McAfee Complete Endpoint Protection - Enterprise

McAfee Complete Endpoint Protection - Enterprise

适用于每台设备,可抵御所有威胁的功能强大、快速且可扩展的安全防御产品

后续步骤:
  • 与迈克菲聊天沟通
    准备好购买我们的产品了吗?或者在购买前还有任何疑问?请与迈克菲的专家沟通交流。该服务提供时间为周一至周五上午。(仅限英语)。
  • 查找经销商
  • 联系我们
  • 请致电: 400 610 0369 或 800 810 0369

概述

维护企业安全变得即轻松又简单。这款具有单一管理平台的解决方案融入了几种安全技术,可为所有设备提供主动安全保护,包括 PC、Mac、Linux 系统、智能手机、虚拟机、平板电脑和服务器。在保护您的终端免遭当前最险恶最隐匿的威胁(包括高级持久性威胁 (APT))的同时,简化企业终端管理过程并降低成本。

通过 Complete Endpoint Protection — Enterprise,您可以自定义企业安全,以便为每个用户社群创建合适的安全策略组合,从为用户提供他们所需的自由度和灵活性授权,到对共享系统应用最严格的控制。一套软件就是一个“覆盖范围全面”的安全工具箱。从安装简单到实时调查,它是一款集成众多先进技术并实现集中管理的安全套件,可提高安全管理效率。

全面保护 — 这款综合性安全套件将业内领先的威胁防御技术扩展到您的数据和系统,从而能够提供其他产品无法实现的全方位安全保护。它能够快速发现、修复和阻止恶意软件。我们的 Security Connected 方法包括分层动态白名单、智能扫描、高级防恶意软件和移动设备保护等功能,范围覆盖所有基础设施。行为和信誉保护与基于云的 McAfee Global Threat Intelligence 集成,可预防来自所有载体的网络威胁,包括文件、Web、消息和网络。

全面简化 -- 安装简单。只需四次单击即可在 20 分钟内完成安装并开始运行。McAfee ePolicy Orchestrator (McAfee ePO) 技术简化了跨所有设备的企业终端安全策略的管理,并提供一个可视面板供用户实时查看。此外,安全团队还可以实时提问并采取操作,以提高威胁发生时的响应速度。

完美性能 — 选择能够支持企业发展而不是影响企业发展的安全解决方案。通过次数更少、但更高效的扫描以及高级内存管理技术,可最大限度地降低安全产品对用户的影响。通过高级智能扫描,以及可优化 CPU 和内存使用率的内存管理技术,在所有平台上都实现超凡性能。动态白名单为功能固定的设备提供无需扫描的紧凑型台式机运行空间,从而提高工作效率。

The true cost of "free" endpoint security

Read Report
View Infographic

特点和优势

一流的分层式终端安全防护

高级防病毒、防恶意软件、主机入侵防护、设备控制、基于主机的防火墙、动态应用程序控制,以及更多应对恶意软件、零日威胁和来自每个载体(包括移动设备、数据、Web、电子邮件和网络)的规避攻击的防御技术。

通过自动且省时的白名单管理,降低应用程序攻击面

独特的动态应用程序控制功能通过灵活且可自动更新的模式,只允许安装已知良好的文件或应用程序。

统一并简化管理

McAfee ePO 是一个单一管理控制台,可自动完成安全管理流程,以及策略的部署、更新和维护,并针对可保护您的端点安全的所有技术提供报告,从而简化您的安全管理工作。通过与其他迈克菲产品和第三方产品集成,可在您增加安全保护时提高您的工作效率,并使您能够更好地了解新增加的安全产品的运行状况。

关注更多,了解更多,获得更多安全保护

基于云的实时 McAfee Global Threat Intelligence 可收集最新数据以抵御来自所有载体的已知与新兴网络威胁,包括文件、Web、消息和网络。

客户案例

California Department of Corrections and Rehabilitation (CDCR) (English)

Leveraging the Security Connected strategy, the California Department of Corrections and Rehabilitation implemented SIEM, network IPS, data protection, and endpoint security solutions to secure its distributed IT environment over 37 locations.

产品特色
  • Compliance with policy standards.
  • Dashboards enable centralized security management and provide easy access for executive reporting.

Major U.S. State Government (English)

State Government Places its Trust in Intel Security for IT Consolidation Within this US state government, the Office of Technology is the central IT organization, serving almost 400 executive, judicial, and legislative agencies, which, in turn, administer programs for 4.4 million citizens. The Office of Technology oversees a network linking 1,500 locations and 35,000 users across the state.

Texas Tech University Health Sciences Center (English)

This leading teaching and research university relies on McAfee to connect security and compliance.

产品特色
  • Extensible compliance reporting.
  • Block thousands of attacks.
  • Security audits in minutes.
  • Improve visibility and productivity.

客户视频

客户反馈

The future of IT is to securely enable businesses. Integris enables its employees by implementing McAfee’s Endpoint Mobility Management (EMM) to secure mobile devices and tablets, integrating EMM with ePO software helps to ease the strain to their IT department by providing one console to assess where the risk threshold lies.

inHouseIT benefits greatly from integrated reporting provided by McAfee ePolicy Orchestrator (ePO) software, creating a central repository and dashboard for a comprehensive view on the IT health of an organization.

The ability to push application control out to a specific endpoint is greatly beneficial, it brings security to any machine and brings performance up. With whitelisting and the integrated nature of McAfee ePO software, Seagate is able to manage all facets of security under one, single pane of glass, making management much easier.

