维护企业安全变得即轻松又简单。这款具有单一管理平台的解决方案融入了几种安全技术，可为所有设备提供主动安全保护，包括 PC、Mac、Linux 系统、智能手机、虚拟机、平板电脑和服务器。在保护您的终端免遭当前最险恶最隐匿的威胁（包括高级持久性威胁 (APT)）的同时，简化企业终端管理过程并降低成本。
通过 Complete Endpoint Protection — Enterprise，您可以自定义企业安全，以便为每个用户社群创建合适的安全策略组合，从为用户提供他们所需的自由度和灵活性授权，到对共享系统应用最严格的控制。一套软件就是一个“覆盖范围全面”的安全工具箱。从安装简单到实时调查，它是一款集成众多先进技术并实现集中管理的安全套件，可提高安全管理效率。
全面保护 — 这款综合性安全套件将业内领先的威胁防御技术扩展到您的数据和系统，从而能够提供其他产品无法实现的全方位安全保护。它能够快速发现、修复和阻止恶意软件。我们的 Security Connected 方法包括分层动态白名单、智能扫描、高级防恶意软件和移动设备保护等功能，范围覆盖所有基础设施。行为和信誉保护与基于云的 McAfee Global Threat Intelligence 集成，可预防来自所有载体的网络威胁，包括文件、Web、消息和网络。
全面简化 -- 安装简单。只需四次单击即可在 20 分钟内完成安装并开始运行。McAfee ePolicy Orchestrator (McAfee ePO) 技术简化了跨所有设备的企业终端安全策略的管理，并提供一个可视面板供用户实时查看。此外，安全团队还可以实时提问并采取操作，以提高威胁发生时的响应速度。
完美性能 — 选择能够支持企业发展而不是影响企业发展的安全解决方案。通过次数更少、但更高效的扫描以及高级内存管理技术，可最大限度地降低安全产品对用户的影响。通过高级智能扫描，以及可优化 CPU 和内存使用率的内存管理技术，在所有平台上都实现超凡性能。动态白名单为功能固定的设备提供无需扫描的紧凑型台式机运行空间，从而提高工作效率。
McAfee ePO 是一个单一管理控制台，可自动完成安全管理流程，以及策略的部署、更新和维护，并针对可保护您的端点安全的所有技术提供报告，从而简化您的安全管理工作。通过与其他迈克菲产品和第三方产品集成，可在您增加安全保护时提高您的工作效率，并使您能够更好地了解新增加的安全产品的运行状况。
基于云的实时 McAfee Global Threat Intelligence 可收集最新数据以抵御来自所有载体的已知与新兴网络威胁，包括文件、Web、消息和网络。
Leveraging the Security Connected strategy, the California Department of Corrections and Rehabilitation implemented SIEM, network IPS, data protection, and endpoint security solutions to secure its distributed IT environment over 37 locations.
State Government Places its Trust in Intel Security for IT Consolidation Within this US state government, the Office of Technology is the central IT organization, serving almost 400 executive, judicial, and legislative agencies, which, in turn, administer programs for 4.4 million citizens. The Office of Technology oversees a network linking 1,500 locations and 35,000 users across the state.
This leading teaching and research university relies on McAfee to connect security and compliance.
The future of IT is to securely enable businesses. Integris enables its employees by implementing McAfee’s Endpoint Mobility Management (EMM) to secure mobile devices and tablets, integrating EMM with ePO software helps to ease the strain to their IT department by providing one console to assess where the risk threshold lies.
inHouseIT benefits greatly from integrated reporting provided by McAfee ePolicy Orchestrator (ePO) software, creating a central repository and dashboard for a comprehensive view on the IT health of an organization.
The ability to push application control out to a specific endpoint is greatly beneficial, it brings security to any machine and brings performance up. With whitelisting and the integrated nature of McAfee ePO software, Seagate is able to manage all facets of security under one, single pane of glass, making management much easier.
