McAfee Application Control

McAfee Application Control

Protect systems from unknown, advanced persistent threats with centrally managed whitelisting

Next Steps:

Overview

McAfee Application Control software provides an effective way to block unauthorized applications and code on servers, corporate desktops, and fixed-function devices. This centrally managed whitelisting solution uses a dynamic trust model and innovative security features that thwart advanced persistent threats — without requiring signature updates or labor-intensive list management.

Complete protection from unwanted applications — Application Control extends coverage to executable files, libraries, drivers, Java apps, ActiveX controls, scripts, and specialty code for greater control over application components.

Flexibility for desktop users and server admins — IT can empower select desktop and server users to approve new apps instantly, and IT can choose to approve or reject these new apps during their routine audit.

Viable security for fixed-function and legacy systems — Application Control has a small footprint and low performance overhead, making it the perfect solution for protecting fixed-function devices, such as kiosks and point-of-sale (POS) terminals. It also extends protection to your legacy Windows NT and Windows 2000 systems.

Minimize patching while protecting memory — Allows you to delay patch deployment until your regular patch cycle. In addition, it prevents whitelisted applications from being exploited via memory buffer overflow attacks on Windows 32- and 64-bit systems.*

Centralized, integrated management — Leverage your investment in the McAfee ePolicy Orchestrator (McAfee ePO) platform. McAfee ePO software integrates all McAfee and security and risk management products from McAfee Security Innovation Alliance partners for a single view of enterprise security management.

* Network Security Platform (NSP) or Host Intrusion Prevention System (HIPS), as an added layer of defense, prevents kernel vulnerability exploits and Denial of Service (DoS) attacks.

Features & Benefits

Reduce risks from unauthorized applications and code

Allow only trusted applications to run on your endpoints, fixed-function devices, and servers. McAfee Application Control also stops malware — whether binaries, kernel components, DLLs, ActiveX controls, scripts, or Java components — from executing.

Save time and lower costs with dynamic whitelisting

Maximize administrator efficiency with a dynamic trust model that does not require signature updates or labor-intensive list management.

Reduce patch cycles and protect memory

Eliminate “patch panic” using a validated countermeasure that maintains your regular patch cycles and prevents whitelisted applications from being exploited via memory buffer overflow attacks on Windows 32- and 64-bit systems.

Inform and empower users with user-friendly notifications (optional)

Educate desktop users about disallowed applications with informative pop-up messages that can prompt them to seek approvals via email or helpdesk requests.

Extend the lifespan of legacy systems

Protect older systems that OS and security vendors no longer support, such as Windows NT and Windows 2000, while alleviating the need to patch these systems.

Safeguard field units and fixed-function devices

Take advantage of our transparent model that requires negligible CPU and memory usage.

Thwart advanced persistent threats with Global Threat Intelligence

Know the reputation of every file and application in your environment with real-time Global Threat Intelligence that automatically categorizes them as good, bad, and unknown.

Use central management to increase efficiency

Optimize and simplify management with the McAfee ePolicy Orchestrator (McAfee ePO) platform. Oversee and administer all your security protections from a single, centralized console that spans McAfee products, Security Innovation Alliance Partner products, and homegrown applications.

System Requirements

Microsoft Windows (32-bit and 64-bit)

  • Embedded: XPE, 7E, WEPOS, POS Ready 2009, WES 2009
  • Server: NT, 2000, 2003, 2003 R2, 2008, 2008 R2, 2012
  • Desktop: XP, Vista, 7

Linux

  • RHEL 5, 6
  • SUSE 10, 11
  • CentOS 5, 6
  • OEL 5,6
  • SLED 11
  • OpenSUSE 10/11
  • Solaris 9, 10

Demos / Tutorials

Demos

Learn how McAfee Application Control works with McAfee ePolicy Orchestrator software and extends the viability of fixed-function systems without impacting performance.

Learn how McAfee Application Control works with McAfee ePolicy Orchestrator software and extends the viability of fixed-function systems without impacting performance.

Tutorials

For guidance on how to use Application Control, watch this Quick Tips video.

Customer Stories

Macquarie Telecom

McAfee solutions offer integrated protection from distributed denial-of service (DDoS) threats at the Macquarie Telecom perimeter.

Highlights
  • Fully integrated security platform easily managed from a central dashboard.
  • Visibility and control for clients over their hosted security environments.
  • Competitive advantage through partnership with a trusted technology provider.

Seagate Uses McAfee Application Control for Intellectual Property Protection

Highlights
  • •Custom end-user protection to boost employee productivity
  • Increased performance of single-use machines in the factory
  • Malware-free factory environment

Resources

Data Sheets

McAfee Application Control

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Application Control for Desktops

For a technical summary on the McAfee product listed above, please view the product data sheet.

FAQ

Maintain Security for XP Systems

Learn about how application whitelisting can maintain security for Microsoft Windows XP systems no longer supported by Microsoft.

Solution Briefs

McAfee Application Control Extends the Life of Legacy Microsoft Windows XP Systems

McAfee Application Control provides an effective way to block unauthorized applications from running and will continue to support Windows XP systems even after Microsoft’s phase-out of support has taken effect.

The Evolving Landscape of Desktop Security

Learn how application whitelisting and recent technology enhancements make it easier to implement whitelisting.

White Papers

From Silicon to the Data: A Multi-Point Approach for Protecting Cloud Environments

Intel and McAfee, along with industry partners, are providing comprehensive solutions to better address the challenges of security for cloud computing.

Taking Back Control in Today’s Complex Threat Landscape

This document discusses the role that integrity control plays in defending networks against attack through a focus on two key areas — controlling what applications are allowed to run and how they are run, and protecting systems on the network from configuration changes and mistakes that can allow serious vulnerabilities to be exploited.

Community

Blogs