McAfee Application Control

McAfee Application Control

Protect systems from unknown, advanced persistent threats with centrally managed whitelisting

Next Steps:

Overview

McAfee Application Control software provides an effective way to block unauthorized applications and code on servers, corporate desktops, and fixed-function devices. This centrally managed whitelisting solution uses a dynamic trust model and innovative security features that thwart advanced persistent threats — without requiring signature updates or labor-intensive list management.

Complete protection from unwanted applications — Application Control extends coverage to executable files, libraries, drivers, Java apps, ActiveX controls, scripts, and specialty code for greater control over application components.

Flexibility for desktop users and server admins — IT can empower select desktop and server users to approve new apps instantly, and IT can choose to approve or reject these new apps during their routine audit.

Viable security for fixed-function and legacy systems — Application Control has a small footprint and low performance overhead, making it the perfect solution for protecting fixed-function devices, such as kiosks and point-of-sale (POS) terminals. It also extends protection to your legacy Windows NT and Windows 2000 systems.

Minimize patching while protecting memory — Allows you to delay patch deployment until your regular patch cycle. In addition, it prevents whitelisted applications from being exploited via memory buffer overflow attacks on Windows 32- and 64-bit systems.*

Centralized, integrated management — Leverage your investment in the McAfee ePolicy Orchestrator (McAfee ePO) platform. McAfee ePO software integrates all McAfee and security and risk management products from McAfee Security Innovation Alliance partners for a single view of enterprise security management.

* Network Security Platform (NSP) or Host Intrusion Prevention System (HIPS), as an added layer of defense, prevents kernel vulnerability exploits and Denial of Service (DoS) attacks.

Your data center is evolving. Are you?

View Infographic

Features & Benefits

Reduce risks from unauthorized applications and code

Allow only trusted applications to run on your endpoints, fixed-function devices, and servers. McAfee Application Control also stops malware — whether binaries, kernel components, DLLs, ActiveX controls, scripts, or Java components — from executing.

Save time and lower costs with dynamic whitelisting

Maximize administrator efficiency with a dynamic trust model that does not require signature updates or labor-intensive list management.

Reduce patch cycles and protect memory

Eliminate “patch panic” using a validated countermeasure that maintains your regular patch cycles and prevents whitelisted applications from being exploited via memory buffer overflow attacks on Windows 32- and 64-bit systems.

Inform and empower users with user-friendly notifications (optional)

Educate desktop users about disallowed applications with informative pop-up messages that can prompt them to seek approvals via email or helpdesk requests.

Extend the lifespan of legacy systems

Protect older systems that OS and security vendors no longer support, such as Windows NT and Windows 2000, while alleviating the need to patch these systems.

Safeguard field units and fixed-function devices

Take advantage of our transparent model that requires negligible CPU and memory usage.

Thwart advanced persistent threats with Global Threat Intelligence

Know the reputation of every file and application in your environment with real-time Global Threat Intelligence that automatically categorizes them as good, bad, and unknown.

Use central management to increase efficiency

Optimize and simplify management with the McAfee ePolicy Orchestrator (McAfee ePO) platform. Oversee and administer all your security protections from a single, centralized console that spans McAfee products, Security Innovation Alliance Partner products, and homegrown applications.

System Requirements

Microsoft Windows

  • Embedded: XPE, 7E, WEPOS, POS Ready 2009, WES 2009, 8 Industry, 8.1
  • Server: 2008, 2008 R2, 2012, 2012 R2
  • Desktop: Vista, 7, 8, 8.1

Legacy Platforms

  • Server: NT, 2000, 2003, 2003 R2
  • Desktop: XP

Linux

  • RHEL/CentOS 5, 6
  • SUSE/openSUSE 10, 11
  • OEL 5, 6
  • Ubuntu 12.04

Demos / Tutorials

Demos

Learn how McAfee Application Control works with McAfee ePolicy Orchestrator software and extends the viability of fixed-function systems without impacting performance.

Tutorials

For guidance on how to use Application Control, watch this Quick Tips video.

Customer Stories

CEMEX

CEMEX adopts a Security Connected approach to safeguard endpoint and network security and improve visibility.

Highlights
  • Safeguards against zero-day advanced persistent threats without signature updates.
  • Greatly diminishes administrative time, from defining policies to repairing workstations.
  • Protects more than 26,000 endpoints from email, web, and application-generated attacks.
  • Provides streamlined and integrated management of large, global security platform.

Honeywell

With a dedicated McAfee resident support account manager, Honeywell gets onsite troubleshooting, faster problem resolution, and fewer escalations to McAfee Support.

