Security Connected Solutions Guide

JANUARY 2011

Bridging Security and Opportunity
Today’s IT ecosystem thrives on its connections. It may link ATM machines, virtual desktops, or personal devices to straight-through applications hosted in the cloud, link employees and partners to business-critical networks and data centers, and link your most sensitive assets to unexpected threats and escalating risk. Your security must help connect these moving parts, without creating friction. Instead of blocking business, security should benefit business—enabling users, services, and profits without sacrificing confidence or compliance. Security should be omnipresent, but not onerous. Effective, but not expensive. Agile, but not fragile. Welcome to a world where security works this way today.

Security Connected from McAfee.

Security Connected
The open McAfee® framework called Security Connected unites the many parts of security infrastructure against the many parts of today’s threats. Weaving in unequalled global threat intelligence, manageability, and industry partnerships, this flexible security platform protects the ubiquity of your IT infrastructure. Instead of competing for your budget and attention, your IT and security investments collaborate for maximum protection and efficiency. You optimize your security to safeguard your business everywhere it goes, in every way it operates, to seize every opportunity.

INTRODUCTION

01

verizonbusiness.While your business has been innovating. the cost. because of the risk. What would it take to say “yes” to these requests? A security environment that gracefully handles • • • Complex threats Multidimensional countermeasures Fluid enterprise infrastructure ¹ McAfee Threats Report: Third Quarter 2010.000.com/resources/reports/rp_2010-data-breach-report_en_xg. cloud and social media services. and non-stop access for a dynamic workforce and its myriad devices. or the technical constraints. http://www. cybercrimes are now mainstream news. 3 2010 Verizon Data Breach Report. From being an occasional headline. 2 McAfee Labs. so has the business of cybercrime.000 new botnet infections are discovered each month1 • A new malicious website is detected every 30 seconds2 • External agents represented 70 percent of data breaches and 98 percent of stolen records3 Balancing Risk and Reward The “do more with less” requirement and competitive climate have spurred investment in IT: desktop virtualization. Sometimes we simply have to say “no” to new services.pdf 02 INTRODUCTION . • An average of 6. Undertakings like these offer efficiencies and competitive advantages—if you can manage risks and maintain compliance.

but without legal. 4 McAfee Threats Report: Third Quarter 2010. web. today’s cyberthreats employ multiple components and threat vectors—a cocktail of network port scans. Stuxnet now infects thousands of mainstream users around the globe. geographical. or moral boundaries. cybercriminals run businesses like yours. For example. corrupt Adobe Flash and PDF files. email. the Stuxnet worm took advantage of four separate. Threats with multiple components Zeus. Mariposa. and network tactics with a multi-month timeline. Designed to cripple critical infrastructure. unpublished vulnerabilities to ensure a match with its target. Operation Aurora went unnoticed by federating endpoint. Operation Aurora. INTRODUCTION 03 . and browser vulnerabilities—to ensure success. It spread through USB devices and network shares and formed a botnet of infected systems that “phoned home” to malicious web servers. and Stuxnet—these attacks represent professional operations. Wielding sophisticated tools and taking a long view of the opportunity. phishing email and websites.McAfee Global Threat Intelligence drew this map of Stuxnet infections.4 Similarly. Unlike the simple viruses of yesteryear.

systems. and recover to business as usual. 04 INTRODUCTION . commissioned by Infosecurity Europe. They catch one facet of an attack but miss the big picture of today’s redundant paths. contain the damage. this after-the-fact event correlation reacts to known threats and patterns. and network organizations view separate parts of the risk picture from siloed management environments. It is unlikely to detect subtle threats that change every use.5 5 PricewaterhouseCoopers. unfold slowly. or incorporate unknown malware and unpublished vulnerabilities.Security with islands of products and people Single-vector protections—traditional defense-in-depth layers—provide limited defense against multivector threats. IT administrators from independent web. While they might assemble a story from logs and alerts. isolated security islands and management environments make it expensive to diagnose. email. Similarly. Many do nothing for insider threats where privileged users abuse legitimate access. A recent PricewaterhouseCoopers poll found that the cost of responding to the worst incidents has more than tripled since 2008. When something goes wrong. Information Security Breaches Survey 2010.

who is managing risk and securing the infrastructure required to support new services and business growth? • • INTRODUCTION 05 . a plethora of new devices accesses a host of services and sensitive data in consolidated data centers.Enterprise ecosystems with assets everywhere Businesses are hard to secure against multivector. or maintained by third parties. This ubiquitous IT infrastructure has many moving parts. how do you ensure compliance with policies or confidentiality of locally stored data? If you can’t lock down the physical server where the data and applications are active. applications. hosted in the cloud. fast-paced threats because enterprise IT architectures have evolved from static to fluid. employees. many of them virtual—partners. how can you block attacks and maintain required patches? If you spend all your time reacting. from proprietary to personal. After waves of virtualization and outsourcing. • If you aren’t providing the mobile devices. data centers.

enable compliance. and streamline operations. 06 INTRODUCTION . a security platform optimized to counter threats. Working with industry leaders. McAfee has defined an open. This compounds the complexity of managing security. proven architecture that helps you construct your optimized security platform: Security Connected. To combat these challenges.Connecting the Components IT infrastructures are often overextended—with islands of separately managed systems. visionary security and risk managers are harnessing separate security components into a coordinated system.

Your extensible platform can connect processes and systems from multiple vendors and organizations. anomalies. email. With real-time visibility into risk and events. you can safely link your users to their applications and data. collaborating in real time. Leveraging tested integrations and open interfaces. and priorities with the people and tools that need them. existing infrastructure can mesh with new capabilities to protect your investments as well as your data assets. and secure your entire enterprise. network.Our technology footprint enables sensors at every layer of the technology stack to communicate. across any network. from any device. share intelligence. to act instantly as risks change. In building security into the way your business operates. It gives you confidence that you understand the shifting situation and can manage risk. non-stop. risks. in compliance with business and industry policies. elements like IT user directories. web. A platform for confidence and compliance A Security Connected platform builds bridges between security islands to close coverage and technology gaps. Apple iPads. INTRODUCTION 07 . It connects intelligence about changing threats. This open platform can handle the change required to seize opportunity and deal with necessity. The world’s most comprehensive threat intelligence keeps your countermeasures up to date and makes possible self-securing data. and endpoint protections. A platform for “yes” Security Connected also builds in choice and flexibility. You can use policies and automation to create efficiencies and enforce rules consistently. These systems share shreds of different types of information. and auditor reports. your Security Connected platform helps you secure the business without getting in its way.

web safety. With an open platform to integrate existing security administration. and data usage both inside and outside the network. manageable. Endpoint Security integrates system security. whether users are in the office or working remotely. and access control to let you guard endpoints against the latest threats with fewer IT resources Security Management provides constant visibility into your security. diagnosis.Leverage the Security Connected Platform The Security Connected architecture takes key elements of security and makes them modular. and compliance profile. and remediation. and effective. real-time threat protection. McAfee automates protection. providing deep visibility into current and emerging online dangers so that McAfee products activate countermeasures ahead of threats Network Security combines real-time threat awareness. and an optimized management platform for the world’s most comprehensive network defense Content Security patrols email. virtualization security. web. award-winning intrusion prevention technologies. mobile protection. email security. It ensures a productive workforce with critical protections that flex to fit your evolving security architecture. • McAfee Global Threat Intelligence™ delivers the industry’s most comprehensive. • • • • 08 INTRODUCTION . risk.

Our consumer products bring McAfee Global Threat Intelligence and robust protection home to secure your loved ones. and report on your changing IT risks. and your personal computing environment. look to McAfee Support and Services. through tested integrations and value-added partnerships. To tailor your platform to your real-world requirements. McAfee Alliances fuse your security platform with your other IT infrastructure. These elements—including over 100 third-party solutions—are united by the open interfaces of the McAfee ePolicy Orchestrator® (McAfee ePO™) management environment. mitigate. Much more than a dashboard. from silicon to satellite.The Security Connected platform from McAfee helps you optimize security as you enable business. for optimized protection at optimal efficiency. McAfee ePO brings together data and activities so you can make sense of. INTRODUCTION 09 . your identity. These experts help you get the most out of your security investments.

10 INTRODUCTION .0 Mitigating insider threats Combating industrialized hacking Fending off targeted attacks and advanced persistent threats (APTs) Balancing security and ROI Reducing complexity and chaos Using security to enable business Get Connected McAfee is ready to help you move toward your optimized security environment. Use this guide to navigate our Security Connected resources and start saying “yes” to enabling your business.WHAT IS YOUR SECURITY PRIORITY? LOOK HERE FOR HELP Protecting virtualized environments – Endpoint Security – Alliances – Endpoint Security – Content Security – Content Security – Endpoint Security – Content Security – McAfee Global Threat Intelligence – Content Security – Network Security – McAfee Global Threat Intelligence – Content Security – Endpoint Security – Network Security – Network Security – McAfee Global Threat Intelligence – Network Security – McAfee Global Threat Intelligence – Security Management – Support and Services – Security Management – Support and Services – Security Management – Alliances Enabling the consumerization of IT Safeguarding sensitive data Leveraging the cloud Facilitating Web 2.

Table of Contents Table of Contents Optimizing your organization’s security means moving from a reactive stance— such as deploying a new point tool to counter each new threat—to a strategic and connected security framework. web. and network—McAfee enables you to enhance operational efficiencies without making compromises on security or compliance. message. By integrating protection across the most common threat vectors—file. Global Threat Intelligence McAfee Labs™ McAfee Global Threat Intelligence™ Network Security McAfee Firewall Enterprise McAfee Firewall Enterprise Profiler McAfee Network Access Control McAfee Network Security Manager McAfee Network Security Platform McAfee Network Threat Behavior Analysis McAfee Network Threat Response Content Security McAfee Command Line Encryption McAfee Content Security Blade Server McAfee Data Loss Prevention McAfee Device Control McAfee Email and Web Security Appliance McAfee Email Gateway McAfee Encrypted USB McAfee Endpoint Encryption McAfee SaaS Email Archiving McAfee SaaS Email Encryption McAfee SaaS Email Inbound Filtering McAfee SaaS Email Protection McAfee SaaS Email Protection and Continuity McAfee SaaS Total Protection™ McAfee SaaS Web and Email Protection McAfee SaaS Web and Email Security with Archiving 11 13 14 17 20 21 22 23 24 25 26 27 30 31 32 33 34 35 36 37 38 39 40 40 41 42 43 44 McAfee SaaS Web Protection McAfee Security for Email Servers McAfee SiteAdvisor® Enterprise McAfee Web Filtering for Endpoint McAfee SmartFilter® McAfee Total Protection for Internet Gateways McAfee Total Protection for Data McAfee Total Protection for Secure Business McAfee Web Gateway Endpoint Security On-premises Endpoint Suites Comparison Security SaaS Suites Comparison McAfee Application Control (for desktops and servers) McAfee Command Line Encryption McAfee Device Control McAfee Encrypted USB McAfee Endpoint Encryption McAfee Endpoint Protection— Advanced Suite McAfee Endpoint Protection Suite McAfee Endpoint Protection for Mac McAfee Enterprise Mobility Management (McAfee EMM™) McAfee Host Intrusion Prevention McAfee Mobile Security for Enterprise McAfee MOVE AntiVirus McAfee Network Access Control McAfee Policy Auditor McAfee SaaS Endpoint Security Suites 45 46 47 47 48 49 50 51 52 53 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 continued on back of tab .

Table of Contents McAfee SaaS Total Protection McAfee Security for Email Servers McAfee Security for Microsoft SharePoint McAfee SiteAdvisor Enterprise McAfee Web Filtering for Endpoint McAfee Total Protection for Endpoint— Enterprise Edition McAfee Total Protection for Data McAfee Total Protection for Secure Business McAfee Total Protection for Server McAfee VirusScan® Enterprise McAfee VirusScan Enterprise for Linux McAfee VirusScan Enterprise for Offline Virtual Images McAfee VirusScan Enterprise for Storage McAfee VirusScan Enterprise for use with SAP NetWeaver platform McAfee VirusScan for Mac Security Management McAfee Change Control McAfee Change Reconciliation McAfee Configuration Control McAfee Database Activity Monitoring McAfee ePolicy Orchestrator (McAfee ePO) McAfee Integrity Control McAfee Integrity Monitor for Databases McAfee PCI Certification Service McAfee Policy Auditor McAfee Risk Advisor McAfee Total Protection for Compliance McAfee Vulnerability Manager (With McAfee SECURE™ module option) McAfee Vulnerability Manager McAfee Vulnerability Manager for Databases Support and Services McAfee Corporate Support McAfee Premium Support Offerings McAfee Corporate Technical Support Program Comparison McAfee Solution Services McAfee University Foundstone® Professional Services Foundstone Education 73 74 75 76 76 77 78 79 80 81 82 83 84 85 86 87 90 91 92 93 94 95 96 97 98 99 100 101 102 103 105 107 108 109 110 111 112 113 Alliances McAfee Global Alliances McAfee Global Alliance Partner Directory McAfee Security Innovation Alliance (SIA) McAfee SIA Partner Directory McAfee SIA Sales Teaming Partners McAfee for the Home Integrated Suites for Home Users McAfee AntiVirus Plus 2011 McAfee Family Protection McAfee Family Protection (iPhone/iPod Touch/iPad Edition) McAfee Internet Security 2011 McAfee Internet Security for Mac 2011 McAfee Online Backup McAfee SiteAdvisor LIVE McAfee Total Protection 2011 McAfee WaveSecure 115 117 119 125 126 128 137 139 140 141 142 143 144 145 146 147 148 .

Powered by millions of sensors around the world and a global team of more than 400 researchers. rather than reactive. real-time threat protection. it provides deep visibility into current and emerging online dangers—ensuring that your threat protection is predictive. .Global Threat Intelligence McAfee Global Threat Intelligence McAfee Global Threat Intelligence from McAfee Labs delivers the industry’s most comprehensive.

In 2010. we reached a frightening 60. the efficiency of your security must be a priority. In 2007. • Global Threat Intelligence McAfee Labs—Backed by a portfolio of more than 480 patents and a network of millions of sensors spanning the Internet. as well as a range of free educational tools and industry outreach McAfee Global Threat Intelligence—Integrated seamlessly into McAfee products.Rely On the Highest Level of Coordinated Security Today’s threats are more sophisticated and targeted than ever. web. and network—reducing your effort while increasing your protection • 1 McAfee Threats Report: Third Quarter 2010. message. and they are growing at an unprecedented rate.000 new pieces of malware per day on average. we identified more than 16. Malicious URLs have grown almost six-fold in the last two years.000 new identifications per day. this cloud-based threat intelligence service from McAfee Labs helps protect your organization against cyberthreats across all vectors—file.1 With the increased threat of criminals mining for data. . the worldwide research experts at McAfee Labs deliver unparalleled protection against both known and emerging threats through a complete suite of security products.

and network security. We are cited most often for our high threat detection and low false positive rates. AVERT Labs broadened its threat research scope to cover web. Operation Aurora. McAfee Labs highlights • • • • • 1996: McAfee discovers first locally exploitable kernel vulnerability 1997: McAfee pioneered detection of password-stealing Trojans 1998: McAfee discovers the first polymorphic field virus 1999: McAfee discovers famed Melissa virus 2003/2004: McAfee discovers two of the biggest self-executing worms written: Blaster and Sasser 2004: McAfee develops the world’s first real-time. multi-dimensional online reputation system. Year after year. email. We see and prevent billions of threats each day. real-time McAfee Global Threat Intelligence via a complete suite of McAfee security products. Through a series of strategic acquisitions and global expansion of the research team. as well as the complete range of emerging vulnerabilities. This broad security research foundation enables today’s McAfee Labs to deliver comprehensive.About McAfee Labs Threat intelligence leadership With more than 20 years of security research experience. “in-the-cloud” file reputation system. we were the only one among top security vendors whose anti-malware engine correctly thwarted what was one of the most significant electronic intellectual property heists in history. McAfee TrustedSource™ 2005: McAfee discovers attackers manipulating Google 2008: McAfee develops world’s first real-time. McAfee ranks at the top of independent security testing organizations’ assessments of security vendors. McAfee Labs is at the forefront of real-time threat intelligence. McAfee Labs began as McAfee AVERT Labs. McAfee Artemis™ 2009: McAfee credited with inventing and defining “global threat intelligence” 2010: McAfee identifies zero-day vulnerability in Microsoft Internet Explorer and names attack “Operation Aurora” • • • • • GLOBAL THREAT INTELLIGENCE 13 . an industry-leading security research organization focused on identifying and tracking burgeoning malware threats. In a recent independent study. While testing is an important way to judge a product’s efficacy. the real proof is in our ability to protect against real-world attacks.

effortlessly. if McAfee Global Threat Intelligence detects malware. evasive. McAfee uses this visibility to provide the highest level of coordinated security defense. but threats have become increasingly sophisticated. Bidirectional communications connect McAfee products with McAfee Global Threat Intelligence. we receive queries from more than 100 million McAfee nodes deployed in real world settings around the globe. and so on. 14 GLOBAL THREAT INTELLIGENCE . and damaging. The reputations of these files. messages containing it. and more.McAfee Global Threat Intelligence Comprehensive. such as malware used in network intrusions. We combine that insight with data from other threat vectors to understand cyberthreats from all angles. With each query. reducing the probability of attack and the costs of remediation and lost downtime • • How it works McAfee Global Threat Intelligence data comes from multiple sources. McAfee products query the cloud. Thanks to our large and diverse customer base. IP addresses hosting it. and our cloud renders the latest reputation or categorization intelligence to the products so that they can take action. cloud-based threat intelligence Not only has the threat growth curve shifted from linear to exponential. often predictive. McAfee has the answer: a reputation-based system that has visibility into all types of cyberthreats from around the globe. botnet associations. websites hosting malware. your security needs to work more intelligently. websites embedded in malware code. enabling security products to act in concert. websites. For example. delivering up-to-themoment threat information to guide decisions in real time at each layer in your infrastructure. reputationbased threat intelligence. This perspective helps us identify threat relationships. our cloud system learns something new about the subject of the query. • Protects from both known and emerging cyberthreats. the system will automatically search its database for associations between that malware and URLs hosting it or embedded links in the malware. With the growth of cyberthreats putting extra pressure on your IT infrastructure and budget. messages. regardless of the source of those threats or where they travel Arms your security infrastructure with shared threat intelligence. McAfee products can then apply policies to limit interactions with these newly more risky entities. and IP addresses will be updated to reflect greater risk. real-time information Closes the threat window with instantaneous. based on the same robust. Our ongoing actions protect you.

and network. McAfee Global Threat Intelligence has the broadest threat data. and network connection reputation. Each product can take appropriate policy-based action when these threats strike. worms. and most complete product integration in the market. most robust data correlation. Already integrated into your McAfee security products on premises or in the cloud. Multiple threat service mappings per product multiply the accuracy and responsiveness of your protections. web reputation. these products also integrate more threat intelligence services per product than any other security products available today — services like file reputation. DNS attacks. Shared threat intelligence McAfee Global Threat Intelligence enables McAfee products to protect you against cyberthreats across all vectors — file. and even advanced persistent threats. message reputation. This gives McAfee unique visibility into online dangers such as botnets. Each product you connect shares intelligence and capability to strengthen the overall effect. web.Message Web Network Vulnerability Information CLOUD File File Web Message Network THREAT INTELLIGENCE Endpoint Application Control Web Message Risk and Compliance COUNTERMEASURES IPS Firewall The McAfee Global Threat Intelligence framework. message. web categorization. GLOBAL THREAT INTELLIGENCE 15 . Not only do thirteen McAfee product families integrate McAfee Global Threat Intelligence.

and research at www. 2010. web reputation. Strengths • • More than one hundred million McAfee nodes deployed around the globe More than one hundred billion queries each month from all threat vectors — file. In some products. and network connection reputation • Tap into this expertise online with free tools. web. blogs. McAfee Global Threat Intelligence picked up anomalous activity of a new website based on web and network threat data. message. Availability and activation McAfee Global Threat Intelligence is included in the cost of McAfee products that incorporate this service. the malicious website was the source of a widespread iFrame injection attack affecting more than 100. 2010. 16 GLOBAL THREAT INTELLIGENCE . On June 7. McAfee customers with McAfee Global Threat Intelligence were already protected. please visit www.com/GTITurnItOn. a virtual appliance that consolidates client-to-cloud communications using a set of auditable proxy servers for McAfee-protected clients.000 legitimate websites. and adjusted the reputation of the website accordingly. and network The most comprehensive set of threat intelligence services in the market — file reputation. you may enable it easily using your McAfee product administrative interface.com/threatintelligence. McAfee offers the McAfee Global Threat Intelligence Server. However.mcafee. message reputation. For organizations that operate environments with limited Internet access. web categorization. McAfee Global Threat Intelligence is also available as a standalone service. McAfee Global Threat Intelligence is enabled by default. If not.McAfee Global Threat Intelligence in action On May 7. To learn more.mcafee.

McAfee delivers the world’s most comprehensive network defense. award-winning intrusion prevention technologies. and an optimized management platform. .Network Security McAfee Network Security Today’s networks face continuous threats and unauthorized access to resources. Combining real-time threat awareness.

centrally managed by McAfee ePolicy Orchestrator. written organizational policies. proactive threat intelligence feeds. • • Network Security • . User activity control—When you identify network activity by end-user application rather than network protocol. and outbound content control. anti-spam. network access control. You gain streamlined configuration management. plus a complete range of security functions: intrusion prevention. We make ownership easy with integrated solutions and centralized management. Using millions of worldwide network sensors to fully characterize all threats. Our network-class. purpose-built hardware platforms exceed the reliability requirements of even the most critical business applications. firewall.Protect Against Network-Based Threats and Policy Violations McAfee safeguards networks 24/7 with real-time threat feeds from McAfee Labs. McAfee NAC allows you to easily deploy and tailor access controls. Network asset protection—McAfee provides the most precise. The result is proactive. By combining zero-day vulnerability coverage with the most comprehensive. we provide an unparalleled understanding of how attacks behave and may evolve over time. McAfee protects network assets against the latest attacks. high-performance network intrusion prevention technologies in the industry. User access control—McAfee Network Access Control (NAC) links endpoint and network security with access control and compliance. your security and network configurations can map directly to conventional. and simplified compliance assessment. fewer errors. web filtering. resulting in increased security. unmatched threat protection delivered in real time. anti-malware. comprehensive global threat intelligence. improved enforcement accuracy. and network control unmatched in the industry. • Perimeter defense—Firewall and network intrusion prevention technologies enable effective perimeter defense through constant.

zero-day threats. visit www. For the latest information. The products grouped below are presented in alphabetical order in the pages that follow.com/networksecurity. easy-to-use console McAfee Network Threat Response — Dig deep into threats and construct forensic analysis to effectively characterize and respond appropriately to malware Network access control McAfee Network Access Control — Mitigate risk to corporate assets posed by systems that don’t comply with your security policies Network behavior analysis McAfee Network Threat Behavior Analysis — Collect traffic and analyze host and application behavior to detect worms. botnets. deploy. and protect every network-connected device McAfee Network Security Manager — Configure. and reconnaissance attacks 20 21 24 23 26 22 25 NETWORK SECURITY 19 . before they can cause damage.Optimize Network Defenses to Match Your Risks Take your pick from a full range of scalable. Firewall McAfee Firewall Enterprise — Use this next-generation firewall to restore control and protection to your network by blocking threats and eliminating unwanted traffic McAfee Firewall Enterprise Profiler — Instantly analyze network traffic and firewall rules to slash the time needed to solve firewall-related network or application outages Network intrusion prevention (IPS) McAfee Network Security Platform — Block attacks in real time. hardened appliances and convenient software designed to integrate seamlessly for better manageability and fast incident response. and manage multiple IPS and NAC appliances through a single.mcafee.

