Mcafee Virusscan Enterprise Protect Your Desktops and File Servers from Malicious Threats

Total Page:16

File Type:pdf, Size:1020Kb

Mcafee Virusscan Enterprise Protect Your Desktops and File Servers from Malicious Threats DATA SHEET McAfee VirusScan Enterprise Protect your desktops and file servers from malicious threats Keeping networks free from a wide range of threats—viruses, worms, rootkits, and Trojans— Key Advantages is more challenging than ever. Whether your organization is a global enterprise with full-time security staff or a small or medium-size business, McAfee® VirusScan® Enterprise software Unbeatable malware detection and removal ensures that your endpoint servers, desktops, and laptops remain free from malware. Protect your files from viruses, worms, rootkits, Trojans, and other threats. McAfee VirusScan Enterprise software combines techniques. With port blocking, file-name blocking, antivirus, antispyware, firewall, and intrusion prevention folder/directory lockdown, file share lockdown, and Proactive protection from zero- technologies to proactively detect and remove malware. infection trace and block, you can stop many new and day attacks Proactive protection against new It reduces the cost of managing outbreak responses, unknown malware files cold. and unknown buffer-overflow stops zero-day threats, and mitigates the window of Proactive Protection from Attacks exploits that target vulnerabilities in vulnerability—the time between the discovery of a Microsoft applications vulnerability and when fixes are deployed. Plus, with McAfee VirusScan Enterprise software is the industry’s first anti-malware software to offer patented intrusion Leverage McAfee GTI McAfee VirusScan Enterprise software, you have The worldwide presence of McAfee prevention with application-specific buffer-overflow the flexibility to detect and block malware based on Labs enables McAfee VirusScan your business needs: on access, on demand, or on a technology. Now, you can protect your users Enterprise software to leverage schedule. proactively against buffer-overflow exploits that target protection across file, network, web, vulnerabilities in Microsoft applications, and you can message, and vulnerability data. Unbeatable Malware Detection and Cleaning enjoy a more robust, advanced level of endpoint system Manage your security McAfee VirusScan Enterprise software uses the award- security by integrating your anti-malware technology The McAfee ePolicy Orchestrator® winning McAfee scanning engine to detect and clean with intrusion prevention. With McAfee VirusScan (McAfee ePO™) management malware and protect your files from viruses, worms, Enterprise software, your critical servers and data platform provides centralized rootkits, Trojans, and other threats. McAfee delivers are kept intact and available for business. For added deployment, policy configuration and enforcement, and detailed, comprehensive find-and-fix solutions for today’s threats protection, we lock down McAfee VirusScan Enterprise customizable reporting. and uses behavioral analysis to protect against new and software files and services so that malicious threats and unknown threats. Protect your systems with McAfee attacks don’t disable them. VirusScan Enterprise software’s advanced behavioral 1 McAfee VirusScan Enterprise DATA SHEET Optimized for Fast Performance and Reduced the globe and deliver real-time protection via our Key Advantages (continued) System Impact suite of security products. McAfee GTI works anytime, anywhere—at home, at work, or on the road. McAfee VirusScan Enterprise software has been Manage quarantined files designed to reduce system impact while scanning for Manage Your Security Easily configure policies to manage threats. Its persistence-caching technology saves a list and remove quarantined items. Centralized management and enforcement is the key of clean, scanned files. This allows the scanner to reduce to effective and efficient protection. McAfee VirusScan Enhanced email scanning duplicate file scanning, dramatically improving both Supports users who are using Enterprise software is deeply integrated into the McAfee on-access and on-demand scanning. With a reduced Microsoft Outlook or Lotus Notes ePO security management platform. The McAfee ePO memory footprint and faster boot times, users will have platform provides centralized deployment, policy lower power requirements than with prior versions. Specifications configuration and enforcement, and detailed reporting McAfee Global Threat Intelligence Technology for McAfee VirusScan Enterprise