In many IT organizations, a gap persists between authorized and documented change, and actual change activity. McAfee Change Control bridges this gap by providing real-time visibility of changes being made, accountability to validate change activity, and technology-based enforcement of change policy to prevent unwanted or unauthorized changes.
Reduce operational costs
By reducing the manual effort to track and account for changes made to systems, and by proactively preventing unauthorized or inappropriately applied changes, McAfee Change Control reduces outages, security breaches and compliance violations that result in additional IT costs.
Gain real-time visibility into changes happening across the entire IT infrastructure
McAfee Change Control allows you to track changes in real-time, so you'll always know what is happening across the infrastructure. You can even search the real-time change database for rapid root-cause analysis.
Increase accountability for employees and outsourced IT providers
Ensure changes are made according to authorized policy and process. McAfee Change Control provides automatic and accurate monitoring of actual changes, and identifies any changes made outside of policy.
Enforce change policy and processes
McAfee Change Control ensures that only in-process changes are allowed by proactively blocking out-of-process and unwanted changes to systems before they occur.
Enforce emergency change processes
Unexpected incidents sometimes dictate the escalation of changes that have not been pre-approved, but still need to be executed. McAfee Change Control provides visibility into the emergency change activity for auditing purposes, and can enforce an emergency change process.
Real-time file integrity monitoring
McAfee Change Control captures all changes to files, and allows administrators to quickly identify where policies are being challenged. Real-time monitoring captures server name, file name, time of change, change type, and change content.
McAfee Change Control allows you to benchmark your servers by performing configuration assessments using Center for Internet Security (CIS) supplied benchmarks, which help identify configuration settings that are insecure.
Change prevention capabilities within McAfee Change Control block out-of-policy changes before they occur. Protection is linked directly to policy, and changes are verified against the change source, time window, or approved change ticket. Changes that are attempted outside of policy on enabled servers are not allowed, but are logged and can be sent as alerts.
Alerts in real-time
For increased visibility, McAfee Change Control delivers real-time alerting for exceptional changes, as well as customizable dashboards and reports that illustrate change patterns that affect compliance, security, and availability.
McAfee Change Control is easily configurable to increase the availability of IT services, accelerate the successful implementation of Information Technology Infrastructure Library (ITIL) projects, and reduce the cost of compliance initiatives such as Sarbanes-Oxley (SOX) and the Payment Card Industry Data Security Standard (PCI DSS).
McAfee Change Control integrates with change management, data center automation, and configuration management database (CMDB) solutions from HP, BMC, IBM, and others.