McAfee VirusScan Enterprise for Storage ensures business continuity by protecting network-attached storage devices against viruses and other malware. This high-performance scanning solution deploys on one or more Windows servers in affordable multifiler or high-availability multiscanner configurations to deliver the power of parallel processing for optimal load balancing and flexible failover protection.
Advanced antivirus technology — Continuously blocks a wide range of viruses and malicious code threats, including those hidden in compressed files. Advanced heuristics and generic detection find even new, unknown viruses.
Detect unwanted programs — Find hidden spyware programs that track Internet use, access personal data, and open security holes.
Reduce administration time — Centrally manage your entire security system with the McAfee ePolicy Orchestrator (McAfee ePO) platform. It delivers complete management from a single console.
Receive rapid notification — Stay informed whenever a virus is detected via email, pager, SNMP, SMS, or Tivoli.
Multi-vendor NAS protection — Simplify your environment and reduce support costs with an award-winning solution that secures multiple storage systems vendors, devices, and operating systems.
Defend against a wide range of malware and other threats, including new, unknown viruses.
Use unique on-access scanning technology to protect NetApp filers while files are being accessed, copied, or written to the server.
Keep users and filers safe from hidden programs that open security holes and access personal information.
Deploy multiscanner to multifiler configurations that increase your load-balancing capacity and failover security.
Control and manage your entire security system with the McAfee ePolicy Orchestrator (McAfee ePO) platform. It delivers complete management, including detailed graphical reporting, from a single console.
Protect data from malware before signatures are developed with included McAfee Global Threat Intelligence (GTI) integration.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
McAfee offers cost-effective solutions for securing your data, files, and peace of mind, no matter how large or how diverse your storage environment.
The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover remote access plus botnet plus stealth functions are available just about anywhere. Ransomware, though very prevalent, has not yet appeared in force in easy-to-deploy kits. But now we have Tox–and it’s free. […]
In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]
Written by Deepak Choudhary There are always risks involved when relying on a third party to send and receive sensitive data over secure network channels. While we recognize the roles of the Public Key Infrastructure (PKI) and third party certificate authority (CA), we also believe that Certificate SSL Pinning can play a key role in […]
In a blog last week, I discussed CryptoLocker, a particularly nefarious family of ransomware, and how to defend against it. I thought it would be worthwhile to demonstrate how McAfee Threat Intelligence Exchange can detect and stop malware like ransomware, even if the suspicious file has not been flagged as malware by antivirus signatures. Click […]
The post Defending Against Ransomware with McAfee Threat Intelligence Exchange appeared first on McAfee.
In the McAfee Labs Threats Report: November 2014, Intel Security predicted nine major threats that would occur in 2015. Regarding ransomware, we said this: “Ransomware will evolve its methods of propagation, encryption, and the targets it seeks.” Almost immediately, we began to see a huge rise in ransomware, especially with the family CTB-Locker, followed by […]