software, as well as Provides Real-Time Security many other McAfee security products. Workstation ■ Windows 10 McAfee Global Threat Intelligence (McAfee GTI) offers Easily Manage Quarantined Files ■ Windows 10 for Embedded one of the most comprehensive protection services on Configure policies to manage quarantined items easily Systems the market. With visibility across all key threat vectors— ■ with the quarantine policy manager. Before an on-access Windows 8.1 file, web, email, and network—and a view into the latest ■ or on-demand scan cleans or deletes a file, it creates a Windows 8 vulnerabilities across the IT industry, we correlate real- ■ backup copy of the original file and a registry value in the Windows 7 world data collected from millions of sensors around ■ quarantine directory. Windows 7 Professional for Embedded Systems e euatr st an ■ Windows 7 Ultimate for Embedded Securit piance Vuneraiit Maare Eai etr ntrusin Systems esearc esearc esearc esearc esearc esearc ■ Windows Vista ■ Windows Vista Business for nternet Embedded Systems ■ Windows Vista Ultimate for Embedded Systems ■ Windows XP SP3 ■ al Thr Windows XP Professional for b ea lo t G Embedded Systems 32-bit ■ Windows XP Tablet PC Edition SP2 S S In e t c e n ■ llig e Windows Embedded for Point of Service (WEPOS) Figure 1. McAfee GTI integrates real-time threat information across the six major threat vectors. 2 McAfee VirusScan Enterprise DATA SHEET Safeguard Email Programs Protected by McAfee Labs Specifications (continued) McAfee VirusScan Enterprise software includes the With a global research footprint, McAfee Labs provides ability to detect and clean viruses in Microsoft Outlook the most comprehensive global threat intelligence in the Server and Lotus Notes email on client systems. It scans industry. Backed by a portfolio of more than 400 patents ■ Windows Server 2012 R2 all client email messages that come to the desktop, and a network of millions of sensors spanning the ■ Windows Server 2012 including HTML text and attachments. Internet, McAfee Labs delivers unparalleled protection ■ Windows Small Business Server against both known and emerging threats via a complete 2011 Automatic Updates ■ suite of security products. Windows Embedded Standard Virus security products are only as good as their most 2009 recent updates. With McAfee VirusScan Enterprise Global Professional Services and Technical ■ Windows Embedded Point of Service 1.1 SP3 software, automatic daily updates ensure that your Support ■ Windows Embedded Point of desktops and file servers are always up to date with the Along with our McAfee Security Innovation Alliance Service Ready 2009 latest .DAT files and engines. integration partners, we offer a wide variety of professional ■ Windows Server 2008 R2 services that help you maximize your investment in Cutting-Edge Endpoint Protection ■ Windows Server 2008 SP2: security. We help you assess, plan, deploy, tune, and Standard, Enterprise, Datacenter, McAfee VirusScan Enterprise software is capable of manage your solutions more effectively and efficiently. Foundation, Web, HPC integrating with McAfee Threat Intelligence Exchange ■ Windows Small Business Server Make sure that everything runs smoothly during and to provide innovative endpoint protection. Using 2008 SP2 after installation with flexible programs from McAfee configurable rules, the McAfee Threat Intelligence ■ Windows Server 2003 R2 SP2 Technical Support. Our highly skilled and certified Exchange VirusScan Enterprise Module leverages ■ Windows Server 2003 SP2 security specialists have a wealth of knowledge and combined intelligence from the local endpoint context ■ Windows Small Business Server (file, process, and environmental attributes) and the resources at their fingertips and can be considered as an 2003 R2 SP2 current available collective threat intelligence (for extension of your IT team. ■ Windows Small Business Server example, organizational prevalence, age, reputation, and Learn More 2003 SP2 more) to make more accurate file execution decisions. ■ Citrix Xen Guest For more information, visit www.mcafee.com/us/ ■ Citrix XenApp 5.0, 5.6, 6.0, 6.5, 7.5, products/virusscan-enterprise.aspx. 7.6 2821 Mission College Boulevard McAfee and the McAfee logo, VirusScan, ePolicy Orchestrator, and McAfee ePO are trademarks or registered trademarks of McAfee, LLC or its Santa Clara, CA 95054 subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. Copyright © 2017 McAfee, LLC. 888 847 8766 62142ds_virusscan-enterprise_1015 OCTOBER 2015 www.mcafee.com 3 McAfee VirusScan Enterprise.
