Today’s layered defense strategy must match the sophistication of modern threats. No individual antimalware product can block all malware infiltration and subsequent activity. You need a team — with the latest equipment.
Layers made manageable — Comprehensive malware protection requires the right defensive layers within each asset and throughout your infrastructure. With them, real-time defenses can deny essentially all malware, keeping your systems and networks available and secure. For resilience and situational awareness, these layers should be knit into a system of systems. Antimalware is integral to the equation, reinforced by other defenses and event management systems.
Multi-vector, multi-engine coverage — McAfee keeps giving you more: more coverage, more innovation, more protection. Our comprehensive malware protection integrates multi-vector detection and blocking at every endpoint, beyond the OS, and everywhere in between. Rich, rigorous analytics take full advantage of cloud intelligence to identify and stop malware assailing endpoints including mobile devices and web, network, and email gateways. Network-based systems monitor and analyze traffic in real time to detect unusual activity that could indicate a compromised host harboring a bot network or persistent attacker.
Context, control, and communication — By integrating real-time defenses, global and local intelligence, and context, McAfee can block almost all malware. Reinforcing system and application controls thwart exploitation and execution by any malicious code that gets through. Data shared in dynamic processes highlight key events to expedite identification, containment, and remediation.
Endpoint to Everywhere — This endpoint to everywhere coverage is core to the McAfee Security Connected approach. Our open platform connects your McAfee solutions to the rest of your security and compliance systems, to the real-time McAfee Global Threat Intelligence network, and to innovative new defenses coming soon. Get connected to improve your security posture, get more value from your investments, and align security to enable business.
A.T.U safeguards employee web and email communications with centrally managed McAfee security solutions.
Alcatel-Lucent Shanghai Bell uses McAfee Network Security Platform to secure 100 Mbps to 10 Gbps corporate networks against threats and attacks.
Cardnet eliminates malware infections with comprehensive network, email, and endpoint security from McAfee.
McAfee Total Protection for Secure Business provides Community South Bank with comprehensive server and desktop protection, while safeguarding data and defending against threats.
McAfee simplifies security management for French city’s local government.
McAfee Firewall Enterprise, McAfee Web Gateway, and McAfee Email Gateway provide the foundation for MidWestOne’s Internet security strategy.
SIM University uses McAfee Firewall Enterprise to protect its data center.
McAfee delivers comprehensive protection for Transend Networks' virtualized infrastructure, enabling high network availability.
Aggregates powerful malware detection techniques including global file reputation, custom malware signatures, file anomaly analysis, heuristics, emulations, cloud lookups, and static file analysis to identify and block threats travelling over the network, from worms to bots. Tools, weighted alerts, and forensic dashboards reduce the expertise and time required to understand and act on relevant events.
Monitors web traffic for malicious content, suspicious memory activities, and known bad URLs, using advanced content and behavior analytics to accurately and preemptively detect and block modern blended attacks and complex malware. Includes full browser emulation and multi-layer analysis that detects malicious active content and reveals the malware’s final intent, reflecting dynamic changes that occur in real time, as well as scareware.
Offers hybrid deployment options, multiple scanning engines, and URL analytics to provide defense in depth for the email vector against phishing attacks, viruses, malware, directory harvest, denial of service (DoS), bounceback attacks, zero-hour threats, and spam surges with the leverage of network, file, and message reputation.
Fends off hackers attempting to enter the network or manipulate bots and compromised systems within your infrastructure. Strong next-generation firewall capabilities, including application visibility and deep application controls, reduce the attack surface, block the latest attacks, and eliminate unwanted traffic.
Unifies security management and policy enforcement for consistent control across the McAfee portfolio of endpoint, network, and data security. Helps security professionals make better security management decisions based on a holistic view of security posture, actionable dashboards, automated responses, and integrated workflows.
Collects and correlates event, behavior, and alert information from all your sources, delivering a full depiction of the attack with context awareness for rapid, decisive action based on a crisp understanding of event sequences and scope. Integrates with McAfee ePO software to automatically adjust system security settings for attacks or potential attacks in progress. Can send quarantine commands to McAfee Network Security Platform to shut down suspicious communications.
Restrict the applications that can be installed or run on your endpoints to limit vulnerabilities and prevent execution of malicious software binaries, kernel components, DLLs, ActiveX controls, scripts, or Java components.
Prevents tampering with critical system files, directories, and registry keys to block all unauthorized changes, whether malicious or inadvertent, that could permit compromise and persistence, such as creation of backdoors and escalation of privileges.
Monitors system behavior at the kernel-level to expose and remove stealthy and unknown threats, including master boot record (MBR) bootkits and kernel rootkits, and preempt zero-day malware; utilizes integration with Intel technology to remove low-level threats that traditional OS-based protection cannot detect.
Lets you lock down ports to limit the chance that portable storage devices can introduce malicious code into your systems or exfiltrate sensitive data.
Imposes three layers of protection (signature analysis, behavioral analysis, and dynamic stateful firewall with global reputation technology) to prevent intrusions, protect mobile assets, and defend your organization against known and emerging exploits, including zero-day attacks.
Offers specialized protection to secure critical servers against attacks, including directory traversal and SQL injection attacks, and block threats such as botnets and denial of service before attacks can occur.
Blocks access to dangerous or forbidden websites and flags potentially risky websites to educate users and reduce the chance for malware to enter through vulnerable browsers and endpoints.
Combines antivirus, antispyware, firewall, and intrusion prevention technologies to stop and remove malicious software and guard against buffer overflow exploits, spam, phishing attacks, malicious websites, and other threats that often evade standard antivirus and URL filtering systems.
Provides malware protection for Android and secures corporate email, calendar, and contacts to prevent interaction with personal data or malicious apps.
Topics : Security Management
For product enhancements, please view the data sheet listed above.