McAfee VirusScan Enterprise for Linux delivers always-on, real-time anti-malware protection for Linux environments. Its unique, Linux-based on-access scanner constantly monitors the system for potential attacks. Regular automatic updates from McAfee Labs protect your enterprise from the latest threats without requiring a system reboot.
VirusScan Enterprise for Linux provides:
Award-winning performance — Named a VB100 award winner for 100% detection of “in the wild” test samples, plus zero false positives in a selection of clean files.
Always-on protection — Uses heuristic scanning, archive scanning, and cross-platform protection to ensure comprehensive security.
Centralized management and reporting — With the McAfee ePolicy Orchestrator (ePO) platform, you can efficiently deploy and manage your Linux, Microsoft Windows, and Mac clients on your network, giving you better security visibility across your entire infrastructure. Control policy configuration, deployment, and reporting for all your endpoints from ePO’s single, web-based console.
Protect your Linux environment with industry-leading protection:
Count on automatic updating from McAfee Labs to ensure the most current protections are always in place — without requiring a server restart.
Manage McAfee VirusScan Enterprise for Linux from a single, centralized console with the ePO platform, the first and only scalable tool for managing and enforcing anti-virus protection and policies.
Get on-access scanning protection without kernel hooks, saving time and effort when you roll out new Linux distributions.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]
Written by Deepak Choudhary There are always risks involved when relying on a third party to send and receive sensitive data over secure network channels. While we recognize the roles of the Public Key Infrastructure (PKI) and third party certificate authority (CA), we also believe that Certificate SSL Pinning can play a key role in […]
In a blog last week, I discussed CryptoLocker, a particularly nefarious family of ransomware, and how to defend against it. I thought it would be worthwhile to demonstrate how McAfee Threat Intelligence Exchange can detect and stop malware like ransomware, even if the suspicious file has not been flagged as malware by antivirus signatures. Click […]
The post Defending Against Ransomware with McAfee Threat Intelligence Exchange appeared first on McAfee.
In the McAfee Labs Threats Report: November 2014, Intel Security predicted nine major threats that would occur in 2015. Regarding ransomware, we said this: “Ransomware will evolve its methods of propagation, encryption, and the targets it seeks.” Almost immediately, we began to see a huge rise in ransomware, especially with the family CTB-Locker, followed by […]
You, along with the vast majority of companies, use public cloud servers for something. Whether they are your primary service infrastructure, overflow capacity, or emergency backup, this Infrastructure as a Service (IaaS) is delivering on the promises of reduced costs, greater agility, and enhanced scalability. But there are still questions about security. You need to […]