McAfee Firewall Enterprise Next-generation firewall with true application control As your business depends more and more on web-enabled applications. virtual. All this powerful protection is wrapped up in appliances built on the SecureOS® operating system. and multi-firewall offerings. Effective security that scales from branch office to data center New software updates are delivered automatically via the Internet. even port-agile and encrypted applications. including the option to run on Riverbed Steelhead and Crossbeam X-Series appliances Includes the McAfee Firewall Enterprise Profiler Virtual Appliance and McAfee Firewall Reporter at no extra charge • 20 NETWORK SECURITY . reducing maintenance effort. anti-malware. protocol. control. anti-virus. applications. IPS signatures. We can block content and connections based on malicious intent before a new threat is confirmed. URL filtering. Strengths • • • • Application discovery and control with powerful visualization tools Integrated.0 traffic depend on fine-grained understanding that goes far beyond port and protocol. those applications have opened up a huge. anti-spam. The next generation McAfee Firewall Enterprise family lets you confidently discover. and protections within your control as you construct rules with a minimum of clicks. You can selectively apply broad defenses such as application filters. Then our single policy view puts users. and show you who is using them. and multivector attack protection to deliver unprecedented protection in a single solution. Multivector. and reputation services and manage them all in a logical workflow. and IP addresses. and protect new and existing applications. fast-changing attack surface. First generation firewalls were limited to port. McAfee AppPrism™ offers visibility and control that spans applications and users. Since effective security policies for today’s complex Web 2. Our reliability and control will be there as your application demands grow. visualize. McAfee ePolicy Orchestrator integration shares firewall health and welfare information with centralized monitoring systems. reputation-aware threat intelligence. McAfee Firewall Enterprise combines full application visibility and control. These integrated protections apply reputation and global threat intelligence to combat the latest botnets and advanced persistent threats. reputation-aware security We can automatically discover applications running on your network. in-line inspection and URL filtering Proven in Fortune 500 and ultra-secure government organizations Flexible range of physical.

McAfee Firewall Enterprise Profiler
Intuitive visualization of network traffic and firewall actions in real time Many organizations struggle to understand the traffic traversing their networks, since it travels as generic or encrypted web traffic through port 80 and port 443. This blind spot limits administrator control over network use, hampers security, and sometimes allows firewall rule changes to inadvertently sabotage network applications. McAfee Firewall Enterprise Profiler shines a spotlight on traffic with application discovery, analysis, visualization, and validation, so you gain the visibility needed for effective control and fast resolution of issues. Situational awareness with the right details to guide action Profiler gives network and firewall administrators at-a-glance visibility into user behavior and who is using which applications, along with the threat risk of each application. Its reporting depicts the users, the applications they are using, the bandwidth being consumed (inbound and outbound), the countries involved, and the time of day. With a few simple clicks, you can drill down from the main view to the details needed to understand your network environment, including related user names, groups, roles, and more. Our visualization and analytics provide better understanding of rule usage and facilitate speedy identification of new application threats. For instance, details on recent or increased usage of a risky application like BitTorrent could indicate employees are breaking your acceptable use policy. Profiler can also minimize troubleshooting costs through quick identification and scoping of application outages and validation of fixes after rule changes. Seamless interoperability with existing network infrastructures Profiler receives data over a live feed from McAfee Firewall Enterprise and aggregates this information with flow data from across the network. By leveraging the McAfee ePO asset directory, you can see the full context of an event for faster resolution. A high-level McAfee ePO dashboard showcases the most pressing firewall alerts that likely require administrator intervention. The Profiler virtual appliance is included with the V8 release of McAfee Firewall Enterprise. Large organizations may want to step up to our pre-configured, scalable McAfee Firewall Enterprise Profiler P1000 appliance. Strengths
• • •

Real-time verification of application rollouts Confirms whether or not traffic disruptions are due to firewalls Detailed visuals and drilldowns let you understand root causes and immediately update firewall configurations to restore service
NETWORK SECURITY 21

McAfee Network Access Control
Reduce threats and data loss with unified network access control Visitors and contractors can introduce malware, disrupt your networks, and compromise your systems and data. Employees who self-administer their endpoints can disable or misconfigure security tools and install malicious programs that can threaten data. McAfee Unified Secure Access is the first network access control (NAC) solution to unify endpoint and network security with access control. Unlike many NAC solutions, the integrated McAfee solution secures against threats inside and outside the network while remaining simple, cost-effective, accurate, scalable, and secure. Minimize risk of outbreaks while allowing flexible policies McAfee expands your security posture with adaptive policy technology that combines multiple assessment and control features into one NAC solution. It controls access and protects against broad threats with application-based and identity-based technologies, which control who has access to your specific critical network resources. Further, McAfee protects your investment by leveraging your existing network and system components and taking advantage of integrated management through McAfee ePO. Broad enforcement options McAfee Unified Secure Access includes three main components. Mix and match these options to create a complete solution:

McAfee NAC Software supports managed users and offers employee endpoint health assessment both pre- and post-admission McAfee NAC Appliance controls guest and contractor access with a network-based approach and offers identity and application-based network access control McAfee NAC Module for McAfee Network Security Platform adds the functionality of the NAC Appliance to an existing Network Security Platform to incorporate intrusion prevention in network access control decisions
St
ep
licy Po 1:
Ste p2 :D i
Scans for rogue devices, alerts, and reports

er ov sc

Takes action based on outcome of policy check or behavior

Ste

p 4: R e m e diate

22

NETWORK SECURITY

St

ep

3:

Enf

orce

McAfee supports a continuous lifecycle of access control for compliance.

Defines health, machine/user identity, and application policy

ni St e p 5: M o

Monitors endpoint to ensure ongoing compliance

Checks pre- or post-admission health against policy

to
r

McAfee Network Security Manager
Simple, centralized control for multiple types of McAfee network sensors McAfee Network Security Manager gives you real-time visibility and control over a complete range of McAfee network appliances, including intrusion prevention system (IPS) sensors, network threat behavior analyzers (NBA), and network access control (NAC) appliances. With its plug-and-play operation, easy-to-use functions, and web-based management, McAfee Network Security Manager saves you time, trouble, and operating costs. Real-time control of real-time data Unrivaled simplicity teams up with centralized, real-time security management. McAfee Network Security Manager enables you to configure, deploy, and manage multiple McAfee IPS, NBA, and NAC appliances through a single, easy-to-use console. A single Network Security Manager appliance delivers centralized, web-based management and unrivaled ease-of-use. The stateof-the-art console puts you in control of real-time data to easily manage and monitor all network security appliances and make better decisions, faster. Pre-configured, but flexible, management Pre-installed and pre-configured, this hardened, plug-and-play appliance ensures scalable, real-time, always-on control. The intuitive web-based management interface can handle any situation, from single devices up to large, distributed, enterprise-wide deployments. It delivers comprehensive and in-depth attack information, as well as highly customized graphical reports. When you discover inappropriate traffic, you can move quickly to identify and correct problems on hosts. McAfee ePO integration provides real-time visibility of actionable system host details, including host name, user name, OS, patch level, media access control (MAC) address, last scan date, protection details, and the top host IPS, anti-virus, and anti-spyware events. The central McAfee ePO repository lets you synthesize and filter data from multiple tools to create custom reports. McAfee Network Security Manager and McAfee Network Security Central Manager are available as pre-configured, hardened appliances or software only, providing the flexibility required for small networks, global enterprises, and high-traffic data centers. Secure access to the Network Security Manager empowers remote management of sensors. Strengths
• •

Simple, granular security policy management Easy-to-use, pre-configured templates, recommended-for-block policies, and out-of-the-box blocking Highly flexible and customizable reporting

NETWORK SECURITY

23

” NSS Labs. a set of hosts. When McAfee detects an issue. or even a single endpoint. known exploits. These dynamic updates ensure continuous. Strengths • • • Industry-leading default and tuned security effectiveness¹ The only IPS to hold the NSS Labs 10-Gigabit IPS certification Carrier-class reliability and the highest port density platforms available ¹ “Intrusion Prevention Systems Individual Product Test Results. You can control traffic and apply unique policies and protections to a network segment. We combine IPS. the platform offers real-time malware detection — via file reputation — and reputation and identity analysis — via network connection reputation — to protect against emerging threats. and IM and peer-to-peer tunneling. such as a host that has become a bot. edge. Better protection.McAfee Network Security Platform Advanced. On-board host quarantine helps you contain threats. 24 NETWORK SECURITY . vulnerability-based intrusion prevention (IPS) appliance offers the highest tested accuracy and throughput in the industry¹ and protects an average of 80 days ahead of threats. purpose-built appliances and experience performance from 100Mbps up to true 10Gbps network IPS for 10GbE networks — with 99. application and protocol anomaly. and — through optional NAC software — control network policy and enforce compliance. McAfee Network Security Platform can also quarantine hosts. validate new patches. manage application traffic. An end to patch fatigue and compliance enforcement woes McAfee helps you insulate systems from risk and enable compliance with the same controls. The optional NAC module controls which devices get access to the network. including unmanaged devices belonging to guests and employees. Choose from a range of hardened. and deploy patches to the systems that really need them. SYN flood. This network-class. 2010. DoS. proven intrusion prevention for every networked device McAfee Network Security Platform protects every network-connected device by blocking attacks in real time before they cause damage. and validates and enforces system health. plus threats like VoIP vulnerabilities. viewing host data such as protection details and the top host IPS and anti-malware events. current protection. better response Enabled by McAfee Global Threat Intelligence. It gives you the information and time you need to assess and enforce compliance.999 percent availability — for locations from the network core to the perimeter. and branch office. DDoS. and behavioral detection to guard against zero-day. and encrypted attacks. you can use McAfee ePO to quickly identify the system and take action.

distinct flow capacity. NAC. Gigabit Ethernet connectivity. To reduce management complexity. A single NTBA sensor efficiently collects traffic from the entire network. RAID disk array. you can instantly assess the threat: perhaps a denial-of-service attack.McAfee Network Threat Behavior Analysis Network-wide threat visibility and anomaly detection for enterprises Attacks target your weak spots. Comparing live traffic to normal baselines helps you identify and verify unusual network behavior. This appliance is an out-of-band network device. including the correlation of anomalies with host data and intrusion prevention system (IPS) alerts and forensic-quality threat behavior data. or innocent video traffic. a worm. use the McAfee Network Security Manager to control McAfee NTBA. and McAfee ePO. and offline SAN storage • • NETWORK SECURITY 25 . for cost-effective. In real time. and reconnaissance attacks traversing your network. targeted attacks including DDoS. network-wide visibility. Strengths • Proactive. Gain insight into your evolving risks by seeing the full context of threat events. zero-day threats. botnets. Behavior analysis increases the value and utility of your other infrastructure. spam. so it is minimally invasive. You can even detect and shut down unauthorized or vulnerable applications through NTBA integration with the McAfee Network Security Platform (IPS). threats within your network — anomalous activities. it reviews host and application behavior to detect unknown threats including worms. Maximize Coverage and Value Graphical views help you know with confidence how well you are mitigating risks or pinpoint network segments and threat vectors that need a boost in protection. instead of poring through logs. or large segments of the network. Juniper. and IPS sensors. As your network changes and grows more intricate. When bandwidth use spikes. and Extreme Networks for cost-effective monitoring of network segments without IPS or firewalls Fully equipped with quad-core processors. Integration with McAfee ePO and McAfee Vulnerability Manager helps you enforce policies and act quickly to reduce risk when threats change. The McAfee Network Threat Behavior Analysis (NTBA) appliance reports unusual network behavior by analyzing traffic from network switches and routers called flow data (like NetFlow) and correlating this data with Layer 7 application information from the McAfee Network Security Platform. McAfee Network Access Control. and botnet zombies — require special attention. behavior-based threat detection to avoid network penetration and disruption of business operations and productivity Supports switches and routers from Cisco.

McAfee NTR finds new network activity unique to your network. and label malware and bots and can recreate the series of packets that attempted to conceal the threat. analyze. It detects malware activity in real time. detects shellcode. and analyzes malware specific to your network. A web dashboard provides visibility into discovered malware. and respond to previously unknown network malware When targeted attacks threaten your network. it confirms the attack. and effectively characterize and respond to advanced malware. construct forensic analysis. Updated . and instantly collects and analyzes a sample to aid remediation. it automatically identifies malware targeting internal network vulnerabilities. is operating. Finally. how it entered your network. Instead of sifting through thousands of threat alerts. Strengths • Ever-expanding SNORT-compatible signature database with support for custom signatures Easy integration with McAfee network security solutions for multi-pass analysis of embedded network threats Streamlined web-based management • • 26 NETWORK SECURITY . These shared signatures bring the full power of McAfee Labs research to McAfee NTR. even decoding polymorphic encoders and discovering malware payloads embedded inside otherwise innocuous PDF files. you can rely on NTR: when it discovers both a vulnerability and a means to exploit it in the same stream. use specialized tools to see the threats unique to your environment. and trying to spread. A powerful tool for security analysts. We dissect payloads to identify.McAfee Network Threat Response Deconstruct. choosing the response most effective for each organization. The McAfee NTR appliance sits inside your network and streamlines the forensic threat analysis process. McAfee Network Threat Response (NTR) enables security analysts to dig deep into threats.DAT files move out to all protected systems within minutes. Confirm and characterize attacks For confirmed attacks. confirm attacks. McAfee NTR analysis helps you better characterize the malware. Analyze unknown threats and targeted attacks This out-of-band appliance captures. reverse engineer. First. deconstructs. McAfee NTR helps you update your security posture by capturing malware and automatically sending samples to the McAfee Global Threat Intelligence network.

McAfee SaaS and on-premises solutions integrate intelligent and flexible control to weave strong—but manageable— content security into your existing architecture.McAfee Content Security Guard critical data and protect web and email productivity. Content Security . whether users are in the office or working remotely.

With powerful inspection of inbound and outbound traffic. Simply protect your precious data and crucial email and web services with McAfee Content Management. McAfee protects against this data loss. preventing information loss and data theft. virtual disks. phishing attempts. • Data protection—Safeguard regulated and sensitive data from unintended disclosure. laptops. and web-based malware. • • Content Security . authentication. mobile devices. McAfee removes the complexity and manual analysis from data loss prevention. Encryption—Protect data across a broad range of devices. you can safely exchange information with partners.0 applications. network files. We stop spam. and policy-driven security controls. foiling cybercriminals who combine email and web technologies to install data-stealing code. Email and web protection—Sensitive data can easily escape through email and the web. and employees using personal devices. making it easy to identify potential problems and fine-tune policies. Using built-in data mining features. and removable media. cloud computing. Powerful encryption technology stops unauthorized access to data and delivers layers of protection for desktops. and loss.Let Security Remove Barriers to Business You can safely embrace Software-as-a-Service. unauthorized use. and streamline policy enforcement. With McAfee encryption solutions. business use of Web 2. strong identification. keep employees productive.

com/contentsecurity for the latest information.Match Protections to Your Business Our solutions scale from small businesses to large enterprises and fit into your evolving architecture as software. 32 33 50 30 36 37 31 34 35 38 39 40 40 41 42 43 44 45 46 47 48 49 51 47 52 CONTENT SECURITY 29 . appliances. The products grouped below appear in alphabetical order in the pages that follow.mcafee. or SaaS. Data protection McAfee Data Loss Prevention McAfee Device Control McAfee Total Protection for Data Encryption McAfee Command Line Encryption McAfee Encrypted USB McAfee Endpoint Encryption Email and web protection McAfee Content Security Blade Server McAfee Email and Web Security Appliance McAfee Email Gateway McAfee SaaS Email Archiving McAfee SaaS Email Encryption McAfee SaaS Email Inbound Filtering McAfee SaaS Email Protection McAfee SaaS Email Protection and Continuity McAfee SaaS Total Protection McAfee SaaS Web and Email Protection McAfee SaaS Web and Email Security with Archiving McAfee SaaS Web Protection McAfee Security for Email Servers McAfee SiteAdvisor Enterprise McAfee SmartFilter McAfee Total Protection for Internet Gateways McAfee Total Protection for Secure Business McAfee Web Filtering for Endpoint McAfee Web Gateway Check www.

reduce labor costs. McAfee E-Business Server McAfee E-Business Server incorporates the industry’s strongest encryption algorithms. you can even share secure data with partners that do not have encryption. Using a simple command-line interface or natively within an application. and in transit over the Internet. so you can securely exchange information with more partners. independent of their preferred transfer method. during access. because E-Business Server supports self-decrypting archives (SDA). Blowfish. developers and administrators can protect data throughout its lifecycle: from its point of origin to data processing and storage. In addition. along with most major certificate authorities. Files with sensitive data need to be protected in transit and in storage for true end-to-end security. remote archive. companies can easily add encryption into existing processes. providing true end-to-end security. Additional configurations for flexible control over data • • • • McAfee E-Business Client McAfee E-Business Server for OS/390 McAfee E-Business Server Native APIs McAfee E-Business Server Partner Edition 30 CONTENT SECURITY . AES. eliminating the need for costly solutions such as leased lines and VPNs. you can protect the privacy of data in storage. You can secure data within automated and batch processes (for file transfer. It secures data as it is transmitted over the Internet and throughout your enterprise. including Triple-DES CAST. and eliminate human interaction errors. We support the OpenPGP standard. Most importantly. IDEA. More than half of all Fortune 500 companies rely on McAfee E-Business Server for secure file transfer and storage. Enterprises that routinely exchange sensitive customer information or intellectual property with branch offices. and business partners need to keep confidential data and applications safe and secure. companies consistently protect sensitive data.McAfee Command Line Encryption Transfer and store your sensitive files securely Your data is the lifeblood of your business. Since these products are transfer protocol independent. and the Twofish Cipher Algorithm. vendors. and transactions) and in standard or proprietary applications. An application-layer approach to encryption McAfee E-Business Server — a fully integrated application-layer approach to encryption — simplifies the process of ensuring end-to-end data security. By securing data automatically.

Each blade is automatically installed and configured for its intended purpose (email or web scanning). fans. and performance they need to implement top-rated email and web security solutions from McAfee. and enterprise-class manageability. without service disruption. such as URL filtering. of course. SSL scanning. scalability. The McAfee Content Security Blade Server combines many web and email protections and access control features that would otherwise require multiple stand-alone products. and power management into a single solution managed as a unified environment. simply add new blades as your requirements increase. by sliding in a new blade Overall system status displayed in convenient at-a-glance dashboard Flexibility to turn on different email and web features when you need them. scalability. With plenty of capacity. You can protect email or web infrastructure separately or cover both with a single system.McAfee Content Security Blade Server Highly scalable email and web security Large enterprises require high performance and throughput. And it uses up to 40 percent less power and 40 percent less space when compared to equivalent 1U rack-mounted servers. These McAfee solutions on the McAfee Content Security Blade Server bring a new level of protection. Combining functionality this way streamlines management and ensures policy enforcement without gaps. Strengths • • Choice of eight blade or sixteen blade enclosures Redundant power supplies. It automatically responds to fluctuating traffic demands and system status and incorporates wire-speed load balancing for traffic distribution and fault tolerance. The blade enclosure integrates server. and content inspection • • • CONTENT SECURITY 31 . Go green while reducing operating costs Our security technology plus the HP BladeSystem infrastructure creates an intelligent. and management blades prevent downtime Increase capacity in minutes. integrated web and email security system that takes advantage of the blade server’s inherent capabilities: operational efficiency. networking. performance. and reliability. Performance and high availability for your security solutions McAfee Content Security Blade Server is the ultimate platform to host your email and web security solutions. storage. McAfee Content Security Blade Server gives large enterprises and providers the functionality. but they also have special requirements for availability and manageability.

To protect your data beyond your network. Pre-integrated solutions deploy in just days Deploying and managing McAfee DLP is simple. and reporting. Our approach makes it easy to roll out protection quickly and drive down deployment costs. illustrate data flows. A foundation for complete data protection Through our easy-to-own solution and streamlined management platform. With McAfee DLP. Real-time network traffic inspection guards sensitive data that you may not realize you possess. While you enjoy the highest levels of data protection. management. safeguard information sent to third parties.McAfee Data Loss Prevention Follow the data — see what you are missing As increasing regulation and corporate standards place more demands on IT to ensure safe data handling. implementing effective data protection quickly. and prove compliance with less effort. McAfee Data Loss Prevention (DLP) simplifies and improves security for your sensitive information by giving you insight about where data is stored. deployment of the necessary protective solutions can seem daunting. email. enabling you to create accurate and effective information protection policies. without months of disruptive trial and error. and who has access to it. It integrates with other McAfee products — encryption. without disrupting business. Unique analytics keep you ahead of threats. you will be saving time and money with centralized deployment. and web security — for complete data security from the USB drive to the network firewall. You manage the process through the McAfee ePO platform. and explain your organization’s data use. how it is used. we offer tight integration with Adobe LiveCycle Rights Management. you can protect data consistently. Some data loss prevention solutions can be difficult to deploy and expensive to own. a single console that supports a centralized overview and delegated control. McAfee DLP enables you to be proactive about data protection. Our DLP solution includes: • • • • • • • • McAfee Network DLP Discover McAfee Network DLP Monitor McAfee Network DLP Prevent McAfee Network DLP Manager McAfee Host Data Loss Prevention McAfee Device Control McAfee Data Protection Suite for Rights Management McAfee Total Protection for Data CONTENT SECURITY 32 . McAfee DLP can secure all sensitive data wherever it is stored or used.

