McAfee Complete Endpoint Protection Business CEBYFM-AA-AA Scheda Tecnica

Codici prodotto
CEBYFM-AA-AA
Pagina di 3
McAfee Complete Endpoint Protection—Business
2
Data Sheet
100%
McAfee Deep
Defender
Vendor A
Vendor B
83%
67%
Zero-Day Rootkit Protection
(Detec
ted R
ootkits)
Source: AV-TEST report, Proactive Rootkit Protection 
Comparison Test.
Get proactive about protecting your data. 
A leader in the 
for Mobile Data Protection and in the 
Magic Quadrant for Endpoint Protection 
Platforms,
 McA
fee provides multiple layers of 
protection. With advanced encryption, you can 
automatically secure confidential information 
and prevent unauthorized access on PCs, Macs, 
laptops, virtual machines, and removable 
media. Safeguard your vital assets without 
hindering system performance—and easily 
manage and enforce policies from the McAfee
®
 
ePolicy Orchestrator
®
 (McAfee ePO
) centralized, 
web-based management platform.
See more, know more, and defend your organi-
zation better with cloud-based McAfee Global 
Threat Intelligence, which gives you the full 
spectrum of new and emerging threats in real 
time across all vectors—file, web, message,  
and network. 
Complete Simplicity
You may not have security experts in every 
office—that’s why we keep it simple. Your 
security is installed and ready to go in as few 
as four clicks. Management is easy with McAfee 
ePO software—a single pane of glass where 
you can view security and manage policies for 
all devices. Real Time for McAfee ePO gives 
you instant access to critical security data, so 
IT can respond 10 to 1,000 times faster when 
incidents occur. 
Complete Performance
Focused scans and focused actions provide you 
with security that supports business rather than 
slowing it down. Superior performance across 
all platforms comes from advanced smart 
scanning and memory management techniques 
that optimize CPU and memory usage. 
McAfee: An Industry 
Leader
 
A Magic Quadrant for 
Endpoint Protection 
Platforms leader since 
2007. (Gartner) 
 
 
 
 
Anatomy of an Attack
Stages of an Attack 
How McAfee Complete Endpoint Protection—Business Suite Defends You
Pre-Attack Phase 
Proactive measures reduce the attack 
surface and vulnerabilities.
• Instant visibility into the security health of your endpoints helps you reduce the 
attack surface easily and efficiently. 
• Protect valuable data with encryption for files, folders, and full disks.
First Contact 
Malware comes in contact with 
unsuspecting users, usually through a 
malicious website. Other access points 
are removable media, unsolicited 
messages from social media sites, 
and misconfigured or unsecured 
wireless networks.
• Safe surf and search and web content filtering reduce chance of exposure to or 
drive-by downloads of malware.
• Device control blocks use of unapproved storage media that may be infected with 
malware. 
• Network connection reputation shuts down botnets, denial-of-service attacks, and 
malicious traffic.
• Mobile anti-malware prevents compromise of smartphones and tablets.
Local Execution 
Bad code runs on target machines to 
exploit vulnerabilities in applications 
or the OS. If the malware can subvert 
protections, it writes its code to disk.
• Below-the-OS detection enhanced by hardware blocks kernel and boot-level rootkits.
• Host intrusion prevention blocks exploits and shields unpatched vulnerabilities.
• On-access scanning monitors memory and network traffic.
• Secure container for mobile email protects enterprise data on devices.
Establish Presence  
Malicious code hides on the system and 
is made to persist, so that it survives 
reboot and stays hidden from security 
measures and from the user.
• Traditional antivirus and anti-malware.
• Hardware-enhanced security protects against rootkits and other stealthy attacks.
• Host intrusion prevention protects during startup and off the network.
Malicious Activity
Goal of attack is achieved—from 
stealing identities and intellectual 
property theft to bank fraud.
• Host-based firewalls prevent connections to known malicious bot networks and 
limit the loss of sensitive data.