The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

We are sorry, This PDF is available in download format only


IT SECURITY MANAGEMENT * McAfee ePolicy Orchestrator * Deep Command Industry IT security management across industries Business Challenge Comprehensive security management solution allowing complete security control, even if PCs are powered off or inaccessible through in-band channels Technology Solution McAfee ePolicy Orchestrator Deep Command Enterprise Hardware Platform PCs running the Intel® Core™ vPro™ processor family BUSINESS AND SOLUTION DETAILS MEETING MARKETPLACE DEMANDS McAfee ePolicy Orchestrator Deep Command enables IT and security organizations that deploy PCs running the Intel® Core™ vPro™ family of processors to reduce costs and maintain security for end- points that are disabled or powered off. This solution represents a new way to deliver security man- agement beyond the operating system by enabling enterprise environments to: • Optimize security. Put protection in place ahead of threats, even if systems are powered off or using encryption. • Reduce power usage. Maintain management access and enforce compliance of powered off systems while conserving energy. • Reduce IT costs. Eliminate frequent desk-side visits and lengthy security service calls. • Enforce compliance. Ensure powered-off, remote, and mobile endpoints adhere to policies and configurations. • Save time. Improve IT service levels with immediate access to endpoints regardless of network access. BUSINESS CHALLENGE Recent high-prole security breaches were the result of unpatched systems. The need to correctly identify systems, and the ability to apply security patches regardless of their power state, become must-haves for any organization. Since malware can move fast, the longer it takes to quarantine the compromised systems, the greater the threat to the network. Solution Blueprint: McAfee ePolicy Orchestrator Deep Command Today’s PCs have traditionally been hard to remotely or automatically inventory, diagnose, and update when their power is off or their operating system (OS) is down. Users, hackers, viruses, and various threats can also disable or remove management and security agents, so IT administrators no longer have visibility or control of the PC or its hardware and software assets. Endpoint administrators are assailed by increasing costs, threats, and business requirements. Each desk-side visit can cost USD 250 or more, accounting for the technical resources involved and user 1 downtime . It may also be a challenge for IT to reach every user’s desk. Remote ofces, teleworkers, and mobile employees depend on service desk calls and overnight shipments to the service depot. These busy users often ignore problems, working on noncompliant, vulnerable systems until a cata- strophic hang, a lockout, or disruption by malware. Security has high operating costs and chief information security ofcers (CISOs) want to increase se- curity while maintaining or reducing those costs. Also, organizations need to reduce their power con- sumption to lower costs and reduce the company’s carbon footprint, but still need to have security access for updates and security patches, even when a PC is powered off. 2 Further complicating the situation, PCs using endpoint encryption can be awakened but not updated without pre-boot authentication. This increases costs and lowers overall security on endpoints due to missing patches and updates, forcing companies to choose between security Read the full SOLUTION BLUEPRINT.

Related Videos