McAfee VirusScan Enterprise for SAP

McAfee VirusScan Enterprise for SAP

Proven security for mission-critical SAP environments

Next Steps:

Overview

McAfee VirusScan Enterprise for SAP continuously secures mission-critical SAP NetWeaver environments against potential security threats. It also stops zero-day threats and speeds the time to resolution when vulnerabilities are discovered. And it provides comprehensive management reporting, updates, and auditing capabilities, all in one package. McAfee is an SAP-certified integration partner.

VirusScan Enterprise for SAP offers:

Continuous, comprehensive coverage — Scan, quarantine, and remediate sensitive documents, configuration files, and templates before they reach your SAP environment.

Simplified security management — Manage agents, policies, and reports for your SAP environment and all your McAfee products from the McAfee ePolicy Orchestrator (ePO) platform, the centralized security management console.

Flexible deployment — Use as a standalone server or as a virtual machine.

Proven protection — Count on McAfee’s anti-malware expertise, trusted by more than 50 million enterprise users worldwide, and the 24/7 anti-threat vigilance of McAfee Labs.

Features & Benefits

Secure your mission-critical SAP environment

Block malware, scan external files, quarantine infected files, and stop zero-day threats before they reach your SAP NetWeaver environment.

Save time with automatic updates

Count on automatic, real-time updates from McAfee Labs to ensure the most current protections are always in place.

Save money by leveraging existing investments

Extend your investment in enterprise security management by adding VirusScan Enterprise for SAP to your McAfee ePolicy Orchestrator (ePO) infrastructure. No additional training is required for IT staff who already use the ePO platform.

Save trouble with simplified, centralized management

Use the ePO platform as the hub of your security risk management solutions, so you can reduce the risk of rogue, noncompliant systems; keep protection up to date; configure and enforce protection policies; and monitor security status 24/7 from one centralized, web-based console.

System Requirements

Supported SAP Software

These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.

  • SAP NetWeaver 2004 (SAP_BASIS 640) ABAP Stack Service Pack 11 (SP11) or higher
  • SAP NetWeaver 2004 (SAP_BASIS 640) J2EE Stack SP13 or higher
  • SAP NetWeaver 7.0 SP15 or higher
  • SAP NetWeaver 7.0 / 2004s ABAP (SAP_BASIS 7.00) or later
  • SAP NetWeaver 7.0 / 2004s J2EE (SAP_BASIS 7.00) or later

CPU

  • Intel Pentium 4 processor (recommended) running at 2 GHz

Operating Systems

  • Windows Server 2008 Enterprise x86
  • Windows Server 2008 Enterprise x64
  • Windows Server 2008 x86
  • Windows Server 2008 x64
  • Windows Server 2003 Standard with SP1 or SP2
  • Windows Server 2003 Enterprise with SP1 or SP2
  • Windows Server 2003 Standard x64 with SP1 or SP2
  • Windows Server 2003 Enterprise x64 with SP1 or SP2

Browser

  • Microsoft Internet Explorer 6 or higher

Windows Installer

  • Microsoft Windows Installer (MSI) 2 or higher

Memory

  • 1 GB RAM

Disk Space

  • 100 MB

McAfee Requirements

  • VirusScan 8.7i; see product documentation for installation and configuration requirements
  • ePolicy Orchestrator version 4.0 or higher for management and reporting

Resources

Data Sheets

McAfee VirusScan Enterprise for SAP

For a technical summary on the McAfee product listed above, please view the product data sheet.

Community

Blogs

  • Taking a Close Look at Data-Stealing NionSpy File Infector
    Sanchit Karve - April 14, 2015

    W32/NionSpy is a family of malware that steals information from infected machines and replicates to new machines over networks and removable thumb drives. Aside from stealing keystrokes, passwords, Bitcoins, system information, and files on disk, NionSpy (also known as Mewsei and MewsSpy) can record video (using the webcam), audio (using the microphone), take screenshots, and […]

    The post Taking a Close Look at Data-Stealing NionSpy File Infector appeared first on McAfee.

  • VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials
    Diwakar Dinkar - April 13, 2015

    Since the beginning of the year we have seen a spike in ransomware including the emergence of new ransomware families. One family that has recently resurfaced is Vaultcrypt. This variant both tidies up after itself and steals web page login data. Infection vector The malware arrives on a victim’s machine through a spam email containing […]

    The post VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials appeared first on McAfee.

  • Takedown Stops Polymorphic Botnet
    Raj Samani - April 9, 2015

    Several global law enforcement agencies—with assistance from Intel Security—this week successfully dismantled the “Beebone” botnet behind a polymorphic worm known by Intel Security as W32/Worm-AAEH. The purpose of this worm is to facilitate downloading other malware, including ZBot banking password stealers, Necurs and ZeroAccess rootkits, Cutwail spambots, fake antivirus, and ransomware. The worm spreads quickly […]

    The post Takedown Stops Polymorphic Botnet appeared first on McAfee.

  • Hidden Low Hanging Avaya IP Office Default Credentials
    McAfee Foundstone Professional Services - March 30, 2015

    Written by Piyush Mittal. Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]

    The post Hidden Low Hanging Avaya IP Office Default Credentials appeared first on McAfee.

  • Protect Yourself by Protecting Others
    Carly Listman - January 21, 2015

    How the consumerization of IT is affecting endpoint security What happens in Vegas may stay in Vegas, but what happens on your employees’ personal devices may not stay there. According to a recent survey of consumers around the world, conducted by MSI Research on behalf of Intel Security, almost 80% of respondents use their personal […]

    The post Protect Yourself by Protecting Others appeared first on McAfee.

Threats and Risks