McAfee Endpoint Protection Suite

McAfee Endpoint Protection Suite

Secure Windows, Mac, and Linux systems with essential endpoint and data protection

Next Steps:

Overview

Traditional Windows, Mac, and Linux systems within your LAN need essential security to block advanced malware, control data loss and compliance risks caused by removable media, and provide safe access to critical email and web applications. McAfee Endpoint Protection Suite integrates these core functions into a single, manageable, multiplatform environment ideal for safeguarding traditional desktops that have limited exposure to Internet threats.

Endpoint Protection Suite includes:

Real-time anti-malware and antivirus protection — Block viruses, Trojans, worms, adware, spyware, and other potentially unwanted programs that steal confidential data and sabotage user productivity.

Proactive email and web security — Intercept malware and spam before it reaches inboxes. Built-in McAfee SiteAdvisor Enterprise Plus warns users about malicious websites before they click and allows administrators to authorize or block website access, ensuring compliance.

Desktop firewall — Control desktop applications that can access the network, and stop network-borne attacks and downtime. Deploy and manage firewall policies based on location to deliver complete protection and compliance with regulations.

Comprehensive device control — Monitor and restrict data copied to removable storage devices and media to keep it from leaving company control.

Unrivaled centralized management — The McAfee ePolicy Orchestrator (McAfee ePO) platform provides visibility and control over security defenses and unifies controls over all your security and compliance tools, from McAfee as well as third parties.

Features & Benefits

Protect your endpoints from every angle

Guard all Windows, Mac, and Linux endpoints against system, data, email, web, and network threats.

Save time and money

Consolidate endpoint and data security efforts with an integrated endpoint security solution from one vendor — securing stronger protection at a lower cost. McAfee enables you to manage endpoint security from one centralized console and connect to other McAfee and third-party products, improving visibility and expediting response times.

Deploy quickly and easily

Enable increased protection without delay. The EASI installer gets your strong protection running in as few as four clicks. Endpoint Protection Suite is integrated with the McAfee ePolicy Orchestrator (ePO) platform so you can deploy and manage security using a single environment.

System Requirements

These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment. 64-bit operating system support is available for some technologies.

  • Workstations
    • Windows 8
    • Windows 7 or Embedded
    • Windows Vista
    • Windows XP Home, Professional, Embedded (WEPOS), Tablet PC
    • Windows 2000 Professional with Service Pack 2 (SP2) or higher
    • Mac OS X Yosemite (version 10.10 or later)
    • Mac OS X Mavericks (version 10.9 or later)
    • Mac OS X Mountain Lion (version 10.8 or later)
    • Mac OS X Lion (version 10.7 or later)
    • Mac OS X Snow Leopard (version 10.6 or later)
  • Servers
    • Windows 2008 Server, HyperV, Core, Datacenter, Storage Server, Cluster Server, Small Business Server
    • Windows 2003 Server, Storage Server, Cluster Server, Datacenter, Small Business Server
    • Windows 2000 Server, Advanced Server, Small Business Server
    • VMware ESX, ESXi
    • Citrix XenDesktop and XenServer
  • Other supported platforms
    • FreeBSD 6.1 and 7.0 (32-bit) (Command Line Scanner)
    • HP-UX 11.0, 11i, 11i v2/v3 (Command Line Scanner)
    • IBM AIX 5.2, 5.3, 6.1 (Command Line Scanner)
    • Linux Kernel 2.4 (32-bit) and 2.6 (64-bit) (Command Line Scanner)
    • Solaris 8, 9, 10 (32-bit/64-bit) (Command Line Scanner)
    • Citrix MetaFrame 1.8 and XP Support
    • EMC Celerra File Server
  • Email server requirements
    • Microsoft Exchange 2003 SP1, 2007 (64-bit), 2010 (v7.0.2)
    • Microsoft Exchange 2000 SMB, 2003 Server, or Advanced Server
    • Lotus Domino 6.0.3-6.0.5, 7.0, 8.0 (32-bit), 8.5 (32-bit)
  • Database software requirements
    • Microsoft SQL Server 2008 (32-bit/64-bit), Express
    • Microsoft SQL Server 2005 (32-bit/64-bit), Express
  • Supported web server platforms
    • IIS 4.0, 5.0, and 6.0 (Microsoft Windows)

Awards / Reviews

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses

McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

Customer Stories

Bank Central Asia

Bank Central Asia, a regional public bank in Indonesia, centralizes security management with McAfee ePolicy Orchestrator.

Highlights
  • Eased compliance with internal and industry regulations.
  • Resulted in time savings with centralized management.
  • Provided integrated solutions to keep computers, the network, and data protected.

Deutsche Edelstahlwerke

Deutsche Edelstahlwerke, the leading German producer of specialty stainless steel products, secures thousands of desktops while keeping production systems available with McAfee endpoint solutions.

News / Events

Resources

Data Sheets

McAfee Endpoint Protection Suite

For a technical summary on the McAfee product listed above, please view the product data sheet.

Reports

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses

McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

Endpoint Security: Anti-Virus Alone is Not Enough

This report provides supporting data that endpoint security based on antivirus software alone is not enough.

Solution Briefs

McAfee Application Control Extends the Life of Legacy Microsoft Windows XP Systems

McAfee Application Control provides an effective way to block unauthorized applications from running and will continue to support Windows XP systems even after Microsoft’s phase-out of support has taken effect.

A More Rational Approach to Endpoint Security: 5 Reasons to Simplify Your Life

Learn how McAfee‘s architecture and scalable management through the ePolicy Orchestrator platform leverage your company’s current infrastructure.

White Papers

Top Five McAfee ePolicy Orchestrator Tips

This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.

Community

Blogs

  • Franchising Ransomware
    Vincent Weafer - July 2, 2015

    Got a great business idea? Want to expand with less risk? Build a good product, develop some training, put them together into a repeatable formula, and collect the royalties from your franchisees. This model, used successfully for everything from fast food to hair salons to tax preparation, is now available for criminal ransomware. Cybercriminals have […]

    The post Franchising Ransomware appeared first on McAfee.

  • Beat the Ticking Clock Against Emerging Threats
    Paul Zimski - July 1, 2015

    In order to beat todays advanced threats, your security defense system relies on good communication. However, when your security posture is dependent on a slew of different products from a spread of vendors, communication can break down. This breakdown in communication means you’re losing valuable time in detecting cyberthreats. To address this communication breakdown, there […]

    The post Beat the Ticking Clock Against Emerging Threats appeared first on McAfee.

  • Securing Critical Infrastructure
    Lorie Wigle - July 1, 2015

    Protecting the Industrial Internet of Things from cyberthreats is a national priority.  Industrial automation and control systems are increasingly online, sending out information and receiving commands from local and remote control centers and corporate data systems. Technologies in this Industrial Internet of Things (IIoT) have tremendous potential to improve operations, reduce costs, enhance safety, increase […]

    The post Securing Critical Infrastructure appeared first on McAfee.

  • Cyber Resilience And Spear Phishing
    Mo Cashman - June 29, 2015

    Balanced security capability, defense in depth, integrated countermeasures, and a threat-intelligence strategy are critical to defending your business from spear-phishing attacks. Spear phishing continues to be the most successful means of gaining entry to an enterprise network and to valuable business or personal data. According to the latest Verizon Data Breach Investigations Report, two-thirds of […]

    The post Cyber Resilience And Spear Phishing appeared first on McAfee.

  • Government Agencies Should Turn to CDM During 30-Day Sprint
    Tom Gann - June 29, 2015

    The fallout from the OPM breach continues with news that clearance information may have been stolen and that more than 10 million federal employee records may have been breached. In response, the White House has ordered every agency to engage in a “30 day sprint” to shore up and bolster their defensive cybersecurity capabilities. During […]

    The post Government Agencies Should Turn to CDM During 30-Day Sprint appeared first on McAfee.

Threats and Risks