McAfee Deep Defender

McAfee Deep Defender

Impedindo ataques indetectáveis com segurança para terminais além do sistema operacional

Próximas etapas:

Visão geral

O McAfee Deep Defender é a próxima geração de segurança para terminais assistida por hardware. Usando a tecnologia McAfee DeepSAFE, ele opera além do sistema operacional e foi projetado para detectar, bloquear e corrigir ataques ocultos e avançados. O McAfee Deep Defender está reinventando a abordagem de segurança do setor. Ele é o primeiro produto baseado na tecnologia McAfee DeepSAFE, desenvolvida em parceria com a Intel.

Operação além do sistema operacional: a inédita integração com a Intel reside entre a memória e o sistema operacional, permitindo o monitoramento da CPU e da memória em tempo real.

Proteção de modo kernel: o monitoramento de comportamento no nível do kernel, em tempo real, expõe e remove ameaças desconhecidas, incluindo rootkits de modo kernel, para prevenção contra malware de dia zero.

Proteção em menos tempo: detenha ataques indetectáveis de baixo nível no momento em que ocorrerem, antes que possam causar danos ou roubar dados.

Recursos e benefícios

Detenha ataques indetectáveis desconhecidos

A proteção de memória do kernel em tempo real opera além do sistema operacional, impedindo que ataques indetectáveis comprometam seus terminais e roubem dados confidenciais.

Use o monitoramento de CPU e memória em tempo real

Aproveite a tecnologia McAfee DeepSAFE, uma camada de software de memória que opera em modo VMX-root para oferecer proteção para eventos de CPU e memória do kernel em tempo real com um impacto mínimo sobre o desempenho.

Obtenha proteção real de dia zero

Identifique comportamento malicioso e ofereça proteção real de dia zero. O McAfee Deep Defender não exige conhecimento prévio do rootkit para detectá-lo.

Distribua com rapidez e gerencie facilmente

Use o software McAfee ePolicy Orchestrator (ePO) para distribuir e gerenciar remotamente o McAfee Deep Defender ao lado de suas soluções existentes para segurança de terminais da McAfee, reduzindo os custos e o trabalho de gerenciamento.

Requisitos de sistema

Os requisitos de sistema a seguir são apenas os mínimos. Os requisitos reais variarão dependendo da natureza do seu ambiente.

  • Compatível com processadores Intel® Core™ i3, i5 e i7
  • Compatível com Windows 7 (32 bits e 64 bits)
  • 2 GB de RAM (32 bits) ou 4 GB de RAM (64 bits)
  • Gerenciado pelo McAfee ePolicy Orchestrator (ePO) 4.5 ou superior
  • McAfee Agent 4.6
  • Tecnologia Intel VT (Virtualization Technology) ativada no BIOS
  • Traduzido e adaptado para distribuição em todo o mundo
  • Compatibilidade testada com os seguintes produtos da McAfee:
    • VirusScan Enterprise 8.7 ou superior
    • Application Control 5.0
    • Endpoint Encryption for PC 5, 5.2.6, 5.2.9 e 6.1
    • Host Data Loss Prevention 9.0 ou superior
    • Host Intrusion Prevention for Server 8.0 ou superior
    • Network Access Control 3.2

Demonstrações/Tutoriais

Demonstrações

McAfee Deep Defender is reinventing the industry approach to security and is the first product built on the McAfee DeepSAFE Technology co-developed with Intel.

Vídeos

Your enterprise attack surface might be bigger than you think, and cybercriminals are constantly finding new ways to exploit any weak points they can find. This video explores the unique, hardware-enhanced security made possible by Intel and McAfee that can help you keep your users and data more secure than ever.

McAfee Deep Defender is reinventing the industry approach to security and is the first product built on the McAfee DeepSAFE Technology co-developed with Intel.

Casos de Clientes

Major Medical Center (english)

McAfee Deep Defender helps a major medical center

Destaques
  • Reduces total cost of ownership with built-in security and management features of Intel vPro
  • Provides a significant time savings for IT personnel to proactively protect company systems
  • Allows for broad and in-depth desktop security
  • Actively detects and disables malware

Notícias / Eventos

Recursos

Diagramas tecnológicos

Fighting Rootkits (english)

McAfee fights rootkits by using real-time memory and CPU protection, protecting against known and unknown attacks, and getting beneath the operating system.

Documentos

McAfee Deep Defender Technical Evaluation and Best Practices Guide (english)

Learn how McAfee Deep Defender version 1.0 targets the more dangerous kernel mode rootkits.

Root Out Rootkits (english)

This paper describes how McAfee Deep Defender moves endpoint security beyond the operating system. McAfee Deep Defender gets hardware assistance from Intel and uses a privileged early load position to uncloak, block, and remove the kernel-mode activities of stealthy rootkits.

A New Paradigm Shift: Comprehensive Security Beyond the Operating System (english)

Learn how efforts by McAfee and Intel allow you to utilize virtualization for delivering comprehensive security beyond traditional software boundaries.

Especificações

McAfee Deep Defender

Para um resumo técnico do produto McAfee listado acima, consulte o data sheet do produto.

Relatórios

Proactive Rootkit Protection Comparison Test (english)

In January 2013, AV-TEST performed a comparative review of McAfee Deep Defender, Microsoft System Center Endpoint Protection, and Symantec Endpoint Protection to determine their capabilities to proactively protect against kernel-mode and MBR rootkits, also known as day zero attacks.

Comunidade

Blogs

  • Boosting Your Competitive Presence
    Lang Tibbils - Julho 29, 2013
    At McAfee, we’re continuing our laser focus on endpoint security. Most recently, you heard from Simon Hunt, CTO for Endpoint Security that the new Endpoint Suites are “strong, fast, simple and 100% effective.” As part of our ongoing ‘Redefining Endpoint Security’ blog series, we caught up with Penny Baldwin,  CMO for McAfee, to learn her […]
  • End-to-end Protection Thwarts Malware
    Ruby Williams - Julho 11, 2013
    Recently, I wrote about the meaning of integration as it relates to protection against malware, why an integrated solution is important, and what is needed to deliver an integrated solution. Today, I’m going to highlight the importance of end-to-end protection in fighting the malware war. Over the past three months, McAfee has made three important […]
  • What McAfee’s Recent Corporate Announcements Mean for Public Sector Customers
    Ken Kartsen - Junho 19, 2013
    Customers sometimes ask how McAfee corporate announcements relate to the public sector, so I decided to talk about two recent ones: the pending Stonesoft acquisition and the new Endpoint Suites offering. Both these developments make us an even stronger, more comprehensive security company, and they further strengthen our Security Connected platform. Our proposed acquisition of […]
  • Lessons Learned on the Journey to McAfee Complete Endpoint Suites
    Mike Fey - Junho 10, 2013
    Security Connected has been McAfee’s approach to security for some time now. We’ve built out a platform of solutions to enable customers to realize it – allowing them to evolve from reactive to proactive security postures. Through innovation and acquisition, we’ve assembled and integrated technologies to deliver across a number of technology fronts.  McAfee’s launch […]
  • Partner Voices: The Impact of McAfee’s New Endpoint Suites
    Lang Tibbils - Junho 5, 2013
    May 29, 2013 marked the dawn of a new era in endpoint security. We launched the new McAfee Complete Endpoint Protection Suites, the industry’s first endpoint suites to provide customers proactive, chip-to-cloud protection and real-time security. You’ve heard a lot from us leading up to this launch. If you’ve been following our Redefining Endpoint Security […]