Macintosh endpoints are not immune to security threats. That’s why it’s imperative that businesses deploy security to Mac endpoints just as they do to Windows endpoints. Cybercriminals are after data, and they don’t care what type of endpoint holds it.
McAfee Endpoint Protection for Mac is an essential security solution for protecting the data on your Mac endpoints. Advanced protection technologies, including anti-virus, anti-spyware, firewall, and application protection, along with centralized management with the McAfee ePolicy Orchestrator (ePO) platform, allow businesses to secure Mac endpoints and ensure compliance with security policies.
Broad protection — Secure all endpoints on your Macintosh systems against all types of viruses, spyware, phishing attacks, and exploits.
Centralized, integrated management — Use the same web-based console to manage both your Mac and Windows endpoints. Easily deploy protection for all of your Macs from a single interface.
Intuitive, Macintosh-like interface — Get up and running quickly, with minimal training. Endpoint Protection for Mac uses Apple’s Mac OS X Aqua user interface, so you can deploy and manage from an instantly familiar Macintosh screen.
Report on and enforce security policies on Macs to ensure endpoints fully comply with your security standards.
Use a single web-based console to manage both Mac and Windows endpoints. Endpoint Protection for Mac integrates seamlessly with the McAfee ePolicy Orchestrator (ePO) platform, saving you time and money.
Rely on advanced scanning functions for fast and accurate threat protection that doesn’t impact system performance.
Prevent malicious attacks designed to steal data from being downloaded or installed on your Mac endpoints.
Secure your endpoints against every type of virus and malicious code threat, even those hidden in compressed files, with advanced heuristics and generic detection from Endpoint Protection for Mac.
Neutralize spyware before it takes root and spreads by stopping spyware and other potentially unwanted programs (PUPs) before they install and start stealing personal information.
Stop network-based attacks with inbound and outbound firewalls to prevent unwanted network activity. Ensure same network firewall policies can be enforced on both Mac and Windows endpoints.
Prevent malicious programs from modifying applications, and allow or deny applications that are not approved to run on your Mac.
These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.
This post was written with the invaluable assistance of my colleague Rakesh Sharma. Over the past couple of months McAfee Labs has seen an increase in the usage of macros to deliver malware. This kind of malware, as mentioned in previous posts (Dridex, Bartallex), usually arrives as an attached document within a phishing email. Recently […]
Intel Security today released the McAfee Labs Threats Report: May 2015. Along with the usual compilation of threats statistics, it focuses on three key topics: A surge in powerful and clever ransomware that encrypts files and holds them hostage until the ransom is paid. New Adobe Flash exploits target the growing number of vulnerabilities that […]
The post McAfee Labs Threats Report Highlights Surge in Ransomware, Flash Exploits, Firmware Attacks appeared first on McAfee.
Take the time to detect the attack, isolate the infected machines, and restore them to a known state. Are you one of the lucky 12%? That is how few companies we surveyed did not experience a successful targeted cyberattack in 2014. If you are one of the few, and think your luck is going to […]
The post What Are You Doing During The Golden Hour After An Attack? appeared first on McAfee.
The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover remote access plus botnet plus stealth functions are available just about anywhere. Ransomware, though very prevalent, has not yet appeared in force in easy-to-deploy kits. But now we have Tox–and it’s free. […]
In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]