McAfee Endpoint Protection Suite

McAfee Endpoint Protection Suite

Secure Windows, Mac, and Linux systems with essential endpoint and data protection

Next Steps:

Overview

Traditional Windows, Mac, and Linux systems within your LAN need essential security to block advanced malware, control data loss and compliance risks caused by removable media, and provide safe access to critical email and web applications. McAfee Endpoint Protection Suite integrates these core functions into a single, manageable, multiplatform environment ideal for safeguarding traditional desktops that have limited exposure to Internet threats.

Endpoint Protection Suite includes:

Real-time anti-malware and antivirus protection — Block viruses, Trojans, worms, adware, spyware, and other potentially unwanted programs that steal confidential data and sabotage user productivity.

Proactive email and web security — Intercept malware and spam before it reaches inboxes. Built-in McAfee SiteAdvisor Enterprise Plus warns users about malicious websites before they click and allows administrators to authorize or block website access, ensuring compliance.

Desktop firewall — Control desktop applications that can access the network, and stop network-borne attacks and downtime. Deploy and manage firewall policies based on location to deliver complete protection and compliance with regulations.

Comprehensive device control — Monitor and restrict data copied to removable storage devices and media to keep it from leaving company control.

Unrivaled centralized management — The McAfee ePolicy Orchestrator (McAfee ePO) platform with Real Time for McAfee ePO provides instant visibility and control over security defenses and unifies controls over all your security and compliance tools, from McAfee as well as third parties.

Features & Benefits

Protect your endpoints from every angle

Guard all Windows, Mac, and Linux endpoints against system, data, email, web, and network threats.

Speed risk management

Use Real Time for McAfee ePO to understand the health, configuration, and state of security defenses in moments, then target updates, changes, and installations to the systems that need them. You can also monitor to confirm installations as they progress.

Save time and money

Consolidate endpoint and data security efforts with an integrated endpoint security solution from one vendor — securing stronger protection at a lower cost. McAfee enables you to manage endpoint security from one centralized console and connect to other McAfee and third-party products, improving visibility and expediting response times.

Deploy quickly and easily

Enable increased protection without delay. The EASI installer gets your strong protection running in as few as four clicks. Endpoint Protection Suite is integrated with the McAfee ePolicy Orchestrator (ePO) platform so you can deploy and manage security using a single environment.

System Requirements

These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment. 64-bit operating system support is available for some technologies.

  • Workstations
    • Windows 8
    • Windows 7 or Embedded
    • Windows Vista
    • Windows XP Home, Professional, Embedded (WEPOS), Tablet PC
    • Windows 2000 Professional with Service Pack 2 (SP2) or higher
    • Mac OS X Mountain Lion (version 10.8 or higher)
    • Mac OS X Lion (version 10.7 or higher)
    • Mac OS X Snow Leopard (version 10.6 or higher)
    • Mac OS X Leopard (version 10.5 or higher)
  • Servers
    • Windows 2008 Server, HyperV, Core, Datacenter, Storage Server, Cluster Server, Small Business Server
    • Windows 2003 Server, Storage Server, Cluster Server, Datacenter, Small Business Server
    • Windows 2000 Server, Advanced Server, Small Business Server
    • VMware ESX, ESXi
    • Citrix XenDesktop and XenServer
  • Other supported platforms
    • FreeBSD 6.1 and 7.0 (32-bit) (Command Line Scanner)
    • HP-UX 11.0, 11i, 11i v2/v3 (Command Line Scanner)
    • IBM AIX 5.2, 5.3, 6.1 (Command Line Scanner)
    • Linux Kernel 2.4 (32-bit) and 2.6 (64-bit) (Command Line Scanner)
    • Solaris 8, 9, 10 (32-bit/64-bit) (Command Line Scanner)
    • Citrix MetaFrame 1.8 and XP Support
    • EMC Celerra File Server
  • Email server requirements
    • Microsoft Exchange 2003 SP1, 2007 (64-bit), 2010 (v7.0.2)
    • Microsoft Exchange 2000 SMB, 2003 Server, or Advanced Server
    • Lotus Domino 6.0.3-6.0.5, 7.0, 8.0 (32-bit), 8.5 (32-bit)
  • Database software requirements
    • Microsoft SQL Server 2008 (32-bit/64-bit), Express
    • Microsoft SQL Server 2005 (32-bit/64-bit), Express
  • Supported web server platforms
    • IIS 4.0, 5.0, and 6.0 (Microsoft Windows)

Awards / Reviews

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses

McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

Customer Stories

Bank Central Asia

Bank Central Asia implemented McAfee solutions to protect its network, data, and 20,000 endpoints.

Highlights
  • Eased compliance with internal and industry regulations.
  • Resulted in time savings with centralized management.
  • Provided integrated solutions to keep computers, the network, and data protected.

Bank of China International (BOCI)

Bank of China International slashes risk of data loss with McAfee data protection.

Highlights
  • Delivered easy-to-manage security through an integrated central console
  • Prevented accidental or malicious data loss
  • Provided full visibility and control over use and movement of confidential data
  • Enabled proactive regulatory compliance and risk avoidance

Boston Medical Center

McAfee helps protect vital services for Boston Medical Center.

Highlights
  • Dramatically reduced denial-of-service (DoS) attacks from 8.4 million per day to zero
  • Integrated security product management through McAfee ePolicy Orchestrator (ePO)
  • Reduced time needed to roll out upgrades
  • Improved threat detection

Citrix Systems

Citrix reduces risk with McAfee’s integrated security risk management platform.

