McAfee VirusScan Enterprise for Linux delivers always-on, real-time anti-malware protection for Linux environments. Its unique, Linux-based on-access scanner constantly monitors the system for potential attacks. Regular automatic updates from McAfee Labs protect your enterprise from the latest threats without requiring a system reboot.
VirusScan Enterprise for Linux provides:
Award-winning performance — Named a VB100 award winner for 100% detection of “in the wild” test samples, plus zero false positives in a selection of clean files.
Always-on protection — Uses heuristic scanning, archive scanning, and cross-platform protection to ensure comprehensive security.
Centralized management and reporting — With the McAfee ePolicy Orchestrator (ePO) platform, you can efficiently deploy and manage your Linux, Microsoft Windows, and Mac clients on your network, giving you better security visibility across your entire infrastructure. Control policy configuration, deployment, and reporting for all your endpoints from ePO’s single, web-based console.
Protect your Linux environment with industry-leading protection:
Count on automatic updating from McAfee Labs to ensure the most current protections are always in place — without requiring a server restart.
Manage McAfee VirusScan Enterprise for Linux from a single, centralized console with the ePO platform, the first and only scalable tool for managing and enforcing anti-virus protection and policies.
Get on-access scanning protection without kernel hooks, saving time and effort when you roll out new Linux distributions.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
This provider of banking IT services centralizes security management and improves security throughout its endpoints, including ATMs and point-of service systems in branches.
For a technical summary on the McAfee product listed above, please view the product data sheet.
W32/NionSpy is a family of malware that steals information from infected machines and replicates to new machines over networks and removable thumb drives. Aside from stealing keystrokes, passwords, Bitcoins, system information, and files on disk, NionSpy (also known as Mewsei and MewsSpy) can record video (using the webcam), audio (using the microphone), take screenshots, and […]
The post Taking a Close Look at Data-Stealing NionSpy File Infector appeared first on McAfee.
Since the beginning of the year we have seen a spike in ransomware including the emergence of new ransomware families. One family that has recently resurfaced is Vaultcrypt. This variant both tidies up after itself and steals web page login data. Infection vector The malware arrives on a victim’s machine through a spam email containing […]
The post VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials appeared first on McAfee.
Several global law enforcement agencies—with assistance from Intel Security—this week successfully dismantled the “Beebone” botnet behind a polymorphic worm known by Intel Security as W32/Worm-AAEH. The purpose of this worm is to facilitate downloading other malware, including ZBot banking password stealers, Necurs and ZeroAccess rootkits, Cutwail spambots, fake antivirus, and ransomware. The worm spreads quickly […]
Written by Piyush Mittal. Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]
The post Hidden Low Hanging Avaya IP Office Default Credentials appeared first on McAfee.
How the consumerization of IT is affecting endpoint security What happens in Vegas may stay in Vegas, but what happens on your employees’ personal devices may not stay there. According to a recent survey of consumers around the world, conducted by MSI Research on behalf of Intel Security, almost 80% of respondents use their personal […]