Macintosh endpoints are not immune to security threats. That’s why it’s imperative that businesses deploy security to Mac endpoints just as they do to Windows endpoints. Cybercriminals are after data, and they don’t care what type of endpoint holds it.
McAfee Endpoint Protection for Mac is an essential security solution for protecting the data on your Mac endpoints. Advanced protection technologies, including anti-virus, anti-spyware, firewall, and application protection, along with centralized management with the McAfee ePolicy Orchestrator (ePO) platform, allow businesses to secure Mac endpoints and ensure compliance with security policies.
Broad protection — Secure all endpoints on your Macintosh systems against all types of viruses, spyware, phishing attacks, and exploits.
Centralized, integrated management — Use the same web-based console to manage both your Mac and Windows endpoints. Easily deploy protection for all of your Macs from a single interface.
Intuitive, Macintosh-like interface — Get up and running quickly, with minimal training. Endpoint Protection for Mac uses Apple’s Mac OS X Aqua user interface, so you can deploy and manage from an instantly familiar Macintosh screen.
Report on and enforce security policies on Macs to ensure endpoints fully comply with your security standards.
Use a single web-based console to manage both Mac and Windows endpoints. Endpoint Protection for Mac integrates seamlessly with the McAfee ePolicy Orchestrator (ePO) platform, saving you time and money.
Rely on advanced scanning functions for fast and accurate threat protection that doesn’t impact system performance.
Prevent malicious attacks designed to steal data from being downloaded or installed on your Mac endpoints.
Secure your endpoints against every type of virus and malicious code threat, even those hidden in compressed files, with advanced heuristics and generic detection from Endpoint Protection for Mac.
Neutralize spyware before it takes root and spreads by stopping spyware and other potentially unwanted programs (PUPs) before they install and start stealing personal information.
Stop network-based attacks with inbound and outbound firewalls to prevent unwanted network activity. Ensure same network firewall policies can be enforced on both Mac and Windows endpoints.
Prevent malicious programs from modifying applications, and allow or deny applications that are not approved to run on your Mac.
These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.
One question I often hear is “When will Intel Security (McAfee) publish a report on the latest threat?” It seems to be a hot trend today for security companies to offer reports with topics such as “Operation X” or “Malware Y,” or to trumpet how many zero-day vulnerabilities they have found. Do we now measure […]
The post At Intel Security, Protecting Customers Takes Precedence Over Seeking Headlines appeared first on McAfee.
During the last couple of months, we’ve observed several RTF exploits that target Indian organizations. The first RTF exploit was found by McAfee researchers on August 21. Subsequently, we saw multiple variants of the same exploit through October. The contents of the decoy documents are politically themed, targeted at several local and overseas Indian establishments. […]
The post Operation Mangal: Win32/Syndicasec Used In Targeted Attacks Against Indian Organizations appeared first on McAfee.
This is the second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out the first part here. Microsoft’s Patch From our previous analysis we’ve learned that the core of this threat is its ability to effectively right-click a file. Now, let’s see what Microsoft did in its patch […]
The post Bypassing Microsoft’s Patch for the Sandworm Zero Day: Even ‘Editing’ Can Cause Harm appeared first on McAfee.
On October 21, we warned the public that a new exploitation method could bypass Microsoft’s official patch (MS14-060, KB3000869) for the infamous Sandworm zero-day vulnerability. As Microsoft has finally fixed the problem today via Security Bulletin MS14-064, it’s time to uncover our findings and address some confusion. This is the first of two posts on […]
The post Bypassing Microsoft’s Patch for the Sandworm Zero Day: a Detailed Look at the Root Cause appeared first on McAfee.
“Distrust and caution are the parents of security”–Benjamin Franklin A recent threat targeting Chinese users of Mac OS X and iPhone came to light yesterday. The malware, called WireLurker, is distributed by the Chinese third-party app store Maiyadi. Since the threat’s discovery, more than 400 applications containing the Trojan were identified at the store. Two […]