McAfee Complete Endpoint Protection — Enterprise

McAfee Complete Endpoint Protection — Enterprise

Strong, fast, scalable defense for every device, every threat

Next Steps:

Overview

It's easy to get enterprise security right. A single solution with a single management platform unifies 17 technologies to proactively protect all of your devices — PCs, Macs, Linux systems, smartphones, virtual machines, tablets, and servers. Simplify enterprise endpoint management and reduce costs while defending your endpoints from today’s most insidious and stealthy threats, including rootkits and advanced persistent threats (APTs).

With Complete Endpoint Protection — Enterprise, you can customize your enterprise’s security to create the right combination for each user community, from giving power users the freedom and flexibility they demand to applying the tightest control on shared systems. One suite brings you a “complete coverage” toolbox. From easy installation to real-time investigations, it’s all integrated and centralized for efficient management.

Complete protection — This comprehensive suite extends industry-leading threat protection to your data and your systems, protecting you where others fail. It finds, fixes, and freezes malware fast. Our Security Connected approach covers all the bases, layering hardware-enhanced technologies, dynamic whitelisting, smart scanning, advanced anti-malware, mobile protection, and more. Behavior and reputation protection integrates with cloud-based McAfee Global Threat Intelligence to protect against cyberthreats across all vectors — file, web, message, and network. And to help your security team take the right actions fast, Real Time for McAfee ePO brings instant visibility into your security posture and security software configurations and helps you fix things fast.

Complete simplicity — Installation is easy. With as few as four clicks and in just 20 minutes, you’re up and running. McAfee ePolicy Orchestrator (McAfee ePO) technology streamlines policy enterprise endpoint management across all devices and provides a single pane of glass for visibility. Additionally, to improve reaction time when threats strike, your security team can ask questions and perform actions in real time.

Complete performance — Choose security that supports business instead of slowing it down. Fewer, more efficient scans and advanced memory management techniques minimize impact on users. Superior performance across all platforms comes from advanced smart scanning and memory management techniques that optimize CPU and memory usage. For the greatest efficiency, dynamic whitelisting offers a no-scanning, compact desktop footprint for fixed-function devices.

Read the Report View the Infographic

Features & Benefits

Top-rated, layered endpoint defense, from chip to cloud

Advanced antivirus, anti-malware, host intrusion prevention, device control, host-based firewall, dynamic application control, and more tackle malware, zero-day threats, and evasion attacks at every vector — mobile, data, web, email, and network.

Reduce the application attack surface without labor- and time-intensive whitelist management

Unique dynamic application control allows installation of only known good files or applications based on a flexible, automated update model.

Unify and simplify management

McAfee ePO single-console management streamlines and automates workflow, policy deployment, updates, maintenance, and reporting across all of the technologies that protect your endpoints. Integration with other McAfee and third-party products increases visibility and efficiency as you add to your security arsenal.

Act faster and more efficiently to stop threats in their tracks

Real Time for McAfee ePO gives security staff instant access to critical data and guidance to the right responses within the natural workflow.

Minimize risk

Clearly identify which assets might be affected by which threats, and whether you have proper protection in place. McAfee Risk Advisor calculates risk scores based on threats, vulnerabilities, asset criticality, and countermeasures to help your in-house security experts optimize and prioritize patching.

See more and know more for better protection

Real-time cloud-based McAfee Global Threat intelligence collects the latest data to protect against known and emerging cyberthreats across all vectors — file, web, message, and network.

Customer Stories

Texas Tech University Health Sciences Center

Texas Tech University Health Sciences Center (TTUHSC) offers programs in medicine, nursing, pharmacy, biomedicine and health sciences.

Highlights
  • Extensible compliance reporting.
  • Block thousands of attacks.
  • Security audits in minutes.
  • Improve visibility and productivity.

Customer Videos

Customer Testimonial

The future of IT is to securely enable businesses. Integris enables its employees by implementing McAfee’s Endpoint Mobility Management (EMM) to secure mobile devices and tablets, integrating EMM with ePO software helps to ease the strain to their IT department by providing one console to assess where the risk threshold lies.

inHouseIT benefits greatly from integrated reporting provided by McAfee ePolicy Orchestrator (ePO) software, creating a central repository and dashboard for a comprehensive view on the IT health of an organization.

The ability to push application control out to a specific endpoint is greatly beneficial, it brings security to any machine and brings performance up. With whitelisting and the integrated nature of McAfee ePO software, Seagate is able to manage all facets of security under one, single pane of glass, making management much easier.

Awards / Reviews

McAfee Enterprise Mobility Management wins Gold Medal for Best of Mobile Data Security 2013

McAfee stood out as the clear category leader, according to voters, coming out ahead of AirWatch MDM. EMM was awarded the Gold Medal for its data and malware protection, central management capabilities (including key management for encryption), granular and flexible policy controls, and the ease of installation and configuration for administrators.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses
McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Protection Defenses
McAfee core endpoint anti-malware products (McAfee VirusScan Enterprise, McAfee Host Intrusion Prevention, and McAfee SiteAdvisor Enterprise) achieved the highest block rate and an overall score of 97% for all threats blocked in the exploit protection test.

AV-TEST Comparative Review
In a comparative review by AV-TEST, McAfee Deep Defender scored 100% in proactive protection against zero-day rootkit and kernel stealth attacks.

Westcoast Labs Anti-Malware Test
McAfee Application Control, McAfee Host Intrusion Prevention, and McAfee VirusScan Enterprise provided 100% malware protection against 7,300 malware samples by allowing only authorized software to run on COE and fixed-function computers.

