McAfee AntiSpyware Enterprise Edition SPY10M005TAA Data Sheet
Product codes
SPY10M005TAA
Data Sheet | McAfee System Protection Solutions
McAfee AntiSpyware Enterprise
Spyware Protection Optimized for Business
On average, business PCs have 27 potentially
unwanted programs (PUPs), while a whopping 80
percent of corporate computers host at least one.
PUPs are any piece of code that a reasonably security-
minded user may want to know about, and possibly
remove. PUPs may include adware or cookies, or
the more insidious spyware, dialers, key-loggers, or
remote administration tools, among others.
Eliminate Spyware Risks
Undetected spyware can lead to identity theft, system and
network corruption, slower Internet access, reduced user
productivity, and more help desk calls. To eliminate these
risks, you need to quickly detect, proactively block, and
safely eliminate PUPs—before they can cause damage.
network corruption, slower Internet access, reduced user
productivity, and more help desk calls. To eliminate these
risks, you need to quickly detect, proactively block, and
safely eliminate PUPs—before they can cause damage.
Unlike home anti-spyware programs, McAfee
®
AntiSpyware
Enterprise meets the stringent scalability and management
requirements that businesses demand. From small
businesses to the largest enterprise, we protect your
business from PUPs—and we do it with our award winning
On-Access scanning technology.
requirements that businesses demand. From small
businesses to the largest enterprise, we protect your
business from PUPs—and we do it with our award winning
On-Access scanning technology.
On-Access Scanning Provides Proactive
Protection
Protection
Most anti-spyware software is reactive in that it catches
unwanted programs after they have been installed on your
systems. But by then it is often too late, because most PUPs
install in many places—as multiple applications, registry
entries, etc. It is not unheard of to have PUPs spawn 20
or more programs or fi les that all need to be cleaned up.
McAfee On-Access scanning catches the problem when it
fi rst tries to install on your system. Catching it once and
stopping it before it installs itself is much more effective
than waiting until it has had a chance to multiply.
unwanted programs after they have been installed on your
systems. But by then it is often too late, because most PUPs
install in many places—as multiple applications, registry
entries, etc. It is not unheard of to have PUPs spawn 20
or more programs or fi les that all need to be cleaned up.
McAfee On-Access scanning catches the problem when it
fi rst tries to install on your system. Catching it once and
stopping it before it installs itself is much more effective
than waiting until it has had a chance to multiply.
On-Access scanning stops a PUP from installing and
completely infecting a system.
completely infecting a system.
Comprehensive Database of PUPs
Our extensive database of known PUPs is built and
maintained by the security experts at McAfee AVERT.
maintained by the security experts at McAfee AVERT.
™
This database helps you keep your user’s systems stable and
allows them to concentrate on their jobs.
allows them to concentrate on their jobs.
Block Unknown PUPs Before They Get Listed
Our database of PUPs is extensive and growing constantly.
But for the ultimate protection, you need to be able to stop
unwanted programs when they fi rst appear, without having
to wait for an updated list. We use advanced technology
to identify PUPs by their behavior. This behavioral-based
technology detects and blocks unwanted programs and
also allows you to monitor software behavior and stop
installation and propagation. For example, you can set
up a rule that prevents fi les from executing from a temp
directory. Another rule could prevent a PUP from writing
to or modifying a host fi le. This proactive strategy protects
your system from the unknown as well as the known.
But for the ultimate protection, you need to be able to stop
unwanted programs when they fi rst appear, without having
to wait for an updated list. We use advanced technology
to identify PUPs by their behavior. This behavioral-based
technology detects and blocks unwanted programs and
also allows you to monitor software behavior and stop
installation and propagation. For example, you can set
up a rule that prevents fi les from executing from a temp
directory. Another rule could prevent a PUP from writing
to or modifying a host fi le. This proactive strategy protects
your system from the unknown as well as the known.
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
h2EAL
TIMEv
(ARMFUL
3EMI
(ARMFUL
(ARMLESS
6
6
6
6
6
/N
!CCESS