根据投票结果，迈克菲打败了 AirWatch MDM，作为清理类别领导者脱颖而出。EMM 依托自身的数据和恶意软件防护、集中式管理功能（包括加密密钥管理）、精细灵活的策略控制以及便于管理员安装和配置等优势，赢得金牌。
NSS Labs 企业 AV/EPP 比较分析 -- 漏洞利用规避防护
NSS Labs 企业 AV/EPP 比较分析 -- 漏洞利用防护
迈克菲核心终端防恶意软件产品（McAfee VirusScan Enterprise、McAfee Host Intrusion Prevention 和 McAfee SiteAdvisor Enterprise）在漏洞利用防护测试中对所有威胁的拦截率最高，为 97%。
Westcoast Labs 防恶意软件测试
McAfee Application Control、McAfee Host Intrusion Prevention 和 McAfee VirusScan Enterprise 通过只允许授权软件在 COE 和功能固定的计算机上运行，提供了针对 7300 种恶意软件样本的 100% 恶意软件防护。
主题： McAfee Labs, 终端保护
主题： SIEM, 终端保护, 网络安全
主题： 终端保护, 风险与合规性
Get answers to questions about McAfee Enterprise Mobility Management.
Learn about why NSS Labs ranked McAfee as the top vendor for endpoint protection products for socially engineered malware protection, exploit protection, and phishing protection.
This Analyst Insight demonstrates how security professional can do a better job at communication security-related risks to business decision-makers, and at showing how investments in security controls actually reduces those risks.
Wondering how to decode vendor hype as you evaluate your next endpoint protection platform? Gartner analyst Peter Firstbrook has created a comprehensive buyer’s guide for endpoint protection: what to look for, what to avoid, and why.
McAfee endpoint protection scored the highest in a test of protection against evasion attacks.
McAfee core endpoint anti-malware products (McAfee VirusScan Enterprise, McAfee Host Intrusion Prevention, and McAfee SiteAdvisor Enterprise) achieved the highest block rate and an overall score of 97% for all threats blocked in the exploit protection test.
As IT organizations try to simplify vendor management, many are asking if consolidating on a single endpoint security vendor makes sense. It could hinge on the existence of an overall security framework. This white paper examines the questions IT executives should ask themselves and their security technology partners.
Critical Security Controls (CSCs) help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.
Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.
McAfee Threat Intelligence Exchange delivers innovative endpoint protection with a system that adapts and learns from threat encounters, and immediately neutralizes emerging attacks.
McAfee Application Control provides an effective way to block unauthorized applications from running and will continue to support Windows XP systems even after Microsoft’s phase-out of support has taken effect.
Learning more about your attackers helps to improve your security profile and reduce the possibility of a breach. Sophisticated criminals using advanced techniques are behind most of the recent security breaches, targeting small network openings and user weaknesses left vulnerable by even the latest shiny new technology. The painful reality is that security operations are […]
The post Study Reveals the Most Common Attack Methods of Data Thieves appeared first on McAfee.
The good, bad, and potentially worse of critical infrastructure protection. There has been a significant post-9/11 focus on securing critical infrastructure systems – many of which pre-date the Networked Age and were potentially more vulnerable to attack that newer networked systems. Cyber-attacks on critical infrastructure systems have not yet resulted in the loss of human […]
The post Out of Aspen: State of Critical Infrastructure Cybersecurity, 2015 appeared first on McAfee.
Governments globally need to focus on the unintended consequences of across the board attempts to deal with deficit spending. Saving pennies is important, but we need to make certain those savings do not cause large consequences for security that will cost much more in the long run. Cyber data breaches are a prominent topic this […]
The post Out of Aspen, Part 2: Sequestration is Penny Wise, but Pound Foolish for Cyber Security appeared first on McAfee.
Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Cyber-criminals are the Hyenas of the Digital Ecosystem (my sincerest apologies to hyenas). Cyber-criminals […]
The post A Thief’s Perspective #5: Network and Resource Abuse Methods appeared first on McAfee.
Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Coffee, Cocaine, and SSL Attacks. Today’s cybercriminals have borrowed a tried and true technique […]