McAfee VirusScan for Mac provides complete, proactive malware protection for Mac systems and users. Using proven protection methods, it stops all types of viruses and malicious code, including spyware, adware, Trojans, and new, unknown threats.
VirusScan for Mac delivers:
Centralized, simplified security management — With the McAfee ePolicy Orchestrator (ePO) platform, you can efficiently deploy and manage your Mac, Windows, and Linux clients on your network, giving you better security visibility across your entire infrastructure. Control policy configuration, deployment, and reporting for all your endpoints from the ePO platform’s single, web-based console.
Proactive threat protection — Uses heuristic analysis, generic protection, and on-access scanning to detect and remove viruses, worms, Trojans, spyware, adware, and other unwanted threats before they infect your system. VirusScan for Mac guards against Mac, PC, and Unix-based viruses.
Continuous and on-demand virus scanning — Automatically scans for threats each time a file is accessed. Also scans on demand with file drag and drop.
Seamless security updating — Automatically pulls the latest malware updates from McAfee Labs, our worldwide, 24/7 security research team.
Stop every type of virus, spyware, adware, and other malicious code that targets Mac OS X or Microsoft Windows. McAfee VirusScan for Mac can even detect compressed malware files and previously unknown viruses.
Allow end users to operate Macs in your environment and ensure their data is protected.
Get continuous policy enforcement for multiple files, directories, and volumes, including volumes on remote Macs connected through your network.
Deploy and monitor VirusScan for Mac using the familiar Mac OS X Aqua user interface. Alternatively, use the McAfee ePolicy Orchestrator (ePO) platform for easy deployment, enforcement, management, and reporting — all from a single console.
Check files only when they are accessed to determine whether they’re infected with malware. Initiate on-demand scanning using file drag and drop, and schedule full-disk scans to run at convenient intervals, such as overnight or during off-peak hours.
Scan Apple Mail messages and attachments for threats, and protect users when they save or open files from shared network drives.
Count on streaming updates from McAfee Labs — our worldwide, 24/7 security research team — to ensure full compliance and up-to-the-minute protection against viruses, worms, and other threats.
These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
Citrix reduces risk with McAfee’s integrated security risk management platform.
Purdue University protects 25,000 systems with McAfee.
For a technical summary on the McAfee product listed above, please view the product data sheet.
One question I often hear is “When will Intel Security (McAfee) publish a report on the latest threat?” It seems to be a hot trend today for security companies to offer reports with topics such as “Operation X” or “Malware Y,” or to trumpet how many zero-day vulnerabilities they have found. Do we now measure […]
The post At Intel Security, Protecting Customers Takes Precedence Over Seeking Headlines appeared first on McAfee.
During the last couple of months, we’ve observed several RTF exploits that target Indian organizations. The first RTF exploit was found by McAfee researchers on August 21. Subsequently, we saw multiple variants of the same exploit through October. The contents of the decoy documents are politically themed, targeted at several local and overseas Indian establishments. […]
The post Operation Mangal: Win32/Syndicasec Used In Targeted Attacks Against Indian Organizations appeared first on McAfee.
This is the second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out the first part here. Microsoft’s Patch From our previous analysis we’ve learned that the core of this threat is its ability to effectively right-click a file. Now, let’s see what Microsoft did in its patch […]
The post Bypassing Microsoft’s Patch for the Sandworm Zero Day: Even ‘Editing’ Can Cause Harm appeared first on McAfee.
On October 21, we warned the public that a new exploitation method could bypass Microsoft’s official patch (MS14-060, KB3000869) for the infamous Sandworm zero-day vulnerability. As Microsoft has finally fixed the problem today via Security Bulletin MS14-064, it’s time to uncover our findings and address some confusion. This is the first of two posts on […]
The post Bypassing Microsoft’s Patch for the Sandworm Zero Day: a Detailed Look at the Root Cause appeared first on McAfee.
“Distrust and caution are the parents of security”–Benjamin Franklin A recent threat targeting Chinese users of Mac OS X and iPhone came to light yesterday. The malware, called WireLurker, is distributed by the Chinese third-party app store Maiyadi. Since the threat’s discovery, more than 400 applications containing the Trojan were identified at the store. Two […]