|
ServerBank ¤O±ô¸ê°TServerBank¸ê°T±ÄÁʺô >
¨¾¬r¦w¥þ³nÅé
|
|
|
¡@ |
Benefits:
- Avoid repeat scans, with
real-time file integrity monitoring
Until now, meeting the file
integrity monitoring (FIM)
requirements of the PCI DSS has been
difficult. Previous tools have
merely provided ¡§periodic¡¨ file
integrity monitoring, using
resource-intensive scans. McAfee PCI
Pro eliminates this problem with
real-time file integrity monitoring,
which continuously detects all
changes, with a very low impact on
resources. Real-time FIM provides
greater information about every
change, including the user and
program used to make the change. It
also eliminates the need to perform
scan after scan on servers,
databases, and network devices. PCI
Pro provides this level of
monitoring across the broadest set
of platforms.
- Eliminate the guesswork in
monitoring for compliance
McAfee PCI Pro contains default
filter profiles for more than 50
operating systems and applications,
and defines the most important files
and registry objects that must be
tracked for PCI compliance. These
filter profiles have been validated
by leading qualified security
assessors (QSAs), and have been used
in many successful PCI audits by
McAfee customers. Operating systems
and applications for the default
filter profiles include: AIX, HP-UX,
CentOS/Redhat/SuSe Linux, Solaris,
Windows, iSeries (AS400), Apache
Webserver, IIS Webserver, Apache
Tomcat server, IBM Websphere, JBoss,
BEA WebLogic, Siebel, DB2, Oracle
and SQL Server.
- Quickly identify insecure
configurations
McAfee PCI Pro provides
configuration assessments of
operating systems, software, and
network devices, and alerts you of
configurations that put you at risk
- Isolate and secure audit
trails
Using a central database, McAfee
PCI Pro manages and stores audit
trails from servers, databases, and
network devices. The database can be
secured to prevent users from
accessing sensitive information that
is not within their authorized
responsibilities.
- Centralize management of
multiple databases
McAfee PCI Pro converts
compliance requirements and controls
into audit settings through a
central console. A uniform,
easy-to-use interface reduces the
complexity involved in working with
different database platforms, and
allows the configuration of various
audit options including the
applications, usernames, and fields
to be monitored. Many popular
database platforms¡Xincluding Oracle,
Microsoft SQL Server, Sybase ASE/ASA
and IBM DB2¡Xare supported today. PCI
Pro tracks both system level
changes/activities and data changes
in real-time, and captures the
¡§before¡¨ and ¡§after¡¨ values in the
audit trail.
Features:
- Built-in reports
Packaged reports are provided to
analyze large audit trails. These
can be generated on-demand, or
scheduled to be mailed out at
regular intervals. Reports in
various categories like PCI,
Sarbanes-Oxley (SOX), and change
management compliance are available
and can be used to automate control
requirements and improve policy
compliance. PCI reports can be used
to identify security violations like
accounts with non-expiring
passwords, unsuccessful logon
attempts, modification of sensitive
data using unauthorized programs,
etc. Change policy compliance
reports can be used to identify
policy violations caused by changes
performed outside of the database
maintenance windows or approved
change manifest.
- Database monitoring
McAfee PCI Pro provides
real-time database audit
capabilities. PCI Pro tracks log-on/
log-off activity, sensitive data
access, changes to database schema,
and stored procedures and data
content. The software also tracks
account creation, deletion, and
other privileged operations.
- Network change and
configuration monitoring
McAfee PCI Pro allows
organizations to establish
configuration standards for network
devices, and provides the capability
to monitor the compliance of the
devices in real-time. The software
restores devices to known
configurations, and provides
detailed audit trails by user.
Devices can be manually added, or
discovered using simple network
management protocol (SNMP).
Configuration change tracking is
supported through syslog and
scheduled backup.
- Audit trail management
Maintain the audit trail,
encrypted in a secure database that
can be configured to store data
according to your organization¡¦s
data retention policy. PCI Pro keeps
a detailed record of all operations
performed on devices, with details
such as who performed the operation,
the time the operation was
performed, and the result of the
operation.
