McAfee Endpoint Protection for Mac

McAfee Endpoint Protection for Mac

Advanced protection to secure Macintosh endpoints

Overview

Macintosh endpoints are not immune to security threats. That’s why it’s imperative that businesses deploy security to Mac endpoints just as they do to Windows endpoints. Cybercriminals are after data, and they don’t care what type of endpoint holds it.

McAfee Endpoint Protection for Mac is an essential security solution for protecting the data on your Mac endpoints. Advanced protection technologies, including anti-virus, anti-spyware, firewall, and application protection, along with centralized management with the McAfee ePolicy Orchestrator (ePO) platform, allow businesses to secure Mac endpoints and ensure compliance with security policies.

Broad protection — Secure all endpoints on your Macintosh systems against all types of viruses, spyware, phishing attacks, and exploits.

Centralized, integrated management — Use the same web-based console to manage both your Mac and Windows endpoints. Easily deploy protection for all of your Macs from a single interface.

Intuitive, Macintosh-like interface — Get up and running quickly, with minimal training. Endpoint Protection for Mac uses Apple’s Mac OS X Aqua user interface, so you can deploy and manage from an instantly familiar Macintosh screen.

Features & Benefits

Enforce security compliance

Report on and enforce security policies on Macs to ensure endpoints fully comply with your security standards.

Lower operational costs and simplify management

Use a single web-based console to manage both Mac and Windows endpoints. Endpoint Protection for Mac integrates seamlessly with the McAfee ePolicy Orchestrator (ePO) platform, saving you time and money.

Get fast and reliable performance

Rely on advanced scanning functions for fast and accurate threat protection that doesn’t impact system performance.

Stop data-stealing malware

Prevent malicious attacks designed to steal data from being downloaded or installed on your Mac endpoints.

Obtain proven anti-virus technology

Secure your endpoints against every type of virus and malicious code threat, even those hidden in compressed files, with advanced heuristics and generic detection from Endpoint Protection for Mac.

Secure reliable anti-spyware protection

Neutralize spyware before it takes root and spreads by stopping spyware and other potentially unwanted programs (PUPs) before they install and start stealing personal information.

Utilize a proactive desktop firewall

Stop network-based attacks with inbound and outbound firewalls to prevent unwanted network activity. Ensure same network firewall policies can be enforced on both Mac and Windows endpoints.

Lock down Mac endpoints

Prevent malicious programs from modifying applications, and allow or deny applications that are not approved to run on your Mac.

System Requirements

These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.

Operating Systems

  • Mac OS X Yosemite (version 10.10 or later)
  • Mac OS X Mavericks (version 10.9 or later)
  • Mac OS X Mountain Lion (version 10.8 or later)
  • Mac OS X Lion (version 10.7 or later)
  • Mac OS X Snow Leopard (version 10.6 or later)

Resources

Data Sheets

McAfee Endpoint Protection for Mac

For a technical summary on the McAfee product listed above, please view the product data sheet.

White Papers

Top Five McAfee ePolicy Orchestrator Tips

This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.

Community

Blogs

  • Taking a Close Look at Data-Stealing NionSpy File Infector
    Sanchit Karve - April 14, 2015

    W32/NionSpy is a family of malware that steals information from infected machines and replicates to new machines over networks and removable thumb drives. Aside from stealing keystrokes, passwords, Bitcoins, system information, and files on disk, NionSpy (also known as Mewsei and MewsSpy) can record video (using the webcam), audio (using the microphone), take screenshots, and […]

    The post Taking a Close Look at Data-Stealing NionSpy File Infector appeared first on McAfee.

  • VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials
    Diwakar Dinkar - April 13, 2015

    Since the beginning of the year we have seen a spike in ransomware including the emergence of new ransomware families. One family that has recently resurfaced is Vaultcrypt. This variant both tidies up after itself and steals web page login data. Infection vector The malware arrives on a victim’s machine through a spam email containing […]

    The post VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials appeared first on McAfee.

  • Takedown Stops Polymorphic Botnet
    Raj Samani - April 9, 2015

    Several global law enforcement agencies—with assistance from Intel Security—this week successfully dismantled the “Beebone” botnet behind a polymorphic worm known by Intel Security as W32/Worm-AAEH. The purpose of this worm is to facilitate downloading other malware, including ZBot banking password stealers, Necurs and ZeroAccess rootkits, Cutwail spambots, fake antivirus, and ransomware. The worm spreads quickly […]

    The post Takedown Stops Polymorphic Botnet appeared first on McAfee.

  • Hidden Low Hanging Avaya IP Office Default Credentials
    McAfee Foundstone Professional Services - March 30, 2015

    Written by Piyush Mittal. Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]

    The post Hidden Low Hanging Avaya IP Office Default Credentials appeared first on McAfee.

  • Protect Yourself by Protecting Others
    Carly Listman - January 21, 2015

    How the consumerization of IT is affecting endpoint security What happens in Vegas may stay in Vegas, but what happens on your employees’ personal devices may not stay there. According to a recent survey of consumers around the world, conducted by MSI Research on behalf of Intel Security, almost 80% of respondents use their personal […]

    The post Protect Yourself by Protecting Others appeared first on McAfee.

Threats and Risks