McAfee VirusScan Enterprise for Offline Virtual Images — the first dedicated security solution for virtual machines (VMs) — protects your virtual environment and corporate network by automatically scanning, cleaning, and updating VMs before they go online.
VirusScan Enterprise for Offline Virtual Images offers:
An optimized solution — Developed specifically to work with all major virtualization environments, including Citrix, Microsoft, and VMware.
Scalable security — Provides on-demand protection for an unlimited number of VMs.
Comprehensive, cost-effective protection — Reduces IT overhead with integrated protection for pre-production (testing and development) and production (disaster recovery) virtual environments.
Automatically scan, clean, and update virtual machines (VMs) while they’re offline to eliminate the risk of dormant VMs threatening your corporate network.
Count on automatic, real-time, anti-malware updates via McAfee Global Threat Intelligence to maintain the latest threat protection without bringing VMs online, thus allowing your IT staff to focus on other issues.
Minimize IT efforts and reduce operating costs with common security management via the McAfee ePolicy Orchestrator (ePO) platform, for both physical and virtual environments.
Reduce IT migration issues with one security solution that supports all top virtualization vendors, including Citrix, Microsoft, and VMware.
Secure offline VMs at secondary sites.
Scan and update offline virtual images periodically to enable archiving for longer periods.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
In the McAfee Labs Threats Report: November 2014, Intel Security predicted nine major threats that would occur in 2015. Regarding ransomware, we said this: “Ransomware will evolve its methods of propagation, encryption, and the targets it seeks.” Almost immediately, we began to see a huge rise in ransomware, especially with the family CTB-Locker, followed by […]
You, along with the vast majority of companies, use public cloud servers for something. Whether they are your primary service infrastructure, overflow capacity, or emergency backup, this Infrastructure as a Service (IaaS) is delivering on the promises of reduced costs, greater agility, and enhanced scalability. But there are still questions about security. You need to […]
On April 8, the takedown operation for the polymorphic botnet known as Beebone successfully concluded. This action redirected traffic from infected hosts to a sinkhole operated by the Shadowserver Foundation. In addition to halting additional infections and the continued morphing of the W32/Worm-AAEH worm, the sinkhole allows McAfee Labs and other partners in the takedown […]
W32/NionSpy is a family of malware that steals information from infected machines and replicates to new machines over networks and removable thumb drives. Aside from stealing keystrokes, passwords, Bitcoins, system information, and files on disk, NionSpy (also known as Mewsei and MewsSpy) can record video (using the webcam), audio (using the microphone), take screenshots, and […]
The post Taking a Close Look at Data-Stealing NionSpy File Infector appeared first on McAfee.
Since the beginning of the year we have seen a spike in ransomware including the emergence of new ransomware families. One family that has recently resurfaced is Vaultcrypt. This variant both tidies up after itself and steals web page login data. Infection vector The malware arrives on a victim’s machine through a spam email containing […]
The post VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials appeared first on McAfee.