McAfee Embedded Control

Modern defense for the devices you rely on

Free Trial

Block unauthorized applications and changes on fixed-function and IoT devices

Non-traditional endpoints—from wearable fitness trackers to energy grid sensors—are expanding the attack surface. With the number of connected IoT devices expected to hit 28 billion by 2020, security is critical. McAfee Embedded Control provides whitelisting and file integrity monitoring technology to combat targeted malware, unauthorized software changes, and configuration alterations across commercial and industrial IoT devices.

Secure fixed-function, legacy systems, and new connected devices

Get proven protection for point-of-service terminals, ATMs, medical imaging systems, gaming devices, fitness trackers, industrial control systems, office equipment, and military and aerospace devices.

Prevent unauthorized software changes

Stop unapproved changes to embedded devices and equipment that can lead to costly system shutdowns, data loss, unanticipated loss of device control, and regulatory fines.

Design security into the newest IoT devices

McAfee Embedded Control gives you a path to developing secure, connected devices. Built-in application whitelisting increases protection against malicious zero-day attacks.

Keep systems running

A low-overhead footprint does not impact system performance and is equally effective in standalone mode, without network access.


A 2018 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms*

Learn More

System integrity, change control, and policy compliance

Lower support and field maintenance costs

Prevent unauthorized changes to devices that cost time and resources. Whitelisting and change control technologies ensure expensive, unauthorized changes never occur in the first place.

Reduce frequent, costly OS patching

Lock down the runtime environment and protect against newly discovered security vulnerabilities to ensure devices are safe and secure from the most recent exploits.

Meet compliance requirements

Continuous change detection prevents unauthorized, out-of-policy changes and supports compliance standards, including PCI, SOX, and healthcare and energy industry requirements.


Enhancing Embedded Device Control

Learn how McAfee Embedded Control improves embedded device integrity, maximizes uptime, and reduces support costs.

System requirements

These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.

Platinum Support

  • Windows 8 and 8.1 (32-bit and 64-bit)
  • Windows 7 (32-bit and 64-bit)
  • Windows 7 Embedded (32-bit and 64-bit)
  • Windows Vista
  • Windows XPE
  • Windows XP (32-bit and 64-bit)
  • Windows 2008
  • Windows 2008 R2
  • Windows 2003
  • Windows 2003 R2
  • Windows 2000
  • Windows NT


  • WEPOS, POSReady 2009
  • WES 2009
  • RHEL 7 (64-bit)
  • RHEL 4/5/6 (32-bit and 64-bit)
  • CentOS 7 (64-bit only)
  • CentOS 5/6 (32-bit and 64-bit)
  • SuSE 10/11 (32-bit and 64-bit)
  • Open SuSE 10/11 (32-bit)
  • Solaris 9/10 (SPARC)
  • Solaris 10 (32-bit and 64-bit)

System Requirements

  • Windows/Unix
  • Single/Multiple Intel Pentium
  • 512 MB RAM
  • 100 MB free disk space
  • Administrator privileges on the system

Learn more about McAfee Embedded Control


McAfee Embedded Control for Retail

See how the features and key advantages of McAfee Embedded Control serve devices in the retail industry.

Read Data Sheet >
Data Sheet

McAfee Embedded Control for Healthcare

See how the features and key advantages of McAfee Embedded Control serve devices in the healthcare industry.

Read Data Sheet >
Solution Brief

Maintain PCI Retail Compliance for Systems No Longer Supported

Protect end-of-life operating systems with application whitelisting.

Read Solution Brief >

Have Additional Questions?

We’re here to help. Contact us to learn about implementation, pricing, technical specifications, and more.

Contact Us

Register for a Free Trial

Get started now. Test drive McAfee Embedded Control in your environment.

Free Trial

*The Gartner Peer Insights Customers’ Choice logo is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner Peer Insights Customers’ Choice distinctions are determined by the subjective opinions of individual end-user customers based on their own experiences, the number of published reviews on Gartner Peer Insights and overall ratings for a given vendor in the market, as further described here, and are not intended in any way to represent the views of Gartner or its affiliates.