Highlights
  • Deployed quickly and easily, saving $40,000 in deployment costs
  • Reduced incident response rate by 40% and overall TCO of security risk management
  • Dramatically eased security administration and accelerated patch deployment
  • Reduced remediation time by 70%

City of St. Paul

McAfee bolsters security for the City of St. Paul, Minnesota.

Highlights
  • Hardened network against intrusion
  • Protected 3,300 endpoints against virus and spam attacks
  • Safeguarded the city’s network 100% from attacks via unsecured physical sites
  • Delivered powerful functionality, ease of use, and simplified administration

Purdue University

Purdue University protects 25,000 systems with McAfee.

Highlights
  • Protected student and employee PCs and Macs on and off campus
  • Accelerated .DAT deployment, reporting, and other tasks

Scottrade

Scottrade partners with McAfee to secure customer data.

Highlights
  • Eliminated network vulnerabilities and protected customer information
  • Improved monitoring and control of workstations and servers via a single management console
  • Streamlined and accelerated security management and vulnerability assessment
  • Simplified deployment, patches, and upgrades
  • Helped Scottrade garner multiple awards for customer satisfaction and IT excellence

Highlights

News / Events

Resources

Data Sheets

McAfee Endpoint Protection Suite

For a technical summary on the McAfee product listed above, please view the product data sheet.

Reports

Tolly Test Report – Leveraging Peer Communications to Deliver Rapid Response to Security Threats in Large, Distributed Environments

Tolly evaluated McAfee Real Time Command and verified its capability to rapidly gather endpoint management data and provide a unified management platform for problem mitigation, in a McAfee commissioned test. Tests showed that McAfee Real Time Command can quickly collect data — 95% of 500 stations were collected in as little as 9 seconds — and effectively manage problem mitigation.

Vijfhonderd endpoints in vijf seconden – Tolly Test Report Summary (Dutch)

Tolly Group bevestigt prestaties van McAfeeReal Time Command

Five Hundred Endpoints in Five Seconds – Tolly Test Report Summary

Tolly Group confirms McAfee Real Time Command performance

NSS Labs Corporate AV/EPP Comparative Analysis, Exploit Evasion Defenses

McAfee endpoint protection scored the highest in a test of protection against evasion attacks.

Endpoint Security: Anti-Virus Alone is Not Enough

This report provides supporting data that endpoint security based on antivirus software alone is not enough.

Solution Briefs

McAfee Application Control Extends the Life of Legacy Microsoft Windows XP Systems

McAfee Application Control provides an effective way to block unauthorized applications from running and will continue to support Windows XP systems even after Microsoft’s phase-out of support has taken effect.

A More Rational Approach to Endpoint Security: 5 Reasons to Simplify Your Life (Dutch)

Learn how McAfee's architecture and scalable management through the ePolicy Orchestrator platform leverage your company’s current infrastructure.

White Papers

McAfee Tackles the Complexities of Endpoint Security

This white paper details the components of McAfee Total Protection for Endpoint, a comprehensive and cost-effective anti-malware solution that integrates host intrusion prevention, and policy auditing with the McAfee ePolicy Orchestrator management platform.

Top Five McAfee ePolicy Orchestrator Tips

This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.

Top Five McAfee ePolicy Orchestrator Tips (Dutch)

This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.

Community

Blogs

  • New McAfee Security Suites for SMB
    McAfee Enterprise - October 22, 2014

    Small businesses often lack IT resources, yet are plagued by the same security issues that large corporations face in today’s increasingly complex threat landscape. Threats do not discriminate against company size, and neither should security; all companies deserve access to industry-leading protection. As a part of our mission to make security available to all, we’re […]

    The post New McAfee Security Suites for SMB appeared first on McAfee.

  • How to Protect Your Users against POODLE
    Rees Johnson - October 20, 2014

    POODLE (Padding Oracle On Downgraded Legacy Encryption) is the latest Secure Sockets Layer (SSL) vulnerability to be uncovered. This vulnerability, which was discovered by researchers at Google, affects SSL 3.0, an older protocol which is still supported by browsers and web servers for backward compatibility. The vulnerability can be exploited by a hacker to obtain […]

    The post How to Protect Your Users against POODLE appeared first on McAfee.

  • How Cybersecurity Can Unlock the Potential of E-Voting: A Pivot to the Positive
    Tom Gann - October 17, 2014

    McAfee recently worked with the Atlantic Council to launch a report in Washington, D.C. on how cybersecurity can help enable e-voting. The launch event, which featured a diverse panel of speakers, was illuminating and is continuing to ignite interest from the media. We’re delighted, of course, but not just because of the possibilities for e-voting. Even […]

    The post How Cybersecurity Can Unlock the Potential of E-Voting: A Pivot to the Positive appeared first on McAfee.

  • 5 Things You Won’t Want to Miss at McAfee FOCUS 14
    McAfee Enterprise - October 16, 2014

    Viva Las Vegas! It is once again time for our annual security conference, McAfee FOCUS. In less than two weeks the biggest and brightest minds in security will unite in Las Vegas to discuss everything from web and email protection to the latest in network security. Between the increasing market for connected devices and the […]

    The post 5 Things You Won’t Want to Miss at McAfee FOCUS 14 appeared first on McAfee.

  • Looking Ahead to a More Connected Future
    Pat Calhoun - October 15, 2014

    In my last posting, I celebrated the 25 year history of the firewall and how its technology has evolved from simple packet filtering in the 1980’s, to the first intrusion prevention systems in the 1990’s, to fully application-aware next-generation firewalls in the mid-2000’s.  Now the stage is set for what I believe will be the […]

    The post Looking Ahead to a More Connected Future appeared first on McAfee.

Threats and Risks