McAfee Deep Defender

McAfee Deep Defender

Detención de ataques sigilosos con la seguridad para endpoints que va más allá del sistema operativo

Próximos pasos:

Descripción general

McAfee Deep Defender es la seguridad asistida por hardware de última generación para endpoints que incorpora la tecnología McAfee DeepSAFE, funciona más allá del sistema operativo y está diseñada para detectar, bloquear y corregir los ataques avanzados ocultos. McAfee Deep Defender reinventa la estrategia de seguridad del sector y es el primer producto que se basa en la tecnología McAfee DeepSAFE desarrollada conjuntamente con Intel.

Actúa más allá del sistema operativo: la primera integración de este tipo con Intel reside entre la memoria y el SO para supervisar la memoria y la CPU en tiempo real.

Protección en modo kernel: la supervisión del comportamiento del kernel deja al descubierto y elimina las amenazas desconocidas, incluidos los rootkits en modo kernel, para anticiparse al malware de tipo día cero.

Velocidad de protección más rápida: detiene los ataques sigilosos de bajo nivel en el momento en que se producen antes de que causen daños o roben datos.

Seguridad global más allá del sistema operativo

Características y ventajas

Detenga los ataques sigilosos desconocidos

Evite que los ataques sigilosos pongan en peligro los endpoints y roben información confidencial gracias a la protección de la memoria del kernel en tiempo real que actúa más allá del sistema operativo.

Utilice la supervisión de la memoria y de la CPU en tiempo real

Aproveche la tecnología McAfee DeepSAFE, una capa de software de memoria que se ejecuta en modo raíz VMX para proteger los eventos en la CPU y la memoria del kernel en tiempo real con un impacto mínimo en el rendimiento

Consiga auténtica protección frente a los ataques de día cero

Identifique el comportamiento malicioso y protéjase frente a los ataques de día cero. McAfee Deep Defender no requiere conocimiento previo del rootkit para detectar su existencia.

Instale con rapidez y administre fácilmente

Utilice McAfee ePolicy Orchestrator (ePO) para instalar y gestionar de forma remota McAfee Deep Defender junto a las actuales soluciones de seguridad de McAfee para endpoints, además de reducir los gastos y los costes de administración.

Requisitos del sistema

Los siguientes requisitos del sistema son los mínimos. Los requisitos reales variarán según la naturaleza de su entorno informático.

  • Compatible con los procesadores Intel® Core™ i3, i5, e i7
  • Compatible con Windows 7 (32 bits y 64 bits)
  • 2 GB de RAM (32 bits) o 4 GB de RAM (64 bits)
  • Gestionado por McAfee ePolicy Orchestrator (ePO) 4.5 o posterior
  • Agente de McAfee 4.6
  • Intel VT (Virtualization Technology) activada en la BIOS
  • Internacionalizada y localizada para instalarla en todo el mundo
  • Compatibilidad probada con los siguientes productos de McAfee:
    • VirusScan Enterprise 8.7 o posterior
    • Application Control 5.0
    • Endpoint Encryption for PC 5, 5.2.6, 5.2.9 y 6.1
    • Host Data Loss Prevention 9.0 o posterior
    • Host Intrusion Prevention for Server 8.0 o posterior
    • Network Access Control 3.2

Demostraciones y tutoriales

Demostraciones

McAfee Deep Defender is reinventing the industry approach to security and is the first product built on the McAfee DeepSAFE Technology co-developed with Intel.

Vídeos

Your enterprise attack surface might be bigger than you think, and cybercriminals are constantly finding new ways to exploit any weak points they can find. This video explores the unique, hardware-enhanced security made possible by Intel and McAfee that can help you keep your users and data more secure than ever.

McAfee Deep Defender is reinventing the industry approach to security and is the first product built on the McAfee DeepSAFE Technology co-developed with Intel.

Experiencias de los clientes

Major Medical Center (English)

McAfee Deep Defender helps a major medical center

Aspectos destacados
  • Reduces total cost of ownership with built-in security and management features of Intel vPro
  • Provides a significant time savings for IT personnel to proactively protect company systems
  • Allows for broad and in-depth desktop security
  • Actively detects and disables malware

Noticias y acontecimientos

Recursos

Fichas técnicas

McAfee Deep Defender

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

Informes

Proactive Rootkit Protection Comparison Test (English)

In January 2013, AV-TEST performed a comparative review of McAfee Deep Defender, Microsoft System Center Endpoint Protection, and Symantec Endpoint Protection to determine their capabilities to proactively protect against kernel-mode and MBR rootkits, also known as day zero attacks.

Libros blancos

McAfee Deep Defender Technical Evaluation and Best Practices Guide (English)

Learn how McAfee Deep Defender version 1.0 targets the more dangerous kernel mode rootkits.

Root Out Rootkits (English)

This paper describes how McAfee Deep Defender moves endpoint security beyond the operating system. McAfee Deep Defender gets hardware assistance from Intel and uses a privileged early load position to uncloak, block, and remove the kernel-mode activities of stealthy rootkits.

Un nuevo cambio de paradigma: seguridad global más allá del sistema operativo (English)

Learn how efforts by McAfee and Intel allow you to utilize virtualization for delivering comprehensive security beyond traditional software boundaries.

Planes detallados de tecnología

Fighting Rootkits (English)

McAfee fights rootkits by using real-time memory and CPU protection, protecting against known and unknown attacks, and getting beneath the operating system.

Comunidad

Blogs

  • Boosting Your Competitive Presence
    Lang Tibbils - julio 29, 2013
    At McAfee, we’re continuing our laser focus on endpoint security. Most recently, you heard from Simon Hunt, CTO for Endpoint Security that the new Endpoint Suites are “strong, fast, simple and 100% effective.” As part of our ongoing ‘Redefining Endpoint Security’ blog series, we caught up with Penny Baldwin,  CMO for McAfee, to learn her […]
  • End-to-end Protection Thwarts Malware
    Ruby Williams - julio 11, 2013
    Recently, I wrote about the meaning of integration as it relates to protection against malware, why an integrated solution is important, and what is needed to deliver an integrated solution. Today, I’m going to highlight the importance of end-to-end protection in fighting the malware war. Over the past three months, McAfee has made three important […]
  • What McAfee’s Recent Corporate Announcements Mean for Public Sector Customers
    Ken Kartsen - junio 19, 2013
    Customers sometimes ask how McAfee corporate announcements relate to the public sector, so I decided to talk about two recent ones: the pending Stonesoft acquisition and the new Endpoint Suites offering. Both these developments make us an even stronger, more comprehensive security company, and they further strengthen our Security Connected platform. Our proposed acquisition of […]
  • Lessons Learned on the Journey to McAfee Complete Endpoint Suites
    Mike Fey - junio 10, 2013
    Security Connected has been McAfee’s approach to security for some time now. We’ve built out a platform of solutions to enable customers to realize it – allowing them to evolve from reactive to proactive security postures. Through innovation and acquisition, we’ve assembled and integrated technologies to deliver across a number of technology fronts.  McAfee’s launch […]
  • Partner Voices: The Impact of McAfee’s New Endpoint Suites
    Lang Tibbils - junio 5, 2013
    May 29, 2013 marked the dawn of a new era in endpoint security. We launched the new McAfee Complete Endpoint Protection Suites, the industry’s first endpoint suites to provide customers proactive, chip-to-cloud protection and real-time security. You’ve heard a lot from us leading up to this launch. If you’ve been following our Redefining Endpoint Security […]