Protection against zero-day and advanced persistent threats / Centralized change detection and management
No List Management or Signature Updates
Application security solutions save time and lower costs using a dynamic trust model, local and global reputation intelligence, and real-time behavioral analytics.
Stop Unwanted Applications
Block unauthorized executable files, libraries, drivers, Java apps, ActiveX controls, scripts, and specialty code on servers, corporate desktops, and fixed-function devices.
Protect Fixed-function, Legacy, and New Systems
Safeguard older operating systems, such as Microsoft Windows XP and Server 2003, as well as newer operating systems like Microsoft Windows 10.
Implement Continuous File Integrity Monitoring
Comply with PCI DSS requirements with Change Control File Integrity Monitoring (FIM) software, continuously track changes to file and registry keys, and identify who made changes to specific files.
Block Unwanted Changes in Your Server Environment
Protect critical system files, directories, and configurations from tampering with the included Change Prevention software. No changes to the server environment are permitted except those in accordance with set policies.
Leverage a Small Footprint and Minimal Operational Overhead
Enjoy negligible impact on server performance with low memory usage, no file scanning to affect system performance, and easy setup.
Reduce Risks from Unauthorized Applications and Code
Know the reputation of every file and application in your environment and categorize them as good, bad, and unknown.
Reduce Patch Cycles and Protect Memory
Maintain regular patch cycles and prevent whitelisted applications from memory buffer overflow attacks on Windows 32- and 64-bit systems.
Balance Protection and Performance
Additional detection engines, including signatures, reputation, and real-time emulation, reduce the number of files requiring more resource-intensive malware sandbox analysis.
Allow software execution based on an approved whitelist or authorization by trusted channels with default deny Allow software execution through signature-less reputation verification with detect and deny. Allow the execution of application that are verified by sandbox testing with verify and deny.
Get Instant Alerts to Changes
Protect critical system, configuration, and content files across distributed and remote locations by enabling instant change detection and sophisticated alerting mechanisms.
Minimize Risk and Maximize Compliance on Multiple Fronts
McAfee Application and Change Control work together to help your organization eliminate vulnerabilities and ensure compliance, such as meeting PCI DSS regulation requirements.