McAfee Management for Optimized Virtual Environments (MOVE) AntiVirus for virtual desktops and servers is uniquely designed to relieve the overhead of traditional endpoint security, yet provide the protection and performance essential for success.
Traditional antivirus software does not integrate well with virtualized infrastructure. McAfee MOVE AntiVirus brings optimized, advanced malware protection to your virtualized desktops and servers, including your virtual environment in the cloud. Choose one efficient solution across multiple vendor platforms or an agentless, tuned option for VMware vShield. Either way, you get both flexible, top-rated security and high performance. For proactive protection, we integrate real-time threat intelligence and unify security management across physical and virtual infrastructure.
MOVE AntiVirus addresses these challenges by:
Optimizing security for virtualized environments — By optimizing and offloading McAfee VirusScan Enterprise’s processing features, MOVE AntiVirus enables you to obtain higher operational returns, and minimizes the performance impact on virtual servers with enhanced scan avoidance and scanning based on overall load of the hypervisor.
Standardizing security across all major hypervisors — Whether you are starting to deploy virtual machines or well on your way with cloud computing, MOVE AntiVirus offers the flexibility of consistent security across all major hypervisors.
Ensuring the best security management and delivery for virtualized environments — Utilize and optimize your current McAfee VirusScan Enterprise protection in virtualized environments including your virtual machines in the cloud, providing security management and effectiveness with the McAfee ePolicy Orchestrator (McAfee ePO) console. Ensure that security policies remain intact, even as virtual machines migrate within the virtualized environment.
Get instant protection with low impact on memory and processing.
Benefit from options that include on-access, scheduled, and selective scans.
Gain support for all major hypervisors.
Optimize your time with a dedicated, hardened virtual appliance.
Leverage real-time file analysis through McAfee Global Threat Intelligence.
Achieve desktop firewall, memory, and web application protection (included).
Realize at-a-glance visibility, control, and reporting across your endpoints, including your virtual machines in the cloud.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
Supported Client Virtual Machine Operating Systems
Supported Virtualization Technologies
Supported Virtualization Infrastructure
Virtual Machine Hosting the Security Virtual Appliance
Supported Virtualized Environments
Virtual Desktop Infrastructure
Virtual Application Management
Supported Virtual Machine Operating Systems
MOVE AntiVirus Agent OS support
Freehills uses McAfee Management for Optimized Virtual Environments (MOVE) AntiVirus to provide agile, service-oriented security, optimized specifically for virtualized environments.
Topics : Endpoint Protection, Security Management
Topics : Endpoint Protection, Security-as-a-Service (SaaS)
Topics : Risk & Compliance
For a technical summary on the McAfee product listed above, please view the product data sheet.
Traditional technologies for securing the evolving enterprise data center are being adapted by leading solution providers to work across a broad range of datacenter deployment scenarios. Enterprise buyers should look for solution providers that have explicitly adapted their solutions to work together in a layered, defense-in-depth approach for data center security.
McAfee Data Center Server Security Suites deliver the industry’s first comprehensive solution for securing mission-critical services in today’s mixed physical and virtual environments.
Learn how to implement security at outset of a data center build-out, upgrade, or consolidation for maximum flexibility and advanced threat reduction.
McAfee Management for Optimized Virtual Environments AntiVirus (McAfee MOVE AntiVirus) tailors security systems to the special technical and management requirements of virtualization.
Learn how McAfee and Citrix are collaborating to deliver a suite of products, tools, and technologies to unlock the power of desktop virtualization for all enterprises.
Learn how the McAfee and Citrix partnership enables Citrix XenDesktop customers to extend management of desktop security to virtual environments using the McAfee ePolicy Orchestrator software.
McAfee and Citrix formed their strategic partnership to make virtual desktop security simpler and more scalable for large enterprise deployments.
Anyone with the responsibilities around server, infrastructure or computing knows to request, demand and expect 99.999% availability or refer to it as five 9s. So why isn’t there a default expectation to server security whether it’s sitting in a data closet, delivered as IaaS or in the near future instrumented as an element as part […]
The post 99.999% and 5 Essential Elements for Server Security appeared first on McAfee.
This summer, the Federal Data Center Consolidation Initiative (FDCCI) ran into a problem with the Government Accountability Office. The FDCCI’s mission is to consolidate the number of governmental data centers to reduce infrastructure and operational costs, as well as to reduce the overall real estate and energy footprint caused by an excess of these facilities. […]
The post Data Center Security Management—Three Simple Ways to Improve Security appeared first on McAfee.
“On the Internet, nobody knows you’re a dog”. More appropriately: “On the internet, nothing knows you’re a dog”. An emerging risk in the Internet of Things (IoT) is associated with the quality of data related to “things”. The risk is not that the data on or in the thing is corrupted itself. The risk it […]
The term “zero-day threat” may sound like the title of a hit film, but it’s definitely not that kind of thriller. A zero-day threat or attack is an unknown vulnerability in your computer or mobile device’s software or hardware. The term is derived from the age of the exploit, which takes place before or on […]
Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware and tools development. AutoIt allows both easy interface creation for rapid development and full Windows API access for whatever is not directly supported. We have seen an increase in the use of AutoIt scripts by […]
The post Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code appeared first on McAfee.