Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

McAfee Policy Auditor

McAfee Policy Auditor helps you report consistently and accurately against key industry mandates and internal policies across your infrastructure or on specific targeted systems. Policy Auditor is an agent-based IT audit solution that leverages the Security Content Automation Protocol (SCAP) to automate the processes required for internal and external IT audits.


Features:

  • Predefined templates for industry regulation
    Policy Auditor ships with a variety of templates including PCI DSS, SOX, GLBA, HIPAA, FISMA, and the best practice frameworks ISO 27001 and COBiT.
  • New standards in compliance validation
    New standards in compliance validation McAfee Policy Auditor is Security Content Automation Protocol (SCAP) validated enabling agencies to comply with the Federal Desktop Core Configuration (FDCC) standard.
  • Unprecedented integration with ePO and Vulnerability Manager
    The single ePO console lowers cost of ownership by consolidating endpoint security management and compliance management, easing agent deployment, management, and reporting. Integration with Vulnerability Manager enables organizations to consolidate agent and agentless audits.
  • Fast, automated import of industry benchmarks
    Download benchmarks from authoritative sites, and, within minutes, view detailed security guidance can confirm regulatory compliance or design your own internal governance policies based on security community best practices
  • Continuous Audit Model and Blackout Window
    Security and audit teams can set the frequency of data capture to support automated reports with accurate data. To prevent disruption to critical business applications, a blackout window lets IT operations block audit data capture during key business periods
  • Scripting Further Extends Policy Auditor capabilities
    Organizations also have the ability to create rules from any scripting language supported by the system being audited to extend the check capabilities of Policy Agents further. Sample languages include VBScript, Batch files, Perl and Python.
  • Streamlined deployment and management
    The McAfee ePolicy Orchestrator (ePO) platform provides easy Policy Auditor deployment, and simplified reporting and compliance management.
Favoured:
0

Listing Details

Vendor
McAfee
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2013-06-19
Owner
michelemjordan
Add'l Info
Integration + Innovation = Compliance Efficiency
Created
2009-06-12
Tags
Audit, Compliance, Policy
  • 457.png
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
    • - Network Enumerators
    • - Passive Fingerprinters
    • - Active Fingerprinters
    • - Vulnerability Exploitation
    • - Network Mapping
    • - Distributed Scanners
    • - Host Scanners
    • - Website Scanners +
    • - Database Scanners
    • - Wardialers
    • - Wireless Tools
    • - Bluetooth Scanners
    • - Network Scanners
    • - Vulnerability Management
    • - Compliance +
      • - PCI DSS
      • - SOX
      • - NERC
      • - HIPAA
      • - GLBA
      • - FISMA
      • - Basel II
      • - NSA
      • - Bill 198
      • - US FDA CFR Pt 11
      • - NSSC
      • - FDCC
      • - JSOX
    • - Mobile Device Scanners
    • - Pen-Testing Distros
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message