McAfee Total Protection for Secure Business, 501-1000u, 1Y Gold, EN, Cross TEBCDE-DA-FA ユーザーズマニュアル
製品コード
TEBCDE-DA-FA
Protect what you value.
Solution Brief | McAfee Total Protection for Secure Business
www.mcafee.com
McAfee Total Protection for Secure Business
Comprehensive security in one easy-to-manage suite
Medium-sized businesses are plagued by the same security risks that the largest enterprises face on a daily
basis, but they typically lack the time, budget, and IT resources to adequately protect themselves against
all of today’s sophisticated threats.
basis, but they typically lack the time, budget, and IT resources to adequately protect themselves against
all of today’s sophisticated threats.
1
The list is long and daunting: Trojans, botnets, spam, spyware, malicious
web sites, data loss, and data theft. Medium-sized businesses need to enforce acceptable use policies for
email and the web, and ensure compliance with government data privacy regulations. A single hacker
attack, a single misplaced laptop containing confidential data, or a single infected device could cripple a
medium-sized business.
email and the web, and ensure compliance with government data privacy regulations. A single hacker
attack, a single misplaced laptop containing confidential data, or a single infected device could cripple a
medium-sized business.
McAfee helps keep small and medium-sized businesses
like yours protected with a smart, simple, secure solution
designed for small and medium enterprise customers.
McAfee
like yours protected with a smart, simple, secure solution
designed for small and medium enterprise customers.
McAfee
®
Total Protection (ToPS) for Secure Business provides
comprehensive endpoint, email, web, and data security—all
in a single, integrated suite. Best of all, the suite is available
from one vendor at one price, making it affordable and easy
to manage.
in a single, integrated suite. Best of all, the suite is available
from one vendor at one price, making it affordable and easy
to manage.
The Need to Secure Multiple Points of Entry
As threats have grown more complex and more numerous,
businesses are finding that yesterday’s anti-virus is no longer
good enough. Cybercriminals are now using Web 2.0
technologies to deliver Trojans, spyware, rootkits, and the
like. As a first layer of defense, you want to have a security
device at the edge of the network that can block access to
malicious web sites and scan all email and web downloads
for malware.
businesses are finding that yesterday’s anti-virus is no longer
good enough. Cybercriminals are now using Web 2.0
technologies to deliver Trojans, spyware, rootkits, and the
like. As a first layer of defense, you want to have a security
device at the edge of the network that can block access to
malicious web sites and scan all email and web downloads
for malware.
Your endpoint computers also need strong onboard security,
such as personal firewall and host intrusion prevention to
protect them when they are away from the network and
more vulnerable to attack.
such as personal firewall and host intrusion prevention to
protect them when they are away from the network and
more vulnerable to attack.
And then there’s data. Valuable corporate data—customer
information, intellectual property, and financial records—
needs to be protected from loss or theft. Encrypting
everything on hard drives is a simple, effective way to prevent
data loss in the event that a laptop computer is lost or stolen.
And to prevent other avenues of data loss, medium-sized
information, intellectual property, and financial records—
needs to be protected from loss or theft. Encrypting
everything on hard drives is a simple, effective way to prevent
data loss in the event that a laptop computer is lost or stolen.
And to prevent other avenues of data loss, medium-sized
businesses need to control what kinds of data storage devices
can be used in organizations, from USB drives to removable
media, such as CD-ROMs.
can be used in organizations, from USB drives to removable
media, such as CD-ROMs.
The Problem with Point Products
Until recently, to protect themselves from the full range of
security threats, medium-sized businesses have had no choice
but to purchase multiple security products from multiple
vendors. This approach makes security both costly and
difficult to manage. It requires increased staff resources to
implement security policies, monitor systems, analyze security
data, and identify events requiring action. Multiple annual
support fees, maintenance contracts, and licenses need to
be funded and managed. When something goes wrong in
a multi-vendor security environment, it’s often difficult to
identify which vendor should be contacted to resolve the
issue, and it’s often even more difficult to get them to work
cooperatively to find a quick solution.
security threats, medium-sized businesses have had no choice
but to purchase multiple security products from multiple
vendors. This approach makes security both costly and
difficult to manage. It requires increased staff resources to
implement security policies, monitor systems, analyze security
data, and identify events requiring action. Multiple annual
support fees, maintenance contracts, and licenses need to
be funded and managed. When something goes wrong in
a multi-vendor security environment, it’s often difficult to
identify which vendor should be contacted to resolve the
issue, and it’s often even more difficult to get them to work
cooperatively to find a quick solution.
Efficiency and security also suffer when businesses
deploy multiple products from multiple vendors. Security
administrators must manually correlate a flood of often-
conflicting information, typically displayed in different formats
on different management consoles. The lack of a centralized
management control means a slower response to threats and
a harder time implementing policies consistently.
deploy multiple products from multiple vendors. Security
administrators must manually correlate a flood of often-
conflicting information, typically displayed in different formats
on different management consoles. The lack of a centralized
management control means a slower response to threats and
a harder time implementing policies consistently.
And the cost of this approach—for licenses, maintenance
fees, and management overhead—is often prohibitive.
fees, and management overhead—is often prohibitive.
1 Based on customer surveys, interviews, and focus groups conducted by McAfee.