Endpoint Security

Get up to date on the latest endpoint solutions and learn how to secure your entire attack surface from enterprise security threats.

Enterprise Endpoint Security

EDR – Not just for Large Enterprises?

When you think of Endpoint Detection and Response (EDR) tools, do you envision a CSI-style crime lab with dozens of monitors and people with eagle eye views of what their users and defenses are doing? For many, the idea of EDR seems like something for “the big players” with teams ...

Enterprise Endpoint Security

McAfee Endpoint Security – Why You Don’t Have to Take Our Word for It.

It’s an unfortunate fact that evaluating security vendors today can often mean sifting through a sea of marketing hype to understand which products should be added to your short-list. Exclusive claims about what makes one product different from another may be vague, hard to find or even harder to believe. ...

Endpoint Security

McAfee Endpoint Security Earns Top Product Award

The AV-TEST Institute, a leading international and independent service provider in the fields of IT security and anti-virus research,  has given McAfee Endpoint Security (ENS) a Top Product Award in their latest corporate Windows7 test. AV-Test evaluated the most recent version 10.5.3 of McAfee Endpoint Security and gave it a ...

Enterprise Endpoint Security

Generating Compliance History Reports

When you’re managing a large environment with thousands of endpoints, assuring consistency can be a huge challenge. Imagine that you want every endpoint to be upgraded to a specific software version, for example. In many cases, you’re forced to rely on manual tracking, where errors and omissions are commonplace. And, ...

Enterprise Endpoint Security

Optimize Software Deployments with McAfee ePolicy Orchestrator

Few engineers will tell you that software updates are their favorite part of the job, but they’re a critically important part of endpoint security. Unfortunately, they do sometimes come with hassles—in particular, dealing with traffic surges over the WAN whenever many endpoints need to download large software packages at the ...

Enterprise Endpoint Security

When it Comes to Malware, Actions Can Speak Louder than Words

This blog post was written by Raja Patel. At some point as a child, a parent likely told you, “actions speak louder than words.” It’s a good life lesson—and it can hold just as true when fighting malware. Cybercriminals have become extremely skilled at disguising the true nature of malware ...

Enterprise Endpoint Security

Use Tags to Simplify Endpoint Security Management

One thing that sets McAfee apart in endpoint security management is the ability to manage multiple security technologies for hundreds of thousands of endpoints through a single interface: McAfee ePolicy Orchestrator (ePO). But while our customers appreciate ePO, it’s even more powerful than some realize. In my next few blogs, ...

Enterprise Endpoint Security

The Clock Is Ticking: Can You Find and Kill Advanced Malware Before it Kills Your Endpoints?

Your company’s computer system has been compromised by disguised malware. There is no greater feeling of dread for a security professional. This may put your mind at ease: Through automation, McAfee’s endpoint and sandbox tools can round up the malware, detonate it in a safe place, identify any compromised areas, ...

Endpoint Security

Migrate to the New McAfee Endpoint Security (ENS)

The traditional IT model of waiting for early adopters to work through any bugs before you install new software makes sense in many cases. In cybersecurity, however, each day’s delay extends the window of opportunity for zero-day malware to wreak havoc on your endpoints. During the recent Wannacry ransomware attack, ...

Endpoint Security

The EDR Balancing Act: Impact vs. Ability to Execute

A new breed of advanced malware has its sights on your business. It’s been cleverly crafted to evade standard defenses, burrow into your endpoints, and hide undetected, indefinitely, waiting to spread to other systems. Unfortunately, this is now day-to-day reality for most organizations. The question is what to do about ...

Subscribe to McAfee Securing Tomorrow Blogs