Orchestrator - PC User manual

McAfee

McAfee EPOCDE-AA-BA - ePolicy Orchestrator - PC User manual

McAfee HISCDE-AB-IA - Host Intrusion Prevention User manual

McAfee

McAfee HISCDE-AB-IA - Host Intrusion Prevention User manual

Popular Software manuals by other brands

Adobe 23101335 - Photoshop - PC manual

Adobe

Adobe 23101335 - Photoshop - PC manual

Snom phones Frequently asked questions

Snom

Snom phones Frequently asked questions

Asus Direct Console user guide

Asus

Asus Direct Console user guide

HP Rx2620-2 - Integrity - 0 MB RAM user guide

HP

HP Rx2620-2 - Integrity - 0 MB RAM user guide

Canon ELURA 100 - Camcorder - 1.3 MP instruction manual

Canon

Canon ELURA 100 - Camcorder - 1.3 MP instruction manual

Dell PowerEdge 1850 Information update

Dell

Dell PowerEdge 1850 Information update

Adobe ACROBAT SDK 8.1 manual

Adobe

Adobe ACROBAT SDK 8.1 manual

Aiphone CommunCenter Operation manual

Aiphone

Aiphone CommunCenter Operation manual

ACRONIS RECOVERY - FOR MICROSOFT EXCHANGE manual

ACRONIS

ACRONIS RECOVERY - FOR MICROSOFT EXCHANGE manual

Sharp MX-5111N Operation manual

Sharp

Sharp MX-5111N Operation manual

Sharp PN-L702B Operation manual

Sharp

Sharp PN-L702B Operation manual

Novell IDENTITY MANAGER 3.6.1 - PASSWORD MANAGEMENT manual

Novell

Novell IDENTITY MANAGER 3.6.1 - PASSWORD MANAGEMENT manual

Nortel Voice Mail Operation guide

Nortel

Nortel Voice Mail Operation guide

Extreme Networks Sentriant AG Software user's guide

Extreme Networks

Extreme Networks Sentriant AG Software user's guide

AVG ANTI-VIRUS 2011 - REV 2011.11 user manual

AVG

AVG ANTI-VIRUS 2011 - REV 2011.11 user manual

ZyXEL Communications VANTAGE CNM 2.0 - quick start guide

ZyXEL Communications

ZyXEL Communications VANTAGE CNM 2.0 - quick start guide

Axis Axis 211 brochure

Axis

Axis Axis 211 brochure

Orion OE392-10-GPCXP Technical guide

Orion

Orion OE392-10-GPCXP Technical guide

manuals.online logo
manuals.online logoBrands
  • About & Mission
  • Contact us
  • Privacy Policy
  • Terms and Conditions

Copyright 2025 Manuals.Online. All Rights Reserved.