McAfee VirusScan for Mac provides complete, proactive malware protection for Mac systems and users. Using proven protection methods, it stops all types of viruses and malicious code, including spyware, adware, Trojans, and new, unknown threats.
VirusScan for Mac delivers:
Centralized, simplified security management — With the McAfee ePolicy Orchestrator (ePO) platform, you can efficiently deploy and manage your Mac, Windows, and Linux clients on your network, giving you better security visibility across your entire infrastructure. Control policy configuration, deployment, and reporting for all your endpoints from the ePO platform’s single, web-based console.
Proactive threat protection — Uses heuristic analysis, generic protection, and on-access scanning to detect and remove viruses, worms, Trojans, spyware, adware, and other unwanted threats before they infect your system. VirusScan for Mac guards against Mac, PC, and Unix-based viruses.
Continuous and on-demand virus scanning — Automatically scans for threats each time a file is accessed. Also scans on demand with file drag and drop.
Seamless security updating — Automatically pulls the latest malware updates from McAfee Labs, our worldwide, 24/7 security research team.
Stop every type of virus, spyware, adware, and other malicious code that targets Mac OS X or Microsoft Windows. McAfee VirusScan for Mac can even detect compressed malware files and previously unknown viruses.
Allow end users to operate Macs in your environment and ensure their data is protected.
Get continuous policy enforcement for multiple files, directories, and volumes, including volumes on remote Macs connected through your network.
Deploy and monitor VirusScan for Mac using the familiar Mac OS X Aqua user interface. Alternatively, use the McAfee ePolicy Orchestrator (ePO) platform for easy deployment, enforcement, management, and reporting — all from a single console.
Check files only when they are accessed to determine whether they’re infected with malware. Initiate on-demand scanning using file drag and drop, and schedule full-disk scans to run at convenient intervals, such as overnight or during off-peak hours.
Scan Apple Mail messages and attachments for threats, and protect users when they save or open files from shared network drives.
Count on streaming updates from McAfee Labs — our worldwide, 24/7 security research team — to ensure full compliance and up-to-the-minute protection against viruses, worms, and other threats.
These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
Citrix reduces risk with McAfee’s integrated security risk management platform.
Purdue University protects 25,000 systems with McAfee.
For a technical summary on the McAfee product listed above, please view the product data sheet.
Although VMworld wrapped a few weeks ago, we’re still spinning over the excitement and buzz that was generated around the event. VMworld 2014 was a special benchmark for both McAfee and Intel, as we presented the first Intel Security product (the Intel Security Controller), and also showcased Intel Security’s capabilities with a united booth presence […]
The post Comprehensive Server Security: The Star of VMworld 2014 appeared first on McAfee.
I’m delighted to announce that McAfee is working with Amazon Web Services (AWS) to offer our Host-Based Security Solution (HBSS) to AWS Cloud customers. As HBSS is so critical to DoD’s security posture, it’s the first of several Software as a Service (SaaS) offerings we’ll do with AWS. Military and civilian government agencies are increasingly […]
The post McAfee offers government security for Amazon cloud customers appeared first on McAfee.
I recently wrote a piece in Dark Reading around the notion that Endpoint security is not dead, but instead facing a steadily mounting series of obstacles with relation to the new universe of Internet-connected devices. While there are certainly more challenges to securing corporate networks today, claiming that enforcing Endpoint security policies is basically fighting […]
The post Endpoint Security and the Reality of Ubiquitous Computing appeared first on McAfee.
In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made this critical point: Stopping attacks before they breach and narrowing the breach discovery gap require the ability to detect threats at […]
The demands between physical, virtual, public and private clouds change faster than actual clouds do. As organizations adapt to these changes, they face the Sisyphean task of securing and hardening their networks from external agents. And therein lies the problem: companies conscious of the cloud’s benefits are hesitant to adopt cost-saving virtualization because of security […]
The post Aberdeen Reports: McAfee Helps Secure the Evolving Datacenter appeared first on McAfee.