McAfee VirusScan Enterprise combines anti-virus, anti-spyware, firewall, and intrusion prevention technologies to stop and remove malicious software. It also extends coverage to new security risks and reduces the cost of responding to outbreaks with the industry’s lowest impact on system performance.
With VirusScan Enterprise, you get:
Maximum defense against malware — Safeguards your systems and files from viruses, spyware, worms, Trojans, and other security risks. It detects and cleans malware, and allows you to easily configure policies to manage quarantined items.
Proactive protection from attacks — Real-time scanning ensures all your systems, including remote locations, are protected from current and emerging threats. VirusScan Enterprise also guards against buffer-overflow exploits that target vulnerabilities in Microsoft applications.
Easy, centralized management — The McAfee ePolicy Orchestrator (ePO) platform is the centralized management console for deploying policies, managing security alerts, and viewing automated reports.
Enhanced security powered by McAfee Global Threat Intelligence — McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. VirusScan Enterprise uses the McAfee GTI file reputation service to identify suspicious files before they are necessarily identified as carrying malicious payloads.
Defend your systems against viruses, worms, spyware, bots, Trojans, buffer overflows, and blended attacks. Block a broad range of viruses and malicious code — even those hidden in compressed files — with combined anti-virus, firewall, and intrusion prevention technology. McAfee’s industry-leading security also safeguards against spam, phishing attacks, malicious websites, and other threats that often evade standard anti-virus and URL filtering systems.
Close the protection gap with McAfee Global Threat Intelligence (GTI). GTI offers comprehensive, real-time protection against both known and emerging threats across all key threat vectors — file, web, email, and network. A cloud-based service using reputation-based threat protection in addition to other techniques, McAfee GTI correlates real-world data collected from millions of sensors globally and delivers intelligence via a complete suite of McAfee security products.
Detect and clean viruses in Microsoft Outlook and Lotus Notes, including HTML text and attachments.
Don’t let your anti-malware software slow down end users. VirusScan Enterprise scans faster, uses less memory, requires fewer CPU cycles, and protects users better than any other anti-malware product on the market.
Limit the risk and impact of an outbreak if one occurs. Close ports, monitor applications and email engines, and block files and directories, even before .DAT files are issued.
Defend your desktops, laptops, and file servers against disruptions. Malware and hackers cannot disable McAfee VirusScan Enterprise.
Guard against buffer-overflow exploits that aim at vulnerabilities in Microsoft Windows operating system services, Microsoft Word, Microsoft Excel, Microsoft Internet Explorer, Microsoft Outlook, and Microsoft SQL Server. It also protects IIS services, WinZip, and Microsoft PowerPoint, Microsoft Office Access, Microsoft Office Visio, Microsoft Windows Media Player, and Microsoft Messenger.
Control and manage VirusScan Enterprise from one central McAfee ePolicy Orchestrator (ePO) console, and get detailed enterprise-level reporting quickly and easily.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment. 64-bit operating system support is available for some technologies.
For guidance on how to use this McAfee product, watch the Quick Tips video listed above.
Brelje & Race Makes a Wise Investment
CEMEX is a global building materials company that produces, distributes, and sells cement, concrete, aggregates, and related building materials and services to customers and communities throughout the Americas, Europe, Africa, Asia, and the Middle East. Based in Monterrey, Mexico, CEMEX employs more than 43,000, with operations in 50 countries spanning four continents. The company is also the world’s leading supplier of ready-mix concrete.
CSS Corp has deployed McAfee Network Security Platform sensors protecting network traffic at its gateways globally.
CSTISA uses McAfee ePolicy Orchestrator (ePO) software as a primary sales tool to sell McAfee Endpoint Protection solutions.
Cancer research group stays on task with McAfee.
McAfee solutions offer integrated protection from distributed denial-of service (DDoS) threats at the Macquarie Telecom perimeter.
McAfee simplifies security management for French city’s local government.
The healthcare system uses McAfee solutions to gain compliance with HIPAA, PCI, DSS, and FTC regulations.
Manpower saves time and improves user service with McAfee.
Manteca Unified School District protects students with McAfee solutions.
McAfee Firewall Enterprise, McAfee Web Gateway, and McAfee Email Gateway provide the foundation for MidWestOne’s Internet security strategy.
Riverside Healthcare protects more than 1,950 endpoints including mobile devices with McAfee software.
Scottrade partners with McAfee to secure customer data.
Smith College strengthens Internet and email security with McAfee.
A leading telecommunications group in the Nordic and Baltic regions strengthens anti-virus security with McAfee.
McAfee Solves Rampant Spyware Problem for Temecula Schools.
McAfee ePolicy Orchestrator (ePO) 4.0 minimizes time spent on threat protection at the University of Utah Health Sciences Center.
WNS deployed McAfee Endpoint Encryption on all of its 1,500 laptops worldwide and McAfee Vulnerability Manager at each of its service sites.
McAfee protects Wyeth’s global IT environment from pervasive threats.
Malware Threat Detection Effectiveness
See our latest malware detection results from third-party testing lab AV-Test.
Topics : Endpoint Protection
Topics : Endpoint Protection
Topics : Endpoint Protection
Topics : Endpoint Protection, Security-as-a-Service (SaaS)
For a technical summary on the McAfee product listed above, please view the product data sheet.
This paper discusses how rogue programs work and recommends three best practices to keep these unwanted programs out of your networks.
As the largest dedicated security vendor, McAfee’s goal is to help customers and consumers feel secure in the digital world. It’s certainly not simple, and it’s challenging to keep up with the bad guys. One way to do that is to match our adversaries’ aggressive drive to innovate with our own deeper commitment to collaborate […]
The post McAfee Founds Cyber Threat Alliance With Industry Partners appeared first on McAfee.
Although VMworld wrapped a few weeks ago, we’re still spinning over the excitement and buzz that was generated around the event. VMworld 2014 was a special benchmark for both McAfee and Intel, as we presented the first Intel Security product (the Intel Security Controller), and also showcased Intel Security’s capabilities with a united booth presence […]
The post Comprehensive Server Security: The Star of VMworld 2014 appeared first on McAfee.
I’m delighted to announce that McAfee is working with Amazon Web Services (AWS) to offer our Host-Based Security Solution (HBSS) to AWS Cloud customers. As HBSS is so critical to DoD’s security posture, it’s the first of several Software as a Service (SaaS) offerings we’ll do with AWS. Military and civilian government agencies are increasingly […]
The post McAfee offers government security for Amazon cloud customers appeared first on McAfee.
I recently wrote a piece in Dark Reading around the notion that Endpoint security is not dead, but instead facing a steadily mounting series of obstacles with relation to the new universe of Internet-connected devices. While there are certainly more challenges to securing corporate networks today, claiming that enforcing Endpoint security policies is basically fighting […]
The post Endpoint Security and the Reality of Ubiquitous Computing appeared first on McAfee.
In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made this critical point: Stopping attacks before they breach and narrowing the breach discovery gap require the ability to detect threats at […]