McAfee Complete Endpoint Protection — Business

McAfee Complete Endpoint Protection — Business

High-performance security for dynamic businesses: strong, fast, simple, and affordable

Next Steps:

Overview

With McAfee Complete Endpoint Protection — Business, you can spend more time on your business and less time worrying about security. This highly affordable, all-in-one solution provides top-rated endpoint security for all the devices in your enterprise: PCs, Macs, Linux systems, servers, virtual systems, smartphones, and tablets. Quickly and easily layer in protection against today’s most advanced threats, including encryption to protect your valuable data, behavioral zero-day intrusion prevention against attacks, hardware-enhanced protection against low-level, stealthy malware, and email, web, and mobile security to block phishing and multistage attacks. Easy installation and unified management reduce setup and maintenance. You can respond faster than ever.

Complete protection — Today, antivirus alone isn’t enough to defend against sophisticated, stealthy malware and attacks. The highest scoring vendor in an NSS Labs comparative test of current defenses against evasion attacks, McAfee finds, fixes, and freezes malware fast with multiple layers of protection. Hardware-enhanced system protection below the OS, available only from McAfee, targets stealthy attacks like rootkits that burrow deep into the kernel. And strong encryption secures your vital confidential data and prevents unauthorized access to PCs, Macs, laptops, and removable media — transparently and without slowing system performance. Behavior and reputation systems integrate with the cloud-based McAfee Global Threat Intelligence to protect against emerging cyberthreats across all vectors — file, web, message, and network.

Complete simplicity — With as few as four clicks and in as little as 20 minutes, you can be up and running. Web-based single console management with McAfee ePolicy Orchestrator software makes it easy to manage policies across all protections and systems and get instant visibility into security health across your entire infrastructure. With new real-time management, you can ask questions and fix vulnerabilities or correct problems faster than ever before.

Complete performance — Are you looking for security that supports business instead of slowing it down? Complete Endpoint Protection — Business minimizes security’s impact on users with fewer, smarter scans and advanced memory management. These technologies optimize CPU and memory usage to make strong security transparent to users across all platforms.

Features & Benefits

Safeguard all your devices

License one product to protect all your business assets: PCs, Macs, Linux systems, servers, virtual systems, smartphones, and tablets.

Top-rated, comprehensive layered protection

Advanced antivirus, anti-malware, host intrusion prevention, device control, host-based firewall, encryption, and more tackle malware, zero-day threats, and evasion attacks at every vector — mobile, data, web, and email.

Security built for growing organizations

We keep it simple for IT administrators to take charge. Install your suite with just four clicks and in less than 20 minutes. Add licenses and products using the same management platform as your business grows.

Unify and simplify management

McAfee ePolicy Orchestrator (McAfee ePO) single-console management streamlines and automates workflow, policy deployment, updates, maintenance, and reporting across all of the technologies that protect your endpoints. Integration with other McAfee and third-party products further increases visibility and efficiency as you add to your security arsenal.

Act faster and more efficiently to stop threats in their tracks

Real Time for McAfee ePO gives administrators instant access to critical data within the natural McAfee ePO workflow, getting answers and taking action to manage security and respond as much as 10 to 1,000 times faster.

Protect vital data proactively with encryption

Deploy industry-leading file, folder, and full disk encryption to secure confidential data across PCs, laptops, network servers, and removable media. Quickly enforce organization-wide encryption policies that are automatic and transparent to users, so files can be securely shared, stored, and transported.

See more and know more for better protection

Real-time cloud-based McAfee Global Threat Intelligence collects the latest data to protect against known and emerging cyberthreats across all vectors — file, web, message, and network.

Customer Videos

Customer Testimonial

The future of IT is to securely enable businesses. Integris enables its employees by implementing McAfee’s Endpoint Mobility Management (EMM) to secure mobile devices and tablets, integrating EMM with ePO software helps to ease the strain to their IT department by providing one console to assess where the risk threshold lies.

inHouseIT benefits greatly from integrated reporting provided by McAfee ePolicy Orchestrator (ePO) software, creating a central repository and dashboard for a comprehensive view on the IT health of an organization.

The ability to push application control out to a specific endpoint is greatly beneficial, it brings security to any machine and brings performance up. With whitelisting and the integrated nature of McAfee ePO software, Seagate is able to manage all facets of security under one, single pane of glass, making management much easier.

Awards / Reviews

McAfee Enterprise Mobility Management wins Gold Medal for Best of Mobile Data Security 2013

McAfee stood out as the clear category leader, according to voters, coming out ahead of AirWatch MDM. EMM was awarded the Gold Medal for its data and malware protection, central management capabilities (including key management for encryption), granular and flexible policy controls, and the ease of installation and configuration for administrators.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses
McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Protection Defenses
McAfee core endpoint anti-malware products (McAfee VirusScan Enterprise, McAfee Host Intrusion Prevention, and McAfee SiteAdvisor Enterprise) achieved the highest block rate and an overall score of 97% for all threats blocked in the exploit protection test.

AV-TEST Comparative Review
In a comparative review by AV-TEST, McAfee Deep Defender scored 100% in proactive protection against zero-day rootkit and kernel stealth attacks.

Gartner Magic Quadrant for Mobile Data Protection
For the past four years, McAfee has been positioned as a leader.

News / Events

Resources

Data Sheets

McAfee Complete Endpoint Protection—Business

For a technical summary on the McAfee product listed above, please view the product data sheet.

