McAfee VirusScan Enterprise combines anti-virus, anti-spyware, firewall, and intrusion prevention technologies to stop and remove malicious software. It also extends coverage to new security risks and reduces the cost of responding to outbreaks with the industry’s lowest impact on system performance.
With VirusScan Enterprise, you get:
Maximum defense against malware — Safeguards your systems and files from viruses, spyware, worms, Trojans, and other security risks. It detects and cleans malware, and allows you to easily configure policies to manage quarantined items.
Proactive protection from attacks — Real-time scanning ensures all your systems, including remote locations, are protected from current and emerging threats. VirusScan Enterprise also guards against buffer-overflow exploits that target vulnerabilities in Microsoft applications.
Easy, centralized management — The McAfee ePolicy Orchestrator (ePO) platform is the centralized management console for deploying policies, managing security alerts, and viewing automated reports.
Enhanced security powered by McAfee Global Threat Intelligence — McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. VirusScan Enterprise uses the McAfee GTI file reputation service to identify suspicious files before they are necessarily identified as carrying malicious payloads.
Defend your systems against viruses, worms, spyware, bots, Trojans, buffer overflows, and blended attacks. Block a broad range of viruses and malicious code — even those hidden in compressed files — with combined anti-virus, firewall, and intrusion prevention technology. McAfee’s industry-leading security also safeguards against spam, phishing attacks, malicious websites, and other threats that often evade standard anti-virus and URL filtering systems.
Close the protection gap with McAfee Global Threat Intelligence (GTI). GTI offers comprehensive, real-time protection against both known and emerging threats across all key threat vectors — file, web, email, and network. A cloud-based service using reputation-based threat protection in addition to other techniques, McAfee GTI correlates real-world data collected from millions of sensors globally and delivers intelligence via a complete suite of McAfee security products.
Detect and clean viruses in Microsoft Outlook and Lotus Notes, including HTML text and attachments.
Don’t let your anti-malware software slow down end users. VirusScan Enterprise scans faster, uses less memory, requires fewer CPU cycles, and protects users better than any other anti-malware product on the market.
Limit the risk and impact of an outbreak if one occurs. Close ports, monitor applications and email engines, and block files and directories, even before .DAT files are issued.
Defend your desktops, laptops, and file servers against disruptions. Malware and hackers cannot disable McAfee VirusScan Enterprise.
Guard against buffer-overflow exploits that aim at vulnerabilities in Microsoft Windows operating system services, Microsoft Word, Microsoft Excel, Microsoft Internet Explorer, Microsoft Outlook, and Microsoft SQL Server. It also protects IIS services, WinZip, and Microsoft PowerPoint, Microsoft Office Access, Microsoft Office Visio, Microsoft Windows Media Player, and Microsoft Messenger.
Control and manage VirusScan Enterprise from one central McAfee ePolicy Orchestrator (ePO) console, and get detailed enterprise-level reporting quickly and easily.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment. 64-bit operating system support is available for some technologies.
For guidance on how to use this McAfee product, watch the Quick Tips video listed above.
Blackburn with Darwen Council, a borough in the county of Lancashire, England, uses McAfee endpoint security, email management, and SIEM solutions to build an integrated, centrally managed security architecture.
This small business centralizes antivirus security management with McAfee ePolicy Orchestrator, saving time for the company's security administrator.
Chicago protects its critical infrastructure with an integrated solution from McAfee, combining SIEM, endpoint, and network security.
Cognizant centralizes its security environment with a single-vendor solution from McAfee that unifies endpoint security and provides better security visibility across the organization.
This Mexican government agency protects endpoints and secures critical data with a range of McAfee solutions.
Kleberg Bank relies on Intel Security for comprehensive protection, time savings, and to support compliance.
This global membership-style retailer secures virtual business infrastructure from sophisticated threats with McAfee MOVE AntiVirus.
State Government Places its Trust in Intel Security for IT Consolidation Within this US state government, the Office of Technology is the central IT organization, serving almost 400 executive, judicial, and legislative agencies, which, in turn, administer programs for 4.4 million citizens. The Office of Technology oversees a network linking 1,500 locations and 35,000 users across the state.
Sicredi, one of Brazil’s largest credit union systems, consolidated their comprehensive security environment with Intel Security.
Malware Threat Detection Effectiveness
See our latest malware detection results from third-party testing lab AV-Test.
Topics : Endpoint Protection, McAfee Labs
Topics : Endpoint Protection
Topics : Endpoint Protection
For a technical summary on the McAfee product listed above, please view the product data sheet.
This post was written with the invaluable assistance of my colleague Rakesh Sharma. Over the past couple of months McAfee Labs has seen an increase in the usage of macros to deliver malware. This kind of malware, as mentioned in previous posts (Dridex, Bartallex), usually arrives as an attached document within a phishing email. Recently […]
Intel Security today released the McAfee Labs Threats Report: May 2015. Along with the usual compilation of threats statistics, it focuses on three key topics: A surge in powerful and clever ransomware that encrypts files and holds them hostage until the ransom is paid. New Adobe Flash exploits target the growing number of vulnerabilities that […]
The post McAfee Labs Threats Report Highlights Surge in Ransomware, Flash Exploits, Firmware Attacks appeared first on McAfee.
Take the time to detect the attack, isolate the infected machines, and restore them to a known state. Are you one of the lucky 12%? That is how few companies we surveyed did not experience a successful targeted cyberattack in 2014. If you are one of the few, and think your luck is going to […]
The post What Are You Doing During The Golden Hour After An Attack? appeared first on McAfee.
The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover remote access plus botnet plus stealth functions are available just about anywhere. Ransomware, though very prevalent, has not yet appeared in force in easy-to-deploy kits. But now we have Tox–and it’s free. […]
In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]