McAfee VirusScan Enterprise for SAP continuously secures mission-critical SAP NetWeaver environments against potential security threats. It also stops zero-day threats and speeds the time to resolution when vulnerabilities are discovered. And it provides comprehensive management reporting, updates, and auditing capabilities, all in one package. McAfee is an SAP-certified integration partner.
VirusScan Enterprise for SAP offers:
Continuous, comprehensive coverage — Scan, quarantine, and remediate sensitive documents, configuration files, and templates before they reach your SAP environment.
Simplified security management — Manage agents, policies, and reports for your SAP environment and all your McAfee products from the McAfee ePolicy Orchestrator (ePO) platform, the centralized security management console.
Flexible deployment — Use as a standalone server or as a virtual machine.
Proven protection — Count on McAfee’s anti-malware expertise, trusted by more than 50 million enterprise users worldwide, and the 24/7 anti-threat vigilance of McAfee Labs.
Block malware, scan external files, quarantine infected files, and stop zero-day threats before they reach your SAP NetWeaver environment.
Count on automatic, real-time updates from McAfee Labs to ensure the most current protections are always in place.
Extend your investment in enterprise security management by adding VirusScan Enterprise for SAP to your McAfee ePolicy Orchestrator (ePO) infrastructure. No additional training is required for IT staff who already use the ePO platform.
Use the ePO platform as the hub of your security risk management solutions, so you can reduce the risk of rogue, noncompliant systems; keep protection up to date; configure and enforce protection policies; and monitor security status 24/7 from one centralized, web-based console.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at the kernel level to bypass Microsoft’s security for 64-bit Windows systems. Today a small utility program named KPP-Destroyer can be found online. Previous versions of KPP-Destroyer had some bugs on a Windows 8.1 computer, but […]
Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often than random phishing attempts. Exploits that use patched vulnerabilities delivered via spear phishing email are one of the most successful combinations used by attackers to infiltrate targeted organizations and gain access to confidential information. During […]
The post Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities appeared first on McAfee.
The Dofoil downloader (found in the wild since 2011) occasionally updates itself with new features and encryption techniques to hide communications with its control servers. The latest iteration uses a variation of XOR and RC4 algorithms similar to previous variants to encrypt the list of control servers within the binary and encrypt all traffic with […]
The post Dofoil Downloader Update Adds XOR-, RC4-Based Encryption appeared first on McAfee.
McAfee product coverage and mitigations for malware or indicators associated with the recent attacks (a.k.a. Dragonfly, Energetic Bear, Havex/SYSMain) on industrial control systems (ICS’s) are listed below. The Havex remote access tool is common across these associated attacks or campaigns–including Dragonfly. We have seen Havex in ICS-specific targeted campaigns. It can detect and affect ICS- […]
The post Product Coverage and Mitigation for ICSA-14-178-01 (Havex/ICS-Focused Malware) appeared first on McAfee.
Every organization has deployed anti-virus/anti-malware solutions, but how much you have actually reduced your risk? To recap what we’ve covered in this 5-part blog series, Aberdeen’s analysis and Monte Carlo modeling: Confirms the high risk of unprotected endpoints Demonstrates that endpoint protection really does reduce risk Confirms that “free” endpoint protection (e.g., Microsoft) is better […]
The post Endpoint Security, Part 5 of 5: A/V Alone is Not Enough appeared first on McAfee.