Reports

NSS Labs Enterprise EPP Comparative Analysis, Socially Engineered Malware

Learn about why NSS Labs ranked McAfee as the top vendor for endpoint protection products for socially engineered malware protection, exploit protection, and phishing protection.

Tolly Test Report – Leveraging Peer Communications to Deliver Rapid Response to Security Threats in Large, Distributed Environments

Tolly evaluated McAfee Real Time Command and verified its capability to rapidly gather endpoint management data and provide a unified management platform for problem mitigation, in a McAfee commissioned test. Tests showed that McAfee Real Time Command can quickly collect data — 95% of 500 stations were collected in as little as 9 seconds — and effectively manage problem mitigation.

Five Hundred Endpoints in Five Seconds – Tolly Test Report Summary

Tolly Group confirms McAfee Real Time Command performance

The Risk of "Free" Endpoint Security

This Analyst Insight demonstrates how security professional can do a better job at communication security-related risks to business decision-makers, and at showing how investments in security controls actually reduces those risks.

Gartner’s Buyer’s Guide to Ideal Endpoint Protection

Wondering how to decode vendor hype as you evaluate your next endpoint protection platform? Gartner analyst Peter Firstbrook has created a comprehensive buyer’s guide for endpoint protection: what to look for, what to avoid, and why.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses

McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Protection Defenses

McAfee core endpoint anti-malware products (McAfee VirusScan Enterprise, McAfee Host Intrusion Prevention, and McAfee SiteAdvisor Enterprise) achieved the highest block rate and an overall score of 97% for all threats blocked in the exploit protection test.

Solution Briefs

McAfee Application Control Extends the Life of Legacy Microsoft Windows XP Systems

McAfee Application Control provides an effective way to block unauthorized applications from running and will continue to support Windows XP systems even after Microsoft’s phase-out of support has taken effect.

Counter Stealthy Malware

The most menacing type of cyberattack is invisible. Using sophisticated techniques to hide its presence, stealthy malware may operate outside of the OS or move dynamically across endpoints to conceal the attackers’ actions. The risk to enterprises is real, with high-profile attacks such as Operation High Roller impacting companies around the globe. Traditional antivirus or intrusion prevention systems are no match for this new breed of stealthy malware; instead, enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.

White Papers

SANS Institute: Correlating Event Data for Vulnerability Detection & Remediation

Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.

Endpoint Security: It’s Not Just Black or White

Effective endpoint security requires more than just blacklisting or whitelisting — it requires a seamless integration of both for maximum endpoint safety.

Root Out Rootkits

This paper describes how McAfee Deep Defender moves endpoint security beyond the operating system. McAfee Deep Defender gets hardware assistance from Intel and uses a privileged early load position to uncloak, block, and remove the kernel-mode activities of stealthy rootkits.

The New Reality of Stealth Crimeware

With cybercrime on the rise, McAfee and Intel researchers believe that we need to re-envision how to detect and block stealthy malware.

Community

Blogs

  • How McAfee SIEM Helped Cologne Bonn Airport’s Security Take Flight
    Karl Klaessig - August 20, 2014

    Timing is everything in an airport and to handle the growth in travelers and airlines at Cologne Bonn, the IT infrastructure includes several large networks and various system architectures, which must be harmonized and centrally operated. Cologne Bonn is a thoroughly modern airport that has many advanced procedures in place to help them manage everything efficiently. […]

    The post How McAfee SIEM Helped Cologne Bonn Airport’s Security Take Flight appeared first on McAfee.

  • July #SecChat Recap – Targeted Attacks Set Sights on Vital Systems
    McAfee Enterprise - August 12, 2014

    When targeted attacks such as Operation Dragonfly began their offensive against vital infrastructure systems, the security community took notice. These cyber-attacks use a multitude of intrusion methods with the intent to disrupt entire nations’ economies. Not only should targeted attacks be of significant concern for those who dwell within the infosec community, but members of […]

    The post July #SecChat Recap – Targeted Attacks Set Sights on Vital Systems appeared first on McAfee.

  • The Evolution of SIEM: Part 1
    Karl Klaessig - August 7, 2014

    They say you can’t teach an old dog, new tricks—or can you? The technology landscape has changed dramatically over the last 10 years, and many security approaches organizations previously relied on are no match for today’s advanced threats. Tools like Security Information and Event Management (SIEM) have become critical to securing an increasingly complex network […]

    The post The Evolution of SIEM: Part 1 appeared first on McAfee.

  • The Economic Impact of Cybercrime and Cyber Espionage
    Michael Sentonas - August 6, 2014

    Extracting value from the computers of unsuspecting companies and government agencies is a big business for criminals. The past 12 months has seen a continued increase in the number and complexity of advanced malware threats affecting business and government operations.  The impact of cybercrime and cyber espionage is no longer a conversation amongst information security […]

    The post The Economic Impact of Cybercrime and Cyber Espionage appeared first on McAfee.

  • Air, Clouds and Factories = Transformation
    Lorie Wigle - August 5, 2014

    Intel estimates that 85% of industrial system devices are not networked today.  But that’s changing for very good reasons. Industrial control systems are part of the rapid evolution to exploit connectivity, big data and cloud computing.  Manufacturers are designing in new capabilities as their customers pursue advances in automation, and gateway devices are proliferating to […]

    The post Air, Clouds and Factories = Transformation appeared first on McAfee.

Threats and Risks