McAfee VirusScan for Mac provides complete, proactive malware protection for Mac systems and users. Using proven protection methods, it stops all types of viruses and malicious code, including spyware, adware, Trojans, and new, unknown threats.
VirusScan for Mac delivers:
Centralized, simplified security management — With the McAfee ePolicy Orchestrator (ePO) platform, you can efficiently deploy and manage your Mac, Windows, and Linux clients on your network, giving you better security visibility across your entire infrastructure. Control policy configuration, deployment, and reporting for all your endpoints from the ePO platform’s single, web-based console.
Proactive threat protection — Uses heuristic analysis, generic protection, and on-access scanning to detect and remove viruses, worms, Trojans, spyware, adware, and other unwanted threats before they infect your system. VirusScan for Mac guards against Mac, PC, and Unix-based viruses.
Continuous and on-demand virus scanning — Automatically scans for threats each time a file is accessed. Also scans on demand with file drag and drop.
Seamless security updating — Automatically pulls the latest malware updates from McAfee Labs, our worldwide, 24/7 security research team.
Stop every type of virus, spyware, adware, and other malicious code that targets Mac OS X or Microsoft Windows. McAfee VirusScan for Mac can even detect compressed malware files and previously unknown viruses.
Allow end users to operate Macs in your environment and ensure their data is protected.
Get continuous policy enforcement for multiple files, directories, and volumes, including volumes on remote Macs connected through your network.
Deploy and monitor VirusScan for Mac using the familiar Mac OS X Aqua user interface. Alternatively, use the McAfee ePolicy Orchestrator (ePO) platform for easy deployment, enforcement, management, and reporting — all from a single console.
Check files only when they are accessed to determine whether they’re infected with malware. Initiate on-demand scanning using file drag and drop, and schedule full-disk scans to run at convenient intervals, such as overnight or during off-peak hours.
Scan Apple Mail messages and attachments for threats, and protect users when they save or open files from shared network drives.
Count on streaming updates from McAfee Labs — our worldwide, 24/7 security research team — to ensure full compliance and up-to-the-minute protection against viruses, worms, and other threats.
These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
Citrix reduces risk with McAfee’s integrated security risk management platform.
Purdue University protects 25,000 systems with McAfee.
For a technical summary on the McAfee product listed above, please view the product data sheet.
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at the kernel level to bypass Microsoft’s security for 64-bit Windows systems. Today a small utility program named KPP-Destroyer can be found online. Previous versions of KPP-Destroyer had some bugs on a Windows 8.1 computer, but […]
Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often than random phishing attempts. Exploits that use patched vulnerabilities delivered via spear phishing email are one of the most successful combinations used by attackers to infiltrate targeted organizations and gain access to confidential information. During […]
The post Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities appeared first on McAfee.
The Dofoil downloader (found in the wild since 2011) occasionally updates itself with new features and encryption techniques to hide communications with its control servers. The latest iteration uses a variation of XOR and RC4 algorithms similar to previous variants to encrypt the list of control servers within the binary and encrypt all traffic with […]
The post Dofoil Downloader Update Adds XOR-, RC4-Based Encryption appeared first on McAfee.
McAfee product coverage and mitigations for malware or indicators associated with the recent attacks (a.k.a. Dragonfly, Energetic Bear, Havex/SYSMain) on industrial control systems (ICS’s) are listed below. The Havex remote access tool is common across these associated attacks or campaigns–including Dragonfly. We have seen Havex in ICS-specific targeted campaigns. It can detect and affect ICS- […]
The post Product Coverage and Mitigation for ICSA-14-178-01 (Havex/ICS-Focused Malware) appeared first on McAfee.
Every organization has deployed anti-virus/anti-malware solutions, but how much you have actually reduced your risk? To recap what we’ve covered in this 5-part blog series, Aberdeen’s analysis and Monte Carlo modeling: Confirms the high risk of unprotected endpoints Demonstrates that endpoint protection really does reduce risk Confirms that “free” endpoint protection (e.g., Microsoft) is better […]
The post Endpoint Security, Part 5 of 5: A/V Alone is Not Enough appeared first on McAfee.