McAfee VirusScan Enterprise for Offline Virtual Images — the first dedicated security solution for virtual machines (VMs) — protects your virtual environment and corporate network by automatically scanning, cleaning, and updating VMs before they go online.
VirusScan Enterprise for Offline Virtual Images offers:
An optimized solution — Developed specifically to work with all major virtualization environments, including Citrix, Microsoft, and VMware.
Scalable security — Provides on-demand protection for an unlimited number of VMs.
Comprehensive, cost-effective protection — Reduces IT overhead with integrated protection for pre-production (testing and development) and production (disaster recovery) virtual environments.
Automatically scan, clean, and update virtual machines (VMs) while they’re offline to eliminate the risk of dormant VMs threatening your corporate network.
Count on automatic, real-time, anti-malware updates via Artemis Technology from McAfee Labs to maintain the latest threat protection without bringing VMs online, thus allowing your IT staff to focus on other issues.
Minimize IT efforts and reduce operating costs with common security management via the McAfee ePolicy Orchestrator (ePO) platform, for both physical and virtual environments.
Reduce IT migration issues with one security solution that supports all top virtualization vendors, including Citrix, Microsoft, and VMware.
Secure offline VMs at secondary sites.
Scan and update offline virtual images periodically to enable archiving for longer periods.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at the kernel level to bypass Microsoft’s security for 64-bit Windows systems. Today a small utility program named KPP-Destroyer can be found online. Previous versions of KPP-Destroyer had some bugs on a Windows 8.1 computer, but […]
Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often than random phishing attempts. Exploits that use patched vulnerabilities delivered via spear phishing email are one of the most successful combinations used by attackers to infiltrate targeted organizations and gain access to confidential information. During […]
The post Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities appeared first on McAfee.
The Dofoil downloader (found in the wild since 2011) occasionally updates itself with new features and encryption techniques to hide communications with its control servers. The latest iteration uses a variation of XOR and RC4 algorithms similar to previous variants to encrypt the list of control servers within the binary and encrypt all traffic with […]
The post Dofoil Downloader Update Adds XOR-, RC4-Based Encryption appeared first on McAfee.
McAfee product coverage and mitigations for malware or indicators associated with the recent attacks (a.k.a. Dragonfly, Energetic Bear, Havex/SYSMain) on industrial control systems (ICS’s) are listed below. The Havex remote access tool is common across these associated attacks or campaigns–including Dragonfly. We have seen Havex in ICS-specific targeted campaigns. It can detect and affect ICS- […]
The post Product Coverage and Mitigation for ICSA-14-178-01 (Havex/ICS-Focused Malware) appeared first on McAfee.
Every organization has deployed anti-virus/anti-malware solutions, but how much you have actually reduced your risk? To recap what we’ve covered in this 5-part blog series, Aberdeen’s analysis and Monte Carlo modeling: Confirms the high risk of unprotected endpoints Demonstrates that endpoint protection really does reduce risk Confirms that “free” endpoint protection (e.g., Microsoft) is better […]
The post Endpoint Security, Part 5 of 5: A/V Alone is Not Enough appeared first on McAfee.