McAfee Host Intrusion Prevention for Desktop

McAfee Host Intrusion Prevention for Desktop

Industry-leading, proactive protection against zero-day threats for desktops and laptops

Next Steps:

Overview

McAfee Host Intrusion Prevention for Desktops safeguards your business against complex security threats that may otherwise be unintentionally introduced or allowed by desktops and laptops. Host Intrusion Prevention for Desktops is easy to deploy, configure, and manage.

Comprehensive security — Three layers of protection (signature analysis, behavioral analysis, and dynamic stateful firewall with global reputation technology) prevent intrusions, protect assets, and defend your company against known and emerging exploits, including zero-day attacks.

Advanced vulnerability shielding — Stronger protection against exploits that target new vulnerabilities means your IT staff has more time for planning, testing, and deploying patches.

Automatic updates — Security content updates are delivered automatically to target specific vulnerabilities and block emerging threats (including buffer-overflow attacks) from executing.

Customized security control — Easily apply different levels of protection based on location (corporate network, VPN, or public network). Host Intrusion Prevention travels with the laptop and can provide varying degrees of protection, depending on whether you are in the office, at home, or on the road.

Enhanced security powered by McAfee Global Threat Intelligence — McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Host Intrusion Prevention for Desktop uses the McAfee GTI network connection reputation service to identify suspicious domains/IP addresses that are infected or hosting malware attacks, and block those attacks.

Features & Benefits

Keep your business running smoothly

Prevent intrusions, protect assets, and enforce intrusion prevention system (IPS) and zero-day threat protection coverage at all levels: network, endpoint, and application. Integrated reputation-based global intelligence in the desktop firewall (Microsoft Windows only) blocks threats such as botnets and denial of service before attacks can occur.

Get the broadest intrusion prevention coverage

Trust McAfee behavioral protection to secure endpoints against unknown attacks. Our signature protection identifies and blocks known attacks while a stateful firewall applies policies, bars unsolicited inbound traffic, and controls outbound traffic.

Save time and cut costs with simplified, centralized management

Protect and manage all desktops across your entire enterprise with the McAfee ePolicy Orchestrator (ePO) console, the scalable, centralized platform for easy deployment, management, reporting, and auditing.

Create custom, location-based policies

Apply different levels of security using rules based on the endpoint’s connection — on the corporate network, over VPN, or from a public network — with connection-aware protection.

Spot and block new vulnerabilities

Count on automatic security content updates targeting specific vulnerabilities to recognize unknown exploits and stop them from executing. Security content updates do not require system reboots, and updating signatures is similar to updating .DAT files.

Avoid trouble with prioritized patching

Reduce patching frequency and deploy patches on a priority basis for the most effective and efficient use of IT resources.

Prove compliance without headaches

Use McAfee’s easy-to-understand actionable views, workflow, event monitoring, and reporting to quickly remediate threats and maintain compliance.

System Requirements

These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.

Operating Systems

  • Microsoft Windows (English, French, German, Spanish, Japanese, Korean, traditional Chinese)
  • Microsoft Windows Vista with Service Pack 1 (SP1) (32-bit and 64-bit)
  • Microsoft Windows XP Home with SP3
  • Microsoft Windows XP Professional with SP3
  • Microsoft Windows XP Tablet PC
  • Microsoft Windows 7

Customer Stories

CEMEX

CEMEX is a global building materials company that produces, distributes, and sells cement, concrete, aggregates, and related building materials and services to customers and communities throughout the Americas, Europe, Africa, Asia, and the Middle East. Based in Monterrey, Mexico, CEMEX employs more than 43,000, with operations in 50 countries spanning four continents. The company is also the world’s leading supplier of ready-mix concrete.

Highlights
  • Safeguards against zero-day advanced persistent threats without signature updates.
  • Greatly diminishes administrative time, from defining policies to repairing workstations.
  • Protects more than 26,000 endpoints from email, web, and application-generated attacks.
  • Provides streamlined and integrated management of large, global security platform.

City of Chicago

The City of Chicago’s recently formed Information Security Office (ISO) is charged with overseeing cybersecurity across all areas of the city, including critical infrastructure within the water, aviation, and public safety departments.

Highlights
  • Maximized staff resources.
  • Malware incidents reduced by 2,000%.
  • Centralized management and analysis.
  • Integrated security event logging that captures events throughout the environment.

Macquarie Telecom

McAfee solutions offer integrated protection from distributed denial-of service (DDoS) threats at the Macquarie Telecom perimeter.

Highlights
  • Fully integrated security platform easily managed from a central dashboard.
  • Visibility and control for clients over their hosted security environments.
  • Competitive advantage through partnership with a trusted technology provider.

News / Events

Resources

Data Sheets

McAfee Host Intrusion Prevention for Desktop

For a technical summary on the McAfee product listed above, please view the product data sheet.

Community

Blogs

  • Five Website Security Do’s and Don’ts for Online Merchants
    Sarah Grayson - August 30, 2013
    As we get closer to the end of summer, most merchants are already in the midst of preparing for another busy fall/winter shopping season. However, amid the chaos, it’s important to take a look at your website’s current features—most importantly security—in order to assess what needs improvement before it’s too late. Aside from cosmetic and [...]
  • What is a Next-Generation Firewall?
    Mike Fey - August 5, 2013
    In my last post, I outlined the business case for converting to a next-generation firewall. Essentially, it’s about protecting valuable IT assets in the face of advanced malware with sophisticated evasion capabilities that make them much harder to detect, and much more dangerous given their ability to hold payloads with multiple, often persistent exploits. How [...]
  • Developing the Ultimate Defense against Advanced Malware
    Pat Calhoun - July 25, 2013
    It is clear cybercrime is getting more organized and cybercriminals are becoming so much more sophisticated.  Today, they not only have experience, but are using powerful, easy-to-access resources to wreak havoc within the data networks of organizations.  The unfortunate truth, as discovered by McAfee Labs in the McAfee Threats Report: First Quarter 2013, is that [...]
  • End-to-end Protection Thwarts Malware
    Rick Simon - July 11, 2013
    Recently, I wrote about the meaning of integration as it relates to protection against malware, why an integrated solution is important, and what is needed to deliver an integrated solution. Today, I’m going to highlight the importance of end-to-end protection in fighting the malware war. Over the past three months, McAfee has made three important [...]
  • Microsoft Patch Tuesday Report: Critical Mass
    Scott Taschler - July 10, 2013
    This is probably one of the most important Patch Tuesdays we have seen in a while, with Microsoft releasing seven patches that address 34 individual vulnerabilities. Of the seven patches released, six are identified by Microsoft as “critical.” The remaining patch is labeled “important” by Microsoft. This month’s patches are as follows: MS13-052 Vulnerabilities in [...]