You quickly and easily configure. compressed. McAfee Device Control guards against critical data leaving the corporation through USB flash drives. pasted. and other removable storage devices that can connect to desktops and laptops. you frustrate users and constrain productivity. Theft is not the only risk. and other removable media — however useful — pose a real threat to your organization. Instead. formats. and update policies and agents throughout your environment from the centralized McAfee ePolicy Orchestrator management console. Now you can monitor and control data transfer to portable storage devices to improve compliance with data control policies and regulations. and blocking. deploy. Their small size and enormous storage capacity make it all too easy for confidential customer data and intellectual property to walk right out the front door and into the wrong hands.McAfee Device Control Fine-grained control over removable media devices on your network USB drives. For accurate. monitoring. MP3 players. vendor ID. CDs. iPods. Strengths • • • • • Fine grained device definitions Content and context-aware protection Centralized policy deployment and management with McAfee ePO Easy upgrade to McAfee Host Data Loss Prevention Visibility. and user. control. device name. DVDs. serial numbers. you can define detailed hardware-based filtering. Our complete device management lets you enforce devices by any Windows software-based device parameter. copied. reliable control. our granular controls let you specify and categorize which devices may or may not be used and enforce what data can and cannot be transferred to these devices. If you need hardware-based encryption. or encrypted. even the most well-intentioned employees accidentally lose devices.and device-level logging to support compliance CONTENT SECURITY 33 . and derivatives even when data is modified. CDs. you can specifically limit use to devices that include approved encryption. This unrivaled protection helps you protect all data. including product ID. Targeted. automatic enforcement of detailed device and data policies With wholesale blocking. Bluetooth and IrDA devices. and more. device class. DVDs.

and document fingerprinting for simplified compliance and data loss prevention Integrated web filtering and anti-virus • 34 CONTENT SECURITY . policy-based controls. Sensitive or regulated data leaving via email can also have huge negative implications. identifying policy-controlled content and stopping outbound messages that could negatively affect your corporate and email reputations. Inbound security Great email security starts with efficiently blocking inbound spam and threats. With its extremely low rate of false positives. Outbound protection Outbound hygiene and content inspection of email are critically important. the McAfee Email and Web Security Appliance combines market-leading email protection with data loss prevention. the McAfee Email and Web Security Appliance is always armed with the latest. Powered by McAfee Global Threat Intelligence. and advanced reporting. identifying threats and unwanted email at the connection. Strengths • • • Scalable. high performance email security appliance The most effective spam filter with the lowest false positives Built-in content dictionaries. outbound protection Much more than a spam and malware filter. message. Reputation scrutiny enables the McAfee Email and Web Security Appliance to more efficiently and accurately block or quarantine email. you do not have to choose between effective spam blocking and low false positive rates. Infected systems within your network cause your organization to be blacklisted. proactive defenses against both known and unknown threats.McAfee Email and Web Security Appliance Inbound security. With the McAfee Email and Web Security Appliance. yet easily managed. McAfee Email and Web Security Appliance keeps the spam out while delivering legitimate email accurately. with maximum performance. you get them both. McAfee Global Threat Intelligence Cloud-based sender reputation provided by McAfee Global Threat Intelligence enables the solution to make rapid decisions about the email. Highly scalable to meet the demands of the most demanding enterprises. the McAfee Email and Web Security Appliance provides the highest level of email security available with a perfect blend of simplicity and sophistication. and file levels. making the solution extremely effective. McAfee Email and Web Security Appliance inspects outbound traffic.

increasing the value and precision of email controls. detailed reporting. Enterprise-class logging and reporting simplify administration and compliance. quarantining. and granular. Simplified compliance. and OpenPGP included Integrated. easy administration Sophisticated content scanning technologies. Email is also a primary vector for sensitive data loss. on-box encryption for sending encrypted email to end users • • • CONTENT SECURITY 35 . easy-to-deploy appliance simplifies fragmented. phishing. phishing. and bounceback attacks. advanced compliance. Protection from email-borne threats The McAfee Email Gateway identifies and blocks incoming spam with over 99 percent accuracy while providing integrated protection against viruses. encryption. alerting. re-routing. directory harvest. multivendor security environments and cuts operating costs while strengthening messaging security. Strengths • • 99 percent or better spam detection accuracy Protection against email-borne threats such as malware. policy-based message handling prevent outbound data loss and simplify compliance. S/MIME. Administrators have the flexibility they need to create policies to fit each business. Effective email security should address both inbound and outbound threats while lowering costs and reducing the burden of administration. and simplified administration. multiple encryption techniques. they now seek to steal data and deploy malware. denial of service.McAfee Email Gateway Comprehensive protection from email-borne threats and email data loss The scale and diversity of email-borne security threats continue to increase. Upon detection. It prevents zero hour threats and dramatically reduces the impact of spam surges through dynamic spam classification and threat updates combined with global. While threats such as spam were once considered merely nuisances. Combining these features into a single. multi-protocol reputation intelligence. and blocking. and bounceback attacks The industry’s most extensive on-box data loss prevention detects structured and unstructured data to reduce data loss and enable regulatory compliance Gateway-to-gateway encryption with TLS. the gateway supports a wide range of policy-based actions including forced encryption. The gateway integrates with McAfee ePO for centralized reporting and alerting. denial of service. The industry’s most complete feature set — at no additional cost McAfee Email Gateway integrates comprehensive inbound threat protection with outbound data loss prevention. malware. directory harvest.

because they never leave the USB drive. management. huge storage capacity. and with industry and government regulations. you centralize deployment. McAfee Encrypted USB drives keep mobile data secure. Automatic. These devices. with convenience comes risk. However. automatically. and auditing. Because of our hardware-based encryption. Extensive auditing and reporting tools allow you to prove that data on devices was encrypted. monitoring. 2 McAfee Encrypted USB Manager software is optional and provided for non-McAfee ePO customers and digital identity options. and on the fly. Our drives protect sensitive information with industry-leading technology: AES-256 encryption and FIPS-140-2 validation. encryption keys cannot be obtained or copied. along with the confidential data they contain. 36 CONTENT SECURITY . applying strong encryption and an advanced management platform.McAfee Encrypted USB Secure mobile devices with built-in access control and encryption USB devices are widely used and convenient because of their small size. and high portability. With McAfee ePolicy Orchestrator (McAfee ePO). To make the data on these devices unreadable by unauthorized parties. Data stored on your USB drives is protected and compliant with company policies. with no special training required. policy administration. even if a device is lost or stolen. are easily lost or stolen. Advanced management with proof of encryption if lost or stolen Efficient security requires you to extend company security policies and compliance requirements to mobile USB drives in a strategic. comprehensive. and managed way. McAFEE ENCRYPTED USB BY SANDISK McAFEE ENCRYPTED USB STANDARD McAFEE ENCRYPTED USB BIO McAFEE ENCRYPTED USB HARD DISK NON-BIO McAFEE ENCRYPTED USB HARD DISK Password Authentication Biometric Authentication AES-256 Bit Hardware Encryption Virtualization Capable (PC-on-a-Stick)1 FIPS 140-2 validated Centralized management via McAfee ePO2 McAfee Anti-Malware Protection • • • • • • • • • • • • Optional Optional Optional Optional Optional • • • • • • • • • • • 1 Third-party software required at additional cost. reporting. industry-leading encryption McAfee Encrypted USB drives encrypt data transparently.

anytime. Transparent policy enforcement Encryption happens transparently — on the fly — with virtually no system performance degradation. tracking. Heterogeneous device support McAfee Endpoint Encryption provides full-disk and file/folder encryption that supports your mixed. removable media. As a result. A common agent and management platform with McAfee endpoint security products helps ensure dramatically lower operational costs and administrative overhead. McAfee Endpoint Encryption prevents unauthorized access to sensitive data through industry-leading encryption technology and strong access control. portable storage devices. Piecemeal and full-disk-only encryption solutions leave security holes and complicate management and reporting.000 customers around the globe.McAfee Endpoint Encryption Ironclad security for lost or stolen devices. Multiple layers of protection let us cover more data loss scenarios than any other vendor in the marketplace. and self-encrypting and solid-state drives. anywhere Rarely does a month go by without an organization revealing the loss or theft of a laptop brimming with sensitive data. or transferred. A single policy architecture for data protection and endpoint security makes it easier to implement and prove compliance as regulations get more stringent. and reporting of encryption status for every device in the environment from a single management console. With over 6. McAfee is the leading vendor of encryption software. One management environment for endpoint and data Our solution offers real-time enforcement. sensitive data remains protected regardless of how it is stored. used. enabling business continuity anytime. Single sign-on with pre-boot authentication gives users secure yet convenient access to the information needed to do their jobs efficiently. laptops. anywhere. evolving range of devices: desktops. plus self-encrypting and solid state drives Consistent administration and policies for any mix of devices in the environment Support for hardware acceleration based on the Intel AES-NI technology Persistent encryption requires no end-user action or file renaming • • • CONTENT SECURITY 37 . network files and folders. Strengths • Supports software-based encryption. smartphones.

service administrators can easily set up and view multiple saved searches. or simply as an accurate record of who said what to whom. and even attachment content.McAfee SaaS Email Archiving Limitless storage. such as tape backup. powerful e-discovery. Strengths • Secure. companies must spend hours managing onsite servers to provide continuous maintenance. safely. data exporting options. and common email configurations to satisfy discovery needs and reduce administration. you can easily access a single message — or thousands — in seconds. using either simple or advanced search criteria. Confident responses to e-discovery requests When you need to recover a stored email message in response to an e-discovery request. through our unified management platform. constantly jeopardizing its ability to economically and efficiently store email at its site. you need to produce that message as quickly as possible. It works by securely pulling messages from your mail server journal and storing them using industry-standard 256-bit encryption. not yours McAfee SaaS (software-as-a-service) email archiving automatically. with unparalleled ease. With the McAfee SaaS email archiving service. including user. automated email archiving to McAfee data centers helps you manage your Microsoft Exchange database size and reduce your maintenance burden Unlimited in-the-cloud storage allows scalability and helps you easily comply with document retention regulations Easy online management and powerful search tools help you quickly satisfy discovery needs Flexible licensing options minimize maintenance time and capital expenditures Included technical support helps resolve any issues around the clock • • • • 38 CONTENT SECURITY . With hardware-based solutions. to demonstrate compliance. Simple online management provides rapid search functionality. date range. For example. no hardware required A business that relies on email can easily generate thousands of new messages every day. at our site. and economically stores email for future review and e-discovery on McAfee infrastructure. message content. often with coverage gaps between backups. Secure archival at our site.

McAfee SaaS email encryption helps businesses meet regulatory compliance and ensure secure confidential information delivery. cloud-based encryption solution. It enables both sender and recipient to communicate securely. And. a recipient can retrieve the message from the web-based message pick-up portal. McAfee SaaS email encryption is easy to use. providing bidirectional protection. Strengths • Cloud-based encryption to comply with regulations and ensure secure confidential information delivery Enables both your senders and recipients to communicate securely and easily. and billions of dollars in account data can be lost. Easy encryption for business users on the go Available only as an add-on to our McAfee SaaS email outbound filtering service. we scan and encrypt the content. Senders simply compose an email and send it. automatically and transparently. and with our centralized online SaaS management. even when using mobile devices Policy-based (passive) or sender-initiated (active) encryption Centralized management is easy-to-use and simple to administer No encryption key management • • • • CONTENT SECURITY 39 . the message can also be encrypted. End users also have the option to initiate encryption proactively by entering “[encrypt]” in either the subject line or the message body to force encryption. As Security-as-a-Service. An easy to use. which enables viewing of the message directly through the recipient’s email client. We require no encryption key management. administrators can manage end-user credentials and pre-configure multiple encryption policies for all user groups. If it matches a policy set by the administrator. even through mobile devices. To decrypt messages. years of product research. valuable intellectual property. this cost-effective encryption solution does not need any upfront investment in additional hardware or software. when they reply.McAfee SaaS Email Encryption Cloud-based encryption to secure confidential information delivery With one innocent click sending one simple email. or they can download a secure message reader. behind the scenes.

directory harvest attacks. viruses. work non-stop as a first line of defense to protect your email infrastructure and safeguard your communications and information integrity. Your email is routed through the McAfee SecurityCenter where it is scanned and cleaned before being delivered. mail bombs. and upon recovery. and DOS attacks CONTENT SECURITY • • • 40 . Knowing what goes out is just as important as knowing what goes in Some emails contain confidential information. with less than one second of delay in transit. or costly installs. and other harmful content from entering your network — without installing any hardware or software. viruses. and partners Disguises your email server to thwart attacks. Strengths • Real-time threat checking of inbound or outbound emails in the cloud using McAfee Global Threat Intelligence Centrally managed via the online SaaS management console Enforces corporate email policies while safeguarding users. McAfee does all the work of keeping the system up to date with the latest anti-virus and anti-spam signatures and detection methods. McAfee SaaS Email Protection provides the outbound protection needed to rein in these risks and protect your business. McAfee SaaS email solutions provide either inbound only. phishing. customers. lightens your workload while cutting the burden on your email server and keeping unwanted email from clogging your network. some contain malware. whether the sender’s intent is malicious or benign. Incoming emails are automatically spooled. Our set-andforget management experience. fully Software-as-a-Service email security outside your network to quickly and accurately prevent over 99 percent of spam. with industry-leading availability. reliable. Our redundant data centers.McAfee SaaS Email Inbound Filtering McAfee SaaS Email Protection Block inbound and outbound email-borne attacks in their tracks Deploy this effective. or inbound and outbound protection. accessible online. It raises the level of your messaging security without capital expenditures. With McAfee SaaS Email Protection. phishing scams. unspooled back to your email server. set-up fees. Lower infrastructure costs by filtering email in the cloud Compatible with all major email platforms. we add insurance to your network and email server so you have full confidence no incoming email is lost during planned or unplanned downtime. some are spam sent from an infected machine on your network. while we block or quarantine spam.

and all email is spooled until connectivity is restored. Your users will have “business as usual” access during this period. managing email to reduce spam and to ensure uptime becomes a huge task that continually diverts IT resources from strategic work. This suite is a cloud-based solution that blocks unwanted email before it reaches your network. all inbound and outbound email is filtered via McAfee. no software to install. including the ability to compose. When connectivity is reestablished. and knowledge assets while ensuring business continuity and compliance with McAfee SaaS Email Protection and Continuity. access. With all that email traffic. and delete messages. Strengths • Security-as-a-Service ensures inbound and outbound email availability and email business continuity protection even during a server outage In-the-cloud protection blocks more than 99 percent of spam and malware before it reaches your network Automatic outbound email inspections keep your business compliant with regulatory and workplace requirements Continuous email storage. Email outage protection guards your business against downtime Protect your users. received. reply to. You achieve this protection and business continuity with no hardware to buy. In an outage. no tapes to change. and deleted email back to the primary system. McAfee intelligently synchronizes all sent. and ensures email access even when your server is unavailable. supports outbound email security policies. IT infrastructure. and no maintenance to perform.McAfee SaaS Email Protection and Continuity Keep your business connected and secured with email protection Email is today’s engine of productivity as thousands of email messages pass through a typical company’s servers every day. and use Streamlines email management with a web-based portal — no need for tape backups or onsite infrastructure • • • • CONTENT SECURITY 41 .

expertise. email. web. and intrusions and provides web security Inbound and outbound email filtering blocks spam and phishing attacks Email continuity ensures email access even when your server experiences an outage Host-based and cloud-based web filtering blocks online threats and ensures Internet compliance and productivity for users on and off the corporate network Perimeter scanning helps identify potential vulnerabilities or security issues and provides remediation assistance • • • • • 42 CONTENT SECURITY . and web protection solutions — all hosted by the McAfee management infrastructure. endpoint. infrastructure. cloud-based security Get a single integrated suite that provides all the benefits from the McAfee SaaS email. Integrated. hackers. and free your IT staff to focus on other areas critical to your business. Strengths • An integrated Security-as-a-Service suite that eliminates the high costs of onsite hardware maintenance and investments Endpoint protection stops viruses. online dashboard to view user protection. and 24/7 Gold support to improve your security. the McAfee SecurityCenter. and network. spyware. and vulnerability scanning Looking for complete protection from the cloud? McAfee SaaS Total Protection offers best-in-class security that leverages the power of cloud computing to deliver comprehensive and cost-effective protection for endpoint. vulnerability management. The SecurityCenter provides total visibility with 24/7 access to an easy-to-use. Our best-in-class SaaS solution maximizes your protection from the cloud and enables your success with a centralized management console. customize security policies. Subscribe to McAfee SaaS solutions. endpoint security. cut your capital expenditures.McAfee SaaS Total Protection Complete email and web protection. and generate and download reports.

With over 100 categories to choose from. reduces risky and unproductive surfing. We can also enforce Internet use and content policies by applying access rules to web and email traffic. phishing sites. If your network or email server goes down.0 malware. whether through disaster or design. including adult content. we are able to insert our best security between you and these threats. and saves you money. We assess intent or predicted behavior. Web 2. viruses. Strengths • Convenient subscription replaces the up-front costs and daily expenses of on-premises security McAfee Global Threat Intelligence protects in real time Complete inbound and outbound web and email protection Reliable email access during planned and unplanned server outages Integrated web management portal speeds start-up and management Web-based dashboards allow easy monitoring. our service keeps your employees. As your users access web pages. Ensure email availability and protection McAfee SaaS Email Protection blocks over 99 percent of spam and eliminates 90 percent of spam-related costs with a complete. and targeted attacks. and suppliers connected 24/7. accuracy. Trojans. worms. This integration of inbound and outbound filtering and anti-malware blocks spam. strips threats. Block hard-to-detect threats before they reach your network By routing your web and email traffic through our data centers. multilayered email defense — and industry-leading low false positive rates. and lost productivity Thousands of companies trust McAfee to protect their most critical productivity tools: web and email. we scan outbound requests. Our experts do all the work. and reporting Leading anti-malware and anti-virus engines • • • • • • CONTENT SECURITY 43 . blocking connections to risky or policy-controlled sites. McAfee SaaS Web and Email protection combines superior. and then proactively protect against unknown malware. tuning. our web filtering is unmatched in flexibility. We can stop keyloggers phoning home with your sensitive information and strip out objectionable or regulated content. saving you time while enhancing your security. partners. integrated defenses with convenience and control to help you worry less while your team is more productive. customers. and security.McAfee SaaS Web and Email Protection Fend off blended threats. Our rich scanning infrastructure compares each email and each web page’s active content to our extensive file and URL reputation databases.

and email continuity. accuracy. Web-based dashboards allow easy visibility into inappropriate Internet use that saps productivity. receive. consumes resources. By providing users easy access to archived emails. McAfee proactively protects your whole network. The service retains all messages sent or received during the outage. search. and suppliers connected 24/7. partners. email retention. compliance.McAfee SaaS Web and Email Security with Archiving Nonstop security. McAfee SaaS Web and Email Security with Archiving combines multiple critical services into a single. convenient subscription. with options to retain email archives for one or multiple years Built-in encryption during transport and storage Leading anti-malware and anti-virus engines • • 44 CONTENT SECURITY . and availability for critical applications Let the cloud lighten the burdens of email and web security. automatically applying access rules to all policy-controlled web traffic. We fend off unknown malware. Our complete solution shields your network and messaging gateways from email attack and blocks over 99 percent of spam. and returns them back to the email server when it becomes available. phishing sites. Secure archival for compliance and data management McAfee SaaS email archiving automatically. and can present legal liability. easy-to-use web interface to send. our service keeps your employees. reputation-powered email and web controls By scanning each email and each web page’s active content and understanding its intent or predicted behavior. and targeted attacks hidden in email and websites. and economically stores email at our site for future review and e-discovery. whether to demonstrate compliance or restore a lost message. With over 100 categories to choose from. and a predictable cost Advanced analytics and reputation services block mutating threats Rolling 60 days of email continuity protection. blended threats. McAfee web filtering is unmatched in flexibility. Automatic engagement and synchronization for seamless continuity Whenever the network is inaccessible. Users browse to our secure. Powerful search tools support quick retrieval of emails. Real-time. no maintenance hassle. and manage emails. safely. customers. you minimize maintenance and gain control of database sizes. and security. even roaming users. We link policies directly to user groups defined in your directory. Strengths • • • Instant startup. Twenty layers of filtering trap malware and spam before it places your systems and user productivity in jeopardy.

For permitted traffic. the traffic is scanned with state-of-the-art security. and behavior of a web page’s active content. hundreds of threat researchers at McAfee Labs develop advanced analytics and reputation services to infer risk and act immediately to protect you. Strengths • • • • • • Easy to deploy with no hardware or software to buy. unknown malware. and reporting for easy control over inappropriate Internet use. or maintain Accurate and granular filtering with more than 100 categories for flexibility Users experience secure. and enterprise-class scalability ensure the performance and reliability you need to secure even the most demanding and distributed environments. Near-zero latency. McAfee SaaS Web Protection uses sophisticated techniques to analyze the nature. and unproductive use of the web. and security — including filtering of anonymizer sites built specifically to bypass filtering engines. install. lost productivity. Managed by professionals in cloud security. Categories can be paired with your unique user communities to set policies against offensive. Webbased dashboards and forensic analysis capabilities allow easy monitoring. or to secure branch offices and mobile users.0 has opened the door to sophisticated threats specifically designed to evade detection by traditional web security measures. industry-leading uptime. intent. blended threats. This deep analysis lets us proactively protect against zero-day threats. undesired. and corporate risk. Proactive reputation-based services updated in real time Instead of depending on static filtering that doesn’t keep up with changing websites and content. McAfee web filtering is unmatched in flexibility.McAfee SaaS Web Protection Comprehensive cloud-based security for a safe. you gain effective. secure network Web 2. economical control over threats and undesired Internet use. If you already have on-premises web filtering. and lets us filter objects exhibiting questionable behavior within pages. transparent browsing with no irritating latency Simplified 24/7 web management of policies and configurations Customizable alerts and dashboards for instant access to the data you need Enforces policies based on existing LDAP or Active Directory users CONTENT SECURITY 45 . and targeted attacks. accuracy. Complete inbound and outbound protection When you redirect your web traffic to our load-balanced data centers. phishing sites. Traffic that violates your policy is blocked before it can enter your network. malicious infiltration. tuning. McAfee SaaS Web Protection is a great way to add industry-leading anti-malware capabilities. McAfee SaaS Web Protection guards your team against infection. With over 100 categories to choose from.

message content. Content filtering You can filter messages based on size. Strengths • • • • Prevents viruses and spyware from traversing your internal network via email Protects Windows. Because it plugs directly into your email server. and file attachments. saving critical computing power for your email server’s number one job: delivering email. and block viruses. and AIX email servers on 32. Role-based administration.McAfee Security for Email Servers Robust content security for Microsoft Exchange and Lotus Domino servers An important component for comprehensive email security. messages. Unbeatable virus and threat detection McAfee Security for Email Servers uses the McAfee scanning engine to detect. worms. embedded URLs. and other potentially unwanted programs. The cloud-based McAfee Global Threat Intelligence reputation service analyzes email sender addresses and domains. Supporting multiple McAfee products and managed through McAfee ePO. it enables administrators to easily consolidate and manage email quarantines. policy management. Many enterprises block or quarantine messages that contain controlled or sensitive contents in the subject. Reputation analysis helps McAfee Email Security for Servers accurately identify and quarantine undesired messages using minimal system resources. Trojans. Manage your security simply Integration with McAfee ePO provides centralized configuration. or attachments. clean. message body. McAfee Email Security for Servers can scan and automatically apply policy to internal email that your email gateway never sees. or attachment content. McAfee Quarantine Manager McAfee Quarantine Manager is a highly scalable centralized off-box quarantine server.and 64-bit platforms Automatically enforces email usage and content policies Works in conjunction with McAfee email appliances to provide comprehensive email security with shared central management and quarantine 46 CONTENT SECURITY . McAfee ePO automatically pushes out and implements your configuration changes and policy changes. Linux. and reporting. and a brandable user interface offer ultimate control and quarantine flexibility. granular quarantines. McAfee Security for Email Servers serves as an additional layer of security by inspecting email on your email server.

red. cybercriminals are making it a dangerous one. and reporting easy and efficient CONTENT SECURITY 47 . and phishing. Featuring an intuitive color-coded rating system — green. whether the user is at a corporate office behind the McAfee Web Gateway or outside the network. Now you can allow employees to surf and search the web safely. using active technology to guide users away from malicious websites and shield them from online threats. protected from web-based threats such as spyware. yellow.McAfee SiteAdvisor Enterprise McAfee Web Filtering for Endpoint Worry-free web browsing and blocking for business users While the Internet is a crucial business tool. control messaging. gateway-aware solution to enforce the appropriate policy intelligently. adware. view reporting. management. You can customize the authorization or blocking of website access. Strengths • • • • Educates users for continuous protection against changing threats Prevents users from browsing to websites hosting malware or exploits Restricts and monitors employee web usage with superior content filtering Centralized management through McAfee ePO makes deployment. or gray for unrated — and the reputation intelligence of McAfee Global Threat Intelligence. Your business users will have the freedom to surf online. McAfee SiteAdvisor Enterprise solutions install easily to protect all business users. Proactive safety information keeps users alert McAfee SiteAdvisor Enterprise lets you avoid restrictive policies that keep your employees from using the web for research and business projects. Integrated URL and content filtering Unmanaged Internet access presents many challenges and introduces unnecessary risk. reduce legal liability. McAfee SiteAdvisor Enterprise provides risk-aware protection at the desktop. assign actions based on safety ratings. and implement added protection for remote users — all to ensure policy compliance. and improve bandwidth to make employee Internet use efficient and effective. Deploy and manage policies with ease Ready to deploy across your organization with McAfee ePO. McAfee Web Filtering for Endpoint integrates with McAfee Site Advisor Enterprise to help organizations manage productivity. McAfee customers who use McAfee Web Filtering for Endpoint and McAfee Web Gateway can take advantage of this integrated.

enabling your company to benefit from information about content sources and risks gathered across the entire Internet. McAfee SmartFilter gives you the power to block the ubiquitous security threats of today’s dynamic web world. maximize employee productivity. and precision reporting Comprehensive coverage of all categories for no additional cost • • 48 CONTENT SECURITY . McAfee SmartFilter achieves its control and protection through the combination of reputation and category-based filtering. and preserve bandwidth for business. McAfee proactively and reliably detects risky sites hosting spyware. and significant security challenges for the enterprise. create block/allow lists. expanded Internet use also often translates into inappropriate use of the web at work and associated productivity drains. you gain control. malware. Comprehensive web filtering powered by McAfee Global Threat Intelligence McAfee SmartFilter software enables organizations to control how the web is used and easily enforce an Internet use policy. Safely enable web access in your unique working and learning environments Customizable controls with fine-grained options let you enforce Internet usage policies that match your organization: create unique policies for different users and groups. phishing. Based on known behaviors. and more. With McAfee SmartFilter. Malicious code and web-borne viruses can enter the network when users visit an infected website — without users even knowing. centralized management. Strengths • • Includes solutions optimized for business and education Predefined filtering policies for over 35 million blockable websites in more than 90 categories Simple installation. and dynamic assessment of security risks. Through the millions of URLs McAfee processes each month. add categories. exempt certain URLs. deviations from expected behaviors. and other security risks associated with employee or student use of the Internet. and malware. and block Internet use to reduce legal liability. while protecting organizations from the viruses. You can understand. It incorporates McAfee Global Threat Intelligence web reputation. legal liability.McAfee SmartFilter Control and security for today’s web Today’s dynamic web environment offers significant opportunity for increased productivity and collaboration. monitor. However. filter.