- Intuitive web interface
Filter profiles can be easily
customized using PCI Pro. Alerts can
be displayed on the console, or sent
via email. Powerful search
capabilities allow users to
drill-down on areas of interest.
- Multi-vendor support
McAfee PCI Pro provides an
integrated solution for devices from
multiple vendors such as Cisco, HP,
Nortel, Force10, D-Link, Juniper-NetScreen,
3Com, Foundry, Fortinet, ADTRAN,
Enterasys, Huawei, Extreme, Proxim,
Aruba and Blue Coat. Multiple
protocols like SSH, Telnet, SNMP &
TFTP are supported to query the
network device configuration, and
track changes. McAfee PCI Pro also
supports bulk operations such as
configuration backup/download, and
templates for popular and frequently
used configuration tasks like
password changes, SNMP
configuration, etc.
¡@ |
|
McAfee McAfee PCI Pro - ServerBank¸ê°T±ÄÁʺô McAfee PCI Pro ¨¾¬r¦w¥þ³nÅé
¡@
Supported
Operating Systems (OS)
- Windows NT
- Windows 2000/2003/2008
- Windows XP/Vista
- Windows XPE
- Windows XP/Vista (64-bit)
- Windows 2003/2008 (64-bit)
- Red Hat Enterprise Linux 3/4/5
- CentOS 4/5
- SUSE Enterprise Linux 9/10
- Oracle Enterprise Linux 5
- Solaris 8/9/10
- HP-UX 11.00/11.11/11.23
- AIX 5.2/5.3
- IBM i5/OS (AS400)
V5R3/V5R4/V6R1
- IBM 4690 OS V5
Supported Databases
- Oracle 8i/9i/10g
- SQL Server 7/2000/2005
- DB2 8.x/9.x
- DB2 for iSeries V5R4
Supported Network Devices
¡@ |
Vendor |
Device Type |
Supported
Model/Series
|
¡@ |
Cisco |
IOS Switch |
All models of
Cisco IOS Switches |
¡@ |
IOS Router |
All models of
Cisco IOS Routers |
¡@ |
Firewall |
All models of
Cisco PIX firewalls & FWSM Modules |
¡@ |
IAD |
All models of
Cisco IAD Devices |
¡@ |
Access Points |
All models of
