Difference between revisions of "MIC"

From ESS-WIKI
Jump to: navigation, search
(Overview)
(Features)
Line 9: Line 9:
  
 
=Features=
 
=Features=
 +
'''<big>Prevent unapproved changes and applications</big> <br>
 +
 +
Block unauthorized applications and change attempts
 +
Ensure that only approved software runs on the point-of-service infrastructure. Easily block unauthorized, vulnerable, or malicious applications that can compromise the security of critical systems.
 +
 +
Link change protection to policy
 +
Verify changes against the source, time window, or approved change ticket. Changes outside of policy are blocked, and the attempt is sent as an alert to administrators, reducing outages and violations.
 +
 +
Monitor file integrity and file changes
 +
Check files and directories for changes to content and permissions. McAfee Integrity Control provides continuous file integrity monitoring, essential for verifying the security of an environment and meeting compliance requirements.
 +
 +
Meet and sustain PCI DSS compliance
 +
Get continuous information about change events across the point-of-service infrastructure to comply with PCI DSS requirements. See information about every change, including the user and the program used to make the change.
 +
 +
Get dynamic whitelisting via a trusted source
 +
Eliminate the need for IT administrators to manually maintain lists of approved applications. A repository of trusted applications prevents execution of unauthorized scripts and dynamic link libraries, and defends against exploits.
 +
 
=Supported Operating Systems=
 
=Supported Operating Systems=
 
=Documents=
 
=Documents=

Revision as of 10:33, 31 May 2016

Overview

Block unauthorized, out-of-policy changes McAfee Integrity Control (MIC) blocks unauthorized applications and change on fixed-function, point-of-service infrastructures, including ATMs, point-of-sale (POS) systems, and kiosks. Combining industry-leading whitelisting and change control technology, it prevents out-of-policy changes while still allowing updates from authorized sources.

  • Reduce change-related outages and compliance violations.
  • Secure fixed-function devices with a fixed CPU or memory. A low-overhead footprint does not impact system performance, and it is equally effective in standalone mode, without network access.
  • Dynamically manage whitelists and support multiple configurations for different business needs and devices.
  • Centralize deployment and management with the McAfee ePolicy Orchestrator console.

Features

Prevent unapproved changes and applications

Block unauthorized applications and change attempts Ensure that only approved software runs on the point-of-service infrastructure. Easily block unauthorized, vulnerable, or malicious applications that can compromise the security of critical systems.

Link change protection to policy Verify changes against the source, time window, or approved change ticket. Changes outside of policy are blocked, and the attempt is sent as an alert to administrators, reducing outages and violations.

Monitor file integrity and file changes Check files and directories for changes to content and permissions. McAfee Integrity Control provides continuous file integrity monitoring, essential for verifying the security of an environment and meeting compliance requirements.

Meet and sustain PCI DSS compliance Get continuous information about change events across the point-of-service infrastructure to comply with PCI DSS requirements. See information about every change, including the user and the program used to make the change.

Get dynamic whitelisting via a trusted source Eliminate the need for IT administrators to manually maintain lists of approved applications. A repository of trusted applications prevents execution of unauthorized scripts and dynamic link libraries, and defends against exploits.

Supported Operating Systems

Documents