McAfee Endpoint Protection Suite

McAfee Endpoint Protection Suite

Secure Windows, Mac, and Linux systems with essential endpoint and data protection

Next Steps:

Overview

Traditional Windows, Mac, and Linux systems within your LAN need essential security to block advanced malware, control data loss and compliance risks caused by removable media, and provide safe access to critical email and web applications. McAfee Endpoint Protection Suite integrates these core functions into a single, manageable, multiplatform environment ideal for safeguarding traditional desktops that have limited exposure to Internet threats.

Endpoint Protection Suite includes:

Real-time anti-malware and antivirus protection — Block viruses, Trojans, worms, adware, spyware, and other potentially unwanted programs that steal confidential data and sabotage user productivity.

Proactive email and web security — Intercept malware and spam before it reaches inboxes. Built-in McAfee SiteAdvisor Enterprise Plus warns users about malicious websites before they click and allows administrators to authorize or block website access, ensuring compliance.

Desktop firewall — Control desktop applications that can access the network, and stop network-borne attacks and downtime. Deploy and manage firewall policies based on location to deliver complete protection and compliance with regulations.

Comprehensive device control — Monitor and restrict data copied to removable storage devices and media to keep it from leaving company control.

Unrivaled centralized management — The McAfee ePolicy Orchestrator (McAfee ePO) platform provides visibility and control over security defenses and unifies controls over all your security and compliance tools, from McAfee as well as third parties.

Features & Benefits

Protect your endpoints from every angle

Guard all Windows, Mac, and Linux endpoints against system, data, email, web, and network threats.

Save time and money

Consolidate endpoint and data security efforts with an integrated endpoint security solution from one vendor — securing stronger protection at a lower cost. McAfee enables you to manage endpoint security from one centralized console and connect to other McAfee and third-party products, improving visibility and expediting response times.

Deploy quickly and easily

Enable increased protection without delay. The EASI installer gets your strong protection running in as few as four clicks. Endpoint Protection Suite is integrated with the McAfee ePolicy Orchestrator (ePO) platform so you can deploy and manage security using a single environment.

System Requirements

These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment. 64-bit operating system support is available for some technologies.

  • Workstations
    • Windows 8
    • Windows 7 or Embedded
    • Windows Vista
    • Windows XP Home, Professional, Embedded (WEPOS), Tablet PC
    • Windows 2000 Professional with Service Pack 2 (SP2) or higher
    • Mac OS X Mountain Lion (version 10.8 or higher)
    • Mac OS X Lion (version 10.7 or higher)
    • Mac OS X Snow Leopard (version 10.6 or higher)
    • Mac OS X Leopard (version 10.5 or higher)
  • Servers
    • Windows 2008 Server, HyperV, Core, Datacenter, Storage Server, Cluster Server, Small Business Server
    • Windows 2003 Server, Storage Server, Cluster Server, Datacenter, Small Business Server
    • Windows 2000 Server, Advanced Server, Small Business Server
    • VMware ESX, ESXi
    • Citrix XenDesktop and XenServer
  • Other supported platforms
    • FreeBSD 6.1 and 7.0 (32-bit) (Command Line Scanner)
    • HP-UX 11.0, 11i, 11i v2/v3 (Command Line Scanner)
    • IBM AIX 5.2, 5.3, 6.1 (Command Line Scanner)
    • Linux Kernel 2.4 (32-bit) and 2.6 (64-bit) (Command Line Scanner)
    • Solaris 8, 9, 10 (32-bit/64-bit) (Command Line Scanner)
    • Citrix MetaFrame 1.8 and XP Support
    • EMC Celerra File Server
  • Email server requirements
    • Microsoft Exchange 2003 SP1, 2007 (64-bit), 2010 (v7.0.2)
    • Microsoft Exchange 2000 SMB, 2003 Server, or Advanced Server
    • Lotus Domino 6.0.3-6.0.5, 7.0, 8.0 (32-bit), 8.5 (32-bit)
  • Database software requirements
    • Microsoft SQL Server 2008 (32-bit/64-bit), Express
    • Microsoft SQL Server 2005 (32-bit/64-bit), Express
  • Supported web server platforms
    • IIS 4.0, 5.0, and 6.0 (Microsoft Windows)

Awards / Reviews

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses

McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

Customer Stories

Bank Central Asia

Bank Central Asia, a regional public bank in Indonesia, centralizes security management with McAfee ePolicy Orchestrator.

