McAfee VirusScan for Mac provides complete, proactive malware protection for Mac systems and users. Using proven protection methods, it stops all types of viruses and malicious code, including spyware, adware, Trojans, and new, unknown threats.
VirusScan for Mac delivers:
Centralized, simplified security management — With the McAfee ePolicy Orchestrator (ePO) platform, you can efficiently deploy and manage your Mac, Windows, and Linux clients on your network, giving you better security visibility across your entire infrastructure. Control policy configuration, deployment, and reporting for all your endpoints from the ePO platform’s single, web-based console.
Proactive threat protection — Uses heuristic analysis, generic protection, and on-access scanning to detect and remove viruses, worms, Trojans, spyware, adware, and other unwanted threats before they infect your system. VirusScan for Mac guards against Mac, PC, and Unix-based viruses.
Continuous and on-demand virus scanning — Automatically scans for threats each time a file is accessed. Also scans on demand with file drag and drop.
Seamless security updating — Automatically pulls the latest malware updates from McAfee Labs, our worldwide, 24/7 security research team.
Stop every type of virus, spyware, adware, and other malicious code that targets Mac OS X or Microsoft Windows. McAfee VirusScan for Mac can even detect compressed malware files and previously unknown viruses.
Allow end users to operate Macs in your environment and ensure their data is protected.
Get continuous policy enforcement for multiple files, directories, and volumes, including volumes on remote Macs connected through your network.
Deploy and monitor VirusScan for Mac using the familiar Mac OS X Aqua user interface. Alternatively, use the McAfee ePolicy Orchestrator (ePO) platform for easy deployment, enforcement, management, and reporting — all from a single console.
Check files only when they are accessed to determine whether they’re infected with malware. Initiate on-demand scanning using file drag and drop, and schedule full-disk scans to run at convenient intervals, such as overnight or during off-peak hours.
Scan Apple Mail messages and attachments for threats, and protect users when they save or open files from shared network drives.
Count on streaming updates from McAfee Labs — our worldwide, 24/7 security research team — to ensure full compliance and up-to-the-minute protection against viruses, worms, and other threats.
These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
Citrix reduces risk with McAfee’s integrated security risk management platform.
Purdue University protects 25,000 systems with McAfee.
For a technical summary on the McAfee product listed above, please view the product data sheet.
I recently wrote a piece in Dark Reading around the notion that Endpoint security is not dead, but instead facing a steadily mounting series of obstacles with relation to the new universe of Internet-connected devices. While there are certainly more challenges to securing corporate networks today, claiming that enforcing Endpoint security policies is basically fighting […]
The post Endpoint Security and the Reality of Ubiquitous Computing appeared first on McAfee.
In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made this critical point: Stopping attacks before they breach and narrowing the breach discovery gap require the ability to detect threats at […]
The demands between physical, virtual, public and private clouds change faster than actual clouds do. As organizations adapt to these changes, they face the Sisyphean task of securing and hardening their networks from external agents. And therein lies the problem: companies conscious of the cloud’s benefits are hesitant to adopt cost-saving virtualization because of security […]
The post Aberdeen Reports: McAfee Helps Secure the Evolving Datacenter appeared first on McAfee.
Some applications go too far in their attempt to get installed on users systems. Many of these fall into the potential unwanted program (PUP) category. One of these is MegaRapido, which primarily targets Brazilians. A recent sample we tested tries to connect to protectmedia.net, which is already marked as suspicious by McAfee SiteAdvisor. Instead of […]
The post Brazilian PUP Campaign MegaRapido Shows Unwanted Behavior appeared first on McAfee.
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at the kernel level to bypass Microsoft’s security for 64-bit Windows systems. Today a small utility program named KPP-Destroyer can be found online. Previous versions of KPP-Destroyer had some bugs on a Windows 8.1 computer, but […]