McAfee Complete Endpoint Protection — Business

McAfee Complete Endpoint Protection — Business

High-performance security for dynamic businesses: strong, fast, simple, and affordable

Next Steps:

Overview

With McAfee Complete Endpoint Protection — Business, you can spend more time on your business and less time worrying about security. This highly affordable, all-in-one solution provides top-rated endpoint security for all the devices in your enterprise: PCs, Macs, Linux systems, servers, virtual systems, smartphones, and tablets. Quickly and easily layer in protection against today’s most advanced threats, including encryption to protect your valuable data, behavioral zero-day intrusion prevention against attacks, and email, web, and mobile security to block phishing and multistage attacks. Easy installation and unified management reduce setup and maintenance. You can respond faster than ever.

Complete protection — Today, antivirus alone isn’t enough to defend against sophisticated, stealthy malware and attacks. The highest scoring vendor in an NSS Labs comparative test of current defenses against evasion attacks, McAfee finds, fixes, and freezes malware fast with multiple layers of protection. And strong encryption secures your vital confidential data and prevents unauthorized access to PCs, Macs, laptops, and removable media — transparently and without slowing system performance. Behavior and reputation systems integrate with the cloud-based McAfee Global Threat Intelligence to protect against emerging cyberthreats across all vectors — file, web, message, and network.

Complete simplicity — With as few as four clicks and in as little as 20 minutes, you can be up and running. Web-based single console management with McAfee ePolicy Orchestrator software makes it easy to manage policies across all protections and systems and get instant visibility into security health across your entire infrastructure. With new real-time management, you can ask questions and fix vulnerabilities or correct problems faster than ever before.

Complete performance — Are you looking for security that supports business instead of slowing it down? Complete Endpoint Protection — Business minimizes security’s impact on users with fewer, smarter scans and advanced memory management. These technologies optimize CPU and memory usage to make strong security transparent to users across all platforms.

Features & Benefits

Safeguard all your devices

License one product to protect all your business assets: PCs, Macs, Linux systems, servers, virtual systems, smartphones, and tablets.

Top-rated, comprehensive layered protection

Advanced antivirus, anti-malware, host intrusion prevention, device control, host-based firewall, encryption, and more tackle malware, zero-day threats, and evasion attacks at every vector — mobile, data, web, and email.

Security built for growing organizations

We keep it simple for IT administrators to take charge. Install your suite with just four clicks and in less than 20 minutes. Add licenses and products using the same management platform as your business grows.

Unify and simplify management

McAfee ePolicy Orchestrator (McAfee ePO) single-console management streamlines and automates workflow, policy deployment, updates, maintenance, and reporting across all of the technologies that protect your endpoints. Integration with other McAfee and third-party products further increases visibility and efficiency as you add to your security arsenal.

Protect vital data proactively with encryption

Deploy industry-leading file, folder, and full disk encryption to secure confidential data across PCs, laptops, network servers, and removable media. Quickly enforce organization-wide encryption policies that are automatic and transparent to users, so files can be securely shared, stored, and transported. Encryption options include enterprise-grade drive encryption or management of native encryption for Apple FileVault and Microsoft BitLocker management.

See more and know more for better protection

Real-time cloud-based McAfee Global Threat Intelligence collects the latest data to protect against known and emerging cyberthreats across all vectors — file, web, message, and network.

Technologies

McAfee Complete Endpoint Protection — Business provides a number of technologies to meet the needs of business customers. One common need is to protect data and ensure your business remains in compliance with government regulations. McAfee endpoint encryption solutions integrate industry-leading technologies to provide top performance, advanced data protection, and seamless deployment for Microsoft Windows and Apple Mac endpoints. Learn more about the encryption solutions available to you in the McAfee Complete Endpoint Protection – Business suite:

Customer Videos

Customer Testimonial

The future of IT is to securely enable businesses. Integris enables its employees by implementing McAfee’s Endpoint Mobility Management (EMM) to secure mobile devices and tablets, integrating EMM with ePO software helps to ease the strain to their IT department by providing one console to assess where the risk threshold lies.

inHouseIT benefits greatly from integrated reporting provided by McAfee ePolicy Orchestrator (ePO) software, creating a central repository and dashboard for a comprehensive view on the IT health of an organization.

The ability to push application control out to a specific endpoint is greatly beneficial, it brings security to any machine and brings performance up. With whitelisting and the integrated nature of McAfee ePO software, Seagate is able to manage all facets of security under one, single pane of glass, making management much easier.

Awards / Reviews

McAfee Enterprise Mobility Management wins Gold Medal for Best of Mobile Data Security 2013

McAfee stood out as the clear category leader, according to voters, coming out ahead of AirWatch MDM. EMM was awarded the Gold Medal for its data and malware protection, central management capabilities (including key management for encryption), granular and flexible policy controls, and the ease of installation and configuration for administrators.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses
McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Protection Defenses
McAfee core endpoint anti-malware products (McAfee VirusScan Enterprise, McAfee Host Intrusion Prevention, and McAfee SiteAdvisor Enterprise) achieved the highest block rate and an overall score of 97% for all threats blocked in the exploit protection test.

Gartner Magic Quadrant for Mobile Data Protection
For the past four years, McAfee has been positioned as a leader.

