McAfee EPSCDE-AA-FA データシート
Data Sheet
Key Benefits
•
Ironclad protection for
all endpoints
all endpoints
•
Lower operational costs with
centralized management
centralized management
•
Compliance made simple with
standard templates
standard templates
“NSS Labs created variants of the
Operation Aurora attack and
tested the anti-malware software
to see which of the seven products
tested the anti-malware software
to see which of the seven products
stopped the exploits and malicious
code payloads. Given the level
of visibility of the attack and the
code payloads. Given the level
of visibility of the attack and the
time that has passed since its initial
discovery, it was thought that
most, if not all, of the products
would cover the vulnerability.
most, if not all, of the products
would cover the vulnerability.
However, only one out of seven
tested products correctly thwarted
tested products correctly thwarted
multiple exploits and payloads,
demonstrating vulnerability-based
protection (McAfee).”
demonstrating vulnerability-based
protection (McAfee).”
—NSS Labs Finds Most Endpoint
Security Products Lack
“Vulnerability-Based Protection”
http://nsslabs.com/nss-labs-in-the-
news/nss-labs-finds-most-endpoint-
security-products-lack-vulnerability-
based-protection
The days of anti-virus being enough are over.
Today’s threat landscape features a constant, ever-
Today’s threat landscape features a constant, ever-
changing stream of worms, spyware, Trojans, bots,
rootkits, hackers, identity thieves, and targeted
attacks. Users expect to take work with them
and access applications everywhere, but their
mobile devices and laptops—including Macs—can
jeopardize your network and systems when they
return to the office. With stringent requirements
to safeguard data as well as verify and report on
regulatory compliance, the risks are higher than
ever. Yet your budget requires you to be frugal.
rootkits, hackers, identity thieves, and targeted
attacks. Users expect to take work with them
and access applications everywhere, but their
mobile devices and laptops—including Macs—can
jeopardize your network and systems when they
return to the office. With stringent requirements
to safeguard data as well as verify and report on
regulatory compliance, the risks are higher than
ever. Yet your budget requires you to be frugal.
You could patch together a collection of individual
products, but you would never achieve the
effectiveness and efficiency of McAfee Endpoint
effectiveness and efficiency of McAfee Endpoint
Security suites. That’s because we integrate
technologies for coordinated, complete solutions
that offer the best defenses against today’s multi-
technologies for coordinated, complete solutions
that offer the best defenses against today’s multi-
vector threats. Our Endpoint Security suites can
protect you against all five threat vectors—system,
protect you against all five threat vectors—system,
email, web, data, and network.
This integrated security delivers ironclad protection,
but is easy to deploy and manage. McAfee
Endpoint Security suites bring together reinforcing
layers of protection against malware and data
loss with the industry’s only open security and
compliance management platform. Our suites give
you a strong foundation for securing your users,
systems, and data, with operational efficiency that
makes effective security easy to maintain.
Endpoint Security suites bring together reinforcing
layers of protection against malware and data
loss with the industry’s only open security and
compliance management platform. Our suites give
you a strong foundation for securing your users,
systems, and data, with operational efficiency that
makes effective security easy to maintain.
McAfee Total Protection for Endpoint—
Enterprise Edition suite
Enterprise Edition suite
Our flagship solution offers ironclad protection
for all your endpoints, including Windows, Mac,
Unix, and Linux systems and mobile devices.
for all your endpoints, including Windows, Mac,
Unix, and Linux systems and mobile devices.
Seamless integration secures systems and data
against sophisticated malware, such as bots and
zero-day attacks. It protects you if the device is
lost or stolen, and blocks noncompliant systems or
unauthorized devices that may attempt to access
your business-critical systems and sensitive data.
unauthorized devices that may attempt to access
your business-critical systems and sensitive data.
This combination of controls is ideal for
sophisticated enterprises with users who expect
freedom—as well as total protection from the
risks their mobility and flexibility entail. Multi-
platform support, network access control, policy
auditing, web filtering, and endpoint encryption
let you meet their needs while ensuring the data
protection and accountability that your executives
and auditors demand.
freedom—as well as total protection from the
risks their mobility and flexibility entail. Multi-
platform support, network access control, policy
auditing, web filtering, and endpoint encryption
let you meet their needs while ensuring the data
protection and accountability that your executives
and auditors demand.
McAfee Endpoint Security Suites
Stronger security with lower operational costs and simplified compliance
Providing a secure endpoint environment for your business can be complex.
Sophisticated malware and a boundary-less workplace make it easy for cybercriminals
to steal information and devices. Regulations force you to increase safeguards for
data and verify compliance. And the growing number of security point products
increases management costs and complicates response. McAfee
data and verify compliance. And the growing number of security point products
increases management costs and complicates response. McAfee
®
Endpoint Security
suites unite industry-leading endpoint security and data protection with centralized
management for ironclad security that streamlines operations and eases compliance.
management for ironclad security that streamlines operations and eases compliance.