McAfee VirusScan Enterprise for SAP continuously secures mission-critical SAP NetWeaver environments against potential security threats. It also stops zero-day threats and speeds the time to resolution when vulnerabilities are discovered. And it provides comprehensive management reporting, updates, and auditing capabilities, all in one package. McAfee is an SAP-certified integration partner.
VirusScan Enterprise for SAP offers:
Continuous, comprehensive coverage — Scan, quarantine, and remediate sensitive documents, configuration files, and templates before they reach your SAP environment.
Simplified security management — Manage agents, policies, and reports for your SAP environment and all your McAfee products from the McAfee ePolicy Orchestrator (ePO) platform, the centralized security management console.
Flexible deployment — Use as a standalone server or as a virtual machine.
Proven protection — Count on McAfee’s anti-malware expertise, trusted by more than 50 million enterprise users worldwide, and the 24/7 anti-threat vigilance of McAfee Labs.
Block malware, scan external files, quarantine infected files, and stop zero-day threats before they reach your SAP NetWeaver environment.
Count on automatic, real-time updates from McAfee Labs to ensure the most current protections are always in place.
Extend your investment in enterprise security management by adding VirusScan Enterprise for SAP to your McAfee ePolicy Orchestrator (ePO) infrastructure. No additional training is required for IT staff who already use the ePO platform.
Use the ePO platform as the hub of your security risk management solutions, so you can reduce the risk of rogue, noncompliant systems; keep protection up to date; configure and enforce protection policies; and monitor security status 24/7 from one centralized, web-based console.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
As the largest dedicated security vendor, McAfee’s goal is to help customers and consumers feel secure in the digital world. It’s certainly not simple, and it’s challenging to keep up with the bad guys. One way to do that is to match our adversaries’ aggressive drive to innovate with our own deeper commitment to collaborate […]
The post McAfee Founds Cyber Threat Alliance With Industry Partners appeared first on McAfee.
Although VMworld wrapped a few weeks ago, we’re still spinning over the excitement and buzz that was generated around the event. VMworld 2014 was a special benchmark for both McAfee and Intel, as we presented the first Intel Security product (the Intel Security Controller), and also showcased Intel Security’s capabilities with a united booth presence […]
The post Comprehensive Server Security: The Star of VMworld 2014 appeared first on McAfee.
I’m delighted to announce that McAfee is working with Amazon Web Services (AWS) to offer our Host-Based Security Solution (HBSS) to AWS Cloud customers. As HBSS is so critical to DoD’s security posture, it’s the first of several Software as a Service (SaaS) offerings we’ll do with AWS. Military and civilian government agencies are increasingly […]
The post McAfee offers government security for Amazon cloud customers appeared first on McAfee.
I recently wrote a piece in Dark Reading around the notion that Endpoint security is not dead, but instead facing a steadily mounting series of obstacles with relation to the new universe of Internet-connected devices. While there are certainly more challenges to securing corporate networks today, claiming that enforcing Endpoint security policies is basically fighting […]
The post Endpoint Security and the Reality of Ubiquitous Computing appeared first on McAfee.
In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made this critical point: Stopping attacks before they breach and narrowing the breach discovery gap require the ability to detect threats at […]