News / Events

Resources

Data Sheets

McAfee Complete Endpoint Protection—Enterprise

For a technical summary on the McAfee product listed above, please view the product data sheet.

Reports

NSS Labs Enterprise EPP Comparative Analysis, Socially Engineered Malware

Learn about why NSS Labs ranked McAfee as the top vendor for endpoint protection products for socially engineered malware protection, exploit protection, and phishing protection.

Tolly Test Report – Leveraging Peer Communications to Deliver Rapid Response to Security Threats in Large, Distributed Environments

Tolly evaluated McAfee Real Time Command and verified its capability to rapidly gather endpoint management data and provide a unified management platform for problem mitigation, in a McAfee commissioned test. Tests showed that McAfee Real Time Command can quickly collect data — 95% of 500 stations were collected in as little as 9 seconds — and effectively manage problem mitigation.

Five Hundred Endpoints in Five Seconds – Tolly Test Report Summary

Tolly Group confirms McAfee Real Time Command performance

The Risk of "Free" Endpoint Security

This Analyst Insight demonstrates how security professional can do a better job at communication security-related risks to business decision-makers, and at showing how investments in security controls actually reduces those risks.

Gartner’s Buyer’s Guide to Ideal Endpoint Protection

Wondering how to decode vendor hype as you evaluate your next endpoint protection platform? Gartner analyst Peter Firstbrook has created a comprehensive buyer’s guide for endpoint protection: what to look for, what to avoid, and why.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses

McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Protection Defenses

McAfee core endpoint anti-malware products (McAfee VirusScan Enterprise, McAfee Host Intrusion Prevention, and McAfee SiteAdvisor Enterprise) achieved the highest block rate and an overall score of 97% for all threats blocked in the exploit protection test.

Solution Briefs

McAfee Application Control Extends the Life of Legacy Microsoft Windows XP Systems

McAfee Application Control provides an effective way to block unauthorized applications from running and will continue to support Windows XP systems even after Microsoft’s phase-out of support has taken effect.

Counter Stealthy Malware

The most menacing type of cyberattack is invisible. Using sophisticated techniques to hide its presence, stealthy malware may operate outside of the OS or move dynamically across endpoints to conceal the attackers’ actions. The risk to enterprises is real, with high-profile attacks such as Operation High Roller impacting companies around the globe. Traditional antivirus or intrusion prevention systems are no match for this new breed of stealthy malware; instead, enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.

White Papers

Conquer the Top 20 Critical Security Controls

The strength of the Critical Security Controls (CSCs) is their ability to reflect the consensus of successful experiences captured and refined over multiple revisions. The CSCs help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

SANS Institute: Correlating Event Data for Vulnerability Detection & Remediation

Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.

Endpoint Security: It’s Not Just Black or White

Effective endpoint security requires more than just blacklisting or whitelisting — it requires a seamless integration of both for maximum endpoint safety.

Root Out Rootkits

This paper describes how McAfee Deep Defender moves endpoint security beyond the operating system. McAfee Deep Defender gets hardware assistance from Intel and uses a privileged early load position to uncloak, block, and remove the kernel-mode activities of stealthy rootkits.

The New Reality of Stealth Crimeware

With cybercrime on the rise, McAfee and Intel researchers believe that we need to re-envision how to detect and block stealthy malware.

Community

Blogs

  • Embrace and Secure Shadow IT
    David Bull - July 22, 2014

    “Shadow IT” is stepping out into the light of day. Business users are eagerly embracing the cloud and especially Software-as-a-Service (SaaS) in search of cost-effective productivity tools for file sharing and storage, collaboration, social media, and anything else that makes them more effective on the job. But the problem is these well-intentioned, hardworking employees are […]

    The post Embrace and Secure Shadow IT appeared first on McAfee.

  • 10 Experts, One Topic, 800 Million AETs
    Pat Calhoun - July 21, 2014

    To say cyber threats are getting more advanced may be the understatement of the year.  Every minute, our 500-plus team at McAfee Labs learns something new about the behavior of malware and other types of network attacks.  The most commonly undetected threat these days is the advanced evasion technique (AET).  In the most basic terms, […]

    The post 10 Experts, One Topic, 800 Million AETs appeared first on McAfee.

  • July #SecChat – Targeted Attacks Set Sights on Vital Systems
    Rees Johnson - July 18, 2014

    Targeted attacks can take on many different forms and are flexible enough to adopt a variety of tactics. Think of them as a specialized unit for cyber criminals. They are utilized for very specific missions and operate with the precision of a surgical strike, rather than the carpet-bombing techniques used by other malware variants. Whether […]

    The post July #SecChat – Targeted Attacks Set Sights on Vital Systems appeared first on McAfee.

  • Texas Tech University HSC Unifies Security and Compliance with McAfee SIEM Solutions
    Karl Klaessig - July 16, 2014

    Texas Tech University Health Sciences Center (TTUHSC) is a leader in education and research. With seven schools across six campuses, research facilities, and health care clinics, the university’s IT security team has the lofty task of protecting electronic medical records and health information in compliance with HIPAA regulations. Previously, TTUHSC lacked a centralized security management […]

    The post Texas Tech University HSC Unifies Security and Compliance with McAfee SIEM Solutions appeared first on McAfee.

  • Continuous Incident Response
    Barbara Kay - July 15, 2014

    At last week’s Gartner Risk and Security Management Summit, Anton Chuvakin mentioned that 1-3% of systems are compromised today. He called it “a low intensity fire, not a conflagration.” This seemed like a great analogy for our challenge with incident response. As a security industry—indeed, as a society—it’s much more straightforward to detect, contain, and […]

    The post Continuous Incident Response appeared first on McAfee.

Threats and Risks