Scanning is done from the McAfee security operations center, so there's no setup or configuration. Start managing threats immediately. No matter where you are, simply log in to a web portal.
With this service, you can evaluate weaknesses of network devices exposed to the Internet. See what the hackers see - vulnerabilities in your systems and applications exposed to the Internet - and take quick action to minimize the possibility of attacks.
At the Threat Correlation Module, assess how threats affect your risk profile. The risk ranking for each threat is correlated to current asset and vulnerability information about your enterprise. Now you can prioritize your vulnerabilities and respond quickly to protect your most valuable assets. The Threat Correlation module also gives you up-to-the-minute Threat Intelligence Alerts from McAfee Avert Labs.
You also get a complete map of your Internet-facing network, including wireless access points and load balancers, along with vulnerabilities and security status. This service analyzes all vulnerabilities and flawed configurations on operating systems, network devices, commercial applications, databases, wireless devices, and custom web applications.
Executive-level metrics and reporting make it easy to evaluate your security status, measure improvement, assess costs, and determine industry and government compliance, including how you measure up to mandates outlined in SOX, FISMA, HIPAA, and PCI DSS. If you require quarterly vulnerability scans for PCI compliance, use the McAfee PCI Certification Service. Customers also receive help with PCI security policy creation, self-assessment questionnaires and certificates of compliance for submission to acquiring banks.
Let McAfee do it all
This is a managed service, so there's no hardware or software to install; updates and patches are automatic; you manage your threat protection by simply logging in to the web portal.
Get a hacker's view of your network
McAfee Vulnerability Management Service scans the same Internet-facing devices that hackers target; McAfee helps you detect vulnerabilities and manage remediation to prevent hackers from penetrating your network.
Protect business availability
Identify your most important applications and systems, target high-risk vulnerabilities, and manage remediation to keep your business running with th proven, priority-based approach.
Use your resources more effectively
McAfee consolidates your manual processes and standalone tools into a single solution that makes your IT staff more effective.
Because there's no setup or installation required, you start managing threats immediately after you receive your license.
Regulatory compliance measurement
You can accurately determine whether you comply with government and industry regulations; McAfee gives you regulation-specific templates for Sarbanes-Oxley, FISMA, HIPAA, ISO27002, and PCI DSS, so that you can prepare for certification audits.
Threat identification and correlation
With Vulnerability Manager's Threat Correlation technology, you can instantly see how emerging threats affect your current risk profile; Threat Correlation ranks the risk of threats by correlating events to your asset and vulnerability data.
The integrated remediation technology gives asset owners exactly the information they need to manage threats discovered by McAfee with automated trouble ticket creation, assignment, verification, and closing.