McAfee VirusScan Enterprise for Storage ensures business continuity by protecting network-attached storage devices against viruses and other malware. This high-performance scanning solution deploys on one or more Windows servers in affordable multifiler or high-availability multiscanner configurations to deliver the power of parallel processing for optimal load balancing and flexible failover protection.
Advanced antivirus technology — Continuously blocks a wide range of viruses and malicious code threats, including those hidden in compressed files. Advanced heuristics and generic detection find even new, unknown viruses.
Detect unwanted programs — Find hidden spyware programs that track Internet use, access personal data, and open security holes.
Reduce administration time — Centrally manage your entire security system with the McAfee ePolicy Orchestrator (McAfee ePO) platform. It delivers complete management from a single console.
Receive rapid notification — Stay informed whenever a virus is detected via email, pager, SNMP, SMS, or Tivoli.
Multi-vendor NAS protection — Simplify your environment and reduce support costs with an award-winning solution that secures multiple storage systems vendors, devices, and operating systems.
Defend against a wide range of malware and other threats, including new, unknown viruses.
Use unique on-access scanning technology to protect NetApp filers while files are being accessed, copied, or written to the server.
Keep users and filers safe from hidden programs that open security holes and access personal information.
Deploy multiscanner to multifiler configurations that increase your load-balancing capacity and failover security.
Control and manage your entire security system with the McAfee ePolicy Orchestrator (McAfee ePO) platform. It delivers complete management, including detailed graphical reporting, from a single console.
Protect data from malware before signatures are developed with included McAfee Global Threat Intelligence (GTI) integration.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
McAfee offers cost-effective solutions for securing your data, files, and peace of mind, no matter how large or how diverse your storage environment.
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at the kernel level to bypass Microsoft’s security for 64-bit Windows systems. Today a small utility program named KPP-Destroyer can be found online. Previous versions of KPP-Destroyer had some bugs on a Windows 8.1 computer, but […]
Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often than random phishing attempts. Exploits that use patched vulnerabilities delivered via spear phishing email are one of the most successful combinations used by attackers to infiltrate targeted organizations and gain access to confidential information. During […]
The post Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities appeared first on McAfee.
The Dofoil downloader (found in the wild since 2011) occasionally updates itself with new features and encryption techniques to hide communications with its control servers. The latest iteration uses a variation of XOR and RC4 algorithms similar to previous variants to encrypt the list of control servers within the binary and encrypt all traffic with […]
The post Dofoil Downloader Update Adds XOR-, RC4-Based Encryption appeared first on McAfee.
McAfee product coverage and mitigations for malware or indicators associated with the recent attacks (a.k.a. Dragonfly, Energetic Bear, Havex/SYSMain) on industrial control systems (ICS’s) are listed below. The Havex remote access tool is common across these associated attacks or campaigns–including Dragonfly. We have seen Havex in ICS-specific targeted campaigns. It can detect and affect ICS- […]
The post Product Coverage and Mitigation for ICSA-14-178-01 (Havex/ICS-Focused Malware) appeared first on McAfee.
Every organization has deployed anti-virus/anti-malware solutions, but how much you have actually reduced your risk? To recap what we’ve covered in this 5-part blog series, Aberdeen’s analysis and Monte Carlo modeling: Confirms the high risk of unprotected endpoints Demonstrates that endpoint protection really does reduce risk Confirms that “free” endpoint protection (e.g., Microsoft) is better […]
The post Endpoint Security, Part 5 of 5: A/V Alone is Not Enough appeared first on McAfee.