奖项/评述

McAfee Enterprise Mobility Management 赢取 2013 年度最佳移动数据安全金牌

根据投票结果,迈克菲打败了 AirWatch MDM,作为清理类别领导者脱颖而出。EMM 依托自身的数据和恶意软件防护、集中式管理功能(包括加密密钥管理)、精细灵活的策略控制以及便于管理员安装和配置等优势,赢得金牌。

NSS Labs 企业 AV/EPP 比较分析 -- 漏洞利用规避防护
迈克菲终端保护解决方案在一项防御规避攻击的测试中得分最高。

NSS Labs 企业 AV/EPP 比较分析 -- 漏洞利用防护
迈克菲核心终端防恶意软件产品(McAfee VirusScan Enterprise、McAfee Host Intrusion Prevention 和 McAfee SiteAdvisor Enterprise)在漏洞利用防护测试中对所有威胁的拦截率最高,为 97%。

Westcoast Labs 防恶意软件测试
McAfee Application Control、McAfee Host Intrusion Prevention 和 McAfee VirusScan Enterprise 通过只允许授权软件在 COE 和功能固定的计算机上运行,提供了针对 7300 种恶意软件样本的 100% 恶意软件防护。

新闻/活动

资源

产品简介

McAfee Complete Endpoint Protection — Enterprise

有关上面所列迈克菲产品的技术摘要,请查看产品简介。

常见问题解答

McAfee Enterprise Mobility Management (McAfee EMM) 12.0 (English)

Get answers to questions about McAfee Enterprise Mobility Management.

报告

NSS Labs Enterprise EPP Comparative Analysis, Socially Engineered Malware (English)

Learn about why NSS Labs ranked McAfee as the top vendor for endpoint protection products for socially engineered malware protection, exploit protection, and phishing protection.

The Risk of "Free" Endpoint Security (English)

This Analyst Insight demonstrates how security professional can do a better job at communication security-related risks to business decision-makers, and at showing how investments in security controls actually reduces those risks.

Gartner’s Buyer’s Guide to Ideal Endpoint Protection (English)

Wondering how to decode vendor hype as you evaluate your next endpoint protection platform? Gartner analyst Peter Firstbrook has created a comprehensive buyer’s guide for endpoint protection: what to look for, what to avoid, and why.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses (English)

McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Protection Defenses (English)

McAfee core endpoint anti-malware products (McAfee VirusScan Enterprise, McAfee Host Intrusion Prevention, and McAfee SiteAdvisor Enterprise) achieved the highest block rate and an overall score of 97% for all threats blocked in the exploit protection test.

白皮书

Should IT Vendor Consolidation Extend to Endpoint Security? (English)

As IT organizations try to simplify vendor management, many are asking if consolidating on a single endpoint security vendor makes sense. It could hinge on the existence of an overall security framework. This white paper examines the questions IT executives should ask themselves and their security technology partners.

Conquer the Top 20 Critical Security Controls (English)

Critical Security Controls (CSCs) help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

SANS Institute: Correlating Event Data for Vulnerability Detection & Remediation (English)

Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.

解决方案简介

McAfee Threat Intelligence Exchange and Endpoint Protection (English)

McAfee Threat Intelligence Exchange delivers innovative endpoint protection with a system that adapts and learns from threat encounters, and immediately neutralizes emerging attacks.

McAfee Application Control Extends the Life of Legacy Microsoft Windows XP Systems (English)

McAfee Application Control provides an effective way to block unauthorized applications from running and will continue to support Windows XP systems even after Microsoft’s phase-out of support has taken effect.

社区

博客

  • Franchising Ransomware
    Vincent Weafer - 七月 2, 2015

    Got a great business idea? Want to expand with less risk? Build a good product, develop some training, put them together into a repeatable formula, and collect the royalties from your franchisees. This model, used successfully for everything from fast food to hair salons to tax preparation, is now available for criminal ransomware. Cybercriminals have […]

    The post Franchising Ransomware appeared first on McAfee.

  • Beat the Ticking Clock Against Emerging Threats
    Paul Zimski - 七月 1, 2015

    In order to beat todays advanced threats, your security defense system relies on good communication. However, when your security posture is dependent on a slew of different products from a spread of vendors, communication can break down. This breakdown in communication means you’re losing valuable time in detecting cyberthreats. To address this communication breakdown, there […]

    The post Beat the Ticking Clock Against Emerging Threats appeared first on McAfee.

  • Securing Critical Infrastructure
    Lorie Wigle - 七月 1, 2015

    Protecting the Industrial Internet of Things from cyberthreats is a national priority.  Industrial automation and control systems are increasingly online, sending out information and receiving commands from local and remote control centers and corporate data systems. Technologies in this Industrial Internet of Things (IIoT) have tremendous potential to improve operations, reduce costs, enhance safety, increase […]

    The post Securing Critical Infrastructure appeared first on McAfee.

  • Cyber Resilience And Spear Phishing
    Mo Cashman - 六月 29, 2015

    Balanced security capability, defense in depth, integrated countermeasures, and a threat-intelligence strategy are critical to defending your business from spear-phishing attacks. Spear phishing continues to be the most successful means of gaining entry to an enterprise network and to valuable business or personal data. According to the latest Verizon Data Breach Investigations Report, two-thirds of […]

    The post Cyber Resilience And Spear Phishing appeared first on McAfee.

  • Government Agencies Should Turn to CDM During 30-Day Sprint
    Tom Gann - 六月 29, 2015

    The fallout from the OPM breach continues with news that clearance information may have been stolen and that more than 10 million federal employee records may have been breached. In response, the White House has ordered every agency to engage in a “30 day sprint” to shore up and bolster their defensive cybersecurity capabilities. During […]

    The post Government Agencies Should Turn to CDM During 30-Day Sprint appeared first on McAfee.

威胁和风险