McAfee VirusScan Enterprise for Storage ensures business continuity by protecting network-attached storage devices against viruses and other malware. This high-performance scanning solution deploys on one or more Windows servers in affordable multifiler or high-availability multiscanner configurations to deliver the power of parallel processing for optimal load balancing and flexible failover protection.
Advanced antivirus technology — Continuously blocks a wide range of viruses and malicious code threats, including those hidden in compressed files. Advanced heuristics and generic detection find even new, unknown viruses.
Detect unwanted programs — Find hidden spyware programs that track Internet use, access personal data, and open security holes.
Reduce administration time — Centrally manage your entire security system with the McAfee ePolicy Orchestrator (McAfee ePO) platform. It delivers complete management from a single console.
Receive rapid notification — Stay informed whenever a virus is detected via email, pager, SNMP, SMS, or Tivoli.
Multi-vendor NAS protection — Simplify your environment and reduce support costs with an award-winning solution that secures multiple storage systems vendors, devices, and operating systems.
Defend against a wide range of malware and other threats, including new, unknown viruses.
Use unique on-access scanning technology to protect NetApp filers while files are being accessed, copied, or written to the server.
Keep users and filers safe from hidden programs that open security holes and access personal information.
Deploy multiscanner to multifiler configurations that increase your load-balancing capacity and failover security.
Control and manage your entire security system with the McAfee ePolicy Orchestrator (McAfee ePO) platform. It delivers complete management, including detailed graphical reporting, from a single console.
Protect data from malware before signatures are developed with included McAfee Global Threat Intelligence (GTI) integration.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
McAfee offers cost-effective solutions for securing your data, files, and peace of mind, no matter how large or how diverse your storage environment.
I recently wrote a piece in Dark Reading around the notion that Endpoint security is not dead, but instead facing a steadily mounting series of obstacles with relation to the new universe of Internet-connected devices. While there are certainly more challenges to securing corporate networks today, claiming that enforcing Endpoint security policies is basically fighting […]
The post Endpoint Security and the Reality of Ubiquitous Computing appeared first on McAfee.
In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made this critical point: Stopping attacks before they breach and narrowing the breach discovery gap require the ability to detect threats at […]
The demands between physical, virtual, public and private clouds change faster than actual clouds do. As organizations adapt to these changes, they face the Sisyphean task of securing and hardening their networks from external agents. And therein lies the problem: companies conscious of the cloud’s benefits are hesitant to adopt cost-saving virtualization because of security […]
The post Aberdeen Reports: McAfee Helps Secure the Evolving Datacenter appeared first on McAfee.
Some applications go too far in their attempt to get installed on users systems. Many of these fall into the potential unwanted program (PUP) category. One of these is MegaRapido, which primarily targets Brazilians. A recent sample we tested tries to connect to protectmedia.net, which is already marked as suspicious by McAfee SiteAdvisor. Instead of […]
The post Brazilian PUP Campaign MegaRapido Shows Unwanted Behavior appeared first on McAfee.
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at the kernel level to bypass Microsoft’s security for 64-bit Windows systems. Today a small utility program named KPP-Destroyer can be found online. Previous versions of KPP-Destroyer had some bugs on a Windows 8.1 computer, but […]