Recommended publications
  • Mcafee Epolicy Orchestrator DATA SHEET
    DATA SHEET McAfee ePolicy Orchestrator Centrally get, visualize, share, and act on security insights Security management requires cumbersome juggling between tools and data. This puts the adversary at an advantage by offering more time to exploit the gap not seen between the tools and do damage. In addition, the cybersecurity workforce is limited and needs to be empowered to manage cybersecurity complexity. The McAfee® ePolicy Orchestrator® (McAfee ePO™) management platform removes the time-consuming and potential human error effort and inspires those responsible to manage security quicker and with higher efficacy. Fundamental Security Proven Advanced Security Management Start with the fundamentals. Core to any security More than 30,000 businesses and organizations trust architecture is the ability to monitor and control the the McAfee ePO console to manage security, streamline health of endpoints and systems. Industry standards and automate compliance processes, and increase such as Center for Internet Security (CIS) Controls and overall visibility across endpoint, network, and security National Institute of Standards Technology (NIST) SP operations. Big companies rely on the McAfee ePO 800 153 security and privacy controls call this out as console’s highly scalable architecture, allowing large a must. The McAfee ePO console allows you to gain enterprises to manage hundreds and thousands of critical visibility and set and automatically enforce nodes from a single console. The McAfee ePO console policies to ensure a healthy security posture across provides an enterprise security administrator with the your enterprise. Policy management and enforcement opportunity to simplify policy maintenance, pull in third- across security products for your entire enterprise party threat intelligence leveraging Data Exchange Layer is accomplished from a single console, removing the (DXL), and integrate policies bi-directionally with an array complexity of managing multiple products.
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Virusscan Enterprise 7.1.0 Installation Guide
    Installation Guide Revision 1.0 VirusScan® Enterprise version 7.1.0 COPYRIGHT © 2003 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Networks Associates Technology, Inc., or its suppliers or affiliate companies. To obtain this permission, write to the attention of the Network Associates legal department at: 5000 Headquarters Drive, Plano, Texas 75024, or call +1-972-963-8000. TRADEMARK ATTRIBUTIONS Active Firewall, Active Security, Active Security (in Katakana), ActiveHelp, ActiveShield, AntiVirus Anyware and design, Appera, AVERT, Bomb Shelter, Certified Network Expert, Clean-Up, CleanUp Wizard, ClickNet, CNX, CNX Certification Certified Network Expert and design, Covert, Design (stylized N), Disk Minder, Distributed Sniffer System, Distributed Sniffer System (in Katakana), Dr Solomon’s, Dr Solomon’s label, E and Design, Entercept, Enterprise SecureCast, Enterprise SecureCast (in Katakana), ePolicy Orchestrator, Event Orchestrator (in Katakana), EZ SetUp, First Aid, ForceField, GMT, GroupShield, GroupShield (in Katakana), Guard Dog, HelpDesk, HelpDesk IQ, HomeGuard, Hunter, Impermia, InfiniStream, Intrusion Prevention Through Innovation, IntruShield, IntruVert Networks, LANGuru, LANGuru (in Katakana), M and design, Magic Solutions, Magic Solutions (in Katakana), Magic University, MagicSpy, MagicTree, McAfee, McAfee (in Katakana),
    [Show full text]
  • Q3 Consumer Endpoint Protection Jul-Sep 2020
    HOME ANTI- MALWARE PROTECTION JUL - SEP 2020 selabs.uk [email protected] @SELabsUK www.facebook.com/selabsuk blog.selabs.uk SE Labs tested a variety of anti-malware (aka ‘anti-virus’; aka ‘endpoint security’) products from a range of well-known vendors in an effort to judge which were the most effective. Each product was exposed to the same threats, which were a mixture of targeted attacks using well-established techniques and public email and web-based threats that were found to be live on the internet at the time of the test. The results indicate how effectively the products were at detecting and/or protecting against those threats in real time. 2 Home Anti-Malware Protection July - September 2020 MANAGEMENT Chief Executive Officer Simon Edwards CONTENTS Chief Operations Officer Marc Briggs Chief Human Resources Officer Magdalena Jurenko Chief Technical Officer Stefan Dumitrascu Introduction 04 TEstING TEAM Executive Summary 05 Nikki Albesa Zaynab Bawa 1. Total Accuracy Ratings 06 Thomas Bean Solandra Brewster Home Anti-Malware Protection Awards 07 Liam Fisher Gia Gorbold Joseph Pike 2. Threat Responses 08 Dave Togneri Jake Warren 3. Protection Ratings 10 Stephen Withey 4. Protection Scores 12 IT SUPPORT Danny King-Smith 5. Protection Details 13 Chris Short 6. Legitimate Software Ratings 14 PUBLICatION Sara Claridge 6.1 Interaction Ratings 15 Colin Mackleworth 6.2 Prevalence Ratings 16 Website selabs.uk Twitter @SELabsUK 6.3 Accuracy Ratings 16 Email [email protected] Facebook www.facebook.com/selabsuk 6.4 Distribution of Impact Categories 17 Blog blog.selabs.uk Phone +44 (0)203 875 5000 7.
