McAfee Endpoint Protection Suite EPSCGE-DA-AA 数据表
产品代码
EPSCGE-DA-AA
Data Sheet
McAfee Endpoint Protection Suite
Secure Microsoft Windows, Mac, and Linux systems with essential endpoint
and data protection
and data protection
Traditional desktops and fixed systems within your LAN probably have layers of
gateway or network security to protect them. Yet they still need essential security to
block advanced malware, control data loss and compliance risks caused by removable
media, and provide safe access to critical email and web applications. The McAfee
block advanced malware, control data loss and compliance risks caused by removable
media, and provide safe access to critical email and web applications. The McAfee
®
Endpoint Protection Suite integrates these core functions into a single, manageable
environment ideal for safeguarding traditional desktops and other systems that have
limited exposure to Internet threats.
environment ideal for safeguarding traditional desktops and other systems that have
limited exposure to Internet threats.
What do call centers, engineering design studios,
and doctors’ offices have in common? Their users
and doctors’ offices have in common? Their users
rely on tower-based PCs and traditional desktop
systems that never leave the office. Since these
systems don’t visit wireless hot spots, help kids
browse the Internet at night, or get left at airports,
they have a lower risk of being hacked, picking
up malicious downloads, or being stolen while
carrying sensitive data.
systems that never leave the office. Since these
systems don’t visit wireless hot spots, help kids
browse the Internet at night, or get left at airports,
they have a lower risk of being hacked, picking
up malicious downloads, or being stolen while
carrying sensitive data.
However, corporate users rely heavily on web-
enabled applications and email, so even these
fixed machines require sophisticated protection
against the targeted, real-time malware these
applications convey. Your email server should
have an extra dose of anti-malware, backed up
by malware protection on each endpoint itself.
enabled applications and email, so even these
fixed machines require sophisticated protection
against the targeted, real-time malware these
applications convey. Your email server should
have an extra dose of anti-malware, backed up
by malware protection on each endpoint itself.
In addition, most modern PCs have multiple
USB ports and DVD drives. In the case of call
centers, engineering design studios, and doctors’
offices, an unhappy worker might take home
customer databases, engineering designs and
other intellectual property, or patient records and
USB ports and DVD drives. In the case of call
centers, engineering design studios, and doctors’
offices, an unhappy worker might take home
customer databases, engineering designs and
other intellectual property, or patient records and
financial data. Device controls can help you restrict
use of removable media and portable storage to
avoid these data losses.
avoid these data losses.
The McAfee Endpoint Protection Suite seamlessly
integrates proven security to help you manage
all of these risks, delivering both operational
efficiencies and cost savings with the convenience
of a single solution.
all of these risks, delivering both operational
efficiencies and cost savings with the convenience
of a single solution.
Always on, real-time malware protection
With the unprecedented growth of advanced
persistent threats, enterprises cannot depend
on solutions that use only signature analysis for
on solutions that use only signature analysis for
endpoint protection. There is a gap of 24 to 72
hours from the time a threat is identified to the
moment its signature is applied to endpoints. In
hours from the time a threat is identified to the
moment its signature is applied to endpoints. In
the meantime, your data and systems are exposed.
McAfee Global Threat Intelligence
™
file reputation
closes this gap, providing real-time, always-on
protection based on the multi-vector threat insight
gathered by McAfee Labs. It quarantines or blocks
viruses, Trojans, worms, adware, spyware, and
other potentially unwanted programs that steal
confidential data and sabotage user productivity.
protection based on the multi-vector threat insight
gathered by McAfee Labs. It quarantines or blocks
viruses, Trojans, worms, adware, spyware, and
other potentially unwanted programs that steal
confidential data and sabotage user productivity.
Advanced email virus and spam protection
Our solution scans your inbound and outbound
emails to intercept spam, inappropriate content,
and harmful viruses. We can quarantine suspicious
emails to prevent evolving email threats from
affecting your network and users. And a layer of
antivirus protection for your email server prevents
malware from reaching user inboxes.
and harmful viruses. We can quarantine suspicious
emails to prevent evolving email threats from
affecting your network and users. And a layer of
antivirus protection for your email server prevents
malware from reaching user inboxes.
Comprehensive device control
We make it possible to prevent critical data from
leaving your company through removable media,
such as USB drives, iPods, Bluetooth devices,
recordable CDs, and DVDs. Tools help you monitor
and control data transfers from all desktops, even
if a device is physically disconnected from the
corporate network.
such as USB drives, iPods, Bluetooth devices,
recordable CDs, and DVDs. Tools help you monitor
and control data transfers from all desktops, even
if a device is physically disconnected from the
corporate network.
Stateful desktop firewall
Control desktop applications that can access
the network to stop network-borne attacks and
the network to stop network-borne attacks and
downtime. You can deploy and manage firewall
policies based on location to deliver complete
protection and compliance with regulatory rules.
policies based on location to deliver complete
protection and compliance with regulatory rules.
Key Points
•
Essential protection that
consolidates endpoint and
data security
consolidates endpoint and
data security
•
Reduces the time and
effort spent deploying and
managing security
effort spent deploying and
managing security
•
One-stop shopping for the right
protections for traditional and
fixed desktops
protections for traditional and
fixed desktops