Cisco Aironet Access Points |
¡@ |
CatOS Switch |
All models of
Cisco CatOS Switches |
¡@ |
Access Server |
All models of Cisco Access Server
models |
¡@ |
Content Switch |
All models of
Cisco Content Switches |
¡@ |
ASA |
All models of
Cisco ASA SingleContext & Multiple
Context Models |
¡@ |
Voice Gateway
Devices |
All models of
Cisco Voice Gateway Devices |
¡@ |
VPN
Concentrators |
All models of
Cisco VPN Concentrator Devices |
¡@ |
MDS Switch |
All models of
Cisco MDS Devices |
|
HP |
Procurve
Switch |
Switches &
Menu based 4000M & 8000M models |
¡@ |
Procurve
Access Point |
All models of
HP Procurve AccessPoints |
|
Foundry |
Switch |
Foundry
BigIron & FastIron Edge Switches |
|
3Com |
Switch |
All models of
3Com menu based SuperStack switches |
|
Fortinet |
FortiGate
Firewall |
All models of
FortiGate firewalls & FortiMail
devices |
|
Juniper |
Netscreen
Firewall |
All models of
Netscreen Firewalls |
¡@ |
J-Series
Router |
All models of
Juniper J-Series Routers |
|
Enterasys |
Switch |
All models of
Enterasys Matrix N Series Switches |
|
ADTRAN |
LAN Switch |
All models of
ADTRAN LAN Switches |
|
Nortel |
Passport
Switch |
All models of
Nortel Passport 1600 Series, 8600
Series Switches |
¡@ |
BayStack
Switch |
All models of
Nortel BayStack Switches |
¡@ |
BayStack
Business Policy Switch |
All models of
Nortel BayStack Business Policy 2000
Series |
|
Aruba |
WiFi Switch |
All models of
Aruba WiFi Switches |
|
Proxim |
Access Points |
All models of
Proxim Access Points |
|
Extreme |
Black Diamond
Switch |
All models of
Extreme Black Diamond Switches |
¡@ |
Summit Switch |
All models of
Extreme Summit switches running with
Extremeware & ExtremewareXOS |