Blocking this unwanted traffic increases productivity. manageable solution. For complete confidence and compliance. one support contract. Simplified management for lower total cost of ownership McAfee Total Protection for Internet Gateways bakes in all the efficiencies that are possible with hard-working solutions from a single vendor. and cuts malware cleanup costs. It combines three proven McAfee security solutions — McAfee Web Gateway. Savings start with rapid deployment. phishing attacks.McAfee Total Protection for Internet Gateways Comprehensive security for web. the solution includes outbound filtering and blocking. while it ensures that sensitive data does not leave in violation of government and corporate regulations. great value McAfee Total Protection for Internet Gateways protects against malware coming into your enterprise through email and web traffic. or other email-borne threats. nearzero-touch user-based authentication. including web-based. with deep micro-level forensics when you need them. Throughout your entire enterprise. Effective protection patrols email and web interactions that might bring malicious code into your business or attempt to extract sensitive data over your network. while it keeps your email free of spam. Inbound and outbound control over malware and sensitive data This combination gives you effective protection against inbound attacks. and interactive web technologies increase the risk of data loss and downtime. source code. Strengths • Number one rated anti-malware protection coupled with better than 99 percent spam detection Identifies and enforces policies on both structured and unstructured data McAfee Global Threat Intelligence protects against emerging threats • • CONTENT SECURITY 49 . email. and data loss prevention Data protection is top of mind for many organizations. and scaling. Moreover. compliance reporting is straightforward. it safeguards both structured and unstructured data. frees up bandwidth. protecting private data like credit card numbers and corporate intellectual property such as financial records. and automated malware and spam protection updates. and targeted malware. We make administration easy with a simplified management footprint. McAfee Email Gateway. testing. Great protection. policy configuration. and McAfee Network DLP Prevent — into one affordable. blended. or blueprints.

They prevent unauthorized access to your sensitive data — anytime. and policy-driven security controls. and centralized management by McAfee ePO. anywhere. and removable media encryption). for any device. and support prompt and proper audits. Unlike wholesale blocking of device usage. data loss prevention. You can also monitor and control data transfer to portable devices. use a single environment to manage your deployment. such as USB flash disks. Host data loss prevention allows you to monitor real-time events and apply centrally managed security policies to control how employees access and use confidential data. or devices without end-user action Logs every data transaction with forensic-quality. demonstrate compliance. Advanced reporting and auditing help your company better meet tough privacy mandates. Instead of managing separate point solutions. Enterprise-grade encryption and device control To protect data at rest. and Bluetooth devices. McAfee Host Data Loss Prevention. and maintain your data protection. you can specify and categorize which devices may or may not be used and enforce what data can and cannot be transferred to these devices based on sophisticated content analysis. ensure safe harbor protection. pasted. copied. compressed. the McAfee Total Protection for Data suite provides strong encryption. DVDs. audit-ready details • • • 50 CONTENT SECURITY . file and folder. To secure your confidential data reliably. before they move through your organization. folders. protecting confidential customer information — as well as your intellectual property — has to be job one.McAfee Total Protection for Data Industry’s most complete data protection solution With today’s mobile devices and ever-connected work style. we help you understand evolving usage and adjust policies appropriately. monitor flexible dashboards. Novell NDS. generate reports. iPods. full-disk encryption combined with strong access control protects sensitive data on all endpoints. and PKI Encrypts files. The suite includes McAfee Endpoint Encryption (full-disk. Improved visibility and efficient. define security policies. Strengths • Works even when data is modified. McAfee Device Control. or encrypted Enforces policies based on users and groups and synchronizes policies with Active Directory. authentication. Persistent file and folder encryption transparently encrypts the files and folders you choose. centralized management As your business needs change. on the fly.

always-active threat protection from data-stealing threats Encryption and device control to prevent data loss Single. Save time and money Let McAfee simplify acquisition and deployment of the protections you need. control. Smart data. and enforce appropriate data usage policies. plus compliance In one solution.McAfee Total Protection for Secure Business All the critical elements of security a medium-sized company needs Free yourself from the headaches of managing multiple point products from multiple vendors. Strengths • • • • Instant. and manage the protections you need CONTENT SECURITY 51 . saves money. email. you gain better visibility. proven vendor. It eliminates the compatibility and maintenance issues associated with multiple point products and vendors. such as memory sticks. and other mobile devices and prevent unauthorized use of removable devices. It saves time. with one purchase of one package from one trusted. integrated defense against the threats medium-sized businesses know about — and the threats you cannot see coming. and provides a more powerful. and web security. and host intrusion prevention. and highly accurate spam detection for effective gateway blocking of malware. desktops. with substantially lower licensing fees and support costs than if purchased separately. purchase. We also help you limit access to dangerous websites. McAfee Total Protection for Secure Business has it all — the industry’s most comprehensive security in one easy-to-manage suite for endpoints. Instead. web. and comprehensive intelligence on your security posture. anti-spyware. and data. web security. centralized management to streamline management and reporting Easy to choose. desktop firewall. you can encrypt all data on laptops. email. To protect your business from data loss. you get anti-virus. block data-stealing malware.

and proactive scanning and ends the blind spot of encrypted threats Enables expanded inbound and outbound access without worry of infection or inappropriate content • 52 CONTENT SECURITY . Enterprise-class performance and manageability Our high-performance. for instance allowing access to social media sites. Management is easy with web filtering. SSL scanning of encrypted traffic. behavior. and other web-based applications and sites. Fine-grained control stops threats such as infected iFrames. authorization controls. authentication. deploy. and manage. The unmatched anti-malware protection proactively blocks zero-day and blended threats. wikis. Our appliances analyze the nature. solutions designed to block only “known bad” behavior and content — signature-based anti-virus and categoryonly URL filtering — cannot combat the full range of threats. We can even stop infections phoning home. You can enable or disable specific functionality on a site. You can minimize operational effort — including policy tuning — and support compliance. McAfee Web Gateway. reputation.McAfee Web Gateway Proactive web security for enabling secure web access As use of the web grows and evolves. combines all the gateway security solutions you need to protect your web traffic. data leakage protection. anti-spyware. McAfee Web Gateway extends control to websites and applications as well. anti-malware. providing immediate protection against hidden threats. and built-in clustering and availability required by today’s agile enterprises. and anti-malware — all in a single appliance that is easy to afford. Our family of appliances offers reputation-based web filtering powered by McAfee Global Threat Intelligence. but disabling access to games available through that site. layered protection on all traffic. Strengths • • Proactive. View McAfee Web Gateway data in McAfee ePO or take advantage of additional reporting capabilities that offer real-time dashboard views with extensive drilldowns and powerful off-line reporting. enterprise-strength proxy appliances provide the caching. administration. an industry-leading anti-malware solution. without waiting for a signature. Powerful safeguards against data loss We scan user-generated content on all key web protocols to prevent confidential or suspicious information from leaking out of your enterprise through social media. while still enabling access to the site. signatures. and other protections administered securely from a single point using a single set of policies. and intent of all content and code on requested web pages. SSL scanner. blogs. with flexibility and scalability Applies threat intelligence including category.

and access control. You can guard against the full spectrum of threats with fewer IT resources. mobile protection.Endpoint Security McAfee Endpoint Security The industry’s broadest suite of integrated solutions protects your endpoint devices with system security. virtualization security. email and web safety. .

and network control unmatched in the industry. User access control—McAfee Network Access Control (NAC) links endpoint and network security with access control and compliance. fewer errors. ensure IT standards meet compliance requirements. Mobile protection—As more personal and mobile devices are used for business-related purposes. McAfee NAC allows administrators to easily deploy and tailor access controls. At the same time. too. • • • . compliance. control employee web activity and network access. • System protection—Obtain a comprehensive defense against today’s advanced threats with the industry’s first and only unified solution for endpoint security. resulting in increased security. compliance. With its intelligent security management and single management console approach. McAfee helps you block malware. McAfee delivers optimized security. McAfee reduces complexity and minimizes the effort and operational overhead required to manage security. Virtualization protection—Whether you are managing virtual desktops or deploying virtual servers. you can ensure secure. we provide innovative options to increase protection and operational efficiencies. and integrate security management for all endpoints through a centralized console. McAfee mobile protection solutions defend against emerging mobile threats and deliver secure and scalable device management and provisioning. and access control. anywhere. centrally managed by McAfee ePolicy Orchestrator. As you provide content to these mobile devices. and control with streamlined management to help ensure compliance and reduce costs.Endpoint Security Empower Your Mobile Workforce with the Right Balance of Protection and Access McAfee Endpoint Security lets you meet the needs of your highly mobile workforce with ironclad security and data protection—anytime. on any device. you can protect and manage them. allowing you to implement new virtualization security without affecting your existing infrastructure or system performance. seamless access to business applications and corporate data. their sophistication and diversity present new challenges to IT.

ENDPOINT SECURITY 55 56 77 63 64 79 78 80 65 57 72 73 58 59 60 61 62 66 67 68 69 70 71 74 75 76 76 81 82 83 84 85 86 .mcafee. The products categorized below appear alphabetically in the pages that follow.com/endpointsecurity for the latest information. Check www. Suites managed at your site On-premises endpoint suites comparison McAfee Total Protection for Endpoint — Enterprise Edition McAfee Endpoint Protection — Advanced Suite* McAfee Endpoint Protection Suite* McAfee Total Protection for Secure Business* McAfee Total Protection for Data McAfee Total Protection for Server McAfee Endpoint Protection for Mac* Suites managed through the cloud Security SaaS suites comparison McAfee SaaS Endpoint Security Suites – McAfee SaaS Endpoint Protection Suite – McAfee SaaS Endpoint Protection — Advanced Suite – McAfee SaaS Endpoint and Email Protection Suite McAfee SaaS Total Protection* Individual endpoint products McAfee Application Control (for desktops and servers) McAfee Command Line Encryption McAfee Device Control McAfee Encrypted USB McAfee Endpoint Encryption McAfee Enterprise Mobility Management (McAfee EMM™) McAfee Host Intrusion Prevention McAfee Mobile Security for Enterprise McAfee MOVE AntiVirus McAfee Network Access Control McAfee Policy Auditor McAfee Security for Email Servers McAfee Security for Microsoft SharePoint McAfee SiteAdvisor Enterprise McAfee Web Filtering for Endpoint McAfee VirusScan Enterprise McAfee VirusScan Enterprise for Linux McAfee VirusScan Enterprise for Offline Virtual Images McAfee VirusScan Enterprise for Storage McAfee VirusScan Enterprise for use with SAP NetWeaver platform McAfee VirusScan for Mac* *Products ideally suited to small and mid-sized businesses.Say “Yes” to Business Initiatives McAfee endpoint solutions protect devices from servers to smartphones to embedded systems.

then refer to the alphabetical listings that follow for details. systems. and network. intelligent suites work hard to guard your data. Select the suite that meets your needs. so you can work on other things.On-premises Endpoint Suites Comparison Our integrated. McAFEE TOTAL PROTECTION FOR ENDPOINT ENTERPRISE EDITION McAFEE TOTAL PROTECTION FOR SECURE BUSINESS McAFEE TOTAL PROTECTION FOR SERVER McAFEE ENDPOINT PROTECTION — ADVANCED McAFEE TOTAL PROTECTION FOR DATA Single integrated management — on site DATA PROTECTION Full-disk encryption File and folder encryption Device control Data loss prevention for endpoint DESKTOP AND SERVER PROTECTION Anti-virus Anti-spyware Real-time anti-malware Host intrusion prevention for desktop Host intrusion prevention for server Application blocking Multi-platform support Desktop firewall Safe surfing with site blocking Network access control Anti-malware (offline virtual images) Web filtering (host) WEB GATEWAY SECURITY Anti-malware Safe surfing URL filtering EMAIL GATEWAY SECURITY Anti-malware Anti-spam Content filtering EMAIL SERVER SECURITY Anti-malware Anti-spam Content filtering RISK AND COMPLIANCE Agentless policy & vulnerability auditing Agent-based policy auditing Change policy enforcement Integrity monitoring Application whitelisting • • • • • McAFEE ENDPOINT PROTECTION • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • 56 ENDPOINT SECURITY .

Security SaaS Suites Comparison Flexible Endpoint Protection Available in three custom suites. McAfee SaaS Suites provide continuous protection against known and unknown threats. Since McAfee automated protection continuously provides up-to-date reporting information to our SecurityCenter. email continuity. on-premises hardware. McAfee SaaS Endpoint Security Suites. adds cloud-based content filtering. and around-the-clock technical support. McAFEE SaaS ENDPOINT PROTECTION SUITE Centralized visibility through an online management console Desktop and file server anti-virus and anti-spyware Real-time threat intelligence Desktop firewall to block hackers and intrusions Web security for safe surfing Host-based web filtering to ensure web security even when users are not on the local network Email server protection to scan for viruses and spam on site Cloud-based. formerly Total Protection Service suites. offer multivector security options for your endpoints. or technical support. And our best-of-suite solution. McAfee SaaS Total Protection. and risk and compliance functions to keep threats and risks away from your network. outbound email filtering to stop viruses and malware Email continuity to enable full disaster recovery Cloud-based web filtering of unwanted websites to ensure compliance and productivity Vulnerability assessment to scan for perimeter weaknesses McAFEE SaaS ENDPOINT PROTECTION ADVANCED SUITE McAFEE SaaS ENDPOINT AND EMAIL PROTECTION SUITE McAFEE SaaS TOTAL PROTECTION • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • ENDPOINT SECURITY 57 . automatic security updates and upgrades hosted by McAfee. inbound email filtering to block unwanted spam and phishing attacks Cloud-based. there’s no need to dedicate IT staff to security maintenance or to invest in additional security management software.

uses a dynamic trust model to avoid labor-intensive lists. McAfee Application Control offers an effective way to block unauthorized applications and. As enterprises face an avalanche of unknown software from the web. manageable. and violates software licenses — compromising systems and your overall business. attuned to the operational needs of enterprises.McAfee Application Control (for desktops and servers) Reduced risk from unauthorized applications. McAfee Application Control extends coverage to Java. affordable. unlike simple whitelisting. such as back office servers and multiple desktop images for different user profiles. scripts. Viable security for remote and legacy systems Patching can be a logistical headache for remote systems and may be impossible for older operating environments that no longer receive vendor updates.0. Integration with McAfee Risk Advisor provides assurance that you are protected from new and emerging vulnerabilities. including legacy Windows NT and 2000 systems. and specialty code to give you greater control over application components. this centrally managed solution adds a timely control to your systems security strategy. ActiveX controls. and you can manage and report on large enterprise rollouts from a central location. creates support issues. Flexible. batch files. McAfee Application Control extends a unique layer of protection to shield hard-to-maintain systems. McAfee ePO provides remote deployment. and secure McAfee Application Control leverages your security investment in the McAfee ePolicy Orchestrator platform. with very low initial and ongoing operational costs. It runs transparently on endpoints. plus stronger endpoint control Users can unintentionally introduce software that installs malware. Complete protection from unwanted applications Malicious code takes full advantage of the flexible software and modular code used in Web 2. Dynamic management of whitelists makes it easy to support multiple configurations for different business needs. Strengths • • • • • Ensures only trusted applications run on servers and endpoints Trust model and dynamic whitelists save administration time and overhead Comprehensive code protection preserves integrity of critical systems Enhanced visibility into vulnerability shielding via Risk Advisor integration Extends lifespan of legacy systems 58 ENDPOINT SECURITY .

providing true end-to-end security. IDEA. More than half of all Fortune 500 companies rely on McAfee E-Business Server for secure file transfer and storage. By securing data automatically. and transactions) and in standard or proprietary applications. developers and administrators can protect data throughout its lifecycle: from its point of origin to data processing and storage. An application-layer approach to encryption McAfee E-Business Server — a fully integrated application-layer approach to encryption — simplifies the process of ensuring end-to-end data security. Using a simple command-line interface or natively within an application. and in transit over the Internet. Additional configurations for flexible control over data • • • • McAfee E-Business Client McAfee E-Business Server for OS/390 McAfee E-Business Server Native APIs McAfee E-Business Server Partner Edition ENDPOINT SECURITY 59 . during access. Since these products are transfer protocol independent. reduce labor costs. and the Twofish Cipher Algorithm.McAfee Command Line Encryption Transfer and store your sensitive files securely Your data is the lifeblood of your business. along with most major certificate authorities. We support the OpenPGP standard. Blowfish. companies consistently protect sensitive data. eliminating the need for costly solutions such as leased lines and VPNs. companies can easily add encryption into existing processes. In addition. you can even share secure data with partners that do not have encryption. Enterprises that routinely exchange sensitive customer information or intellectual property with branch offices. remote archive. and business partners need to keep confidential data and applications safe and secure. McAfee E-Business Server McAfee E-Business Server incorporates the industry’s strongest encryption algorithms. Files with sensitive data need to be protected in transit and in storage for true end-to-end security. You can secure data within automated and batch processes (for file transfer. AES. It secures data as it is transmitted over the Internet and throughout your enterprise. vendors. because E-Business Server supports self-decrypting archives (SDA). independent of their preferred transfer method. Most importantly. including Triple-DES CAST. and eliminate human interaction errors. you can protect the privacy of data in storage. so you can securely exchange information with more partners.

and device-level logging to support compliance 60 ENDPOINT SECURITY . formats. Strengths • • • • • Fine grained device definitions Content and context-aware protection Centralized policy deployment and management with McAfee ePO Easy upgrade to McAfee Host Data Loss Prevention Visibility. you can specifically limit use to devices that include approved encryption. control. pasted. McAfee Device Control guards against critical data leaving the corporation through USB flash drives. and user. If you need hardware-based encryption. Our complete device management lets you enforce devices by any Windows software-based device parameter. you can define detailed hardware-based filtering. reliable control. Targeted. Theft is not the only risk. you frustrate users and constrain productivity. copied. CDs. even the most well-intentioned employees accidentally lose devices. You quickly and easily configure. compressed. CDs. and more. and blocking. device name. automatic enforcement of detailed device and data policies With wholesale blocking. For accurate. Bluetooth and IrDA devices. deploy. and other removable media — however useful — pose a real threat to your organization. DVDs. device class. and update policies and agents throughout your environment from the centralized McAfee ePolicy Orchestrator management console. Their small size and enormous storage capacity make it all too easy for confidential customer data and intellectual property to walk right out the front door and into the wrong hands. This unrivaled protection helps you protect all data. MP3 players. vendor ID. or encrypted. DVDs. and other removable storage devices that can connect to desktops and laptops. serial numbers. and derivatives even when data is modified. Now you can monitor and control data transfer to portable storage devices to improve compliance with data control policies and regulations.McAfee Device Control Fine-grained control over removable media devices on your network USB drives. monitoring. iPods. Instead. our granular controls let you specify and categorize which devices may or may not be used and enforce what data can and cannot be transferred to these devices. including product ID.

Our drives protect sensitive information with industry-leading technology: AES-256 encryption and FIPS-140-2 validation. applying strong encryption and an advanced management platform. with no special training required. Automatic. industry-leading encryption McAfee Encrypted USB drives encrypt data transparently. huge storage capacity. However. Because of our hardware-based encryption.McAfee Encrypted USB Secure mobile devices with built-in access control and encryption USB devices are widely used and convenient because of their small size. and on the fly. Extensive auditing and reporting tools allow you to prove that data on devices was encrypted. To make the data on these devices unreadable by unauthorized parties. policy administration. and high portability. and auditing. automatically. comprehensive. 2 McAfee Encrypted USB Manager software is optional and provided for non-McAfee ePO customers and digital identity options. Advanced management with proof of encryption if lost or stolen Efficient security requires you to extend company security policies and compliance requirements to mobile USB drives in a strategic. reporting. With McAfee ePolicy Orchestrator (McAfee ePO). with convenience comes risk. and with industry and government regulations. ENDPOINT SECURITY 61 . are easily lost or stolen. McAFEE ENCRYPTED USB BY SANDISK McAFEE ENCRYPTED USB STANDARD McAFEE ENCRYPTED USB BIO McAFEE ENCRYPTED USB HARD DISK NON-BIO McAFEE ENCRYPTED USB HARD DISK Password Authentication Biometric Authentication AES-256 Bit Hardware Encryption Virtualization Capable (PC-on-a-Stick) FIPS 140-2 validated Centralized management via McAfee ePO McAfee Anti-Malware Protection 2 1 • • • • • • • • • • • • Optional Optional Optional Optional Optional • • • • • • • • • • • 1 Third-party software required at additional cost. These devices. McAfee Encrypted USB drives keep mobile data secure. because they never leave the USB drive. monitoring. you centralize deployment. Data stored on your USB drives is protected and compliant with company policies. even if a device is lost or stolen. management. along with the confidential data they contain. and managed way. encryption keys cannot be obtained or copied.

plus self-encrypting and solid state drives Consistent administration and policies for any mix of devices in the environment Support for hardware acceleration based on the Intel AES-NI technology Persistent encryption requires no end-user action or file renaming • • • 62 ENDPOINT SECURITY . anywhere Rarely does a month go by without an organization revealing the loss or theft of a laptop brimming with sensitive data. Strengths • Supports software-based encryption. As a result. anytime. Piecemeal and full-disk-only encryption solutions leave security holes and complicate management and reporting. and reporting of encryption status for every device in the environment from a single management console. A single policy architecture for data protection and endpoint security makes it easier to implement and prove compliance as regulations get more stringent. evolving range of devices: desktops. portable storage devices.McAfee Endpoint Encryption Ironclad security for lost or stolen devices. Single sign-on with pre-boot authentication gives users secure yet convenient access to the information needed to do their jobs efficiently. or transferred. and self-encrypting and solid-state drives. used. McAfee is the leading vendor of encryption software. removable media. anywhere. laptops. enabling business continuity anytime. Multiple layers of protection let us cover more data loss scenarios than any other vendor in the marketplace. smartphones. sensitive data remains protected regardless of how it is stored. One management environment for endpoint and data Our solution offers real-time enforcement. Heterogeneous device support McAfee Endpoint Encryption provides full-disk and file/folder encryption that supports your mixed. network files and folders.000 customers around the globe. With over 6. A common agent and management platform with McAfee endpoint security products helps ensure dramatically lower operational costs and administrative overhead. McAfee Endpoint Encryption prevents unauthorized access to sensitive data through industry-leading encryption technology and strong access control. Transparent policy enforcement Encryption happens transparently — on the fly — with virtually no system performance degradation. tracking.

