Total Protection (ToPS) for Compliance v7.x
June 02, 2014
Ranges from £9.73 to $61.50 per node based on the number of nodes.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Visualisation tools, mobile device support, vulnerability management capabilities.
- Weaknesses: Only a cosmetic one: The vulnerability manager tool is outside of ePO with separate interfaces.
- Verdict: The added capabilities for asset management and vulnerability management made a good tool even better.
The asset and vulnerability modules are new or updated in this version. The integration of McAfee Asset Manager and McAfee Vulnerability Manager provides added network visibility for the enterprise, enabling a comprehensive view of security, configuration, compliance and risk management on the network. McAfee Asset Manager provides complete network visibility with real-time network, device and user intelligence, enabling McAfee Vulnerability Manager to maintain network-wide, up-to-date, total risk visibility. By leveraging the integration between McAfee Asset Manager and McAfee Vulnerability Manager, total risk visibility can be combined with threat information in near real-time, creating a view of total risk intelligence that reflects the actual risk state of a network.
ToPS for Compliance conducts agent/agent-less scans on anything with an IP address - from print servers to smartphones to critical infrastructure devices. The same console serves as the "single pane of glass" from which detailed analytics can be viewed and reported. All risk, policy and asset management and reporting is contained in ePO. The Vulnerability Manager is a separate interface, but data is exchanged automatically and rolled-up reporting is available in ePO. The Vulnerability Manager does have its own reporting capabilities and can actually stand alone.
Key features include active and passive network protection, where network information is continuously collected in real time to reflect the current state of the network. The active and passive network discovery and monitoring reveals servers, laptops, networking equipment virtualised, and mobile and hidden devices on a network, including mobile devices such as such as Windows, BlackBerry, iOS and Android devices. Threat identification and correlation is offered, as the tool automatically ranks the risk potential of new threats by correlating events to assets and vulnerability data. It also automates manual audits and the configuration assessment and compliance assessment (SOX/PCI/HIPAA/FDCC/ISO27002) of environments. Priority-based auditing and remediation combines vulnerability, severity and asset criticality information to quickly identify, rank and address violations and vulnerabilities. Additionally, the threat detection capabilities for even non-managed (agentless) devices using the information fingerprinted on the device and McAfee's threat database is a great source of information. Reporting was very strong and the usability/visualisation capabilities, such as the drilldown to vulnerability root cause/remediation information, is great.
ToPS for Compliance is delivered as software or appliance and can also be installed on virtual machines. It can be implemented and collecting data for analysis in a matter of minutes. ToPS deploys on Windows Server 2003 or 2008 R2 and supports SQL Server 2005, 2008 Express or 2008 R2 database platforms.
Support includes 24/7 access to phone, email and website resources. There are several premium options available. The fee for the support varies with the implementation size and support options selected.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry