McAfee VirusScan Enterprise for Linux delivers always-on, real-time anti-malware protection for Linux environments. Its unique, Linux-based on-access scanner constantly monitors the system for potential attacks. Regular automatic updates from McAfee Labs protect your enterprise from the latest threats without requiring a system reboot.
VirusScan Enterprise for Linux provides:
Award-winning performance — Named a VB100 award winner for 100% detection of “in the wild” test samples, plus zero false positives in a selection of clean files.
Always-on protection — Uses heuristic scanning, archive scanning, and cross-platform protection to ensure comprehensive security.
Centralized management and reporting — With the McAfee ePolicy Orchestrator (ePO) platform, you can efficiently deploy and manage your Linux, Microsoft Windows, and Mac clients on your network, giving you better security visibility across your entire infrastructure. Control policy configuration, deployment, and reporting for all your endpoints from ePO’s single, web-based console.
Protect your Linux environment with industry-leading protection:
Count on automatic updating from McAfee Labs to ensure the most current protections are always in place — without requiring a server restart.
Manage McAfee VirusScan Enterprise for Linux from a single, centralized console with the ePO platform, the first and only scalable tool for managing and enforcing anti-virus protection and policies.
Get on-access scanning protection without kernel hooks, saving time and effort when you roll out new Linux distributions.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
McAfee protects Wyeth’s global IT environment from pervasive threats.
For a technical summary on the McAfee product listed above, please view the product data sheet.
Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often than random phishing attempts. Exploits that use patched vulnerabilities delivered via spear phishing email are one of the most successful combinations used by attackers to infiltrate targeted organizations and gain access to confidential information. During […]
The post Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities appeared first on McAfee.
The Dofoil downloader (found in the wild since 2011) occasionally updates itself with new features and encryption techniques to hide communications with its control servers. The latest iteration uses a variation of XOR and RC4 algorithms similar to previous variants to encrypt the list of control servers within the binary and encrypt all traffic with […]
The post Dofoil Downloader Update Adds XOR-, RC4-Based Encryption appeared first on McAfee.
McAfee product coverage and mitigations for malware or indicators associated with the recent attacks (a.k.a. Dragonfly, Energetic Bear, Havex/SYSMain) on industrial control systems (ICS’s) are listed below. The Havex remote access tool is common across these associated attacks or campaigns–including Dragonfly. We have seen Havex in ICS-specific targeted campaigns. It can detect and affect ICS- […]
The post Product Coverage and Mitigation for ICSA-14-178-01 (Havex/ICS-Focused Malware) appeared first on McAfee.
Every organization has deployed anti-virus/anti-malware solutions, but how much you have actually reduced your risk? To recap what we’ve covered in this 5-part blog series, Aberdeen’s analysis and Monte Carlo modeling: Confirms the high risk of unprotected endpoints Demonstrates that endpoint protection really does reduce risk Confirms that “free” endpoint protection (e.g., Microsoft) is better […]
The post Endpoint Security, Part 5 of 5: A/V Alone is Not Enough appeared first on McAfee.
If you’re just tuning in, this is the fourth in a series of blogs about understanding the risk of endpoint security, preceded by: Endpoint Security: The Risk of Going Unprotected Endpoint Security: Yes, Anti-Virus Really Does Reduce Risk Endpoint Security: Why “Free” A/V is Better Than Nothing By now, the approach to substantiate the statement […]
The post Endpoint Security, Part 4 of 5: Why “Free” A/V Actually Costs More appeared first on McAfee.