This suite puts you in charge with broad protections. compliance controls. Finally. and more ENDPOINT SECURITY 63 . efficient control of security and compliance tools Keeps confidential data from leaving the company Zero-day protection against new vulnerabilities. you get the most advanced system vulnerability coverage on the market. Whether you want to keep viruses. reduced urgency to patch. network access control.McAfee Endpoint Protection — Advanced Suite Protection against zero-day attacks. It patrols these endpoints against malware. this seamless solution has the perfect combination of capabilities and cost savings. And advanced web access control ensures employee productivity everywhere they travel. stops network-borne attacks Blocks code that steals data and sabotages user productivity Improves productivity and limits phishing and malware Helps ensure compliance and reduce risk from web surfing Controls users surfing on or off the corporate network Intercepts malware before it reaches the user inbox Limits malware infections by blocking noncompliant systems Streamlined compliance reporting for HIPAA. and a stateful desktop firewall. it is safe to implement and test patches on your schedule. Combined with our patented behavioral protection. Integrated. FEATURE WHY YOU NEED IT Single integrated management Device control Host IPS and desktop firewall Anti-malware Anti-spam Safe surf and search Host web filtering Email server security Network access control Policy auditing Instant visibility into security status and events. PCI. spammers. Centrally managed for control with lower cost and complexity Centralized policy-based management. or auditors at bay. The built-in McAfee Global Threat Intelligence file reputation service provides real-time. and desktop policy auditing keep endpoints safe and compliant. Zero-day and vulnerability shielding Integrated intrusion prevention secures Windows workstations and servers from advanced persistent threats. and unified management for Microsoft Windows endpoints. which prevents buffer overflow attacks. and provides automatically updated signatures that shield laptops and desktops from attack. always-on protection based on insight gathered by McAfee Labs. and help with compliance A mobile workforce plus increased regulation could equal a security nightmare. hackers. blocks malicious code from hijacking an application. proactive security combats sophisticated malware and zero-day threats to protect endpoints when they leave your network and protect your network when they return. data thieves. Get the McAfee Endpoint Protection — Advanced suite and rest peacefully. device control.

your email server gets an extra dose of anti-malware. delivering both operational efficiencies and cost savings with the convenience of a single solution. Core controls to protect users and their systems The McAfee Endpoint Protection Suite integrates essential security to block advanced malware. We unite these core functions into a single. manageable environment ideal for safeguarding traditional desktops and other systems that have limited exposure to Internet threats. picking up malicious downloads.McAfee Endpoint Protection Suite Secure Windows PCs against real-time malware and unauthorized devices Many enterprise users and small businesses rely on tower-based PCs and traditional desktop systems that never leave the building. they have a lower risk of being compromised. help kids browse the Internet at night. Device controls help you restrict use of removable media and portable storage to avoid loss of sensitive and regulated data. every business user relies heavily on web-enabled applications and email. or being stolen while carrying sensitive data. efficient control of security and compliance tools Keeps confidential data from leaving the company Prevents network-based attacks and allows only legitimate network traffic Blocks code that steals data and sabotages user productivity Improves productivity and limits employee exposure to phishing and malware Intercepts malware before it reaches the user inbox Helps ensure compliance and reduce risk from web surfing 64 ENDPOINT SECURITY . backed up by malware protection on each endpoint itself. These traditional desktops and fixed systems within your LAN probably have layers of gateway or network security to protect them. real-time malware web and email applications convey. However. control data loss and compliance risks caused by removable media. or get left at airports. essential for small businesses and merchants subject to PCI DSS regulation. Of course. Since these systems don’t visit wireless hot spots. FEATURE WHY YOU NEED IT Single integrated management Device control Desktop firewall Anti-malware Anti-spam Email server security Safe surf and search Instant visibility into security status and events. The McAfee Endpoint Protection Suite seamlessly integrates proven security to help you manage these risks. so even these fixed machines require sophisticated protection against the targeted. and provide safe access to critical email and web applications.

hosts. McAfee Endpoint Protection for Mac also addresses compliance requirements by ensuring that Macs receive the same level of protection as Microsoft Windows-based PCs. data. It stops malware and other security threats before they can damage or infect Macintosh desktops and laptops and spread throughout your company’s network. and thwart cybercriminals. Advanced security for Mac endpoints McAfee Endpoint Protection for Mac secures Apple Macintosh endpoints with complete. intuitive Mac OS X Aqua interface Supports Mac OS X 10. It gives you the confidence to say “yes” to Macs in the workplace while maintaining or even reducing operational costs. And since hackers and cybercriminals now view Macs as a target.McAfee Endpoint Protection for Mac Say “yes” to Macs in the workplace As more and more business users choose Macs. Inbound scanning stops network-based attacks. these systems contain or access the same sensitive data as other PCs. anti-spyware. And you can set rules to control access to specific networks. and desktop firewall Fast and reliable scanning preserves system performance Familiar. while outbound packet filtering prevents spyware and malware from shipping personal data out to would-be attackers. or IP addresses. application lockdown. You can bring new Macs onto the network quickly and seamlessly and respond quickly to security incidents. Application lockdown lets you pre-approve applications that can run and freeze configurations to ensure compliance with policies. and then confirm compliance using powerful reporting.5 (Leopard). Critical firewall. and application protection. 10.6 (Snow leopard). anti-spyware. Any Macs running virtualization software face Microsoft Windows threats. advanced coverage. regardless of where they originate. Centralized. Strengths • • • • Proven anti-virus. simultaneous management of Macs and PCs McAfee ePO integration enables you to lower operational management costs by making it easier to manage all endpoints — Macs and PCs — from a single platform. A single view helps you update security settings on distributed endpoints simultaneously. and application controls We include the most advanced firewall on the market for Apple Macs. preserve availability. including anti-virus. system firewall. and 10. you should enforce compliance of Macs to the same high security standards of your Windows-based PCs.4 (Tiger) ENDPOINT SECURITY 65 .

robust management enables you to secure your mobile workforce effectively. Our approach blends mobile device management with policy-managed endpoint security.McAfee Enterprise Mobility Management (McAfee EMM) Secure. and remote data wipe to reduce the risk to sensitive corporate data if a device is lost or stolen. password authentication. network access control. ensure persistent policies and configurations. Strengths • Scales to let you manage thousands of users and tens of thousands of devices Enables device choice. and device wipe. and automation throughout the device lifecycle • • 66 ENDPOINT SECURITY . and connections. easy. such as enterprise device activation. we monitor access to alert you to unauthorized requests so you can maintain compliance. Non-stop. including access from personally-owned devices Reduces costs with centralized management. and scalable mobile access to enterprise applications As enterprises mobilize corporate applications. Risk reduction tailored to mobile devices McAfee Enterprise Mobility Management configures mobile devices to comply with corporate security policies and enforces compliance via network access control. We automate configuration of Wi-Fi. from any web browser. Take advantage of native device encryption. over-the-air provisioning of policies and updates. including directory services. unlocking their devices. and deliver automatic and real-time compliance management. some sacrifice security and control and risk data loss and noncompliance. and compliance reporting in a seamless system. Fast rollout and a lightweight. we also help drive down support costs and overall cost of ownership. a self-service portal allows users to perform basic help desk services. Users have unique credentials to trigger access to their specific application services as well as enforcement of role-based policies. Comprehensive. VPN. Google Android. and Symbian — while delivering the same level of control traditionally applied to laptops and desktops. policies. By leveraging existing data center and network infrastructure. Your policies define which devices may access the corporate network and can block modified devices like iPhones and iPads. and native email sync. Windows Mobile. minimizing help desk calls. McAfee Enterprise Mobility Management (McAfee EMM™) enables you to offer mobile device choice — including Apple iPhones and iPads. productive user experience Once you specify users.

Automatic signature updates and zero-day protection give you advanced vulnerability shielding. The firewall also ensures compliance with application and system access policies. money. Both enforce proper system and application behavior. put employees at risk. protecting you from advanced threats such as botnets and DDOS before these attacks can do damage. stateful firewall integrates McAfee Global Threat Intelligence network connection reputation to characterize and block newly malicious traffic. ENDPOINT SECURITY 67 . Host IPS for server contains unique protection engineered specifically for web and database servers. Employees can inadvertently introduce worms. and other threats into your network with their desktops or laptops. Application shielding and enveloping prevent compromise of applications and data and prevent applications from being used to attack other applications. The integrated McAfee ePO agent and management console let you consolidate processes and cut overhead. even by a user with administrative privileges. Relax on “Patch Tuesdays” You can save time. and a dynamic. For desktop Managing security and connectivity policies for endpoints can be a real IT headache. and resources on patching. stateful firewall — to keep desktops safe. For server Host IPS for server can monitor and block unwanted activity and threats to maintain server uptime and protect assets. and proactively prevents emerging attacks through McAfee Global Threat Intelligence. ending the pain of “Patch Tuesdays” and emergency patch cycles. These actions compromise data. McAfee Host Intrusion Prevention (Host IPS) delivers complete protection against new and unknown threats. and result in lost productivity. A dynamic. spyware.McAfee Host Intrusion Prevention Proactively secure your desktops and servers As an IT manager. one of your top challenges is to protect the IT assets that support your business. fending off known and unknown attacks to guard confidential data and preserve business continuity. You can maintain a high level of protection with complete vulnerability coverage while deploying patches on your schedule. Host IPS for desktop uses multiple proven methods — behavioral analysis. protecting against attacks like directory traversal and SQL injection. after appropriate testing. while signature-based protection identifies known attacks. signature analysis. Behavioral protection blocks zero-day attacks that target new vulnerabilities.

and other malicious code. Using a consistent management platform lowers IT overhead costs and generates operational efficiencies. automatic updates safeguard your devices from the latest threats. and monitor mobile security status. Comprehensive mobile protection is essential to protect data integrity and employee productivity from malware attacks. and Internet downloads. malicious files are stripped of their payloads. streamlined administration Mobile Security for Enterprise extends centralized management to include your Windows Mobile devices. Trojans. including emails. manage updates. Complete mobile protection As your users work. the system transparently scans all types of files. McAfee Mobile Security for Enterprise is a centrally operated anti-malware system that scans and cleans mobile data. and infrared communications. Wi-Fi. worms. Strengths • • • • Always-on. Instant threat detection Continuous protection detects malware in less than 200 milliseconds without interrupting wireless operations or connectivity. text messages. real-time protection without interrupting connections Inline cleaning automatically removes infections to maintain device health Designed specifically for mobile threats with a minimal device footprint Regular over-the-air signature updates and alerts if an update fails or a device becomes infected Reduces risk of sensitive data loss that can mean compliance violations • 68 ENDPOINT SECURITY . photos. you can easily configure policies. text messages. email attachments. All the while. dialers. including inbound and outbound emails. and videos on Windows Mobile OS smartphones. Simple. A consistent policy definition and management environment reduces mobile risk for your enterprise and helps you maintain compliance. After detection. preventing corruption from viruses. Bluetooth. Our comprehensive anti-malware technology protects data transmitted over wireless carrier data networks.McAfee Mobile Security for Enterprise Proven endpoint security for enterprise mobile devices Malware can interrupt mobile service and disrupt business. Mobile Security for Enterprise protects your mobile devices at the most critical points of exposure. Through the web-based McAfee ePO console.

McAfee provides AV offloading and security intelligence that results in a sixty percent increase in supportable virtual workloads. can cause much delay and overhead.DAT update functions while greatly reducing the infrastructure impact seen with traditional anti-virus deployments. We cut operating costs through common security management for both physical and virtual environments. freeing valuable resources for other business operations. Strengths • Removes common hindrances of implementing security in virtualized environments Decouples security management from operations Provides robust security policy and reporting adaptable enough for virtualization deployments ENDPOINT SECURITY 69 • • . improving performance. McAfee MOVE AV enables on-access and . But anti-virus implemented in the traditional manner. McAfee provides operational flexibility for virtual servers with AV scanning of offline images and the ability to schedule AV on-demand scanning based on the overall load of the hypervisor. it also can become tricky to capacity plan. Realize the full benefits of virtualization without the risk McAfee MOVE AntiVirus (AV) works in conjunction with McAfee VirusScan to optimize security processing in virtualized environments. Reduce resource utilization Security processing can be resource intensive. Because of hypervisor-aware security management. McAfee MOVE AV optimizes security for virtualized environments. Security for virtualization — now and in the future McAfee MOVE AV supports the major hypervisor vendors and is fully integrated with McAfee Global Threat Intelligence. within each virtual desktop. extra resource consumption can affect all of the services provided on the hypervisor. having strong protection against malware is more important than ever. capacity planning and utilization can now be predictive. Virtualization makes it easier to support a multitude of servers. having the controls to minimize unintended resource consumption is critical. As data is now consolidated within the datacenter. When loads are high. With fluid provisioning.McAfee MOVE AntiVirus Optimize security for virtualized desktops without compromising Virtual desktop infrastructure (VDI) is giving IT great flexibility to support work whenever and where ever. You get advanced security from McAfee with the agility to adopt a variety of virtualization implementations. However. Supporting VMware View and Citrix XenDesktop.

or post-admission health against policy to r . McAfee protects your investment by leveraging your existing network and system components and taking advantage of integrated management through McAfee ePO. alerts.and post-admission McAfee NAC Appliance controls guest and contractor access with a network-based approach and offers identity and application-based network access control McAfee NAC Module for McAfee Network Security Platform adds the functionality of the NAC Appliance to an existing Network Security Platform to incorporate intrusion prevention in network access control decisions St ep licy Po 1: Ste p2 :D i Scans for rogue devices. disrupt your networks. the integrated McAfee solution secures against threats inside and outside the network while remaining simple. cost-effective. Mix and match these options to create a complete solution: • McAfee NAC Software supports managed users and offers employee endpoint health assessment both pre. and reports • • er ov sc Takes action based on outcome of policy check or behavior Ste p 4: R e m e diate 70 ENDPOINT SECURITY St ep 3: Enf orce McAfee supports a continuous lifecycle of access control for compliance. scalable. which control who has access to your specific critical network resources. Further. McAfee Unified Secure Access is the first network access control (NAC) solution to unify endpoint and network security with access control. Broad enforcement options McAfee Unified Secure Access includes three main components. and application policy ni St e p 5: M o Monitors endpoint to ensure ongoing compliance Checks pre. It controls access and protects against broad threats with application-based and identity-based technologies. Minimize risk of outbreaks while allowing flexible policies McAfee expands your security posture with adaptive policy technology that combines multiple assessment and control features into one NAC solution. Defines health. machine/user identity. Employees who self-administer their endpoints can disable or misconfigure security tools and install malicious programs that can threaten data. and compromise your systems and data. accurate. and secure. Unlike many NAC solutions.McAfee Network Access Control Reduce threats and data loss with unified network access control Visitors and contractors can introduce malware.

prove compliance by automating the IT audit process These days. McAfee Policy Auditor enables you to produce consistent and accurate reporting against internal and external policies. easing agent deployment. FDCC. as well as standards and frameworks. McAfee Policy Auditor simplifies the process of demonstrating compliance. such as FDCC. every time. efficient audits. Integrated for investment protection Use McAfee Policy Auditor with McAfee ePO to consolidate security management and compliance management. Pair McAfee Policy Auditor with McAfee Vulnerability Manager to run consolidated audits across both managed (agent-based) and unmanaged (agentless) systems. It automates manual audit processes and increases efficiency. HIPAA. SOX. Predefined templates include ISO 27001. it is not enough to be compliant. Built on open standards and SCAP-validated. You can proactively define. Get proactive about compliance McAfee Policy Auditor delivers automated policy auditing of managed assets. It is critical to show it with a high degree of accuracy — a daunting and time-consuming task. extensive support for content standards. and transparent integration with McAfee ePolicy Orchestrator mean accurate. it enables you to import authoritative templates. management. and report on the compliance of information systems based on industry.McAfee Policy Auditor Get in control. FISMA. Strengths • • • • • Fast. and PCI DSS. measure. mapping IT controls to policy. automated import of industry benchmarks through SCAP standard Real-time audit model and blackout window reduce business disruption Automation saves hours and days of tedious tasks Builds confidence with external auditors Enables organizations to prove compliance consistently ENDPOINT SECURITY 71 . By mapping IT controls against predefined policy content. and audit for compliance to that standard within minutes. Its proven agent. and corporate security policies. and auditing devices — especially your mission-critical servers — to identify policy violations and noncompliant systems. COBIT. regulatory. You need an efficient and accurate alternative. and reporting. You spend an inordinate amount of time and effort manually collecting data. GLBA.

and you can customize web policies to filter unwanted websites. Simply install the protection onto endpoints. and run virus and vulnerability scans. Advanced security McAfee SaaS Endpoint Security Suites protect from unknown threats. schedule reports. and online exploits like phishing scams. McAfee Gold Technical Support is included for easy access to trusted experts through phone. McAfee SiteAdvisor software helps users stay safe from malicious websites. For the most complete security. It also scans the network perimeter for vulnerabilities to help you take action against weaknesses. Defend all your systems and eliminate the high costs of onsite maintenance and investments with an integrated Security-as-a-Service approach. and the software transparently updates over an Internet connection with no maintenance and no disruptions. email. and more — without limiting online access. consolidate endpoint. our SaaS Endpoint and Email Protection Suite filters and quarantines inbound and outbound threats from email before the threats reach your network — with no installation required. updates.McAfee SaaS Endpoint Security Suites Always-on-guard Security-as-a-Service With IT staff stretched thin and limited budgets. reporting. From the web-based McAfee SecurityCenter console. McAfee SaaS Endpoint Security Suites. McAFEE SaaS ENDPOINT PROTECTION SUITE Centralized online management Desktop and file server anti-virus and anti-spyware Real-time threat intelligence Desktop firewall Web security for safe surfing (McAfee SiteAdvisor) Host web filtering Email server protection Cloud email filtering for inbound and outbound email McAFEE SaaS ENDPOINT PROTECTION ADVANCED SUITE McAFEE SaaS ENDPOINT AND EMAIL PROTECTION SUITE • • • • • • • • • • • • • • • • • • • • 72 ENDPOINT SECURITY . chat. and web security to protect businesses of all sizes against the latest known and unknown threats. and email. and group management. you can centralize installation. formerly McAfee Total Protection Service suites. Use the same console to customize reporting. Signature and behavioral-based scanning reduce exposure from unknown threats. configuration. Enjoy fast deployment and uninterrupted protection that is never obsolete. spyware. companies are looking for innovative ways to protect their assets and their users without complex and expensive software deployments and maintenance. outbreaks.

McAfee SaaS Total Protection
Complete email and web protection, endpoint security, and vulnerability scanning Looking for complete protection from the cloud? McAfee SaaS Total Protection offers best-in-class security that leverages the power of cloud computing to deliver comprehensive and cost-effective protection for endpoint, email, web, and network. Integrated, cloud-based security Get a single integrated suite that provides all the benefits from the McAfee SaaS email, endpoint, vulnerability management, and web protection solutions — all hosted by the McAfee management infrastructure. Subscribe to McAfee SaaS solutions, infrastructure, expertise, and 24/7 Gold support to improve your security, cut your capital expenditures, and free your IT staff to focus on other areas critical to your business. Our best-in-class SaaS solution maximizes your protection from the cloud and enables your success with a centralized management console, the McAfee SecurityCenter. The SecurityCenter provides total visibility with 24/7 access to an easy-to-use, online dashboard to view user protection, customize security policies, and generate and download reports. Strengths

An integrated Security-as-a-Service suite that eliminates the high costs of onsite hardware maintenance and investments Endpoint protection stops viruses, spyware, hackers, and intrusions and provides web security Inbound and outbound email filtering blocks spam and phishing attacks Email continuity ensures email access even when your server experiences an outage Host-based and cloud-based web filtering blocks online threats and ensures Internet compliance and productivity for users on and off the corporate network Perimeter scanning helps identify potential vulnerabilities or security issues and provides remediation assistance

• •

ENDPOINT SECURITY

73

McAfee Security for Email Servers
Robust content security for Microsoft Exchange and Lotus Domino servers An important component for comprehensive email security, McAfee Security for Email Servers serves as an additional layer of security by inspecting email on your email server. Because it plugs directly into your email server, McAfee Email Security for Servers can scan and automatically apply policy to internal email that your email gateway never sees. Unbeatable virus and threat detection McAfee Security for Email Servers uses the McAfee scanning engine to detect, clean, and block viruses, worms, Trojans, and other potentially unwanted programs. The cloud-based McAfee Global Threat Intelligence reputation service analyzes email sender addresses and domains, messages, embedded URLs, and file attachments. Reputation analysis helps McAfee Email Security for Servers accurately identify and quarantine undesired messages using minimal system resources, saving critical computing power for your email server’s number one job: delivering email. Content filtering You can filter messages based on size, message content, or attachment content. Many enterprises block or quarantine messages that contain controlled or sensitive contents in the subject, message body, or attachments. McAfee Quarantine Manager McAfee Quarantine Manager is a highly scalable centralized off-box quarantine server. Supporting multiple McAfee products and managed through McAfee ePO, it enables administrators to easily consolidate and manage email quarantines. Role-based administration, granular quarantines, and a brandable user interface offer ultimate control and quarantine flexibility. Manage your security simply Integration with McAfee ePO provides centralized configuration, policy management, and reporting. McAfee ePO automatically pushes out and implements your configuration changes and policy changes. Strengths
• • • •

Prevents viruses and spyware from traversing your internal network via email Protects Windows, Linux, and AIX email servers on 32- and 64-bit platforms Automatically enforces email usage and content policies Works in conjunction with McAfee email appliances to provide comprehensive email security with shared central management and quarantine

