Virtualization

Security, intelligence, and management through, within, and for virtualized environments

Next Steps:

Overview

Implementing virtualization solutions is challenging enough without security and compliance hindering performance and expected operational returns. With McAfee’s solutions for virtualized environments, you retain the operational benefits of virtualization while ensuring optimized virtual server security and compliance. Our solutions deliver new options for protection and operational efficiency — whether you are consolidating data centers, managing virtual desktop infrastructure, or looking to protect sensitive information within your databases.

As part of McAfee’s Security Connected framework, our solutions deliver real-time visibility and predictive capability enabled by McAfee Global Threat Intelligence (GTI). McAfee GTI allows you to balance the business need to embrace all forms of virtualization while protecting your critical assets and sensitive data from compromise.

Your data center is evolving. Are you?

View Infographic

Key Benefits

  • Advanced network threat detection
    Gain visibility through the virtualized environment with real-time threat intelligence.
  • Unique security management
    Get security management across virtualized servers with online, offline, and hypervisor-aware malware protection.
  • Purpose-built security for VDI environments
    Leverage security that enables protected and productive virtual desktops.
  • Data-level malware protection
    Use malware protection across shared storage infrastructure reducing risk of compromise.
  • Virtual machine host intrusion prevention
    Achieve host intrusion prevention for advanced protection of virtualized business endpoints and the data and transactions through them.
  • Virtual machine dynamic whitelisting and memory protection
    Block unwanted and unauthorized changes to virtualized servers that require best performance and highly effective security while subject to dynamic resource allocation.

Videos

Videos

RSA 2013: McAfee Interview on VMWare TV

McAfee MOVE AV provides strong anti-malware protection integrates with VMware vShield Endpoint to offload key antivirus and anti-malware functions to a hardened, tamperproof security virtual appliance, eliminating agent footprint.

Learn how the McAfee MOVE platform enables security for virtualized environments — without impacting the performance or availability of virtual machines.

Products

Endpoint Protection

McAfee MOVE AntiVirus
McAfee MOVE AntiVirus

McAfee Management for Optimized Virtual Environments (MOVE) AntiVirus optimizes McAfee virus protection for virtual desktops and servers without compromising performance or security, helping you realize operational returns and more effective security management.

McAfee Server Security Suite Advanced
McAfee Server Security Suite Advanced

McAfee Server Security Suite Advanced is the industry’s first server security solution that safeguards your critical servers from complex threats while preserving uptime and availability.

Database Security

McAfee Database Activity Monitoring
McAfee Database Activity Monitoring

McAfee Database Activity Monitoring stops attacks in real time, delivers sophisticated audit reports to help meet compliance requirements, and eases vulnerability remediation with virtual patching technology.

McAfee Security Scanner for Databases
McAfee Security Scanner for Databases

McAfee Security Scanner for Databases automatically finds databases on your network, determines if the latest patches have been applied, and tests for weak passwords, default accounts, and other common threats.

Services

Secure Virtualization Implementation Services

Secure your virtual infrastructure. Foundstone uncovers vulnerabilities that present risks to your virtual infrastructure and boosts compliance with industry best practices.

Virtual Infrastructure Security Assessment

Uncover security vulnerabilities in your virtual infrastructure. Foundstone evaluates the architecture, configuration, and management of your virtualized environment to identify gaps with industry best practices and lower risk.

Resources

Data Sheets

McAfee MOVE AntiVirus

For a technical summary on the McAfee product listed above, please view the product data sheet.

Reports

Gartner Magic Quadrant for SIEM

The security information and event management (SIEM) market is defined by the customer's need to apply security analytics to event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze and report on log data for incident response, forensics and regulatory compliance. The vendors included in the Magic Quadrant analysis have technologies that have been designed for this purpose, and they actively market and sell these technologies to the security buying center.

[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]

Evolving Your Data Center? Evolve Your Data Center Security

Traditional technologies for securing the evolving enterprise data center are being adapted by leading solution providers to work across a broad range of datacenter deployment scenarios. Enterprise buyers should look for solution providers that have explicitly adapted their solutions to work together in a layered, defense-in-depth approach for data center security.