Seagate Technology

McAfee Application Control protects Seagate's intellectual property and complex IT environment.

Highlights
  • Custom end-user protection to boost employee productivity
  • Increased performance of single-use machines in the factory
  • Malware-free factory environment

Sysec Ltd.

U.K. partner Sysec gains 30% year-over-year growth by selling the complete McAfee solution portfolio.

Resources

Data Sheets

McAfee Application Control

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Application Control for Desktops

For a technical summary on the McAfee product listed above, please view the product data sheet.

FAQ

Maintain Security for XP Systems

Learn about how application whitelisting can maintain security for Microsoft Windows XP systems no longer supported by Microsoft.

Infographics

SANS Top 20 Critical Controls Poster

The top 20 critical controls for effective cyberdefense.

Reports

SANS Report: Critical Security Controls: From Adoption to Implementation

A recent SANS survey provides an in-depth look at the primary industries adopting critical security controls and how they approach implementation.

Solution Briefs

Counterattacking BERserk

Trust is no longer present when the privacy, integrity, and authenticity of our information is called into question. Learn how you can protect your company against attacks that attempt to exploit the BERserk vulnerability.

Abuse of Trust

Attackers prey upon the institution of trust in many ways, with exploiting unsuspecting victims the primary pursuit. Learn how McAfee security technology can help protect against attacks seeking to abuse the trust your company has in its day-to-day operations.

McAfee Application Control Extends the Life of Legacy Microsoft Windows XP Systems

McAfee Application Control provides an effective way to block unauthorized applications from running and will continue to support Windows XP systems even after Microsoft’s phase-out of support has taken effect.

The Evolving Landscape of Desktop Security

Learn how application whitelisting and recent technology enhancements make it easier to implement whitelisting.

White Papers

Conquer the Top 20 Critical Security Controls

Critical Security Controls (CSCs) help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

From Silicon to the Data: A Multi-Point Approach for Protecting Cloud Environments

Intel and McAfee, along with industry partners, are providing comprehensive solutions to better address the challenges of security for cloud computing.

Taking Back Control in Today’s Complex Threat Landscape

This document discusses the role that integrity control plays in defending networks against attack through a focus on two key areas — controlling what applications are allowed to run and how they are run, and protecting systems on the network from configuration changes and mistakes that can allow serious vulnerabilities to be exploited.

Community

Blogs

  • Protect Yourself by Protecting Others
    Carly Listman - January 21, 2015

    How the consumerization of IT is affecting endpoint security What happens in Vegas may stay in Vegas, but what happens on your employees’ personal devices may not stay there. According to a recent survey of consumers around the world, conducted by MSI Research on behalf of Intel Security, almost 80% of respondents use their personal […]

    The post Protect Yourself by Protecting Others appeared first on McAfee.

  • The Rise of Backdoor-FCKQ (CTB-Locker)
    Raj Samani - January 21, 2015

    By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice President Vincent Weafer commented that 2014 will be remembered as “the year of shaken trust.” Indeed almost every threat measured saw notable increases in Q3 that pointed to a rather ominous 2015.  There was, however, […]

    The post The Rise of Backdoor-FCKQ (CTB-Locker) appeared first on McAfee.

  • The Scan: The Best of CES 2015
    Bradi Van Noy Hays - January 19, 2015

    Hey guys! I’m Bradi, and this is the Scan – bringing you the very latest in security news. It’s 2015, and you know what that means – we’re officially in THE FUTURE. Congratulations, you made it! CES 2015 Rundown Another Consumer Electronics Show has come and gone, which means a lot of tech nerds out […]

    The post The Scan: The Best of CES 2015 appeared first on McAfee.

  • InstallCube: How Russian Programmers Turn Adware Into Cash
    Tarun Agarwal - December 16, 2014

    We often observe applications bundled with ad-displaying programs to generate revenue for those products. These are not necessarily unethical, but some of them try to make easy money by deceiving users. McAfee categorizes such apps as potentially unwanted program (PUPs). Here’s a look at a recently discovered Russian-based campaign that is very well organized. We […]

    The post InstallCube: How Russian Programmers Turn Adware Into Cash appeared first on McAfee.

  • Behavior Analysis Stops Romanian Data-Stealing Campaign
    Ankit Anubhav - December 3, 2014

    In a recent press announcement, McAfee and Europol’s European Cyber Centre announced a cooperation of our talents to fight cybercrime. In general these joint operations are related to large malware families. Writing or spreading malware, even in small campaigns, is a crime. McAfee Labs doesn’t hesitate to reach out to its partners and contacts in […]

    The post Behavior Analysis Stops Romanian Data-Stealing Campaign appeared first on McAfee.