4 VendorsBlog
We pay for content
McAfee Endpoint Security

Add to comparison

McAfee Endpoint Security

McAfee Endpoint Security is an integrated, centrally managed, advanced defenses

Features of product

Проблемы Pain points
  • Malware infection via Internet, email, storage devices
  • Risk of attacks by hackers
  • Risk of data loss or damage
  • Risk of lost access to data and IT systems
Ценности Business Values
  • Appraise and Train Staff
  • Ensure Security and Business Continuity
  • Reduce Costs
Матрица сравнения с конкурентами Matrix of comparison with competitors

About Product

Advanced, consolidated endpoint defense McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint environment. Core threat prevention Essential anti-virus, exploit prevention, firewall, and web control communicate with each other. Machine learning State-of-the art techniques identify malicious code based on appearance and behavior. Application containment Limit the impact of suspicious files and zero-day malware by blocking behaviors and containing them before they can infect or spread in your environment. Endpoint detection and response Our integrated, automated, and adaptable endpoint detection and response (EDR) technology is easy to use and makes incident response as simple as a single click. Product features

  • Centralized management. The McAfee ePolicy Orchestrator management console can be deployed on premises or in the cloud. It provides greater visibility, simplifies operations, boosts IT productivity, unifies security, and reduces costs.
  • Advanced anti-malware protection. Our anti-malware engine is continually updated by McAfee Global Threat Intelligence and works efficiently across multiple operating systems.
  • Machine learning analysis. Detect zero-day threats in near real time by examining how they look and behave to halt threats designed to evade detection.
  • Dynamic application containment. Defend against ransomware and greyware by securing endpoints that are leveraged as entry points for attacks.
  • Proactive web security. Ensure safe browsing with web protection and filtering for endpoints.
  • Actionable threat forensics. Quickly see where infections are, why they are occurring, and the length of exposure to understand the threat and react more quickly.


File Reputation Scanning
URL filtering


User behavior Analytics N/A
Application Control N/A
Device & Port Control


Application Vulnerability Managment N/A