McAfee Endpoint Protection — Advanced Suite

McAfee Endpoint Protection — Advanced Suite

Protection against zero-day attacks and help with regulatory compliance

Overview

McAfee Endpoint Protection — Advanced Suite delivers integrated, proactive security that blocks malware and zero-day threats. It protects Windows, Mac, and Linux systems on and off your network. With centralized policy-based management and auditing, Endpoint Protection — Advanced Suite helps keep your systems and data safe and compliant.

Endpoint Protection — Advanced Suite includes:

Real-time anti-malware protection — Block viruses, Trojans, worms, adware, spyware, and other potentially unwanted programs that steal confidential data and sabotage user productivity.

Unrivaled centralized management — The McAfee ePolicy Orchestrator (McAfee ePO) platform provides visibility and control over security defenses and unifies controls over all your security and compliance tools, from McAfee as well as third parties.

Strong device control — Comprehensive device control monitors and restricts data copied to removable storage devices, ensuring that sensitive information remains safe.

Features & Benefits

Protect your endpoints from every angle

Guard all Windows, Mac, and Linux endpoints against system, data, email, web, and network threats.

Save time and money

Consolidate endpoint and data security efforts with an integrated solution from one vendor — securing stronger protection at a lower cost. McAfee enables you to manage security from one centralized console and connect to other McAfee and third-party products, improving visibility and expediting response times.

Deploy quickly and easily

Enable increased protection without delay. The EASI installer gets your strong protection running in just minutes with a few clicks. Endpoint Protection Suite is integrated with the McAfee ePolicy Orchestrator (McAfee ePO) platform so you can so you can deploy and manage security using a single environment.

Block zero-day threats

Secure zero-day protection against new vulnerabilities with integrated McAfee Host Intrusion Prevention. It reduces the urgency to patch existing systems.

Control web use

Ensure seamless control of web traffic. Host web filtering technology restricts access to inappropriate websites, regardless if users are on or off the corporate network.

Keep unwanted applications off your systems

Boost security and productivity with application blocking that prevents unwanted programs from running on your systems.

Get comprehensive device control

Monitor and restrict data copied to removable storage devices and media to keep it from leaving company control.

Automate policy compliance

Integrate compliance reporting for HIPAA, PCI, and other regulations with the built-in McAfee Policy Auditor.

System Requirements

These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment. 64-bit operating system support is available for some technologies.

  • Workstations
    • Windows 8
    • Windows 7 or Embedded
    • Windows Vista
    • Windows XP Home, Professional, Embedded (WEPOS), Tablet PC
    • Mac OS X Yosemite (version 10.10 or later)
    • Mac OS X Mavericks (version 10.9 or later)
    • Mac OS X Mountain Lion (version 10.8 or later)
    • Mac OS X Lion (version 10.7 or later)
    • Mac OS X Snow Leopard (version 10.6 or later)
  • Servers
    • Windows 2012 Server
    • Windows 2008 Server, HyperV, Core, Datacenter, Storage Server, Cluster Server, Small Business Server
    • Windows 2003 Server, Storage Server, Cluster Server, Datacenter, Small Business Server
    • Windows 2000 Server, Advanced Server, Small Business Server
    • VMware ESX, ESXi
    • Citrix XenDesktop and XenServer
  • Other supported platforms
    • Red Hat 5, 6, 7
    • SUSE 10, 11
    • Ubuntu 12, 13, 14
    • Cent OS 5, 6, 7
    • Oracle Linux 5, 6, 7
    • Amazon Linux 2014
    • FreeBSD 6.1 and 7.0 (32-bit) (Command Line Scanner)
    • HP-UX 11.0, 11i, 11i v2/v3 (Command Line Scanner)
    • IBM AIX 5.2, 5.3, 6.1 (Command Line Scanner)
    • Linux Kernel 2.4 (32-bit) and 2.6 (64-bit) (Command Line Scanner)
    • Solaris 8, 9, 10 (32-bit/64-bit) (Command Line Scanner)
    • Citrix MetaFrame 1.8 and XP Support
    • EMC Celerra File Server
  • Email server requirements
    • Lotus Domino 8.x, 9.x
  • Database software requirements
    • Microsoft SQL Server 2008 (32-bit/64-bit), Express
    • Microsoft SQL Server 2005 (32-bit/64-bit), Express
  • Supported web server platforms
    • IIS 6.0 (Microsoft Windows)

Awards / Reviews

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses

McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Protection Defenses

McAfee core endpoint anti-malware products (McAfee VirusScan Enterprise, McAfee Host Intrusion Prevention, and McAfee SiteAdvisor Enterprise) achieved the highest block rate and an overall score of 97% for all threats blocked in the exploit protection test.

Customer Stories

Arab National Bank

Arab National Bank, one of the largest banks in the Middle East, relies on McAfee data protection and endpoint security solutions to protect sensitive data across multiple locations and comply with financial regulations.

Highlights
  • Reduces manpower required to manage endpoint security from six people to two
  • Accelerates deployment of data loss protection—70 percent faster than competitive solutions
  • Cuts administrative reporting from several days to minutes
  • Saves $152,000 in reduced manual intervention, thanks to integration with third-party security solutions

Cognizant

Cognizant centralizes its security environment with a single-vendor solution from McAfee that unifies endpoint security and provides better security visibility across the organization.

