McAfee TPECDE-AA-EA データシート

ページ / 3
Data Sheet
Effective endpoint security was once a straightforward 
process. All you had to do was update your anti-
virus software. But now, you face a constant stream 
of worms, spyware, Trojans, bots, rootkits, hackers, 
identity thieves, and other targeted attacks. And with 
the stringent requirements to verify and report on 
regulatory compliance, the risks are higher than ever.
You need an integrated solution that delivers total 
protection, but is easy to deploy and manage. 
McAfee
®
 Total Protection for Endpoint provides 
stronger protection that protects data, ensures greater 
compliance, and lowers operational costs—the 
industry’s first truly integrated system security. McAfee 
Total Protection for Endpoint stops malware, rootkits, 
spyware, exploits, bots, spam, and hacker attacks. 
With our web security, you know your employees 
can safely search the web. And Total Protection for 
Endpoint is managed through a single integrated 
console, reducing time and resources needed to 
manage security. Our advanced solution does all 
that, and allows you to audit, verify, and enforce 
compliance with comprehensive policy auditing and 
flexible network access control (NAC).
Total 
Protection 
for 
Endpoint—
Advanced
Total 
Protection 
for Endpoint
Total 
Protection 
for Endpoint
Essential
Network 
access control
4
Policy 
auditing
4
Desktop and 
file server  
anti-virus
4
4
4
Desktop  
anti-spyware
4
4
4
Desktop host 
intrusion 
prevention 
and firewall
4
4
4
Web security
4
4
4
Email server 
anti-virus  
and anti-
spam
4
4
Single 
management 
console
4
4
4
McAfee Total Protection for Endpoint 
Strong Security Enabling Lower Costs and Simplified Compliance
Providing a secure environment for your business is complex. Evolving threats make it easy for 
cybercriminals to illegally steal access to information; regulations force companies to increase 
safeguards for data and verify security compliance; and the growing number of disparate  
and point products increase management costs and security complexities. To stop these 
evolving threats, you need stronger protection with greater compliance while lowering your 
overall costs.
Mc
Afe
e To
tal Protection for Endp
oint
Em
ail
 se
rve
r      
                  Deskto
p/fir
ew
all/
    
    
    
    
   
D
es
kt
op
  
N
et
w
or
ac
ce
ss
 c
on
tr
ol
   
   
   
   
   
an
ti-
vir
us
 an
d a
nti-s
pam       host intrusio
n pr
eve
ntio
n  
    
  a
nt
i-s
py
w
ar
e
anti
-viru
s
Web se
curi
ty 
    
   
  P
ol
icy
 a
ud
iti
ng
De
skt
op a
nd fil
e server