    [Show full text]
  • Consumer Security Products Performance Benchmarks (Edition 2) Antivirus & Internet Security Windows 10
    Consumer Security Products Performance Benchmarks (Edition 2) Antivirus & Internet Security Windows 10 January 2020 Document: Consumer Security Products Performance Benchmarks (Edition 2) Authors: J. Han, D. Wren Company: PassMark Software Date: 13 January 2020 Edition: 2 File: Consumer_Security_Products_Performance_Benchmarks_2020_Ed_2.docx Consumer Security Performance Benchmarks 2019 PassMark Software Table of Contents TABLE OF CONTENTS ......................................................................................................................................... 2 REVISION HISTORY ............................................................................................................................................ 3 REFERENCES ...................................................................................................................................................... 3 EXECUTIVE SUMMARY ...................................................................................................................................... 4 OVERALL SCORE ................................................................................................................................................ 5 PRODUCTS AND VERSIONS ............................................................................................................................... 6 PERFORMANCE METRICS SUMMARY ................................................................................................................ 7 TEST RESULTS ................................................................................................................................................
    [Show full text]
  • Ten Strategies of a World-Class Cybersecurity Operations Center Conveys MITRE’S Expertise on Accumulated Expertise on Enterprise-Grade Computer Network Defense
    Bleed rule--remove from file Bleed rule--remove from file MITRE’s accumulated Ten Strategies of a World-Class Cybersecurity Operations Center conveys MITRE’s expertise on accumulated expertise on enterprise-grade computer network defense. It covers ten key qualities enterprise- grade of leading Cybersecurity Operations Centers (CSOCs), ranging from their structure and organization, computer MITRE network to processes that best enable effective and efficient operations, to approaches that extract maximum defense Ten Strategies of a World-Class value from CSOC technology investments. This book offers perspective and context for key decision Cybersecurity Operations Center points in structuring a CSOC and shows how to: • Find the right size and structure for the CSOC team Cybersecurity Operations Center a World-Class of Strategies Ten The MITRE Corporation is • Achieve effective placement within a larger organization that a not-for-profit organization enables CSOC operations that operates federally funded • Attract, retain, and grow the right staff and skills research and development • Prepare the CSOC team, technologies, and processes for agile, centers (FFRDCs). FFRDCs threat-based response are unique organizations that • Architect for large-scale data collection and analysis with a assist the U.S. government with limited budget scientific research and analysis, • Prioritize sensor placement and data feed choices across development and acquisition, enteprise systems, enclaves, networks, and perimeters and systems engineering and integration. We’re proud to have If you manage, work in, or are standing up a CSOC, this book is for you. served the public interest for It is also available on MITRE’s website, www.mitre.org. more than 50 years.