Highlights
  • Easily demonstrated compliance with complex government regulations and client requirements
  • Centralized view into entire security environment eases deployment, reporting and management
  • Maximum confidence and trust from key stakeholders

San Francisco Police Credit Union

McAfee security management solutions keep this San Francisco-based financial company compliant.

Highlights
  • Faster, easier compliance with GLBA and NCUA Part 748.
  • Automated and on-demand reporting.
  • Fast troubleshooting and remediation.
  • Comprehensive security management without increasing headcount.

State of Alaska

The state of Alaska utilizes McAfee's product portfolio to protect data centers and networks across 16 state agencies, saving $3.8 million.

Highlights
  • Saved a projected $3.8 million and improved operational and team efficiency
  • Dramatically improved security posture without increasing headcount
  • Allowed for greater budget predictability with the flexibility to adapt and grow security as needs change

Sutherland Global Services

The McAfee Security Connected framework drives compliance and protects 24,000 endpoints for this consulting company.

Highlights
  • Virus attacks are virtually nonexistent throughout the globally distributed enterprise.
  • Central McAfee ePO console enables global management of entire IT infrastructure by only a two-person IT staff.
  • Industry-leading reporting tools facilitate compliance.
  • Automatic updates improve operational efficiency and ease burden on IT staff.
  • McAfee updates and notifications enable proactive response to threats.

Sysec Ltd.

U.K. partner Sysec gains 30% year-over-year growth by selling the complete McAfee solution portfolio.

News / Events

Resources

Data Sheets

McAfee Endpoint Protection — Advanced Suite

For a technical summary on the McAfee product listed above, please view the product data sheet.

Reports

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses

McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Protection Defenses

McAfee core endpoint anti-malware products (McAfee VirusScan Enterprise, McAfee Host Intrusion Prevention, and McAfee SiteAdvisor Enterprise) achieved the highest block rate and an overall score of 97% for all threats blocked in the exploit protection test.

Endpoint Security: Anti-Virus Alone is Not Enough

This report provides supporting data that endpoint security based on antivirus software alone is not enough.

Solution Briefs

McAfee Application Control Extends the Life of Legacy Microsoft Windows XP Systems

McAfee Application Control provides an effective way to block unauthorized applications from running and will continue to support Windows XP systems even after Microsoft’s phase-out of support has taken effect.

A More Rational Approach to Endpoint Security: 5 Reasons to Simplify Your Life

Learn how McAfee‘s architecture and scalable management through the ePolicy Orchestrator platform leverage your company’s current infrastructure.

White Papers

Top Five McAfee ePolicy Orchestrator Tips

This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.

Community

Blogs

  • Predictive Analytics: The Future Is Now
    Vincent Weafer - April 16, 2015

    Enhanced analytical capabilities will help organizations better understand how attacks will unfold, and how to stop them in their earliest stages.  Prediction is as old as humankind, as we’ve search for clues to the future. Big data, computer models, and sophisticated algorithms have brought us much closer to accurately predicting things such as actuarial tables, […]

    The post Predictive Analytics: The Future Is Now appeared first on McAfee.

  • Botnet to Cybersecurity: Catch Me If You Can
    Raj Samani - April 15, 2015

    Tracking and disrupting the crime ring behind a polymorphic botnet.  On April 8, global law enforcement, with the assistance of Intel Security/McAfee, took down the Beebone botnet, which propagates a particularly tricky polymorphic worm. Law enforcement and criminals often act like predators and prey, each evolving and adapting, trying to gain an advantage. A few […]

    The post Botnet to Cybersecurity: Catch Me If You Can appeared first on McAfee.

  • Microsoft Patch Tuesday – April 2015
    PageOne Pr - April 15, 2015

    Hello everyone, This is Greg Blaum again with the Microsoft Patch Tuesday newsletter for April 2015. The month Microsoft released a total of eleven (11) security bulletins. For this month, four (4) of these are rated Critical, which Microsoft terms as a vulnerability whose exploitation could allow code to execute without any user interaction. These […]

    The post Microsoft Patch Tuesday – April 2015 appeared first on McAfee.

  • RSA Conference 2015: Shaking Up Security
    McAfee Enterprise - April 14, 2015

    With RSA Conference drawing near, the information security industry is abuzz. In today’s digital, always-on (rather, always-online) world, it is more critical than ever to keep data protection top of mind. RSA Conference provides an open forum for security professionals to do just that, from learning the latest industry trends to exchanging ideas on how […]

    The post RSA Conference 2015: Shaking Up Security appeared first on McAfee.

  • Securosis White Paper: Implementing and Managing a Data Loss Prevention Solution
    Cindy Chen - April 13, 2015

    Chapter 4: “Managing Your Data Loss Prevention Solution” Congratulations on a successful DLP deployment and configuration! If your policies are priorities are well defined, then management won’t pose any difficulties for you and your team. Developing and following efficient day-to-day processes is described in the fourth and final chapter of the white paper Implementing and […]

    The post Securosis White Paper: Implementing and Managing a Data Loss Prevention Solution appeared first on McAfee.

Threats and Risks