Intel Security
open

Overview

Fast, flexible and scalable protection against zero-day and advanced persistent threats

McAfee Application Control blocks unauthorized executables on servers, corporate desktops, and fixed-function devices. Using a dynamic trust model and innovative security features such as local and global reputation intelligence, real-time behavioral analytics, and auto-immunization of endpoints, it immediately thwarts advanced persistent threats—without requiring labor-intensive list management or signature updates.

  • Complete protection from unwanted applications with coverage of executable files, libraries, drivers, Java apps, ActiveX controls, scripts, and specialty code.
  • Flexibility for desktop users and server admins with self-approval and auto-approval based on application rating.
  • Viable security for fixed-function, legacy, and modern systems.
  • Patch cycle reduction and advanced memory protection.
  • Centralized, integrated management via McAfee ePolicy Orchestrator.
Download Data Sheet Free Trial

Thwart threats with intelligent whitelisting

Reduce risks from unauthorized applications and code

Know the reputation of every file and application in your environment and categorize them as good, bad and unknown with real-time McAfee Global Threat Intelligence combined with local reputation intelligence from McAfee Threat Intelligence Exchange, an optional module sold separately.

Leverage three options to maximize their whitelisting strategy

Default Deny allows software execution based on an approved whitelist or authorization by trusted channels. Detect and Deny allows software execution through signature-less reputation verification, and Verify and Deny allows the execution of applications that are verified by sandbox testing.

Save time and lower costs

Eliminate the need for signature updates or labor-intensive list management, and using a dynamic trust model that requires negligible CPU and memory usage.

Reduce patch cycles and protect memory

Maintain your regular patch cycles and prevent whitelisted applications from being exploited via memory buffer overflow attacks on Windows 32- and 64-bit systems.

Protect legacy systems and modern IT investments

Protect older operating systems, such as Microsoft Windows NT, 2000, and XP as well as recent operating systems such as Microsoft Windows 10.

Windows Server 2003 end of support is here. Migrate smoothly with our 1-2-3 approach.

Learn More
Securing Your Evolving Data Center

Securing Your Evolving Data Center

Your data center is evolving. Can your security keep up with it? Learn what features to look for in solutions that offer a layered, comprehensive approach to security.

Download Infographic

Customer Success

Manufacturing

Healthcare

Resources

System Requirements

These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.

Microsoft Windows

  • Embedded: XPE, 7E, WEPOS, POS Ready 2009, WES 2009,
    8 Industry, 8.1
  • Server: 2008, 2008 R2, 2012, 2012 R2
  • Desktop: Vista, 7, 8, 8.1

Legacy Platforms

  • Server: NT, 2000, 2003, 2003 R2
  • Desktop: XP

Linux

  • RHEL/CentOS 5, 6
  • SUSE/openSUSE 10, 11
  • OEL 5, 6
  • Ubuntu 12.04

Need additional technical resources? Visit the McAfee Expert Center