Protection against zero-day and advanced persistent threats / Centralized change detection and management

No List Management or Signature Updates

Application security solutions save time and lower costs using a dynamic trust model, local and global reputation intelligence, and real-time behavioral analytics.

Stop Unwanted Applications

Block unauthorized executable files, libraries, drivers, Java apps, ActiveX controls, scripts, and specialty code on servers, corporate desktops, and fixed-function devices.

Protect Fixed-function, Legacy, and New Systems

Safeguard older operating systems, such as Microsoft Windows XP and Server 2003, as well as newer operating systems like Microsoft Windows 10.

Implement Continuous File Integrity Monitoring

Comply with PCI DSS requirements with Change Control File Integrity Monitoring (FIM) software, continuously track changes to file and registry keys, and identify who made changes to specific files.

Block Unwanted Changes in Your Server Environment

Protect critical system files, directories, and configurations from tampering with the included Change Prevention software. No changes to the server environment are permitted except those in accordance with set policies.

Leverage a Small Footprint and Minimal Operational Overhead

Enjoy negligible impact on server performance with low memory usage, no file scanning to affect system performance, and easy setup.

Reduce Risks from Unauthorized Applications and Code

Know the reputation of every file and application in your environment and categorize them as good, bad, and unknown.

Reduce Patch Cycles and Protect Memory

Maintain regular patch cycles and prevent whitelisted applications from memory buffer overflow attacks on Windows 32- and 64-bit systems.

Balance Protection and Performance

Additional detection engines, including signatures, reputation, and real-time emulation, reduce the number of files requiring more resource-intensive malware sandbox analysis.

Product features

Multi-layered Whitelisting

Allow software execution based on an approved whitelist or authorization by trusted channels with default deny Allow software execution through signature-less reputation verification with detect and deny. Allow the execution of application that are verified by sandbox testing with verify and deny.

Get Instant Alerts to Changes

Protect critical system, configuration, and content files across distributed and remote locations by enabling instant change detection and sophisticated alerting mechanisms.

Minimize Risk and Maximize Compliance on Multiple Fronts

McAfee Application and Change Control work together to help your organization eliminate vulnerabilities and ensure compliance, such as meeting PCI DSS regulation requirements.

Data Sheet


Free Trial


More Information

Contact Us