74

ENDPOINT SECURITY

McAfee Security for Microsoft SharePoint
Powerful protection for your SharePoint servers With so much information shared throughout your business, you need targeted security for your SharePoint document libraries. Otherwise, viruses, worms, Trojans, and other threats can harm them. Know your content and enforce compliance McAfee Security for Microsoft SharePoint provides comprehensive, enhanced security for documents, web content, and files stored on your SharePoint workspaces. It detects, cleans, and removes viruses, as well as banned or inappropriate content, using the lightning-fast McAfee scanning engine. McAfee Security for Microsoft SharePoint offers preset content rules to prevent the spread of inappropriate content. Easy to use and immediately effective, the preset content rules can be run straight out of the box, or you can fine-tune them using advanced custom rule sets. The content management rules can prevent downloads and uploads. They also report details about documents that contain sensitive or offensive information. Scalable management McAfee Security for Microsoft SharePoint leverages your investment in the McAfee ePO platform. Comprehensive, graphical reports detail your security posture and answer the question: “Are all my SharePoint servers protected with the latest engine and virus definition files?” McAfee ePO supports remote deployment and allows large enterprise rollouts to be managed easily from a central location. Actionable monitoring with a graphical dashboard The management dashboard provides an overview of the latest virus detections; graphical data views with charts, detection summaries, product updates, licensing, and version information; details on recently scanned items; and security and vulnerability news. Strengths
• • • • • • •

Advanced anti-virus technology Effective content filtering Centralized management and reporting Preset content rules Microsoft VSAPI support Automatic updating Enhanced quarantine management

ENDPOINT SECURITY

75

Proactive safety information keeps users alert McAfee SiteAdvisor Enterprise lets you avoid restrictive policies that keep your employees from using the web for research and business projects. Your business users will have the freedom to surf online. management. and reporting easy and efficient 76 ENDPOINT SECURITY . and phishing. Deploy and manage policies with ease Ready to deploy across your organization with McAfee ePO. and improve bandwidth to make employee Internet use efficient and effective. using active technology to guide users away from malicious websites and shield them from online threats. and implement added protection for remote users — all to ensure policy compliance. view reporting. reduce legal liability. McAfee SiteAdvisor Enterprise solutions install easily to protect all business users. Strengths • • • • Educates users for continuous protection against changing threats Prevents users from browsing to websites hosting malware or exploits Restricts and monitors employee web usage with superior content filtering Centralized management through McAfee ePO makes deployment. protected from web-based threats such as spyware. red. Now you can allow employees to surf and search the web safely. McAfee Web Filtering for Endpoint integrates with McAfee Site Advisor Enterprise to help organizations manage productivity. Integrated URL and content filtering Unmanaged Internet access presents many challenges and introduces unnecessary risk. You can customize the authorization or blocking of website access. Featuring an intuitive color-coded rating system — green. gateway-aware solution to enforce the appropriate policy intelligently. cybercriminals are making it a dangerous one. assign actions based on safety ratings. McAfee customers who use McAfee Web Filtering for Endpoint and McAfee Web Gateway can take advantage of this integrated. McAfee SiteAdvisor Enterprise provides risk-aware protection at the desktop.McAfee SiteAdvisor Enterprise McAfee Web Filtering for Endpoint Worry-free web browsing and blocking for business users While the Internet is a crucial business tool. adware. control messaging. or gray for unrated — and the reputation intelligence of McAfee Global Threat Intelligence. whether the user is at a corporate office behind the McAfee Web Gateway or outside the network. yellow.

the growing number of security point products increases management costs and complicates response. Protect every endpoint from data. but you would never achieve the effectiveness and efficiency of McAfee Total Protection for Endpoint — Enterprise Edition. All the while. email. network. Users expect support for their preferred systems. efficient control of security and compliance tools Safeguards data and minimizes compliance issues Keeps confidential data from leaving the company Zero-day protection against new vulnerabilities. including Macs and mobile devices. and Linux systems and mobile devices. We protect even if the device is lost or stolen. shielding your assets from bots and zero-day attacks with the support of McAfee Global Threat Intelligence. and block noncompliant systems or unauthorized devices that may attempt to access your business-critical systems and sensitive data. We secure your systems and data against sophisticated malware. while regulations force increased safeguards for data and documented compliance. FEATURE WHY YOU NEED IT Single integrated management Encryption Device control Host IPS and desktop firewall Anti-malware Anti-spam Safe surf and search Host web filtering Email server security Network access control Policy auditing Multiplatform Instant visibility into security status and events. Mac.McAfee Total Protection for Endpoint — Enterprise Edition Complete endpoint security designed for medium to large enterprises Providing a secure endpoint environment for your business can be complex. stops network-borne attacks Blocks code that steals data and sabotages user productivity Improves productivity and limits phishing and malware Helps ensure compliance and reduce risk from web surfing Controls users surfing on or off the corporate network Intercepts malware before it reaches the user inbox Limits malware infections by blocking noncompliant systems Streamlines checks and compliance reporting Protects the full range of endpoints required by mobile and knowledge workers ENDPOINT SECURITY 77 . reduced urgency to patch. This combination of controls is ideal for sophisticated enterprises with users who expect freedom — as well as total protection from the risks their mobility and flexibility entail. web. This integrated security suite delivers ironclad protection for all your endpoints. and system-level threats You could patch together a collection of individual products. including Windows. Sophisticated malware and a boundary free workplace make it easy for cybercriminals to steal information and devices.

DVDs. file and folder. authentication. and Bluetooth devices. full-disk encryption combined with strong access control protects sensitive data on all endpoints. Host data loss prevention allows you to monitor real-time events and apply centrally managed security policies to control how employees access and use confidential data. data loss prevention. on the fly. and centralized management by McAfee ePO. You can also monitor and control data transfer to portable devices. Novell NDS. Strengths • Works even when data is modified. McAfee Device Control. Unlike wholesale blocking of device usage. iPods. or devices without end-user action Logs every data transaction with forensic-quality. The suite includes McAfee Endpoint Encryption (full-disk. protecting confidential customer information — as well as your intellectual property — has to be job one. McAfee Host Data Loss Prevention. Persistent file and folder encryption transparently encrypts the files and folders you choose. for any device. define security policies. copied. compressed. audit-ready details • • • 78 ENDPOINT SECURITY . Improved visibility and efficient. pasted. folders. ensure safe harbor protection. Instead of managing separate point solutions. Enterprise-grade encryption and device control To protect data at rest. generate reports. anywhere. before they move through your organization. centralized management As your business needs change. and maintain your data protection.McAfee Total Protection for Data Industry’s most complete data protection solution With today’s mobile devices and ever-connected work style. and support prompt and proper audits. monitor flexible dashboards. demonstrate compliance. and removable media encryption). we help you understand evolving usage and adjust policies appropriately. use a single environment to manage your deployment. you can specify and categorize which devices may or may not be used and enforce what data can and cannot be transferred to these devices based on sophisticated content analysis. the McAfee Total Protection for Data suite provides strong encryption. They prevent unauthorized access to your sensitive data — anytime. such as USB flash disks. or encrypted Enforces policies based on users and groups and synchronizes policies with Active Directory. and PKI Encrypts files. Advanced reporting and auditing help your company better meet tough privacy mandates. and policy-driven security controls. To secure your confidential data reliably.

you can encrypt all data on laptops. and comprehensive intelligence on your security posture. anti-spyware. email. web security. proven vendor. and data. you get anti-virus. with one purchase of one package from one trusted. control. such as memory sticks. purchase. and manage the protections you need ENDPOINT SECURITY 79 . McAfee Total Protection for Secure Business has it all — the industry’s most comprehensive security in one easy-to-manage suite for endpoints. email. It eliminates the compatibility and maintenance issues associated with multiple point products and vendors. desktop firewall. saves money. block data-stealing malware. web. you gain better visibility. desktops. To protect your business from data loss. We also help you limit access to dangerous websites. Smart data. always-active threat protection from data-stealing threats Encryption and device control to prevent data loss Single. and enforce appropriate data usage policies. and other mobile devices and prevent unauthorized use of removable devices. Save time and money Let McAfee simplify acquisition and deployment of the protections you need. It saves time. Strengths • • • • Instant. and highly accurate spam detection for effective gateway blocking of malware. with substantially lower licensing fees and support costs than if purchased separately. centralized management to streamline management and reporting Easy to choose. and host intrusion prevention. and web security. Instead.McAfee Total Protection for Secure Business All the critical elements of security a medium-sized company needs Free yourself from the headaches of managing multiple point products from multiple vendors. plus compliance In one solution. and provides a more powerful. integrated defense against the threats medium-sized businesses know about — and the threats you cannot see coming.

and executables. Strengths • • • Whitelisting and on-demand scanning for maximum protection Prevents execution of all unauthorized code. Alerting and rich auditable data on server changes help you test and verify compliance with regulations. and DLLs Defends against memory exploits with memory protection and in-memory scanning Low overhead components minimize CPU impact Simple setup and low initial and ongoing operational overhead Administrators with physical or remote access to the machine cannot override protection • • • 80 ENDPOINT SECURITY . Any attempt at unauthorized change is detected and flagged with an alert. We include templates for key regulatory and industry policy standards. servers are a prime target as hackers pursue valuable. Centralized McAfee ePO management makes our flexible configurations easy to set up and maintain and helps you manage and document security throughout your enterprise. However. Strong change management controls mitigate the risk of targeted attacks. and reports become routine.McAfee Total Protection for Server Improve security while preserving system availability and uptime Many companies have scaled back security on the server because traditional server security solutions introduce latency. The ability to assess configuration and management of the system against policy drives down the cost of management. Optimize your security posture Our combination of dynamic whitelisting. and disrupt critical processes. drivers. These lightweight security components preserve processing power for critical applications by locking in a trusted state and blocking unauthorized scripts. hamper server operations. and on-demand anti-virus helps you ensure only authorized applications can run. and compliance drift. To better manage risk exposure. McAfee Total Protection for Server lets you ensure optimal security without compromising availability or uptime. you acquire complete visibility as well as policy enforcement over data and system access. thwarting attacks like Operation Aurora. scripts. Gain operational efficiency and continuous compliance Combined security and compliance functions reduce the number of hours required to manage processes. policy auditing. sensitive data. data breaches. change policy management. You also trim investments in hardware and separate licenses for application and file server security.

the better. malware. Explorer. McAfee correlates real-world data collected from millions of sensors around the globe and provides real-time malware information to McAfee VirusScan Enterprise. It will also identify and block threats that take advantage of JavaScript and Visual Basic. the most comprehensive threat intelligence in the market. buffer overflows. unknown viruses concealed in compressed files and can stop rootkits and hidden keyloggers from installing. Strengths • • • • Powered by global threat intelligence across all key threat vectors Cannot be disabled by hackers. With visibility across all threat vectors — including file. McAfee VirusScan Enterprise covers a broad range of known and unknown threats. firewall. It’s better yet if your protection technology identifies new. Advanced analysis and behavior-based threat detection With innovative heuristics and generic detection. unknown malware. automatically. By blending advanced anti-virus. It defends your systems against viruses. Outlook. and network — and a view into the latest vulnerabilities across the IT industry.McAfee VirusScan Enterprise The ultimate way to keep viruses out of your desktops and servers Enterprises cannot afford to wait for every threat to be identified and a signature file to be released. McAfee VirusScan Enterprise looks for exploits known to target Microsoft applications and services. as well as HTML text and attachments. Block multiple threats to protect systems and productivity McAfee VirusScan Enterprise proactively stops and removes malicious software. including threats that attempt to write to memory. Supported by the McAfee Global Threat Intelligence network To dramatically reduce the exposure from new. web. and SQL Server Can replace existing anti-virus products remotely. Word. or fake anti-virus Centrally managed. and intrusion prevention technologies. and blended attacks. and reduces the cost of responding to outbreaks. monitored. and with no reboot required in most cases • ENDPOINT SECURITY 81 . it finds even new. Excel. McAfee VirusScan Enterprise incorporates real-time risk analysis from McAfee Global Threat Intelligence. unknown threats. message. The time between attack and subsequent identification is critical: the shorter. and reported on through McAfee ePO Defends against threats that target Microsoft — especially Windows services. extends coverage against new security risks.

Windows. including heuristic scanning to identify and block new variants and unknown threats without the need to patch Archive scanning to discover and block viruses hidden within archived files Automatic updating without system reboots Cross-platform protection to block Windows malware Kernel module versioning for on-access scanning on new kernels without having to recompile modules • • • • 82 ENDPOINT SECURITY . comprehensive policy management. worms. and support for most common Linux distributions and include a kernel-scanning cache for efficient processing. Security designed for Linux We offer real-time protection.McAfee VirusScan Enterprise for Linux Always-on protection for Linux systems Though most threats attack Windows systems. and software deployment across your Linux. McAfee VirusScan Enterprise for Linux suits today’s fast-moving. and network — and a view into the latest vulnerabilities across the IT industry. Extremely scalable. McAfee correlates real-world data collected from millions of sensors around the globe. Supported by the McAfee Global Threat Intelligence network McAfee Global Threat Intelligence offers the most comprehensive threat intelligence in the market. on-access scanning. Unprotected Linux systems may also act as carriers. web. allowing viruses and malware to disrupt non-Linux operating systems throughout the network. It provides real-time malware information to McAfee VirusScan Enterprise for Linux to block threats before signatures become available. McAfee VirusScan Enterprise for Linux offers superior protection from the growing numbers of viruses. Enhanced enterprise management and reporting McAfee ePolicy Orchestrator manages and enforces anti-virus protection and policies. malware definitely does target the Linux platform. Strengths • Continuous. Even after an initial outbreak has been contained. Linux-based on-access scanner constantly monitors the system for potential attacks. and other malware targeting Linux systems. low processing overhead. message. With visibility across all threat vectors — including file. It provides centralized. and Mac clients. its unique. offering better security visibility across your entire infrastructure. detailed graphical reporting. viruses may still be able to execute their payloads and infect the entire network. Always on the lookout. highly adaptive small businesses and global enterprises.

Safe archival for compliance Now you can archive safely for longer intervals to support regulatory policies. Updated protection. and Citrix environments • • ENDPOINT SECURITY 83 . and updates the anti-malware security profile of dormant VMs — without bringing them online. real-time anti-malware updates use McAfee Global Threat Intelligence to maintain the latest threat protection. with integrated protection for virtual environments. automatically McAfee has extended its trusted expertise to virtualized environments. maintain. Automatic. We cut operating costs through common security management for both physical and virtual environments. with more and more VMs created throughout the IT environment. their anti-malware security profiles can be precariously out of date and their unpatched vulnerabilities put your entire infrastructure at risk. However. we also greatly reduce the intermittent IT burden of bringing VMs back online for security patches. and report on physical and virtual environments with one console. Strengths • • Updates McAfee . so they no longer threaten the IT environment. allowing your IT staff to focus on other issues. cleans. With McAfee VirusScan Enterprise for Offline Virtual Images. Microsoft. your organization can ensure your VMs are secure and also reduce IT effort. cleaned. Periodic automatic scans and updates of offline virtual images will ensure the systems remain protected. the consequence of easy deployment is virtual machine (VM) proliferation. The solution scans. McAfee has already scanned. Because we automate these processes.DAT signature files without bringing the VM online Integrated with VMware’s VMsafe integration tools for optimal performance and security Facilitates real-time disaster recovery by securing offline virtual machines at secondary sites Reduces migration issues with one solution for VMware. and fully secured them with updated signatures. updates. you monitor. when you bring offline VMs back online. Through McAfee ePO. and other routine maintenance. When these archived VMs activate. Reduced IT overhead and headaches Eventually.McAfee VirusScan Enterprise for Offline Virtual Images Purpose-built security for virtual environments Enterprise applications are easier to provision and deploy on virtualized systems than on physical servers. In today’s virtual environments. VMs that are dormant for an extended time miss the latest patches.

or quarantines it. Automatic remediation Once it finds an infected file. Regular automatic updates from McAfee Labs keep your protection abreast of the latest threats. on-access scanning blocks viruses before they are stored and prevents script-type threats. proactive protection McAfee scans NAS filers to deliver real-time virus protection against a wide range of viruses and other threats. Broad. or written to the server. VirusScan for Storage automatically cleans. Strengths • Continuous. Multiple scanners checking multiple filers give you the power of parallel processing for optimal load balancing and flexible failover protection. One management platform McAfee ePolicy Orchestrator makes control and management easy with a single display and detailed graphical reporting. and unwanted programs One management platform Automatic updates of . on-access scanning that has minimal impact on filer access time. Use McAfee VirusScan Enterprise for Storage to keep viruses away with continuous. accessed and stored constantly by your users. spyware. deletes.DAT files and scanning engines Rapid notification of alerts Works with NetApp filers and Sun Storage devices Enterprise-ready multi-scanner to multi-filer configurations Backed by the 24/7 global research team at McAfee Labs • • • • • • 84 ENDPOINT SECURITY .McAfee VirusScan Enterprise for Storage Unmatched virus protection for network-attached storage environments Network-attached storage (NAS) devices hold a vast amount of business-critical information. unknown viruses and even those hidden in compressed files. Unique on-access scanning technology scans constantly in real-time. It blocks threats before they are stored. copied. detecting new. while files are accessed. you gain the ultimate in virus protection. By scanning files as they move to and from your filers.

McAfee VirusScan Enterprise for use with SAP NetWeaver platform
Extending proven security to mission-critical business applications While anti-malware software is a de facto standard with enterprise clients globally, the vast majority of mission-critical SAP environments remain exposed to potential security threats. With the expanding SAP product portfolio, there are more opportunities to upload external, potentially infected, files to the SAP NetWeaver environment, such as employment resumes, configuration files, and templates. Infected files could potentially corrupt the entire database. We help with the first enterprise-class protection for this critical enterprise asset: McAfee VirusScan Enterprise for use with SAP NetWeaver platform. It supports business continuity for mission-critical SAP environments and helps ensure uploads of infected files do not affect the whole database. Enterprise-class protection McAfee is the only enterprise-class vendor to offer security that scans, quarantines, and remediates sensitive documents, configuration files, templates, and other files before they reach the SAP environment. The product offers real-time (on-access) scanning of any file uploaded or modified in the environment and comes with the flexibility for deployment as a standalone server or as a virtual machine. Enterprise-class manageability Use the same McAfee ePO management platform you use to control other McAfee enterprise products. You get simple, centralized reporting, updates, and auditing. Strengths

Real-time (on-access) scanning of any file uploaded or modified in the environment Flexible deployment: standalone or virtual machine SAP certified integration partner Backed by 24/7 global threat intelligence from McAfee Labs

• • •

ENDPOINT SECURITY

85

McAfee VirusScan for Mac
Complete protection for Mac PowerPC and Intel-based systems Leverage the award-winning McAfee scan engine to proactively hunt down and kill Macintosh and Windows viruses, worms, Trojans, and other threats. Automatic virus updating and cleaning protects you against infected Internet downloads, such as spyware, adware, and other unwanted software. Complete, proactive threat protection McAfee VirusScan for Mac uses on-access scanning to search for viruses and malicious threats every time a file is accessed. It automatically detects viral infections as they attempt to infect a system and protects against Macintosh, PC, and Unix-based viruses. In addition, it has the ability to scan Apple Mail messages and attachments for malicious threats. It will also protect your users when they save or open files from shared network drives. McAfee VirusScan for Mac uses heuristic analysis and generic detection that proactively protects against new and previously unknown viruses. The advanced heuristic analysis looks through the code in a file to determine if the actions it takes are typical of a virus. The more virus-like the code found, the more likely the file is to be infected. To reduce the risk of false alarms, we combine our positive heuristics approach with negative heuristics, which searches for those things that are distinctly non-virus-like. Proactive McAfee Global Threat Intelligence technology automatically detects and blocks suspicious files without the need for signatures. Centralized management McAfee ePolicy Orchestrator can administer McAfee VirusScan for Mac for easy policy configuration, deployment, enforcement, reporting, and management across all your endpoints. Strengths
• • • •

Familiar Apple Mac OS X Aqua user interface Fast on-access or convenient on-demand and full-disk scanning Automatic or on-demand one-click updating Universal deployment on either Intel-based or Power PC-based Macintosh systems Kept up to date with 24/7 global threat intelligence from McAfee Labs Centralized management and visibility across Mac, Windows, and Linux clients Supports Mac OS X 10.6 (Snow Leopard), 10.5 (Leopard), and 10.4 (Tiger) Also available as part of comprehensive protection in the McAfee Endpoint Protection for Mac suite

• •

• •

86

ENDPOINT SECURITY

Security Management

McAfee Security Management
McAfee Security Management delivers real-time visibility into your security, risk, and compliance profile. With an open platform to integrate existing security administration, McAfee automates protection, diagnosis, and remediation.

including databases. Compliance—McAfee solutions automate compliance reporting and elevate your organization’s adherence to industry standards—including PCI. and networks. • Security Management Consolidated management—McAfee ePolicy Orchestrator is the only enterprise-class. and report on your security. web applications. McAfee slashes incident response times. you can secure continuous integrity monitoring. open platform to centrally manage security for systems. Risk management—Your organization can fully understand its risk posture across every meaningful sector of your IT environment. create and enforce change policies. and compliance profile. systems. and compliance. mitigate risk. it empowers you with situational awareness. global protection across your heterogeneous infrastructure. Designed to monitor. and easily incorporate revised standards. and drives down the cost of managing security. risk. and prioritize security efforts while eliminating manual threat correlation processes. SOX. and HIPAA—while lowering costs and reducing audit overhead. strengthens protection. data.Take the Guesswork Out of Securing Your Enterprise McAfee Security Management represents the industry’s most comprehensive approach to managing enterprise security. Through built-in integration with our centralized management console. and shared intelligence— all in an open platform. With end-to-end visibility and powerful automation. networks. you can optimize security. Armed with this new visibility. manage. • • .

Security management for systems.com/securitymanagement for the latest information. Now security goes wherever your employees go. and security defenses coordinated across dynamic enterprise infrastructures. data. 94 99 101 102 103 90 91 92 93 95 96 97 98 100 SECURITY MANAGEMENT 89 . Visit www. application. network. networks.Coordinate Your Security Defenses McAfee Security Management offers proactive risk management.mcafee. or database. and compliance McAfee ePolicy Orchestrator (McAfee ePO) Risk management McAfee Risk Advisor McAfee Vulnerability Assessment SaaS (with McAfee SECURE module option) McAfee Vulnerability Manager McAfee Vulnerability Manager for Databases Streamlined compliance McAfee Change Control McAfee Change Reconciliation McAfee Configuration Control McAfee Database Activity Monitoring McAfee Integrity Control McAfee Integrity Monitor for Databases McAfee PCI Certification Service McAfee Policy Auditor McAfee Total Protection for Compliance The above products appear in alphabetical order in the pages that follow. Regardless of the device. integration with business operations. McAfee protection is there.

It instantly detects changes as they are made. databases.McAfee Change Control Stay in control with comprehensive change policy enforcement How often has an unapproved or untimely change brought down a key system? Unauthorized or untested changes may cause 80 percent of unplanned system downtime. data center automation. many organizations are eager to block unwanted changes and improve accountability for privileged insiders. McAfee Change Control continuously tracks and validates every attempted change to your IT infrastructure. Real-time network visibility McAfee Change Control alerts you to changes on servers. Improved compliance with SOX and PCI DSS Unauthorized changes can violate policies. Complete policy enforcement As insider threats rise. Strengths • Real-time visibility and alerting across servers. source. violations. databases. If it blocks an unauthorized change. or approved ticket. This software lets you enforce change policy according to time window. including switches. enabling those who process credit card transactions to fulfill and validate PCI and SOX requirements efficiently and cost-effectively. it immediately makes a record of the attempt. McAfee Change Control prevents unauthorized changes by providing realtime visibility into modifications and delivering technology-based policy enforcement. and network devices Instant file integrity monitoring lets you quickly identify where policies are being challenged Prevents unauthorized changes. and configuration management database solutions • • • • 90 SECURITY MANAGEMENT . McAfee Change Control provides categorical management over your complete IT infrastructure. and firewalls. routers. leading to costly network outages and material weakness in compliance standards. logging modifications in an independent change database. It improves accountability and eliminates violations that affect compliance or cause outages — while lowering IT costs. and network devices. including employees and outsourced IT contractors. and outages before they occur Eliminates costly manual efforts to track and account for changes Easily integrates with change management.

