McAfee VirusScan Enterprise for Storage ensures business continuity by protecting network-attached storage devices against viruses and other malware. This high-performance scanning solution deploys on one or more Windows servers in affordable multifiler or high-availability multiscanner configurations to deliver the power of parallel processing for optimal load balancing and flexible failover protection.
Advanced antivirus technology — Continuously blocks a wide range of viruses and malicious code threats, including those hidden in compressed files. Advanced heuristics and generic detection find even new, unknown viruses.
Detect unwanted programs — Find hidden spyware programs that track Internet use, access personal data, and open security holes.
Reduce administration time — Centrally manage your entire security system with the McAfee ePolicy Orchestrator (McAfee ePO) platform. It delivers complete management from a single console.
Receive rapid notification — Stay informed whenever a virus is detected via email, pager, SNMP, SMS, or Tivoli.
Multi-vendor NAS protection — Simplify your environment and reduce support costs with an award-winning solution that secures multiple storage systems vendors, devices, and operating systems.
Defend against a wide range of malware and other threats, including new, unknown viruses.
Use unique on-access scanning technology to protect NetApp filers while files are being accessed, copied, or written to the server.
Keep users and filers safe from hidden programs that open security holes and access personal information.
Deploy multiscanner to multifiler configurations that increase your load-balancing capacity and failover security.
Control and manage your entire security system with the McAfee ePolicy Orchestrator (McAfee ePO) platform. It delivers complete management, including detailed graphical reporting, from a single console.
Protect data from malware before signatures are developed with included McAfee Global Threat Intelligence (GTI) integration.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
McAfee offers cost-effective solutions for securing your data, files, and peace of mind, no matter how large or how diverse your storage environment.
For several weeks after we released the McAfee Labs Threats Report, May 2015, in which we discussed the topic of ransomware in depth, we frequently saw the same questions: “Why is ransomware increasing, and why is it so successful? In our report we offered a few answers to this question. We’d like to zoom in […]
This post was written by Haifei Li of Intel Security and Xiaoning Li of Intel Labs. Microsoft Office documents play an important role in our work and personal lives. In the last couple years, unfortunately, we have seen a number of exploits, especially some critical zero-day attacks, delivered as Office documents. Here are a couple […]
The post Threat Actors Use Encrypted Office Binary Format to Evade Detection appeared first on McAfee.
This post was written with the invaluable assistance of my colleague Rakesh Sharma. Over the past couple of months McAfee Labs has seen an increase in the usage of macros to deliver malware. This kind of malware, as mentioned in previous posts (Dridex, Bartallex), usually arrives as an attached document within a phishing email. Recently […]
Intel Security today released the McAfee Labs Threats Report: May 2015. Along with the usual compilation of threats statistics, it focuses on three key topics: A surge in powerful and clever ransomware that encrypts files and holds them hostage until the ransom is paid. New Adobe Flash exploits target the growing number of vulnerabilities that […]
The post McAfee Labs Threats Report Highlights Surge in Ransomware, Flash Exploits, Firmware Attacks appeared first on McAfee.
Take the time to detect the attack, isolate the infected machines, and restore them to a known state. Are you one of the lucky 12%? That is how few companies we surveyed did not experience a successful targeted cyberattack in 2014. If you are one of the few, and think your luck is going to […]
The post What Are You Doing During The Golden Hour After An Attack? appeared first on McAfee.