|
Force 10 |
Switch |
All models of
Force10 E, S & C Series Switches |
|
Netgear |
Switch |
Netgear
Prosafe Switches |
|
Dell |
Switch |
All models of
Dell Power Connect Switches |
|
SlimLine |
Appliance |
All models of
SlimLine devices |
|
DLink |
Switch |
DES 3010 , DES
3899 , DXS 3259 |
|
Blue Coat |
Proxy SG |
All BlueCoat ProxySG devices |
|
Huawei |
Router |
All models of
Huawei AR Routers |
¡@ |
|
¡D¥»¤å¥óªº¸ê°TY¦³×§ï¡A®¤¤£¥t¦æ³qª¾¡C
¡D³W®æ©Î³ø»ùY¦³»~¡A¥Hì¼t«¬¿ý©Î¥¿¦¡³ø»ù³æ¬°¥D¡C
¡D¥»ºô¯¸¤º®e©Î¤å¥ó·í¤¤©Ò´£¤Î¤§«~µP¤Î²£«~¦WºÙ©Î¹Ï¤ù§¡¬°¨äì©ÒÄݤ½¥q¤§ª©Åv¡B°Ó¼Ð©Îµù¥U°Ó¼Ð¡C
º¡¤@©w¼Æ¶q©Îª÷ÃBÁÙ¦³¦h´ÚÃØ«~¥i¨Ñ¿ï¾Ü³á!
ServerBank ¤O±ô¸ê°Tµ¹§A³Ì¶WÈÀu´fªºMcAfee - McAfee PCI Pro - ¨¾¬r¦w¥þ³nÅé
,³Ì¦nªºMcAfee - McAfee PCI Pro±ÄÁÊ¿ï¾Ü´N¦b ServerBank!
|
¥æ©ö¤è¦¡¡G
±z¤£½T©w¥H¤W°Ó«~¬O§_²Å¦X±zªº»Ý¨D?¨SÃö«Y¡A§ÚÌ·|¬°±z¦Vì¼t½T»{¡C©Î¬O±z§Æ±æ¼W´î¥H¤W°Ó«~¤§³W®æ¹s²Õ¥ó¡A§Ú̳£¥i¼u©Ê°t¦X±zªº»Ýn³ø»ù¤Î¥X³f¡C ¦p±z¹ï¥H¤W²£«~³W®æ¥H¤Î»ù®æº¡·N¡A¥i³z¹L¥H¤U¤è¦¡¶i¦æ±ÄÁÊ¡G
1.¹q¸ÜÁpô¡G ½Ðª½±µ¨Ó¹q¡G(02)8969-0901 |
2.ºô¸ô¸ß»ù¡GÂI¿ï¥»¶ÁʶR¸ß»ù§ÚÌ·|¥ß§Y»P±zÁpô! |
3.¨Ó¨ç¸ß»ùEmail: service@serverbank.com.tw |
|
¥I´Ú¤è¦¡¡G¦p«È¤á¬°º¦¸¥æ©ö±Ä²{ª÷¥æ©ö¡C |
¶Ç¯uq³æ¡G ª½±µ±N¥¿¦¡³ø»ù³æñ¦W«á¶Ç¯u¦Ü(02)2253-9016 §Y§¹¦¨qÁʵ{§Ç¡A§ÚÌ·|©ó³Ìµu®É¶¡¤º¹q¸Ü½T»{q³æ¡C |
±H°e®É¶¡¡G¨Ì³y¤£¦P¼tµP¥N²z°Ó¦³©Ò¤£¦P¡A¤j¦h¼Æ°Ó«~©ó 7 Ó¤u§@¤Ñ¯à°e©è«È¤áºÝ¡A§Ú̦¬¨ì±zq³æ®É·|¦P®É¦^Âбz½T©w¥æ´Á¡C |
°e³f¤è¦¡¡G(1) ì¼t©Î¬O¥N²z°Óª½±µ°t°e (2) ¥ÑServerBank©e°U¦v°t©Î¬O³f¹B¤½¥q°e¹F¡C |
°e³f½d³ò¡G¥xÆW¥»®q¦a°Ï¡A¹B¶O¥Ñ ServerBank ¬°±zt¾á¡Aª`·N¡I¦¬¥ó¦a§}½Ð¤Å¬°¶l¬F«H½c¡C |
°â«áªA°È¡GY²£«~¥»¨·å²«©Î¹B°e¹Lµ{¾ÉP·s«~·å²«¡A¨ì³f7¤é¤º¥i§ó´«·s«~¡C |
«O©T¬Fµ¦¡G ¹ê»Ú¥Hì¼t¤Î¥N²z°Ó¤½§i«O©T±ø¥ó¬°¥D¡A¬d¾\Áʪ«»¡©ú»P«O©TªA°È¡C |
¤O±ô¸ê°T ServerBank Inc. ²¤¶
