McAfee VirusScan Enterprise for Offline Virtual Images

McAfee VirusScan Enterprise for Offline Virtual Images

Purpose-built security for virtual environments

Next Steps:

Overview

McAfee VirusScan Enterprise for Offline Virtual Images — the first dedicated security solution for virtual machines (VMs) — protects your virtual environment and corporate network by automatically scanning, cleaning, and updating VMs before they go online.

VirusScan Enterprise for Offline Virtual Images offers:

An optimized solution — Developed specifically to work with all major virtualization environments, including Citrix, Microsoft, and VMware.

Scalable security — Provides on-demand protection for an unlimited number of VMs.

Comprehensive, cost-effective protection — Reduces IT overhead with integrated protection for pre-production (testing and development) and production (disaster recovery) virtual environments.

Features & Benefits

Secure your VMs and protect your enterprise

Automatically scan, clean, and update virtual machines (VMs) while they’re offline to eliminate the risk of dormant VMs threatening your corporate network.

Save money with automatic updates

Count on automatic, real-time, anti-malware updates via McAfee Global Threat Intelligence to maintain the latest threat protection without bringing VMs online, thus allowing your IT staff to focus on other issues.

Save time with unified security management

Minimize IT efforts and reduce operating costs with common security management via the McAfee ePolicy Orchestrator (ePO) platform, for both physical and virtual environments.

Save trouble with a single solution

Reduce IT migration issues with one security solution that supports all top virtualization vendors, including Citrix, Microsoft, and VMware.

Facilitate real-time disaster recovery

Secure offline VMs at secondary sites.

Support regulatory compliance

Scan and update offline virtual images periodically to enable archiving for longer periods.

System Requirements

These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.

Supported Operating Systems

  • Microsoft Windows Vista base or higher (includes 64-bit)
  • Microsoft Windows XP with Service Pack 1 (SP1) or higher (no support for XP 64-bit)
  • Microsoft Windows Server 2008: Standard, Enterprise, and Datacenter editions (includes 64-bit; no support for Server Cores)
  • Microsoft Windows Server 2003 with SP1 or higher: Standard, Enterprise, and Datacenter editions (no support for Server 2003 64-bit)

Supported VMware Images

  • Supports images using the Virtual Machine Disk Format (VMDK) and Open Virtualization Format (OVF) specification
  • Microsoft Windows 7, all versions
  • Microsoft Windows Vista base or higher (includes 64-bit)
  • Microsoft Windows XP with SP1 or higher (includes 64-bit)
  • Microsoft Windows 2000 with SP4
  • Microsoft Windows Server 2008: Standard, Enterprise, and Datacenter editions (includes 64-bit)
  • Microsoft Windows Server 2003 with SP1: Standard, Enterprise, and Datacenter editions (includes 64-bit)

Supported Microsoft Virtual PC Images

  • Supports images using the Microsoft Virtual Hard Disk Image Format specification
  • Microsoft Windows Vista base or higher (includes 64-bit)
  • Microsoft Windows XP with SP1 or higher (includes 64-bit)
  • Microsoft Windows 2000 with SP4
  • Microsoft Windows Server 2008: Standard, Enterprise, and Datacenter editions (includes 64-bit)
  • Microsoft Windows Server 2003 with SP1 or higher: Standard, Enterprise, and Datacenter editions (includes 64-bit)

Resources

Data Sheets

McAfee VirusScan Enterprise for Offline Virtual Images

For a technical summary on the McAfee product listed above, please view the product data sheet.

Community

Blogs

  • Understanding the Scope of Venom (CVE-2015-3456)
    Jim Walter - May 19, 2015

    In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]

    The post Understanding the Scope of Venom (CVE-2015-3456) appeared first on McAfee.

  • Enhanced Certificate Security – Pinning
    McAfee Foundstone Professional Services - May 18, 2015

    Written by Deepak Choudhary There are always risks involved when relying on a third party to send and receive sensitive data over secure network channels. While we recognize the roles of the Public Key Infrastructure (PKI) and third party certificate authority (CA), we also believe that Certificate SSL Pinning can play a key role in […]

    The post Enhanced Certificate Security – Pinning appeared first on McAfee.

  • Defending Against Ransomware with McAfee Threat Intelligence Exchange
    Dan Larson - April 30, 2015

    In a blog last week, I discussed CryptoLocker, a particularly nefarious family of ransomware, and how to defend against it. I thought it would be worthwhile to demonstrate how McAfee Threat Intelligence Exchange can detect and stop malware like ransomware, even if the suspicious file has not been flagged as malware by antivirus signatures. Click […]

    The post Defending Against Ransomware with McAfee Threat Intelligence Exchange appeared first on McAfee.

  • Advice for Unfastening CryptoLocker Ransomware
    Dan Larson - April 22, 2015

    In the McAfee Labs Threats Report: November 2014, Intel Security predicted nine major threats that would occur in 2015. Regarding ransomware, we said this: “Ransomware will evolve its methods of propagation, encryption, and the targets it seeks.” Almost immediately, we began to see a huge rise in ransomware, especially with the family CTB-Locker, followed by […]

    The post Advice for Unfastening CryptoLocker Ransomware appeared first on McAfee.

  • Building Secure Castles in the Cloud
    PageOne Pr - April 21, 2015

    You, along with the vast majority of companies, use public cloud servers for something. Whether they are your primary service infrastructure, overflow capacity, or emergency backup, this Infrastructure as a Service (IaaS) is delivering on the promises of reduced costs, greater agility, and enhanced scalability. But there are still questions about security. You need to […]

    The post Building Secure Castles in the Cloud appeared first on McAfee.

Related Solutions
Threats and Risks