Highlights
  • Eased compliance with internal and industry regulations.
  • Resulted in time savings with centralized management.
  • Provided integrated solutions to keep computers, the network, and data protected.

Berkshire Health Systems

Berkshire Health Systems secures PCs, laptops, servers, and patient data with endpoint security, email security, and data protection solutions from McAfee.

Highlights
  • Removed email management burden and frees up several hours each week
  • Simplified security administration and system management of 3,700 machines
  • Provided comprehensive control of sensitive information to eliminate data loss
  • Allowed a small IT staff complete visibility into all endpoints and data
  • Afforded significant time savings due to centralized management and automated tasks

Deutsche Edelstahlwerke

Deutsche Edelstahlwerke, the leading German producer of specialty stainless steel products, secures thousands of desktops while keeping production systems available with McAfee endpoint solutions.

News / Events

Resources

Data Sheets

McAfee Endpoint Protection Suite

For a technical summary on the McAfee product listed above, please view the product data sheet.

Reports

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses

McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

Endpoint Security: Anti-Virus Alone is Not Enough

This report provides supporting data that endpoint security based on antivirus software alone is not enough.

Solution Briefs

McAfee Application Control Extends the Life of Legacy Microsoft Windows XP Systems

McAfee Application Control provides an effective way to block unauthorized applications from running and will continue to support Windows XP systems even after Microsoft’s phase-out of support has taken effect.

A More Rational Approach to Endpoint Security: 5 Reasons to Simplify Your Life

Learn how McAfee‘s architecture and scalable management through the ePolicy Orchestrator platform leverage your company’s current infrastructure.

White Papers

Top Five McAfee ePolicy Orchestrator Tips

This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.

Community

Blogs

  • Five Easiest Ways to Get Hacked – Part 1
    Carric Dooley - February 23, 2015

    A conversation with principal security consultant Amit Bagree. I had the opportunity recently to sit down with Amit Bagree, one of our principal security consultants, for a chat about the most common weak points in network security. Amit has been breaking things apart since childhood, has been working in the security field for almost 10 […]

    The post Five Easiest Ways to Get Hacked – Part 1 appeared first on McAfee.

  • You’re Under Attack! Eight Ways to Know for Sure
    Karl Klaessig - February 23, 2015

    The parade of breaches, attacks and various other digital maladies hitting corporations in 2014 made it clear that default, out-of-the-box compliance and security isn’t enough to protect organizations. But the nature of advanced persistent threats (APTs), and other forms of malware, makes it difficult to find an investment that can keep the next threat from […]

    The post You’re Under Attack! Eight Ways to Know for Sure appeared first on McAfee.

  • Cyberespionage: You’re Not Paranoid, Someone Is Spying on Your Company
    Michael Sentonas - February 19, 2015

    It’s time for all of your counter-espionage tools to work together. By now you, your peers, and your board should have accepted that cyberespionage is real, active, and not going away. Whether it is a customer or competitor, country or criminal, someone wants to know a lot more about you. They could be looking for […]

    The post Cyberespionage: You’re Not Paranoid, Someone Is Spying on Your Company appeared first on McAfee.

  • Microsoft Patch Tuesday – February 2015
    PageOne Pr - February 12, 2015

    Hello everyone, This is Greg Blaum again with the Microsoft Patch Tuesday newsletter for February 2015. The month Microsoft released a total of nine (9) security updates. For this month, three (3) of these are rated Critical, which Microsoft terms as a vulnerability whose exploitation could allow code to execute without any user interaction. These […]

    The post Microsoft Patch Tuesday – February 2015 appeared first on McAfee.

  • We Tried the NIST Framework and It Works
    Kent Landfield - February 11, 2015

    By Kent Landfield, Director of Standards and Technology Policy, Intel Security, and Malcolm Harkins, Chief Security and Privacy Officer at Intel When the Administration released the Framework for Improving Critical Infrastructure Cybersecurity (the Framework) on February 12, 2014, many of us at Intel and Intel Security were familiar with the details, as we had participated […]

    The post We Tried the NIST Framework and It Works appeared first on McAfee.

Threats and Risks