View
Sorting
Products found: 17
McAfee Active Response
McAfee Active Response is proof of the effectiveness of the integrated McAfee security architecture, which is designed to resolve more threats faster and with fewer resources in a more complex world. McAfee Active Response gives you continuous visibility and powerful insights into your endpoints so you can identify breaches faster. And it provides you with the tools you need to correct issues faster and in the way that makes the most sense for your business. All of this power is managed via McAfee® ePolicy Orchestrator® (McAfee ePO™) software leveraging McAfee Data Exchange Layer—this provides unified scalability and extensibility without the need for incremental staff to administer the product.
Key Advantages
- Automated: Capture and monitor context and system state for changes that may be IoAs, as well as find dormant attack components, and send intelligence to analytics, operations, and forensic teams.
- Adaptable: When alerted, you can adjust to changes in attack methodologies; automate data collection, alerts, and responses to objects of interest; and customize your configuration to customer workflows.
- Continuous: Persistent collectors activate triggers on detection of attack events, alerting you and your systems to attack activity that you
McAfee Advanced Threat Defense
- Configurable operating system and application support: Tailor analysis images with select environment variables to validate threats and support investigation.
- User interactive mode: Enables analysts to interact directly with malware samples.
- Extensive unpacking capabilities: Reduces investigation time from days to minutes.
- Full logic path: Enables deeper sample analysis by forcing execution of additional logic paths that remain dormant in typical sandbox environments.
- Sample submission to multiple virtual environments: Speeds investigation by determining which environment variables are needed for file execution.
- Detailed reports: Provide critical information for investigation including MITRE ATT&CK mapping, disassembly output, memory dumps, graphical function call diagrams, embedded or dropped file information, user API logs, and PCAP information. Threat time lines help visualize attack execution steps.
- Bro Network Security Monitor integration: Deploy Bro sensor to a suspected network segment to monitor and capture traffic and forward files to McAfee Advance Threat Defense for inspection.
McAfee Cloud Workload Security
Cloud-native network control With increased awareness and control of your cloud workloads you can prevent both lateral attacks in the data center and external threats.
Cloud provider direct integration Additional capabilities are enabled through direct integration with cloud providers such as AWS. For example, AWS GuardDuty alerts integrate directly into McAfee ePO, displaying network connections, port probes, and DNS requests for EC2 instances. McAfee Cloud Workload Security:
- McAfee Cloud Workload Security Basic
- McAfee Cloud Workload Security Essentials
- McAfee Cloud Workload Security Advanced
McAfee Complete Data Protection
Key Features
■ Drive encryption
■ File and removable media protection
■ Management of native encryption
Key Advantages
■ Stop data loss initiated by sophisticated malware that hijacks sensitive and personal information.
■ Secure data when it’s stored on desktops, laptops, tablets, and cloud storage.
■ Manage Apple FileVault and Microsoft BitLocker native encryption on endpoints directly from McAfee ePO software.
■ Communicate with and take control of your endpoints at the hardware level, whether they are powered off, disabled, or encrypted to halt desk-side visits and endless helpdesk calls due to security incidents, outbreaks, or forgotten encryption passwords.
■ Prove compliance with advanced reporting and auditing capabilities and monitor events and generate detailed reports that show auditors and other stakeholders your compliance with internal and regulatory privacy requirements.
McAfee Complete EndPoint Protection - Business (CEB)
McAfee Complete Endpoint Threat Protection
McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and sophisticated attacks.
Core endpoint protection, including anti-malware, firewall, device control, email and web security works together with machine learning and dynamic application containment to detect zero-day threats in near real time, and classify and halt them before they can execute on your systems. Actionable forensic data and easy-to-read reports keep you informed and help you make the move from responding to outbreaks, to investigating and hardening your defenses. And, because McAfee Complete Endpoint Threat Protection is built using an extensible framework, you can add other advanced threat defenses with ease as your security needs and the threat landscape evolve.
McAfee Email Gateway
McAfee Endpoint Protection — Advanced Suite
McAfee Endpoint Security
- Centralized management. The McAfee ePolicy Orchestrator management console can be deployed on premises or in the cloud. It provides greater visibility, simplifies operations, boosts IT productivity, unifies security, and reduces costs.
- Advanced anti-malware protection. Our anti-malware engine is continually updated by McAfee Global Threat Intelligence and works efficiently across multiple operating systems.
- Machine learning analysis. Detect zero-day threats in near real time by examining how they look and behave to halt threats designed to evade detection.
- Dynamic application containment. Defend against ransomware and greyware by securing endpoints that are leveraged as entry points for attacks.
- Proactive web security. Ensure safe browsing with web protection and filtering for endpoints.
- Actionable threat forensics. Quickly see where infections are, why they are occurring, and the length of exposure to understand the threat and react more quickly.
McAfee Enterprise Security Manager (SIEM)
As the foundation of our security information and event management (SIEM) solution, McAfee Enterprise Security Manager delivers the performance, actionable intelligence, and real-time situational awareness required for organizations to identify, understand, and respond to stealthy threats, while the embedded compliance framework simplifies compliance.
Advanced threat intelligence
Get actionable information on all collected events with contextual information, such as vendor threat feeds and shared indicators of compromise (IOC), to deliver prioritized, actionable information in minutes.
Critical facts in minutes, not hours
Store billions of events and flows, keeping information available for immediate ad hoc queries, forensics, rules validation, and compliance. Access long-term event data storage to investigate attacks, search for indications of advanced persistent threats (APTs) or IOC, and remediate a failed compliance audit.
Optimize security management and operations
Centralize the view of your organization’s security posture, compliance status, and prioritized security issues that require investigation. Access hundreds of reports, views, rules, alerts, and dashboards.
McAfee ePolicy Orchestrator (McAfee ePO)
McAfee MVISION Cloud
- McAfee MVISION Cloud for Office 365
- McAfee MVISION Cloud for AWS
- McAfee MVISION Cloud for Box
- McAfee MVISION Cloud for Salesforce
- McAfee MVISION Cloud for Azure
- McAfee MVISION Cloud for Shadow IT
McAfee MVISION EDR
McAfee MVISION Mobile
Always-on defense for on-the-go devices
Unlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, McAfee MVISION Mobile sits directly on mobile devices to provide always-on protection no matter how a device is connected—via a corporate network, public access point, or cellular carrier—and even offline.Advanced analysis thwarts advanced attacks
Machine learning algorithms analyze deviations to device behavior and make determinations about indicators of compromise to accurately identify advanced device, application, and network-based attacks.A single console for all devices—including mobile
As an integrated component of McAfee Device Security, McAfee MVISION Mobile extends visibility and control of your mobile assets from the same single console of all your McAfee-managed devices, including OS-based endpoints, servers, containers, and embedded IoT devices.McAfee Network Security Platform
It utilizes advanced detection and emulation techniques, moving beyond mere pattern matching to defend against stealthy attacks with a high degree of accuracy. To meet the needs of demanding networks, the platform can scale to more than 40 Gbps with a single device. The integrated McAfee solution portfolio streamlines security operations by combining real-time McAfee Global Threat Intelligence feeds with rich contextual data about users, devices, and applications for fast, accurate response to network-borne attacks.
Key Advantages
■ Quickly detects and blocks threats to protect applications and data
■ High-performance, scalable solution for dynamic environments
■ Centralized management for visibility and control
■ Advanced detection, including signature-less malware analysis
■ Inbound and outbound SSL decryption to inspect network traffic
■ High-availability and disaster recovery protection
■ Virtual appliances also available
■ Integrates with McAfee solution portfolio for device-to-cloud security