McAfee Host Intrusion Prevention for Desktops safeguards your business against complex security threats that may otherwise be unintentionally introduced or allowed by desktops and laptops. Host Intrusion Prevention for Desktops is easy to deploy, configure, and manage.
Comprehensive security — Three layers of protection (signature analysis, behavioral analysis, and dynamic stateful firewall with global reputation technology) prevent intrusions, protect assets, and defend your company against known and emerging exploits, including zero-day attacks.
Advanced vulnerability shielding — Stronger protection against exploits that target new vulnerabilities means your IT staff has more time for planning, testing, and deploying patches.
Automatic updates — Security content updates are delivered automatically to target specific vulnerabilities and block emerging threats (including buffer-overflow attacks) from executing.
Customized security control — Easily apply different levels of protection based on location (corporate network, VPN, or public network). Host Intrusion Prevention travels with the laptop and can provide varying degrees of protection, depending on whether you are in the office, at home, or on the road.
Enhanced security powered by McAfee Global Threat Intelligence — McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Host Intrusion Prevention for Desktop uses the McAfee GTI network connection reputation service to identify suspicious domains/IP addresses that are infected or hosting malware attacks, and block those attacks.
Prevent intrusions, protect assets, and enforce intrusion prevention system (IPS) and zero-day threat protection coverage at all levels: network, endpoint, and application. Integrated reputation-based global intelligence in the desktop firewall (Microsoft Windows only) blocks threats such as botnets and denial of service before attacks can occur.
Trust McAfee behavioral protection to secure endpoints against unknown attacks. Our signature protection identifies and blocks known attacks while a stateful firewall applies policies, bars unsolicited inbound traffic, and controls outbound traffic.
Protect and manage all desktops across your entire enterprise with the McAfee ePolicy Orchestrator (ePO) console, the scalable, centralized platform for easy deployment, management, reporting, and auditing.
Apply different levels of security using rules based on the endpoint’s connection — on the corporate network, over VPN, or from a public network — with connection-aware protection.
Count on automatic security content updates targeting specific vulnerabilities to recognize unknown exploits and stop them from executing. Security content updates do not require system reboots, and updating signatures is similar to updating .DAT files.
Reduce patching frequency and deploy patches on a priority basis for the most effective and efficient use of IT resources.
Use McAfee’s easy-to-understand actionable views, workflow, event monitoring, and reporting to quickly remediate threats and maintain compliance.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
Riverside Healthcare protects more than 1,950 endpoints including mobile devices with McAfee software.
Scottrade partners with McAfee to secure customer data.
A leading telecommunications group in the Nordic and Baltic regions strengthens anti-virus security with McAfee.
Topics : Endpoint Protection
Topics : Endpoint Protection, Security-as-a-Service (SaaS)
For a technical summary on the McAfee product listed above, please view the product data sheet.