Now Protects Desktops in Addition to Servers and Fixed Function Devices
SANTA CLARA, Calif., 25 Январь 2012 г. - The latest release of McAfee Application Control is integrated with McAfee Global Threat Intelligence to show the file reputation of every file in the enterprise. This feature coupled with whitelisting and memory protection makes it an ideal solution for blocking advanced persistent threats and zero-day attacks. The solution is centrally managed by McAfee ePolicy Orchestrator software and uses a dynamic trust model which reduces costs by eliminating expensive manual support requirements.
McAfee Application Control is now a powerful solution for corporate desktops with the introduction of a set of desktop-specific features including friendly end-user notifications and approval requests. Protecting the desktop and the endpoint is essential as that is often a vulnerable point subject to human error. Employees and online users can unintentionally introduce software that installs malware, creates support issues, and violates software licenses — compromising systems and the overall business. McAfee Application Control allows only trusted applications to run on the company’s endpoints and servers.
McAfee Application Control Key Features:
McAfee Global Threat Intelligence – a cloud-based knowledge of reputation of files which is used by McAfee Application Control to classify applications as good or bad. This feature indicates whether any malware is being whitelisted inadvertently and also highlights files without a reputation, which need to be investigated internally.
Dynamic Whitelisting - can configure it such that the whitelist will grow dynamically when systems are patched and updated, which alleviates the hassle of manual updates to the whitelist.
Memory Protection - helps ensure that the whitelisted programs which might contain some inherent vulnerabilities cannot be exploited through a buffer overflow or other means. This feature helps prevent complex threats from circumventing whitelisting.
McAfee Ecosystem - well integrated within the McAfee product ecosystem to create a multi-faceted whitelisting solution. Integration with the ePolicy Orchestrator platform gives organizations a single security console to manage all their security solutions, thus improving operational efficiency. Additionally, integration with McAfee Risk Advisor helps prioritize which systems to patch first and offers visibility on whether or not McAfee Application Control gives them coverage from the most recent threats. Building upon the whitelisting capabilities is McAfee Host Intrusion Prevention which can be used to firewall files with unknown reputations.
“As enterprises face an avalanche of unknown software from the web, McAfee Application Control provides the essential layer of defense for protecting enterprises from advanced unknown threats,” said Martin Ward, senior director of endpoint solutions at McAfee. “McAfee is now extending this protection which has been available on servers and fixed function devices to corporate desktops in a solution which is scalable to the largest enterprises.”
McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), is the world's largest dedicated security technology company. McAfee delivers proactive and proven solutions and services that help secure systems, networks, and mobile devices around the world, allowing users to safely connect to the Internet, browse and shop the Web more securely. Backed by its unrivaled Global Threat Intelligence, McAfee creates innovative products that empower home users, businesses, the public sector and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. McAfee is relentlessly focused on constantly finding new ways to keep our customers safe. http://www.mcafee.com
Note: McAfee, McAfee Global Threat Intelligence, and ePolicy Orchestrator are registered trademarks of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.