McAfee Endpoint Protection for Mac

McAfee Endpoint Protection for Mac

Advanced protection to secure Macintosh endpoints

Next Steps:

Overview

Macintosh endpoints are not immune to security threats. That’s why it’s imperative that businesses deploy security to Mac endpoints just as they do to Windows endpoints. Cybercriminals are after data, and they don’t care what type of endpoint holds it.

McAfee Endpoint Protection for Mac is an essential security solution for protecting the data on your Mac endpoints. Advanced protection technologies, including anti-virus, anti-spyware, firewall, and application protection, along with centralized management with the McAfee ePolicy Orchestrator (ePO) platform, allow businesses to secure Mac endpoints and ensure compliance with security policies.

Broad protection — Secure all endpoints on your Macintosh systems against all types of viruses, spyware, phishing attacks, and exploits.

Centralized, integrated management — Use the same web-based console to manage both your Mac and Windows endpoints. Easily deploy protection for all of your Macs from a single interface.

Intuitive, Macintosh-like interface — Get up and running quickly, with minimal training. Endpoint Protection for Mac uses Apple’s Mac OS X Aqua user interface, so you can deploy and manage from an instantly familiar Macintosh screen.

Features & Benefits

Enforce security compliance

Report on and enforce security policies on Macs to ensure endpoints fully comply with your security standards.

Lower operational costs and simplify management

Use a single web-based console to manage both Mac and Windows endpoints. Endpoint Protection for Mac integrates seamlessly with the McAfee ePolicy Orchestrator (ePO) platform, saving you time and money.

Get fast and reliable performance

Rely on advanced scanning functions for fast and accurate threat protection that doesn’t impact system performance.

Stop data-stealing malware

Prevent malicious attacks designed to steal data from being downloaded or installed on your Mac endpoints.

Obtain proven anti-virus technology

Secure your endpoints against every type of virus and malicious code threat, even those hidden in compressed files, with advanced heuristics and generic detection from Endpoint Protection for Mac.

Secure reliable anti-spyware protection

Neutralize spyware before it takes root and spreads by stopping spyware and other potentially unwanted programs (PUPs) before they install and start stealing personal information.

Utilize a proactive desktop firewall

Stop network-based attacks with inbound and outbound firewalls to prevent unwanted network activity. Ensure same network firewall policies can be enforced on both Mac and Windows endpoints.

Lock down Mac endpoints

Prevent malicious programs from modifying applications, and allow or deny applications that are not approved to run on your Mac.

System Requirements

These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.

Operating Systems

  • Mac OS X Yosemite (version 10.10 or later)
  • Mac OS X Mavericks (version 10.9 or later)
  • Mac OS X Mountain Lion (version 10.8 or later)
  • Mac OS X Lion (version 10.7 or later)
  • Mac OS X Snow Leopard (version 10.6 or later)

Resources

Data Sheets

McAfee Endpoint Protection for Mac

For a technical summary on the McAfee product listed above, please view the product data sheet.

White Papers

Top Five McAfee ePolicy Orchestrator Tips

This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.

Top Five McAfee ePolicy Orchestrator Tips (Dutch)

This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.

Community

Blogs

  • Protect Yourself by Protecting Others
    Carly Listman - January 21, 2015

    How the consumerization of IT is affecting endpoint security What happens in Vegas may stay in Vegas, but what happens on your employees’ personal devices may not stay there. According to a recent survey of consumers around the world, conducted by MSI Research on behalf of Intel Security, almost 80% of respondents use their personal […]

    The post Protect Yourself by Protecting Others appeared first on McAfee.

  • The Rise of Backdoor-FCKQ (CTB-Locker)
    Raj Samani - January 21, 2015

    By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice President Vincent Weafer commented that 2014 will be remembered as “the year of shaken trust.” Indeed almost every threat measured saw notable increases in Q3 that pointed to a rather ominous 2015.  There was, however, […]

    The post The Rise of Backdoor-FCKQ (CTB-Locker) appeared first on McAfee.

  • The Scan: The Best of CES 2015
    Bradi Van Noy Hays - January 19, 2015

    Hey guys! I’m Bradi, and this is the Scan – bringing you the very latest in security news. It’s 2015, and you know what that means – we’re officially in THE FUTURE. Congratulations, you made it! CES 2015 Rundown Another Consumer Electronics Show has come and gone, which means a lot of tech nerds out […]

    The post The Scan: The Best of CES 2015 appeared first on McAfee.

  • InstallCube: How Russian Programmers Turn Adware Into Cash
    Tarun Agarwal - December 16, 2014

    We often observe applications bundled with ad-displaying programs to generate revenue for those products. These are not necessarily unethical, but some of them try to make easy money by deceiving users. McAfee categorizes such apps as potentially unwanted program (PUPs). Here’s a look at a recently discovered Russian-based campaign that is very well organized. We […]

    The post InstallCube: How Russian Programmers Turn Adware Into Cash appeared first on McAfee.

  • Behavior Analysis Stops Romanian Data-Stealing Campaign
    Ankit Anubhav - December 3, 2014

    In a recent press announcement, McAfee and Europol’s European Cyber Centre announced a cooperation of our talents to fight cybercrime. In general these joint operations are related to large malware families. Writing or spreading malware, even in small campaigns, is a crime. McAfee Labs doesn’t hesitate to reach out to its partners and contacts in […]

    The post Behavior Analysis Stops Romanian Data-Stealing Campaign appeared first on McAfee.

Threats and Risks