News / Events

Resources

Data Sheets

McAfee Complete Endpoint Protection — Business

For a technical summary on the McAfee product listed above, please view the product data sheet.

FAQ

McAfee Enterprise Mobility Management (McAfee EMM) 12.0

Get answers to questions about McAfee Enterprise Mobility Management.

Reports

NSS Labs Enterprise EPP Comparative Analysis, Socially Engineered Malware

Learn about why NSS Labs ranked McAfee as the top vendor for endpoint protection products for socially engineered malware protection, exploit protection, and phishing protection.

Tolly Test Report – Leveraging Peer Communications to Deliver Rapid Response to Security Threats in Large, Distributed Environments

Tolly evaluated McAfee Real Time Command and verified its capability to rapidly gather endpoint management data and provide a unified management platform for problem mitigation, in a McAfee commissioned test. Tests showed that McAfee Real Time Command can quickly collect data — 95% of 500 stations were collected in as little as 9 seconds — and effectively manage problem mitigation.

Five Hundred Endpoints in Five Seconds – Tolly Test Report Summary

Tolly Group confirms McAfee Real Time Command performance

The Risk of "Free" Endpoint Security

This Analyst Insight demonstrates how security professional can do a better job at communication security-related risks to business decision-makers, and at showing how investments in security controls actually reduces those risks.

Gartner’s Buyer’s Guide to Ideal Endpoint Protection

Wondering how to decode vendor hype as you evaluate your next endpoint protection platform? Gartner analyst Peter Firstbrook has created a comprehensive buyer’s guide for endpoint protection: what to look for, what to avoid, and why.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses

McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Protection Defenses

McAfee core endpoint anti-malware products (McAfee VirusScan Enterprise, McAfee Host Intrusion Prevention, and McAfee SiteAdvisor Enterprise) achieved the highest block rate and an overall score of 97% for all threats blocked in the exploit protection test.

Solution Briefs

McAfee Threat Intelligence Exchange and Endpoint Protection

McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threats response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

McAfee Application Control Extends the Life of Legacy Microsoft Windows XP Systems

McAfee Application Control provides an effective way to block unauthorized applications from running and will continue to support Windows XP systems even after Microsoft’s phase-out of support has taken effect.

White Papers

Should IT Vendor Consolidation Extend to Endpoint Security?

As IT organizations try to simplify vendor management, many are asking if consolidating on a single endpoint security vendor makes sense. It could hinge on the existence of an overall security framework. This white paper examines the questions IT executives should ask themselves and their security technology partners.

SANS Institute: Correlating Event Data for Vulnerability Detection & Remediation

Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.

The New Reality of Stealth Crimeware

With cybercrime on the rise, McAfee and Intel researchers believe that we need to re-envision how to detect and block stealthy malware.

Community

Blogs

  • Five Easiest Ways to Get Hacked – Part 1
    Carric Dooley - February 23, 2015

    A conversation with principal security consultant Amit Bagree. I had the opportunity recently to sit down with Amit Bagree, one of our principal security consultants, for a chat about the most common weak points in network security. Amit has been breaking things apart since childhood, has been working in the security field for almost 10 […]

    The post Five Easiest Ways to Get Hacked – Part 1 appeared first on McAfee.

  • You’re Under Attack! Eight Ways to Know for Sure
    Karl Klaessig - February 23, 2015

    The parade of breaches, attacks and various other digital maladies hitting corporations in 2014 made it clear that default, out-of-the-box compliance and security isn’t enough to protect organizations. But the nature of advanced persistent threats (APTs), and other forms of malware, makes it difficult to find an investment that can keep the next threat from […]

    The post You’re Under Attack! Eight Ways to Know for Sure appeared first on McAfee.

  • Cyberespionage: You’re Not Paranoid, Someone Is Spying on Your Company
    Michael Sentonas - February 19, 2015

    It’s time for all of your counter-espionage tools to work together. By now you, your peers, and your board should have accepted that cyberespionage is real, active, and not going away. Whether it is a customer or competitor, country or criminal, someone wants to know a lot more about you. They could be looking for […]

    The post Cyberespionage: You’re Not Paranoid, Someone Is Spying on Your Company appeared first on McAfee.

  • Microsoft Patch Tuesday – February 2015
    PageOne Pr - February 12, 2015

    Hello everyone, This is Greg Blaum again with the Microsoft Patch Tuesday newsletter for February 2015. The month Microsoft released a total of nine (9) security updates. For this month, three (3) of these are rated Critical, which Microsoft terms as a vulnerability whose exploitation could allow code to execute without any user interaction. These […]

    The post Microsoft Patch Tuesday – February 2015 appeared first on McAfee.

  • We Tried the NIST Framework and It Works
    Kent Landfield - February 11, 2015

    By Kent Landfield, Director of Standards and Technology Policy, Intel Security, and Malcolm Harkins, Chief Security and Privacy Officer at Intel When the Administration released the Framework for Improving Critical Infrastructure Cybersecurity (the Framework) on February 12, 2014, many of us at Intel and Intel Security were familiar with the details, as we had participated […]

    The post We Tried the NIST Framework and It Works appeared first on McAfee.

Threats and Risks