McAfee Complete Endpoint Protection Business CEBYFM-AA-AA Scheda Tecnica
Codici prodotto
CEBYFM-AA-AA
McAfee Complete Endpoint Protection—Business
2
Data Sheet
100%
McAfee Deep
Defender
Vendor A
Vendor B
83%
67%
Zero-Day Rootkit Protection
(Detec
ted R
ootkits)
Source: AV-TEST report, Proactive Rootkit Protection
Comparison Test.
Comparison Test.
Get proactive about protecting your data.
A leader in the
for Mobile Data Protection and in the
Magic Quadrant for Endpoint Protection
Platforms, McAfee provides multiple layers of
protection. With advanced encryption, you can
automatically secure confidential information
and prevent unauthorized access on PCs, Macs,
laptops, virtual machines, and removable
media. Safeguard your vital assets without
hindering system performance—and easily
manage and enforce policies from the McAfee
Magic Quadrant for Endpoint Protection
Platforms, McAfee provides multiple layers of
protection. With advanced encryption, you can
automatically secure confidential information
and prevent unauthorized access on PCs, Macs,
laptops, virtual machines, and removable
media. Safeguard your vital assets without
hindering system performance—and easily
manage and enforce policies from the McAfee
®
ePolicy Orchestrator
®
(McAfee ePO
™
) centralized,
web-based management platform.
See more, know more, and defend your organi-
zation better with cloud-based McAfee Global
zation better with cloud-based McAfee Global
Threat Intelligence, which gives you the full
spectrum of new and emerging threats in real
time across all vectors—file, web, message,
and network.
time across all vectors—file, web, message,
and network.
Complete Simplicity
You may not have security experts in every
office—that’s why we keep it simple. Your
security is installed and ready to go in as few
as four clicks. Management is easy with McAfee
ePO software—a single pane of glass where
you can view security and manage policies for
all devices. Real Time for McAfee ePO gives
you instant access to critical security data, so
IT can respond 10 to 1,000 times faster when
incidents occur.
security is installed and ready to go in as few
as four clicks. Management is easy with McAfee
ePO software—a single pane of glass where
you can view security and manage policies for
all devices. Real Time for McAfee ePO gives
you instant access to critical security data, so
IT can respond 10 to 1,000 times faster when
incidents occur.
Complete Performance
Focused scans and focused actions provide you
with security that supports business rather than
slowing it down. Superior performance across
all platforms comes from advanced smart
scanning and memory management techniques
that optimize CPU and memory usage.
with security that supports business rather than
slowing it down. Superior performance across
all platforms comes from advanced smart
scanning and memory management techniques
that optimize CPU and memory usage.
McAfee: An Industry
Leader
■
■
■
■
■
Anatomy of an Attack
Stages of an Attack
How McAfee Complete Endpoint Protection—Business Suite Defends You
Pre-Attack Phase
Proactive measures reduce the attack
Proactive measures reduce the attack
surface and vulnerabilities.
• Instant visibility into the security health of your endpoints helps you reduce the
attack surface easily and efficiently.
• Protect valuable data with encryption for files, folders, and full disks.
First Contact
Malware comes in contact with
Malware comes in contact with
unsuspecting users, usually through a
malicious website. Other access points
are removable media, unsolicited
messages from social media sites,
and misconfigured or unsecured
wireless networks.
• Safe surf and search and web content filtering reduce chance of exposure to or
drive-by downloads of malware.
• Device control blocks use of unapproved storage media that may be infected with
malware.
• Network connection reputation shuts down botnets, denial-of-service attacks, and
malicious traffic.
• Mobile anti-malware prevents compromise of smartphones and tablets.
Local Execution
Bad code runs on target machines to
Bad code runs on target machines to
exploit vulnerabilities in applications
or the OS. If the malware can subvert
protections, it writes its code to disk.
• Below-the-OS detection enhanced by hardware blocks kernel and boot-level rootkits.
• Host intrusion prevention blocks exploits and shields unpatched vulnerabilities.
• On-access scanning monitors memory and network traffic.
• Secure container for mobile email protects enterprise data on devices.
• Host intrusion prevention blocks exploits and shields unpatched vulnerabilities.
• On-access scanning monitors memory and network traffic.
• Secure container for mobile email protects enterprise data on devices.
Establish Presence
Malicious code hides on the system and
Malicious code hides on the system and
is made to persist, so that it survives
reboot and stays hidden from security
measures and from the user.
• Traditional antivirus and anti-malware.
• Hardware-enhanced security protects against rootkits and other stealthy attacks.
• Host intrusion prevention protects during startup and off the network.
• Hardware-enhanced security protects against rootkits and other stealthy attacks.
• Host intrusion prevention protects during startup and off the network.
Malicious Activity
Goal of attack is achieved—from
Goal of attack is achieved—from
stealing identities and intellectual
property theft to bank fraud.
• Host-based firewalls prevent connections to known malicious bot networks and
limit the loss of sensitive data.