Solution Briefs

Data Center Server Security Suites

McAfee Data Center Server Security Suites deliver the industry’s first comprehensive solution for securing mission-critical services in today’s mixed physical and virtual environments.

Expand Virtualization, Maintain Security

McAfee Management for Optimized Virtual Environments AntiVirus (McAfee MOVE AntiVirus) tailors security systems to the special technical and management requirements of virtualization.

Securing the Next-Generation Data Center

Learn how to implement security at outset of a data center build-out, upgrade, or consolidation for maximum flexibility and advanced threat reduction.

McAfee MOVE AntiVirus: Optimized Security for Virtualized Environments

Learn how McAfee MOVE AntiVirus optimizes virus scanning for virtualized desktops and servers, providing essential protection and improved performance.

Efficient, Scalable & Secure Desktop Virtualization

Learn how McAfee and Citrix are collaborating to deliver a suite of products, tools, and technologies to unlock the power of desktop virtualization for all enterprises.

Securing the Virtual Desktop: Removing the Last Barrier to Widespread Adoption

Learn how the McAfee and Citrix partnership enables Citrix XenDesktop customers to extend management of desktop security to virtual environments using the McAfee ePolicy Orchestrator software.

White Papers

Security Connected from McAfee: Comprehensive, Cost-Effective Security

With federal budgets trending downward and both cyberthreats and mandates heading upward, the question becomes, "Can you get comprehensive cybersecurity that provides real-time threat visibility and protection at a reasonable cost? The answer is yes."

Secure Virtualization in the Federal Government

McAfee solutions can help federal IT teams support more end users, more workloads, and more geographies, while adhering to strict government compliance standards.

Community

Blogs

  • Root of Trust vs. Root of Evil: Part 3
    Tyson Macaulay - July 19, 2015

    This is the third of three parts about root of trust and the Internet of Things. In Part 1 and Part 2, I covered how root of trust is an important approach to managing risk in virtualized network—especially compliance risks. The first two posts in this series examined several reasons to consider root-of-trust technologies. In […]

    The post Root of Trust vs. Root of Evil: Part 3 appeared first on McAfee.

  • Root of Trust vs. Root of Evil: Part 2
    Tyson Macaulay - July 17, 2015

    This is the second of three posts about the root of trust and the Internet of Things. In my first post I wrote about the burden of technology compliance and how it may be changing as virtualization enters service provider and enterprise networks and underlies the Internet of Things (IoT). I also wrote about a […]

    The post Root of Trust vs. Root of Evil: Part 2 appeared first on McAfee.

  • Root of Trust vs. Root of Evil: Part 1
    Tyson Macaulay - July 15, 2015

    Regulatory compliance is an unloved cost of goods—an expense to be managed, like cafeteria subsidies or fleet fuel costs. Major regulatory gaps are opening around the Internet and Internet of Things (IoT), and especially in the plumbing under the IoT, which is rapidly evolving in a process known as network function virtualization (NFV). This future […]

    The post Root of Trust vs. Root of Evil: Part 1 appeared first on McAfee.

  • Containing Security
    Rishi Bhargava - April 8, 2015

    How to identify the appropriate security for your container-based virtual applications.  Virtual machines and containers are similar but distinct ways of virtualizing infrastructure to deploy applications. And they have similar but distinct needs for securing those applications. Virtual machines are the most separate and secure method of virtualizing hardware, enforced by hardware. Each virtual machine […]

    The post Containing Security appeared first on McAfee.

  • Aberdeen Reports: McAfee Helps Secure the Evolving Datacenter
    PageOne Pr - August 27, 2014

    The demands between physical, virtual, public and private clouds change faster than actual clouds do. As organizations adapt to these changes, they face the Sisyphean task of securing and hardening their networks from external agents. And therein lies the problem: companies conscious of the cloud’s benefits are hesitant to adopt cost-saving virtualization because of security […]

    The post Aberdeen Reports: McAfee Helps Secure the Evolving Datacenter appeared first on McAfee.

Threats and Risks