    [Show full text]
  • Sécurité Et Antivirus Sur Mac
    Sécurité et antivirus sur Mac Sécurité et antivirus sur Mac ............................................................................................................. 1 Sécurité : le discours officiel et les faits ......................................................................................... 3 Sécurité : les types de menace en activité ..................................................................................... 4 Les failles de sécurité ......................................................................................................................................... 4 Trojans ................................................................................................................................................................. 4 Phishing, vol d'identité ..................................................................................................................................... 5 Les mécanismes de défense standard ............................................................................................ 6 Quelles défenses contre des logiciels malveillants ? ................................................................. 7 Le chiffrement de données sous Mac OS X .................................................................................... 8 Antivirus sur Mac : est-ce bien nécessaire ? ................................................................................. 9 Les suites de sécurité sur Mac .......................................................................................................
    [Show full text]
  • Malware Analysis (CS6038) Week 08.1 Static Analyzers
    Malware Analysis (CS6038) Week 08.1 Static Analyzers Scott Nusbaum [email protected] March 5, 2019 Overview • Homework • Static Analyzers – Overview – Pros / Cons – Free Tools (vscan, ClamAV, Yara) – Current Trends and Alternatives Homework • Homework 3: – Due Feb 28, 2019 – Graded and uploaded to Blackboard • Homework 4: – Assigned: Feb 28, 2019 – Due March 14, 2019 – Covers RE and Network Analysis Static Analyzers Signature-based Anti-Virus Systems • By far, the most popular weapon against cyber attacks is signature-based antivirus software. • When you are relying upon Symantec’s Norton Antivirus, Intel/McAfee’s VirusScan, and similar products, you are using a signature-based antivirus solution. • This may not be the exclusive function of the tools, but it is a significant component. Pros and Cons to Signatures • Pros • Cons – Signatures can be easily – Easily avoided or bypassed – Proprietary databases written. – Not all vendors detect the same way • Based on hashes – Vendors label or categorize • Strings or ”Unique” byte differently the same malware sample arrays – Scans can be time intensive – Open source repo’s exists – Always need to be updated to catch to cultivate and maintain the most resent version of malware signatures. Free Static Analyzers • vscan – Build around Google’s re2 library • ClamAV – Uses binary pattern language for efficiency vs versatility balance • Yara – Contains a more versatile pattern matching engine * https://zeltser.com/custom-signatures-for-malware-scan/ vscan • The tool vscan is a malware scanner that’s predominantly focused on searching for the presence of text-based evidence of malware, given a set of files. • The list of information to search for is managed in a data set named sensors in the config.lua file.
    [Show full text]
  • Release Notes
    ESAP 2.6.2 Release Notes SDK Version: Mac and Windows 3.6.9026.2 (V2 Unified + V3) Noteworthy changes: Starting ESAP 2.6.1, each release contains additional files in preparation of new features that will be enabled in the next major release of SA and IC. ESAP 2.6.2 and Junos Pulse Secure Access/Access Control Service Compatibility Chart: This ESAP package can be installed on the following Junos Pulse Secure Access/Access Control Service software versions. o SA 8.0Rx o SA 7.4Rx o SA 7.3Rx o SA 7.2Rx o SA 7.1Rx o SA 7.0Rx o SA 6.5Rx o UAC 5.0Rx o UAC 4.4Rx o UAC 4.3Rx o UAC 4.2Rx o UAC 4.1Rx o UAC 4.0Rx o UAC 3.1Rx Note: The ESAP package may install and function without any errors on older releases however as the install has not been tested, we recommend that it be used only on the above versions of software releases. Support has been added for the following products in ESAP2.6.2 Windows OS Antivirus Products [Comodo Group] COMODO Antivirus (7.x) [McAfee, Inc.] McAfee Endpoint Security Threat Prevention (10.x) [Trend Micro, Inc.] Trend Micro Worry Free Business Security Agent (19.x) Antispyware Products [Comodo Group] COMODO Antivirus (7.x) [McAfee, Inc.] McAfee Endpoint Security Threat Prevention (10.x) [Trend Micro, Inc.] Trend Micro Worry Free Business Security Agent (19.x) Firewall Products [Comodo Group] COMODO Firewall (7.x) [McAfee, Inc.] McAfee Endpoint Security Firewall (10.x) [Trend Micro, Inc.] Trend Micro Worry Free Business Security Agent (19.x) Mac OS Antivirus Products [F-Secure Corp.] F-Secure Anti-Virus for Mac (0.x) Support has been removed for the following products in ESAP2.6.2 Mac OS Antivirus Products [SPAMfighter] VIRUSfighter (7.x) Issues Fixed in ESAP2.6.2 OPSWAT issues fixed: 1.
