Endpoint Security

Endpoint Security 301: When Products, Policies, and People Break Down the Lines of Communication

Security architecture is like the ocean: no one owns it, and it is constantly affected by change. New technologies are introduced, staff changes occur, and as a result, communication suffers. I often see environments where ownership is placed into silos across teams in the enterprise, meaning IT administrators preventing threats ...

Endpoint Security

Response Required: Why Identifying Threats With Your EDR Isn’t Enough

The perpetrator was a master of disguise, outfitting himself as an employee to bypass the extensive preventive security controls and flee with the contents of the vault. Fortunately, the building was equipped with strong detection security measures, and the burglar—unaware of the location of a laser tripwire—soon set off a ...

Endpoint Security

It’s Quiz Time! How Well Do You Know Endpoint Security Best Practices?

How confident are you that you have the best security practices in place across your organization? Like most, you probably have your concerns.  Ever wonder what keeps your peers up at night and how your security practices compare to others? We recently sponsored a SANS survey on endpoint protection and response ...

Enterprise Endpoint Security

How the Rubber Meets the Road in Human-Machine Teaming

Everywhere you turn today, machine learning and artificial intelligence are being hyped as both a menace to and the savior of the human race. This is perhaps especially true in cybersecurity. What these alluring terms usually mean is simply related to detailed statistical comparisons derived from massive data collections. Let’s ...

Enterprise Endpoint Security

EDR – Not just for Large Enterprises?

When you think of Endpoint Detection and Response (EDR) tools, do you envision a CSI-style crime lab with dozens of monitors and people with eagle eye views of what their users and defenses are doing? For many, the idea of EDR seems like something for “the big players” with teams ...

Endpoint Security

McAfee Endpoint Security Earns Top Product Award

The AV-TEST Institute, a leading international and independent service provider in the fields of IT security and anti-virus research,  has given McAfee Endpoint Security (ENS) a Top Product Award in their latest corporate Windows7 test. AV-Test evaluated the most recent version 10.5.3 of McAfee Endpoint Security and gave it a ...

Enterprise Endpoint Security

Generating Compliance History Reports

When you’re managing a large environment with thousands of endpoints, assuring consistency can be a huge challenge. Imagine that you want every endpoint to be upgraded to a specific software version, for example. In many cases, you’re forced to rely on manual tracking, where errors and omissions are commonplace. And, ...

Enterprise Endpoint Security

When it Comes to Malware, Actions Can Speak Louder than Words

This blog post was written by Raja Patel. At some point as a child, a parent likely told you, “actions speak louder than words.” It’s a good life lesson—and it can hold just as true when fighting malware. Cybercriminals have become extremely skilled at disguising the true nature of malware ...

Enterprise Endpoint Security

Use Tags to Simplify Endpoint Security Management

One thing that sets McAfee apart in endpoint security management is the ability to manage multiple security technologies for hundreds of thousands of endpoints through a single interface: McAfee ePolicy Orchestrator (ePO). But while our customers appreciate ePO, it’s even more powerful than some realize. In my next few blogs, ...

Enterprise Endpoint Security

The Clock Is Ticking: Can You Find and Kill Advanced Malware Before it Kills Your Endpoints?

Your company’s computer system has been compromised by disguised malware. There is no greater feeling of dread for a security professional. This may put your mind at ease: Through automation, McAfee’s endpoint and sandbox tools can round up the malware, detonate it in a safe place, identify any compromised areas, ...

Subscribe to McAfee Securing Tomorrow Blogs