¥Ø«e¤w¸g¬°¶W¹L30000®a¥ø·~´£¨ÑIT¸ê°T¬[ºc©Ò»Ýªº³nµwÅé³]³Æ¡A¦U¦æ·~ª¾¦W«È¤á¦p¡G
»s³y·~¡G¥x¿n¹q¡B¤Í¹F¡BÂE®üºë±K¡B¤O´¹¥b¾ÉÅé¡B¦w±¶Û¡B¥xÆWªFªÛ¡B¥xÆW^¸â¡B¥¿´Q¡B§¡»¨¡B§»¥¿¡B©MºÓÁp¦X¡BªF¶©¡B«Ø¿³¹q¤l¡B¸§Q®ú©úùÖ¡B®õª÷Ä_¡B¯«³q¡B¯«¹F¡B°¶³Ð¤O¡B±d¥þ¡B°ê²³¡B±á¬P¥b¾ÉÅé¡B¼s¹F¹q¸£¡B¼s¿o¹q³q¡BÁpµØ®ðÅé¡BÄ_¦¨¤u·~¡B¼s¹B¡B
¥~°Ó¡G ¥xÆWNTT¡B¥xÆW·Nªk¥b¾ÉÅé¡B¥xÆWNEW Balance¡B¥xÆWNEC¡B¥xÆWSONY¡B¥xÆW´I¤h¥þ¸S¡B
ª÷¿Ä¡G°ê®õ¤H¹Ø¡B¤¸¤jÃÒ¨é¡B«n¤s¤H¹Ø¡B°ê®õ¥@µØ¡B¥xÆW¤u·~»È¦æ¡B¥xÆWª÷¿Ä¬ã°V°|¡B¤T°Ó¬ü¨¹¤H¹Ø¡B¤j¸Û«OÀI¡Bªk°ê¤Ú¾¤¤H¹Ø¡B«O¸Û¤H¹Ø¡B°êµØ¤H¹Ø¡B²Î¤@ÃÒ¨é¡B´I¨¹¤H¹Ø¡BµØ«n²£ª««OÀI¡B·s¥ú¤H¹Ø¡B¥xÆW²£·~«OÀI¡B
¬y³q¡G ·s¥ú¤T¶V¡B¤T¹´(·L·¼s³õ)¡B«H¸q©Ð«Î¡Bªü¨½¤Ú¤Ú¡B
Æ[¥ú¡G ¤¤«H¶º©±¡B¶³®Ô¶º©±¡B¤Ó¥¬v¡BµØ®õ¡B¤»ºÖ¡B¤Ñ²»´¹µØ¡B¬K¤Ñ°s©±¡B»·¶¯®ü¬v¤½¶é¡B
¹«~¡G ¥xÆWµÒ°s¡B¤Ñ¤¯¯ù¸¡B¤¸¯ª¡B¥ú¬u¡B·sªF¶§¡B¦w¤ß¹«~(¼¯´µº~³ù)¡B®õ¤s¡B®üÅQ¤ý¡B²Î¤@¥ø·~¡B¾ó¤ì±í¡B¯ø´µ¸ª¡B«¢¸ò¹F´µ¦B²N²O¡B
´CÅé¡G ³ü¶Ç´C¡BÁp¦X³ø¡B¥xµø¡BµØµø¡B«D¤Z¹qµø¡B¨È¬w¼s¼½¡B¸ºÐ¼s¼½¡B·¼é°Û¤ù¡B®É³ø©P¥Z¡B
±Ð¨|¡G ¥xÆW¤j¾Ç¡B¥æ³q¤j¾Ç¡B²MµØ¤j¾Ç¡B¤j¦P¤j¾Ç¡B¤¤¥¡¤j¾Ç¡B¤¤ì¤j¾Ç¡B¤¤¿³¤j¾Ç¡B»²¤j¡B°ê»y¹ê¤p¡BÂù¶é°ê¤p¡BµØ¿³¤¤¾Ç¡BªFªù°ê¤p¡B¥x¬ì¤j¡B©ú§Ó¡BªF§d¡BªF®ü¹qºâ¤¤¤ß¡Bªø©°¤j¾Ç¡B«n¨È§Þ³N¾Ç°|¡B¨ÈªF¡B«nªù°ê¤¤¡B¥x®v¤j¡BªFµØ¡B¶§©ú¡B¶³¬ì¤j¡B¦Ë®v¡Bº[«n¤j¾Ç¡B±X¤s¬ì¤j¡B²H¦¿¡B²M¶³¡B³{¥Ò¡B
²Õ´¡G «H«O°òª÷¡B«C³Ð·|¡B¤¤¤p¥ø·~¨ó·|¡BºÞ²z¬ì¾Ç¾Ç·|¡Bì¦í¥Á±Ú¤å¤Æ±Ð¨|¨ó·|¡B¸êµ¦·|¡B¥xºô¤¤¤ß¡B¶³ªù»R¶°
¬F©²¡G ¤¤¬ã°|¡B¤¤¬ì°|¡B°·«O§½¡B¤Ñ¤å¬ì±ÐÀ]¡B¦Á¤îĵ§½¡BªO¾ô¹A·|¡B¥x¥_¿¤®ø¨¾§½¡B°ê½Ã°|¡B®ü¥ÍÀ]¡B°ê¦w§½¡B
ÂåÀø¡G ¥x¤jÂå°|¡B®¦¥D¤½Âå°|¡B¥_¨Ê¦P¤¯°ó¡B®H¨½°ò·þ±ÐÂå°|¡B¸¯Äõ¯À¥v§J¡Bù¤ó¤jÃļt¡B¥Ã«HÃÄ«~¡B
¹q«H¡G ¤j²³¹q«H¡B¥xÆW©Tºô¡B»·¶Ç¹q«H¡B
¥æ³q¡G ¥x¥_±¶¹B¤½¥q¡BµØ¯è¡B¤±]±¶¹B¡B¥xÆW´¼¼z¥d¡B
¤½¯q¡G³ßéw¨à¡B¥ì¨l¡B¶§¥ú°òª÷·|¡B»Z¤½^¡B¿ßÀYÆN
©v±Ð¡G ¤¤¥xÁI¦x¡B°ò·þ±Ð¦æ¹D·|¡B°ò·þ±Ð®û«H·|¡B
x¤è¡G ªÅx¥q¥O³¡¡B°ê¨¾Âå¾Ç°|¡B
|
|
|
|
|
|
|
¡@ |
|