McAfee VirusScan Enterprise for Offline Virtual Images — the first dedicated security solution for virtual machines (VMs) — protects your virtual environment and corporate network by automatically scanning, cleaning, and updating VMs before they go online.
VirusScan Enterprise for Offline Virtual Images offers:
An optimized solution — Developed specifically to work with all major virtualization environments, including Citrix, Microsoft, and VMware.
Scalable security — Provides on-demand protection for an unlimited number of VMs.
Comprehensive, cost-effective protection — Reduces IT overhead with integrated protection for pre-production (testing and development) and production (disaster recovery) virtual environments.
Automatically scan, clean, and update virtual machines (VMs) while they’re offline to eliminate the risk of dormant VMs threatening your corporate network.
Count on automatic, real-time, anti-malware updates via McAfee Global Threat Intelligence to maintain the latest threat protection without bringing VMs online, thus allowing your IT staff to focus on other issues.
Minimize IT efforts and reduce operating costs with common security management via the McAfee ePolicy Orchestrator (ePO) platform, for both physical and virtual environments.
Reduce IT migration issues with one security solution that supports all top virtualization vendors, including Citrix, Microsoft, and VMware.
Secure offline VMs at secondary sites.
Scan and update offline virtual images periodically to enable archiving for longer periods.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
I recently wrote a piece in Dark Reading around the notion that Endpoint security is not dead, but instead facing a steadily mounting series of obstacles with relation to the new universe of Internet-connected devices. While there are certainly more challenges to securing corporate networks today, claiming that enforcing Endpoint security policies is basically fighting […]
The post Endpoint Security and the Reality of Ubiquitous Computing appeared first on McAfee.
In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made this critical point: Stopping attacks before they breach and narrowing the breach discovery gap require the ability to detect threats at […]
The demands between physical, virtual, public and private clouds change faster than actual clouds do. As organizations adapt to these changes, they face the Sisyphean task of securing and hardening their networks from external agents. And therein lies the problem: companies conscious of the cloud’s benefits are hesitant to adopt cost-saving virtualization because of security […]
The post Aberdeen Reports: McAfee Helps Secure the Evolving Datacenter appeared first on McAfee.
Some applications go too far in their attempt to get installed on users systems. Many of these fall into the potential unwanted program (PUP) category. One of these is MegaRapido, which primarily targets Brazilians. A recent sample we tested tries to connect to protectmedia.net, which is already marked as suspicious by McAfee SiteAdvisor. Instead of […]
The post Brazilian PUP Campaign MegaRapido Shows Unwanted Behavior appeared first on McAfee.
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at the kernel level to bypass Microsoft’s security for 64-bit Windows systems. Today a small utility program named KPP-Destroyer can be found online. Previous versions of KPP-Destroyer had some bugs on a Windows 8.1 computer, but […]