But often a gap remains between actual activity and the documented change management process. and documents unapproved or unticketed changes. McAfee also integrates with both default and customized installations of HP ServiceManager. To help minimize differences between staging and production environments. or a service desk. ticketed change requests Automatically creates new tickets for unticketed changes Creates tickets for changes made to staging environment. reconciles the ticket with production environment changes. McAfee Change Reconciliation operates in concert with McAfee Change Control to correlate changes made on servers to the change tickets documented in existing ticketing systems. actual start time. McAfee Change Reconciliation can be configured to prevent any unauthorized changes to the infrastructure. Strengths • • • Reconciles actual changes to approved. HP uCMDB and BMC Atrium integrations place comprehensive real-time change data into the CMDB.McAfee Change Reconciliation Automate change policy and ensure effectiveness Most IT organizations recognize the impact of change on their operations and have invested in change management. and username. It integrates with popular change management systems and configuration management databases to reduce the cost of compliance. actual end time. Integrations help create closed-loop change management When deployed with McAfee Change Control. For instance. HP Release Control. data center automation. increase availability. and offers exception reporting SECURITY MANAGEMENT 91 . you might allow a change only if there is an approved RFC and the time of change is between the scheduled start and end time. groups. with high accuracy. such as emergency changes. the software can track changes on staging environments and create a manifest ticket for use in production implementations. and BMC Remedy and supports integration with custom workflows. After reconciliation. Cost-effective compliance and change validation McAfee Change Reconciliation verifies deployment of approved changes and identifies. and improve information technology infrastructure library (ITIL) processes. the RFC is updated with detailed information about the change. It automatically validates changes corresponding to an approved and implemented request for change (RFC) based on the identifying hostname or configuration item.

Profiles let you focus on what is critical for you to monitor. McAfee Configuration Control offers a cost effective means to automate and enforce individualized or standard compliance configurations. automated audit and compliance reports can provide internally or externally defensible proof of continuous compliance across your environment. you can quickly create your own IT compliance standards as well as address external requirements — without being an expert. with continuous compliance For enterprises that must adhere to multiple compliance standards or strict regulations. Achieve compliant configurations and enforce policy with ease Through unique IT controls and automated assessments. and compliance Leverages your investment in McAfee ePolicy Orchestrator and other enterprise software • • • 92 SECURITY MANAGEMENT . Beyond saving you time and money on audit activity. Scheduled. With this one solution. you meet prescribed compliance requirements for unauthorized change alerting and configuration assessment reporting. with dashboards making it easy to keep watch and track. Control. and Enforcement.McAfee Configuration Control Get in control and stay in control. Alerting with policy enforcement provides the notification of changes that could jeopardize compliance. and costs. it goes farther to block unauthorized changes and limits the liability and costs associated with ad hoc changes that may affect performance. we help you obtain continuous compliance. Through the three steps of Audit. reliability. you can achieve continuous compliance while dramatically cutting audit preparation. It also limits changes to predetermined time windows. time. or security. With a flexible and easy-to-use interface. Strengths • Controls integrity of your systems with continuous tracking and alerting of events that could compromise security or lead to noncompliance Enforces a centralized or enterprise change policy so that only validated. or approved work tickets. You have control and can stop drift from corporate policy. trusted sources. availability. authorized changes are executed Minimizes risk by controlling system change and configurations to ensure the highest level of security. constantly maintaining and achieving compliance in dynamic environments is both tricky and expensive.

Total visibility into database compliance With McAfee Database Activity Monitoring. It also shields applications that use older releases of the databases for which patches are no longer provided. Audit trail reports are available to meet SOX. allowing time for the security team to investigate Monitors threats from all sources. Research shows that more than 92 percent of records breached involved a database. 2010. SECURITY MANAGEMENT 93 . a luxury not available to most mission-critical databases. PCI.McAfee Database Activity Monitoring Automated database protection Organizations store their most valuable and sensitive data in a database. protects them with a set of pre-configured defenses. and other compliance audit requirements. but perimeter protection and basic security provided with the database may not protect this asset from sophisticated hackers or rogue insiders. local privileged accounts. Virtual patching protects against extreme database threats Applying missing patches and fixing misconfigurations found by the vulnerability scan will enable you to improve the security posture of your databases immediately. It can also enforce policies by terminating sessions that violate security policy. including network and application users. Strengths • • • Protects unpatched databases against zero-day attacks Real-time monitoring alerts can spark immediate response Intrusion prevention terminates suspicious sessions and quarantines malicious users. and attacks from within the database itself • 1 Verizon Business Study. even when running in virtualized or cloud computing environments. with more than 87 percent based on exploits requiring significant technical skills. and helps you build a custom security policy for your environment — making it easier to demonstrate compliance to auditors and improving protection of critical data assets.¹ McAfee Database Activity Monitoring automatically finds databases on your network. you gain visibility into all database activity. including local privileged access and sophisticated attacks from within the database. McAfee Database Activity Monitoring cost-effectively protects your data from threats by monitoring activity locally on each database server and by alerting or terminating malicious behavior in real time. Since database patch deployments require downtime. An audit trail aids post-incident forensic analysis to understand the amount of lost data or malicious activity. McAfee Virtual Patching technology can protect even your unpatched databases against zero-day attacks by blocking attacks that exploit known vulnerabilities.

Integration for quick problem identification and action To help you get answers about infections and threat events faster. For the big picture. Members of the McAfee Security Innovation Alliance (SIA) develop new use cases and integrations to make it easier for you to oversee your infrastructure. network. From the management dashboard. a partner might link its real-time monitoring and threat detection with McAfee incident response and compliance reporting. and events across endpoint. attacks. The savings can be material. According to third party research. A cornerstone of the McAfee Security Management Platform. effective decisions. this approach dramatically simplifies installation and maintenance of protections and their rules and policies. and then factors in data usage and compliance information. McAfee ePO brings together information and processes to create intelligent security that is automated and actionable. incident response. For example. web. data. and compliance processes. it also helps you respond quickly.000 customers use McAfee ePolicy Orchestrator to manage nearly 60 million PCs and servers. You leverage your McAfee ePO investment for a united view and audit trail of actions. making it the world’s most deployed and respected security and compliance management technology. Open for innovation McAfee ePO has an open architecture that helps advance next-generation security and compliance innovations. It eliminates the system impact of multiple agents and the decision inefficiencies of multiple consoles. and consistent. McAfee ePO correlates threats. You can reduce operational costs with advanced reporting and policy assignment functions. Every efficient response improves threat protection and compliance management. correlated set of threat events.McAfee ePolicy Orchestrator (McAfee ePO) Intelligent security and compliance optimization Over 35. It streams threat and vulnerability information into a central management hub for a single. Compared to old-style point solutions. and gateway protection tiers. accurate. network. This consolidation supports more relevant and efficient operational and compliance processes. With McAfee ePO. 94 SECURITY MANAGEMENT . updates are quick. Achieve operational efficiencies and business benefits McAfee ePO unifies security management across the enterprise with an open architecture that streamlines reporting. When policies need to adjust as threats and regulations change. you can just select a system or group and immediately launch a task. customers manage more nodes with less hardware in less time. McAfee ePO integrates system. When the integrated display shows you need to investigate. and email protections. you can make quick.

where changes are later reversed. and present compliance violations and risk. costly support associated with other whitelisting technologies. introduce malware. It enables real-time change detection. automated teller machines (ATMs). We also catch transient violations. Dynamic whitelisting and policy enforcement with low TCO Our solution blocks unauthorized. such as point-of-service (POS) systems. We block changes attempted outside of policy. out-of-policy changes before they occur. medical imaging systems. or both. kiosks. and you can verify changes against the change source. rules. or malicious applications that can compromise the integrity of systems. time window. Combining industry-leading whitelisting and change control technology. vulnerable. Unauthorized applications or changes affect service availability. Protection links directly to policy. yet allows for authorized updates or changes from administrator-defined trusted sources. McAfee Integrity Control also includes change control to block unwanted. log the change attempt. as it needs no databases. and notify administrators. or updates. management. It’s crucial to ensure only trusted applications run on high-value fixed-function devices. and process control systems. and reporting Provides data about every change. including the user and program used Transparent operational footprint suits compact. It reduces risk. Strengths • • • • McAfee ePO eases agent deployment. cuts overhead caused by scan-based monitoring.McAfee Integrity Control Protect fixed-function systems from unauthorized applications and changes Vertical segments such as retail. healthcare. or approved change ticket. and is essential for verifying security or meeting compliance requirements such as the Payment Card Industry Data Security Standard (PCI DSS). lightweight way to block unauthorized applications and changes on fixed-function point-of-service systems and devices. Monitor file integrity and changes in real time Continuous file integrity monitoring (FIM) watches files and directories for changes to content. permissions. McAfee Integrity Control provides an effective. This control slashes change-related outages and policy violations. accountability to validate change activity. A dynamic whitelisting trust model keeps systems tightly secured. and change prevention against unwanted activity. and industrial control face a barrage of unknown software from the web and intensifying compliance and regulatory scrutiny. The software eliminates the manual. fixed-function systems Eases compliance with PCI regulations SECURITY MANAGEMENT 95 .

McAfee Integrity Monitor for Databases Improved visibility into your database security posture while meeting compliance requirements Compliance regulations demand that organizations have proper controls over sensitive data. without an impact on performance • • • • 96 SECURITY MANAGEMENT . password changes. including financial information and customer personally identifiable information (PII). McAfee Integrity Monitor for Databases is the easiest. Strengths • Deploys on the IT infrastructure you prefer: installed non-intrusively on physical servers. or deployed remotely on cloud servers Minimizes risk and liability with real-time notification of any configuration changes that affect security Tracks activities such as logons. organizations gain visibility into important configuration parameters for database servers. and monitors database schema changes and data changes Centralized deployment and management through McAfee ePO Low overhead operation allows you to monitor comprehensively. most cost-effective solution to deploy for evaluating and monitoring the security of systems storing sensitive information. Saves time and money through fast deployment and an efficient architecture With McAfee Integrity Monitor for Databases. This content is typically stored in relational databases. McAfee Integrity Monitor for Databases tests systems for common configuration vulnerabilities. but complex configuration of these systems coupled with difficulty in monitoring privileged access make it a challenge to demonstrate consistent protection. It can be up and running quickly. and helps you build a custom security policy to audit access to your sensitive data — providing visibility into dangerous configuration changes and making it easier to demonstrate compliance to auditors. and more. capturing the information necessary to meet compliance requirements. logoffs. as well as any changes to these settings that could influence data security. monitors changes to these settings. user/role creations. and offers a simple upgrade path to more advanced capabilities as needed. provisioned along with the database on virtual machines. without affecting existing operations or performance.

so that companies can successfully navigate and complete the PCI DSS requirements. install. Merchants can quickly meet all requirements with confidence. and a certificate of compliance. port-level network services vulnerability testing. and 4). with Software-as-a-Service provisioning and no hardware or software to deploy. 3. reliable. technical support. Simple. and even generate the necessary PCI compliance reports and documentation. and affordable compliance Working directly with Visa International. The McAfee PCI Certification Service provides step-by-step guidance and real-time analysis of compliance status. Our portal makes it easy to complete your self-assessment questionnaire. This full-service PCI compliance service is suitable for organizations with fewer than 6 million payment card transactions per year (PCI merchant levels 2. The McAfee PCI Certification Service includes quarterly and on demand scanning. assistance and recommendations to help you meet requirements. and web application vulnerability testing Generates PCI compliance reports that are ready to submit • • • SECURITY MANAGEMENT 97 .McAfee PCI Certification Service PCI peace of mind from the world’s largest dedicated security company and PCI-approved scan vendor All organizations that capture. The McAfee PCI Certification Service includes IP address scanning. remediation assistance. Strengths • • Easy-to-use Software-as-a-Service Self-assessment questionnaire selection wizard and unlimited technical support Automatic quarterly scans help you continue to demonstrate compliance Quarterly and on-demand scanning includes dynamic port scanning. we developed an accurate. The service is completely web-based. or store credit card data must demonstrate proof of compliance with PCI DSS. process. and extensive technical support. review quarterly vulnerability scans. easyto-use service that makes PCI compliance more affordable and more reliable for organizations of all sizes. the self-assessment questionnaire. launch on-demand scans to retest as needed. Tens of thousands of organizations around the world trust McAfee to audit their PCI compliance. or maintain.

By mapping IT controls against predefined policy content. and report on the compliance of information systems based on industry. Get proactive about compliance McAfee Policy Auditor delivers automated policy auditing of managed assets. efficient audits. GLBA. prove compliance by automating the IT audit process These days. such as FDCC. SOX. It automates manual audit processes and increases efficiency. Built on open standards and SCAP-validated. Predefined templates include ISO 27001. FISMA. mapping IT controls to policy. and auditing devices — especially your mission-critical servers — to identify policy violations and noncompliant systems. Integrated for investment protection Use McAfee Policy Auditor with McAfee ePO to consolidate security management and compliance management. You spend an inordinate amount of time and effort manually collecting data. McAfee Policy Auditor simplifies the process of demonstrating compliance. and corporate security policies. It is critical to show it with a high degree of accuracy — a daunting and time-consuming task. automated import of industry benchmarks through SCAP standard Real-time audit model and blackout window reduce business disruption Automation saves hours and days of tedious tasks Builds confidence with external auditors Enables organizations to prove compliance consistently 98 SECURITY MANAGEMENT . Strengths • • • • • Fast.McAfee Policy Auditor Get in control. McAfee Policy Auditor enables you to produce consistent and accurate reporting against internal and external policies. Its proven agent. it enables you to import authoritative templates. regulatory. and PCI DSS. and transparent integration with McAfee ePolicy Orchestrator mean accurate. and reporting. HIPAA. You need an efficient and accurate alternative. extensive support for content standards. FDCC. You can proactively define. measure. every time. easing agent deployment. management. Pair McAfee Policy Auditor with McAfee Vulnerability Manager to run consolidated audits across both managed (agent-based) and unmanaged (agentless) systems. as well as standards and frameworks. COBIT. it is not enough to be compliant. and audit for compliance to that standard within minutes.

real-time visibility. realtime information about a threat. Its insight pays off in improved operational efficiency.McAfee Risk Advisor Take the guesswork out of securing your environment What happens when you face an out-of-cycle patch. various risk-scoring methods. “At Risk” and “Not at Risk” views of all the assets in your environment enable you to see quickly which assets are threatened. real-time threat updates to improve situational awareness • • • SECURITY MANAGEMENT 99 . the dashboard provides recommended countermeasures. Automated threat correlation and real-time updates from McAfee Labs and tight integration with core McAfee products combine to deliver the highest level of security and improve operational efficiencies. and patch optimization Through correlation and analysis. and the risk it poses to specific assets. You learn how threats affect regulatory mandates so you can balance your business objectives with the right amount of security. To help reduce the frequency and cost of patching. Simplified management and compliance McAfee Risk Advisor integrates with McAfee ePO for easy. and an optimized security posture. while demonstrating the positive impact of deployed security products. vulnerability. and countermeasure information. McAfee Risk Advisor takes the guesswork out of protecting critical assets by proactively correlating threat. then drill down for actionable details. McAfee Risk Advisor provides detailed. web-based console. its severity. how do you know where to invest your time and resources? Most organizations rely on error-prone. cost-effective management from a single. such as Stuxnet? Does your team have to scramble to test and apply patches? As you evaluate risks. Comprehensive risk assessment. Strengths • Replaces manual tasks with real-time risk assessment to focus efforts on at-risk assets Reduces the cost and time associated with patching Demonstrates measurable ROI for existing security products Leverages centralized dashboard and integrated. manual assessments to guide their security efforts. and a list of affected applications. It pinpoints critical assets in need of immediate attention to let you direct security efforts. links to threat discussion groups and notices. “Not Vulnerable” reports and threats filtered by regulation cut the time it takes to satisfy auditors. reduced cost.

assesses. standards. for instance. Leveraging McAfee ePO and McAfee Risk Advisor. and reports across managed and unmanaged systems. and system access Assessments and reports for SOX. administrators and auditors can use a single workflow and policy environment for policy definition. FISMA. Simplified compliance McAfee Total Protection for Compliance reduces the number of point products needed to achieve the results and reports auditors demand. This comprehensive model lets you use the most effective technology for the architecture you have. you can discern the 30 systems that are at risk and vulnerable to a specific threat. asset identification. nonstop.000 systems. and more SECURITY MANAGEMENT • 100 . McAfee Policy Auditor. file. keeping pace with new requirements. If your environment has 3. Strengths • • Accurate risk analysis and prioritization shrink the noncompliance window Deep policy assessments on hosts. and reporting platform. applying policy benchmarks across many different asset types. it audits. and countermeasure information to proactively pinpoint assets that are at risk to threats. Through both agent-based and agentless technology. while eliminating manual processes throughout the risk management and audit lifecycle. As you prepare for audits. it integrates McAfee Vulnerability Manager. and changing guidelines means deploying multiple technologies for managing IT audit cycles and sustaining compliance.McAfee Total Protection for Compliance Unified IT policy auditing and risk management For many organizations. It takes the guesswork out of when and where to focus your security efforts — saving you time and money. FDCC. and McAfee Risk Advisor. For instance. PCI DSS. network. dramatically reducing IT audit time while managing risk more effectively. just import industry-standard content and tailor policies and checks for your needs. more controls. Using McAfee ePolicy Orchestrator (McAfee ePO) as the single deployment. you can combine threat. McAfee Total Protection for Compliance makes compliance easy with the industry’s first integrated solution for vulnerability management. plus network audits of policy settings for account. management. HIPAA. McAfee Global Threat Intelligence keeps threat and vulnerability data updated. vulnerability. compliance assessment and reporting. Comprehensive coverage and proactive risk management The combination of agent and agent-less scans mean we assess every system for compliance with regulations. and consolidated reporting. and comprehensive risk management. and best practices.

data breaches. and no special training to use. We combine this with security data gathered by continuously crawling the web. To help organizations around the world achieve this peace of mind. It provides transparent objectivity by continually benchmarking and certifying your network perimeter security status to widely adopted independent data security standards including the McAfee SECURE™ certification and PCI. and customers from hackers. Compliance holds other benefits. customizable daily audits for latest web application and network perimeter vulnerabilities Includes technical and PCI DSS compliance support to ensure the resources you need to certify your PCI DSS compliance Continual benchmarks of your real-time security against the PCI and McAfee SECURE standards. easy-to-use system perfectly suited to any organization that needs to successfully and confidently complete the steps necessary for PCI (merchant level 2 – 4) certification. As long as you remain compliant with the McAfee SECURE standard. Strengths • • Software-as-a-Service delivery model cuts start-up time and eliminates costs Accurate. prioritize and delegate your remediation responsibilities. with meaningful reports to guide action Lets you promote your trustworthy status with the McAfee SECURE trustmark SECURITY MANAGEMENT 101 • • • . The service helps you identify potential security issues through real-time insight into the security status of your network perimeter. It requires no installation. McAfee Vulnerability Assessment SaaS leverages our widely used vulnerability scanning technology that currently helps protect more than 80. and even demonstrate ROI. we integrated complementary security technologies into a single service. browser exploits. McAfee provides automated network security audits combined with an interactive. popups.McAfee Vulnerability Assessment SaaS (With McAfee SECURE module option) The world’s network perimeter security standard Protect the perimeter. such as browser exploits and spyware. spyware. no hardware purchases. no security expertise. searching for and identifying sites harboring malicious code. no software development.000 sites. Easy startup and no hardware or software to install or maintain This web-based service runs entirely from our McAfee network. highly customizable vulnerability management portal. and phishing. and you will defend your organization. you have the option of promoting your certified security to visitors by displaying the McAfee SECURE trustmark on your site. McAfee Vulnerability Assessment SaaS also includes a simplified. brand.

and deployment. running services. integrations with McAfee and third party products. Thousands of organizations rely on McAfee Vulnerability Manager. with less stress McAfee makes it simple to implement reliable scanning. you can maintain one repository for asset data and design scans based on groups and other tags. Protect your business against changing risks with the industry’s most flexible. including air-gapped networks Unmatched scalability. file and drive permissions. registry keys.McAfee Vulnerability Manager Evaluate 100 percent of your network 100 percent of the time When scanning for vulnerabilities. coverage counts. Since we integrate directly with enterprise user and asset management tools. and any failed scans — to show that specific systems are “Not Vulnerable. and countermeasures to help you make informed decisions. broad scanning coverage with vulnerability. scalable. As you work. and comprehensive solution. and scanning accuracy Unrivaled data integration with homegrown and third party applications Unprecedented response to threats via McAfee Global Threat Intelligence Unique capability to prove assets “Not Vulnerable” to threats • • • • 102 SECURITY MANAGEMENT . Within minutes. guiding you to deploy resources efficiently.” an increasing audit requirement. you start your first scan and automatically discover assets. asset data. Real-time threat feeds and correlation data help you determine how emerging malware and vulnerabilities affect your risk profile. policy settings. and an open programming interface let you merge McAfee Vulnerability Manager into your entire IT security operation. We make system and application-level assessments that include database banners. Find and fix fast. Four times more content checks for comprehensive coverage Our risk-based approach combines thorough. and tests for more than 450 operating system versions. from organizations with a few hundred nodes to one continuously scanning over four million IP addresses. We present conclusive evidence — such as expected and actual scan results. vulnerability coverage. Our portable option lets you scan isolated networks and bring back results for aggregated reporting. Support for custom scripts and checks. scanning. beginning with installation. tailor scans and reports with virtually unlimited flexibility. any systems not scanned. Strengths • Ultimate flexibility in reporting.

rather than generating long. modified privileges. and IT security • • • SECURITY MANAGEMENT 103 . Clear visibility into database vulnerabilities and your risk posture McAfee Vulnerability Manager for Databases automatically discovers databases on your network. Instead. McAfee Vulnerability Manager for Databases reduces the likelihood of a damaging breach. enabler of your business workflows. you can tailor reports for specific stakeholders such as database administrators (DBAs).000 vulnerability checks — including weaknesses such as weak passwords and default accounts — against databases including Oracle. changed objects. By improving your visibility. drowning you in data and disguising the truly critical issues. cryptic reports Creates outputs based on stakeholder needs to suit audiences including DBAs. and forensic traces Provides practical remedy advice and solutions Tests and reports on real issues. determines if the latest patches have been applied. Out-of-the-box regulatory compliance reports allow you to fulfill obligations for PCI DSS and other regulations. It conducts more than 3. DB2. and starts looking for potential problems. developers.McAfee Vulnerability Manager for Databases Protect your network databases from threats Few assets merit stronger protection than your databases. Strengths • Performs more than 3. the comprehensive McAfee Vulnerability Manager for Databases inspects from all known threat vectors and organizes the results to expedite processing. and MySQL.000 checks. reporting on criteria such as version/ patch level. It also cuts cost by preparing you for audits. developers. Or. They are home to your sensitive and regulated data. Actionable risk evaluation and efficient reporting Some products overwhelm with a myriad of minor threats. It clearly classifies threats into distinct priority levels with relevant remediation recommendations and fix scripts where practical. SQL Server. and the hub of 24/7 employee and partner activities. and InfoSec users. Use the familiar McAfee ePO platform to get centralized reporting and summary information for thousands of databases from one consistent dashboard. McAfee Vulnerability Manager for Databases evaluates risks from all known threat vectors and provides concrete tools and expert recommendations to remediate them.