    [Show full text]
  • EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response
    EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response The more data sources you have in your security incident and event management (SIEM), the better equipped you are to detect attacks. And the more security orchestration and automation response (SOAR) connections you have between your SIEM and your IT and security systems the quicker LIMITLESS SCALE WITH FLAT, PREDICTABLE PRICING you can respond. Every log and every security event matters. Not retaining your log data can create security blinds spots that prevent Exabeam Security Management Platform (SMP) has compliance or leave your organization vulnerable to attack. approximately 350 integrations with IT and security products Exabeam is designed to scale without penalizing you for the to help your analysts work smarter - providing inbound amount of data you ingest. Our flat pricing model is based integrations with data sources from vendors to easily on the number of users and devices in your environment, allow you to ingest as much data as possible; and SOAR not data volume. integrations with 3rd party vendors to help you automate and orchestrate your security response. CENTRALIZED SECURITY AUTOMATION AND ORCHESTRATION WITH 3RD PARTY INTEGRATIONS EXTENSIVE DATA SOURCES Exabeam Incident Responder integrates with approximately Exabeam ingests data from approximately 300 different 70 third party IT and security products. These integrations IT and security products to provide security analysts with help your analysts to gather evidence and attach them as the full scope of events. Exabeam Data Lake, Exabeam artifacts to incidents or quarantine affected users and assets Advanced Analytics and Exabeam Entity Analytics ingest logs until incidents are mitigated.
    [Show full text]
  • Linux Security Review 2015
    Linux Security Review 2015 www.av-comparatives.org AV-Comparatives Linux Security Review Language: English May 2015 Last revision: 26 th May 2015 www.av-comparatives.org -1- Linux Security Review 2015 www.av-comparatives.org Contents Introduction ....................................................................................................................... 3 Reviewed products ............................................................................................................... 4 Malware for Linux systems ..................................................................................................... 5 Linux security advice ............................................................................................................ 6 Items covered in the review .................................................................................................. 7 Avast File Server Security ...................................................................................................... 8 AVG Free Edition for Linux.................................................................................................... 11 Bitdefender Antivirus Scanner for Unices ................................................................................ 13 Clam Antivirus for Linux ....................................................................................................... 17 Comodo Antivirus for Linux .................................................................................................. 20 Dr.Web Anti-virus for
    [Show full text]
  • Mcafee Epolicy Orchestrator Inspiring and Empowering the Security Professional
    DATA SHEET McAfee ePolicy Orchestrator Inspiring and empowering the security professional Security management requires cumbersome juggling between tools and data, often with Key Advantages limited visibility into external threats. This puts the adversary at an advantage by having ■ Industry-acclaimed centralized more time to exploit the gaps not seen between the tools so they can do more damage. management with unique, The cybersecurity workforce is limited and needs to be empowered to simply orchestrate integrated single pane of glass for complex cybersecurity environments. They need to be less reactive and become more great simplicity—available from the cloud or on premises proactive to get ahead of adversaries. ■ Proactive actionable intelligence to get ahead of the adversary Your organization needs to respond quickly to threats on any type of device to minimize ■ Automated workflows to the damage and when upper management demands evidence of security effectiveness. streamline administrative duties The McAfee® ePolicy Orchestrator® (McAfee ePO™) management platform—available and achieve higher efficiency ■ Open and comprehensive platform on premises and from the cloud (with two models to choose from: SaaS or IaaS)—helps integrates McAfee and more than eliminate the time-consuming effort and potential for human error. It also helps those 150 third-party solutions for faster and more accurate responses responsible for managing security respond proactively, faster, and with higher efficacy. ■ Common security management for ® Unique to the McAfee ePO console is McAfee MVISION Insights, the first technology the largest share of devices on the to proactively prioritize threats and campaigns before they hit you, predict if your market ■ Leverages and enhances native countermeasures can withhold the threat, and prescribe what you need to do to counter controls built into operating the threat concurrently.
    [Show full text]