104 SECURITY MANAGEMENT .

Support and Services McAfee Support and Services If you find yourself constantly reacting to events or mired in day-to-day activities. and apply best practices. tune installations. the McAfee Support and Services team stands ready to help. from proactive to optimized. We can help there. Your organization can reduce its workload and gain back time to manage risk proactively. . with best practice-based program development. We work with you to move your Security Connected infrastructure from reactive to compliant. too. Our experts help prevent issues. train teams.

a division of McAfee— Build a strong foundation for long-term security. • McAfee Corporate Support—Define your own technical support experience with our à la carte software and hardware support programs. and maximize your return on investment. and optimize your security—all based on best practices and tools that ensure comprehensive protection. McAfee University—Learn the real-world skills you need to effectively fight today’s attacks and tomorrow’s threats. Foundstone Education—Give your in-house security team the tools and methodologies they need to defend your business. and then add in relevant services to be prepared and respond effectively. implement. Foundstone combines interactive classroom demonstrations with hands-on labs. McAfee University combines hands-on experience with expert instruction so you can get the most from your McAfee security products. McAfee Solution Services—Realize the full value of your McAfee solutions. Foundstone® Professional Services. minimize risk. We help you assess. • • • • Support and Services . See the comparison chart in this section for details. design.Select the Help That Matches Your Organization Tailor your technical support to get help fast. You leave armed with a real-world understanding of how to address critical security issues. our experts address security issues from both a business and technology perspective to deliver measurable protection for your business. Drawing from our deep and broad experience.

McAfee emphasizes proactive and pre-emptive support. Enterprise customers are encouraged to leverage McAfee Platinum Enterprise support offerings. not yours. To ensure our customers remain secure. McAfee support options include: • • • • • • • • • Daily product updates for the latest threats Product upgrades Alerts and remediation actions on the latest threats Analysis on latest malware trends Online product evaluation environments Video and best practice guides Automated issue analysis and remediation tools Direct access to McAfee experts regardless of problem severity Unlimited access to support SUPPORT AND SERVICES 107 . You will find highly trained and certified security specialists and get the right information. constantly providing updates and upgrades to our products. Security is not just about the purchase of a product. McAfee includes McAfee Gold Business Support as standard. It is about that product constantly keeping your business protected. and your defenses need to adapt to these new threats. Regardless of when you need assistance. service skills. your network and systems must remain secure. McAfee is there to help. around the clock.McAfee Corporate Support Keeping you secure For your business to thrive. McAfee customers can access an expert in less than 5 minutes. notifying its customers of new threats and product updates that increase protection and enable best practices. Today’s threat environment is constantly changing. We also help minimize the internal costs of supporting security. support. Additional resources can work directly with your IT team. and replacement parts that you need. McAfee Gold Business Support brings big benefits Because threats from other countries occur during their business hours. preventing issues before they occur and remediating complex issues quickly if they do. backed up by 24/7 support.

Support Account Managers Predictive support from an assigned McAfee Support Account Manager helps you address issues before they become a problem. A single McAfee point of contact for case management ensures that you are constantly protected. you can choose from several levels of increasingly personalized attention. 108 SUPPORT AND SERVICES . saving your resources. Resident Resources The deepest understanding of a company’s environment comes from a McAfee expert physically located at your facility.McAfee Premium Support Offerings Tailored solutions to meet your needs As you consider your organization’s risks and support requirements. and money. Your onsite expert ensures pre-emptive guidance and rapid hands-on support. Product Specialists Multisite environments with hundreds of employees often invest in McAfee Product Specialists whose higher level of training and experience helps them identify and resolve complex issues faster. time.

PLATINUM ENTERPRISE SUPPORT PLATINUM GLOBAL ENTERPRISE SUPPORT PLATINUM LARGE ENTERPRISE SUPPORT PLATINUM RESIDENT ENTERPRISE SUPPORT FEATURES AND OFFERINGS Daily product updates (such as . engines) Product upgrades Malware alerts with remediation analysis Malware analysis service Malware trend podcasts and blogs Chat. web.mcafee. and phone support with remote desktop control 24/7 phone support (normally under 5 minutes to expert) Automatic diagnostic and remediation tools Best practice videos and guides Online product test environments Product Specialists Direct Access to Specialists for all your products Enhanced escalation strategy Enhanced SMS alerting services Authorized contacts Assigned Support Account Manager Product planning and protection analysis Regular case and business reviews Risk assessments Technical onsite visits Emergency onsite assistance Global Account Management Scheduled calls with McAfee Labs and Product Management • • • • • • • • • • GOLD ENHANCED BUSINESS SUPPORT GOLD BUSINESS SUPPORT • • • • • • • • • • • • • • 5 • • • • • • • • • • • • • • 10 • • • • • • • • • • • • • • 25 • • • • • • • • • • • • • • 20 • • • • • • • • • • • • • • Resident Resident • • • • • Up to 2 • • • • • • • • • • • • • • • • • • Resident Resident • • Look for detailed information on McAfee support programs at www.McAfee Corporate Technical Support Program Comparison Choose the level of support you prefer Your company is unique.DATs.com/support. SUPPORT AND SERVICES 109 . That’s why we offer multiple programs to meet your needs.

We specialize in the deployment and delivery of McAfee solutions. maximize your security. We help ensure that your security investment supports the best security posture. both standalone and integrated. and reduce risk. please contact McAfee Solution Services: www. Our worldwide team of architects and consultants works closely with McAfee support and development organizations to apply the full talents of the McAfee organization to your needs. McAfee provides a wide range of custom services tuned to each company’s specific needs. As no two organizations have exactly the same environment. operate. Our experience enables faster product migration so your investments deliver their full value as quickly as possible. Faster time to value Through our proven deployment methodology. plan. as well as costly problem diagnosis and remediation. Strategize. implement. • • • • Custom services Standard engagements Express packages Security Quickstarts for midsize businesses For more information on these tailored engagements. ITIL. McAfee Solution Services can help you improve time to value. Many customers using our Quickstart program cut support cases by thirty percent — savings that turn into more time for other priorities. and PCI standards. and optimize The six stages of the McAfee methodology leverage the best current security practices including ISO. while minimizing total cost of ownership and risk. Reduce risk McAfee Solution Services help you avoid system downtime that can damage your bottom line. customers can reduce delays in product installation resulting from the initial learning curve of new technologies. design. Investing in the planned deployment of a centralized security solution can not only reduce risk but also minimize your operational costs.McAfee Solution Services Quickly realize the full value of your McAfee security solution Deploying new solutions can be challenging for any organization.mcafee. 110 SUPPORT AND SERVICES . Whether your company has fifty or five million nodes.com/us/services/ solution-services.

McAfee University has both online and traditional classroom training programs to suit the needs of any size business. A wide range of courses is available at the click of a mouse. For more information.000 global testing locations.com.mcafee.com. McAfee hosts streaming video and online virtual environments that you launch on demand to fit your schedule. The McAfee Security Certification Program allows you to select a certification track based on either McAfee products (McAfee Certified Product Specialist) or a McAfee Foundstone penetration testing skill area (McAfee Certified Assessment Specialist). McAfee University combines hands-on experience with expert instruction. while increasing your knowledge and expanding your career opportunities. McAfee classroom training McAfee University provides onsite. in a variety of security-related categories. instructor-led training allowing for a practical.com/university_online. either as “public classes” where any student may register and attend. Get certified now and help your company stay secure from the latest threats. Graduates of appropriate McAfee or Foundstone courses and other qualified candidates can test at any of 5.mcafeeuniversity. This convenient approach saves time and travel costs while providing the training you need. The process is simple. email the McAfee Security Certification Program at certification@mcafee. through McAfee University Online courses. hands-on experience that maximizes the value of your investment in McAfee solutions. contact your McAfee salesperson or email McAfee Training at education@mcafee. so that you can get the most from your McAfee security products.McAfee University Expert instruction for McAfee security products Learn the real world skills you need to effectively fight today’s attacks and tomorrow’s threats. McAfee customer certification program Demonstrate your knowledge and experience on key McAfee products and McAfee Foundstone penetration testing skills by becoming a McAfee Certified Product Specialist or a McAfee Certified Assessment Specialist. For more information.com SUPPORT AND SERVICES 111 . McAfee provides this training around the globe. For more information visit www. or as “private classes” given to individual organizations. McAfee University online training Experience classroom-level training without the need to travel. Visit the online course catalog at www.

We assess current policies. Foundstone expertise spans from penetration testing to modems. and wireless tests. • Infrastructure assessments — We identify vulnerabilities and defend areas that present the greatest risk to your business. as well as the “apps” that run on them. VoIP. Our Advanced Persistent Threat (APT) health checks can ensure you have not been compromised by these targeted attacks. 112 SUPPORT AND SERVICES . and technology to manage risk and leverage security investments more effectively. and recommend a strategic security road map Data loss prevention (DLP) — Your program can begin with discovery. and procedure development and continue full leverage of tools Incident response and forensics — Our experts can respond quickly to a security breach. policy.com/us/services/ mcafee-foundstone-practice. and help you cost-effectively prepare for security emergencies. visit http://www. and application penetration testing can identify software security problems in the early stages of development when they cost the least to fix. code review. • For more information. minimizing damage and downtime due to an attack. Methodical tests and analysis help guide and optimize security investments. Foundstone identifies and implements the right balance of people. create new programs that meet compliance goals. We also bring extensive experience testing devices ranging from mobile phones to tablets. Software and application security services — Threat modeling. diagnose weaknesses.mcafee. Through a strategic approach. Program development — We help build policies and processes that tackle network and application vulnerabilities and educate employees enterprise-wide about information security • • • • Technology consulting We can detail the immediate threats across your enterprise and recommend appropriate responses without a deluge of irrelevant data.Foundstone Professional Services Trust the experts Foundstone® Professional Services experts help you continuously and measurably protect your most important assets from the most critical threats. • Compliance — Get help meeting ongoing compliance requirements or building policies and procedures to meet evolving regulations Health checks — We evaluate your security status to pinpoint strengths.aspx. Strategic consulting Fill the gaps in your information security program with trusted advice from McAfee Foundstone. process.

 and Ultimate    Hacking: Expert. and government organizations. and  Java). subject-specific classes — Foundstone also offers classes  in Forensics and Incident Response. Ultimate Hacking: Windows. Building  Secure Software. Fortune 1000 companies. network security. and Writing Secure Code (available in C/C++. Critical Infrastructure Protection. Ultimate Hacking:  Web. Ultimate Hacking: Wireless.   In-depth. privacy. Instructors are noted experts. measures.Foundstone Education Build the knowledge for effective defenses Foundstone provides a comprehensive security training curriculum designed to meet the needs of individuals. Courses cover topics such as software security. and Homeland Security issues.NET. and legislation. This immersive experience arms students with the tools and methodologies to proactively defend against the latest security threats. . and forensics. and influencers on topics of national security. For more information. activists. academic institutions. These classes will teach anyone involved in the software development   lifecycle how to write secure code and are available in programming  language-agnostic or language-specific versions. Our instructors Some of the world’s foremost network security experts and developers of market-leading security technology teach Foundstone education and training courses. These hands-on courses serve the goals of serious security  practitioners in either offensive or defensive roles. cryptography. as well as customized classes to fit  your needs • • All Foundstone courses combine interactive classroom demonstrations with hand-on lab exercises to reinforce critical security issues with real-world scenarios. They have a broad range of expertise through work with leading IT and financial services companies and government agencies and are featured speakers at industry conferences.com/us/education-overview.foundstone. incident response. • Ultimate Hacking series — Includes Ultimate Hacking. visit www. advisors. SUPPORT AND SERVICES 113 .asp.  Software Security series — Includes Software Security Essentials.

114 SUPPORT AND SERVICES .

targeted threats. Alliances . and it needs to be everywhere.McAfee Alliances In today’s world of sophisticated malware. security needs to be smarter. and multistage attacks. McAfee security is being woven into the fabric of computing. Through alliances with the most relevant leaders in IT.

Security Connected to Your Business— and Your Customers
Our extensible platform unites advanced security and management technologies with the most influential technology vendors in the world to help you optimize your IT security environment and reduce operational costs.

McAfee Global Alliances—Industry-shaping relationships ensure McAfee can help you take advantage of changing market dynamics and the rapid evolution at every technology layer from silicon to satellite McAfee Security Innovation Alliance (SIA)—This partner ecosystem uses cross-product integrations to maximize the value of your existing investments, reduce time to resolution, and lower costs; the “McAfee Compatible” symbol tells you a partner’s solution is integrated, tested, and ready to deploy with McAfee technology McAfee Connected—When you purchase products and services that meet the McAfee Connected specifications, you can reduce testing costs, simplify deployments, and increase overall confidence in your purchase decision McAfee OEM Alliances—McAfee expertise is at your service, placing industry-leading McAfee protection in a broad spectrum of existing and emerging products for endpoints, servers, data, and the network

Our technology footprint enables sensors at every layer of the technology stack to communicate, share intelligence, and secure your entire enterprise.

Alliances

McAfee Global Alliances
Innovative joint solutions and integrated services As technologies expand and evolve, threats change quickly, and security must keep pace. But few individual companies have the security know-how to match their innovations. That’s why leading vendors in every product category, from silicon to satellites, are making McAfee their partner of choice. With our Global Alliances, we work with select partners to create bundled or embedded security that runs seamlessly with each partner’s technology and within their service offerings. Only McAfee delivers industry-leading security in an extensible architecture, so integration is easy and efficient. And because McAfee is a full-spectrum security company, we offer each partner relevant expertise and capabilities in a one-stop security solution. Help where you need it most The Global Alliances program concentrates on seven areas central to an optimized security and compliance architecture:

Cloud Computing — McAfee works with leading telecommunication companies and service providers to deliver the industry’s broadest range of SaaS security solutions, including email, web, and endpoint security. Partners choose between a hosted delivery model managed fully by the partner, a co-located delivery model managed in partnership with McAfee, or a fully managed delivery model where McAfee manages the entire process. Through these high-value security services, partners are able to extend additional value to customers and prospects very quickly and affordably.
McAfee alliances help you implement advanced technologies to meet emerging security needs.

S

IO

ut

s

rc ou

in g

MS SP
IT Con sum eri za ti

d ifie tions Un unica m m Co

on

er s

Data Prote and Compl ction ian ce

e Manufactur

G LO B

AL

TH

REAT INTEL
it y

Se

r cu

Co n te

LIG

co Tel

Net

CE EN urit y Sec

mmunications / ISP

ng worki

nt

Network

Security Management

twar

nd

S of

io n

p oi

nt Secu

rit

y
at

E

R AT

EGIC F O C

US

Vi

ua

rt

liz

Cl

s

ou

ST

d

PC

M

an

M o b ilit y

uf

ac t

ure

rs

Sem

ico

u nd

ct

or

s

ALLIANCES

117

Data Protection and IT Compliance — In a business world where efficiency is everything, it no longer makes sense to see systems management and data security as separate endeavors. Instead, top systems management vendors and their customers are working with McAfee to build a bridge between systems and security. A systems integration partner, for example, might deliver IT operations solutions that include configuration and patch management and use the McAfee expertise and open architecture to make full-spectrum data protection an integral part of operations. IT Consumerization — With new devices and applications that enable employees to be more productive, and the acceptance of a virtual office work environment, the line between enterprise and personal has become blurred. McAfee solutions coupled with our alliance partner offerings enable companies to adhere to their corporate compliance policies, yet enable the flexibility that their employees desire. Mobility — As you give mobile users access to sensitive data and applications, McAfee mobility partners can help you secure your mobile workforce, ensure persistent policies and configurations, and deliver automatic and real-time compliance management. Turn to them for help conquering mobile enterprise challenges: user expectations of convenience, productivity, and privacy; the array of devices and network configurations that require support; and the risks associated with allowing these devices on your corporate network. Networking — The world’s leading network equipment vendors work with McAfee so you can rest assured that your networking equipment has been tested and qualified for the highest level of security in a proven environment. We offer three levels of integration, from interoperability testing and certification of combined products to bundled networking and security solutions to embedded best-of-breed security solutions built directly into the network equipment architecture. Unified Communications — McAfee helps unified communication partners address the growing need for enhanced security to protect the telepresence environment. These strong protections can also help IT managers in regulated industries from healthcare to financial services to lessen the burden of meeting compliance and reporting requirements. Virtualization — McAfee helps virtualization partners offer you the benefits of virtualization with complete, scalable security. McAfee MOVE provides a common way to develop across the hypervisor vendors, offload resource-intensive actions from the individual virtual machines, and optimize scheduling of these actions based on the state of the hypervisor. McAfee MOVE AV enables virus scanning to protect online and offline VMs. Other McAfee security products protect VM server farms, secure virtualized desktops, assess vulnerabilities, and identify risks as soon as they arise.

118

ALLIANCES

McAfee Global Alliance Partner Directory Industry leaders teaming to secure your future McAfee and its Global Alliance partners are ready to provide you with better solutions that work better in your changing environment. McAfee and Adobe have a global alliance to jointly deliver new solutions that will offer more comprehensive security and allow customers to expand the reach of data protection beyond the enterprise boundaries. Adobe Adobe revolutionizes how the world engages with ideas and information — anytime. and through any medium.com/global_alliances. and cost-effectiveness to meet customers’ challenging business demands. maintenance. or infrastructure. This solution will help automate data protection for customers by applying a LiveCycle Rights Management policy (DRM) to documents that have been determined to be highly sensitive by the McAfee DLP classification system. anywhere.mcafee. up-to-date list of partners at www. AT&T AT&T and McAfee have created a strategic partnership that allows both companies to utilize and benefit from each other’s leading technologies and services in order to deliver advanced security and application solutions with superior ease-of-use. AT&T is providing McAfee with state-of-the-art Global IP networking solutions. and intelligence. anytime. enabling AT&T to offer innovative managed security solutions that do not require customers’ capital investment in management. Together. we offer a joint solution that combines McAfee Data Loss Prevention’s (DLP) automated discovery of sensitive data with Adobe LiveCycle Rights Management’s persistent enforcement of sensitive data anywhere. Below are some of the relationships that are expanding our security footprint. View a complete. reliability. ALLIANCES 119 . protection. McAfee is providing AT&T with advanced global threat intelligence technologies that help protect customers against the latest threats. enabling McAfee to deliver security solutions and updates to its customers with scalability.

spanning software. and McAfee Network Security Platform (IPS) into Brocade’s network infrastructure equipment and management platform. Brocade The McAfee and Brocade partnership provides an industry-leading networking and threat protection solution for business-critical enterprise environments. a Brocade and McAfee solution delivers end-to-end assurance for enterprise networking and security. integrated solutions developed specifically to address the networking security needs of enterprise customers from the edge to the core of the data center. service packs (for Microsoft Windows). McAfee Network Access Control. third-party solutions that add the greatest value in the Citrix Delivery Center infrastructure. offloading processing-intensive actions from the individual VMs. The integrated solution combines best-in-class technology from McAfee. McAfee makes it easy for customers to identify complementary security products and solutions that can enhance their Citrix environments. These solutions integrate McAfee Firewall Enterprise. As a member of the Citrix Ready program.BMC BMC and McAfee have joined forces to build the industry’s first truly enterpriseready solution for automated policy compliance. Proven to protect against known and emerging threats while meeting compliance and reporting objectives. interoperable. Citrix and McAfee collaborated on McAfee MOVE AntiVirus for VDI-based virtual desktops that centralizes all virus scanning and virus signature file updates. 120 ALLIANCES . Brocade and McAfee provide an industry-leading networking and threat-protection solution for business-critical enterprise environments. Together. power settings. patches. Brocade and McAfee have collaborated on a set of jointly designed. and security policy. through McAfee Policy Auditor. Citrix Citrix and McAfee have partnered to provide business continuity and regulatory compliance solutions with software created for securing data and applications via centralized IT management. coupled with BMC’s proven client management technology: BMC BladeLogic Client Automation. The Citrix Ready program identifies trusted. Customers can be confident that McAfee system security and vulnerability management products have successfully passed a series of tests established by Citrix and can be trusted to work effectively with XenApp and XenDesktop. configuration settings. remediation of vulnerabilities.

Cognizant’s Digital Security Practice provides services for an end-to-end Data Loss Prevention (DLP) solution deployment within an enterprise. integrating DLP into encryption. and DLP policy monitoring service. and Compliance (GRC) solutions allow Cognizant to holistically look into the compliance posture of an organization and recommend suitable controls to address gaps at an enterprise risk management level. Designed to help large enterprises optimize and consolidate their security infrastructure. high-performance architecture that easily provisions and scales multiple best-in-class security applications to meet the evolving threat landscape.Cognizant Technology Solutions Cognizant and McAfee have partnered to provide enterprises the ability to optimize their security and compliance controls while reducing operational effort and costs. Risk. The McAfee integrated data protection suite allows Cognizant to provide complete data protection for an organization. ALLIANCES 121 . rather than integrating point solutions. product implementation. McAfee Governance. and policy-based security controls within the enterprise. thus ensuring comprehensive protection based on a suite of products. The combined solution reduces the cost and complexity of security infrastructure by consolidating networking and security into one platform. CrossBeam Systems. Inc. The X-Series offers an open. McAfee and Crossbeam have partnered to deliver the most scalable applicationaware firewall in the industry. features the McAfee next-generation firewall on the industry-proven Crossbeam X-Series security platform. McAfee Firewall Enterprise for Crossbeam. The suite of solutions helps our customers by speeding implementation and response times. McAfee Firewall Enterprise for Crossbeam delivers carrier-class security performance with scalability up to 40Gbps of real-world inspected traffic throughput as well as self-healing redundancy. This includes a phase-wise approach for assessment and policy definition. the combined solution. authentication.

cost. and continuously monitor and improve their security. The McAfee and Dell partnership provides customers the highest level of protection and cost efficiency. and integrated reporting. 122 ALLIANCES . enterprises gain end-to-end solutions that do a better job of addressing critical security challenges. HP HP and McAfee work together to help organizations get ahead of evolving threats — and stay ahead — by securing more effectively and efficiently. and the public sector. and networking and communications products. As a team. Together. and ease the path to compliance. The partnership directly connects the proven HP Converged Infrastructure. to security protection capabilities for small and medium business. security management. boards. Intel is a leading technology platform company that develops advanced integrated digital technology platforms for the computing and communications industries. which allows customers to have constant threat protection on their PCs or workstations. In the consumer line of PC products. Intel offers products at various levels of integration. and system optimization. and complexity. enterprise. protect data. software. we offer McAfee Security Center.Dell Dell is a market leading system and services provider whose unique relationships with its customers provide a competitive advantage in the market. integrated products. Dell’s breadth of products and solutions provide customers a total offering to their computer needs. McAfee and Dell empower customers to experience the web more safely. servers. to critical McAfee and third party security and compliance processes. prevent disruptions. integrated management. HP and McAfee offer integrated service delivery. providing its customers and partners the flexibility to create advanced computing and communications systems and products. and semiconductor components that are the building blocks integral to computers. Intel McAfee works with Intel’s technology in many key areas: data protection technologies. Intel’s products include chips. By combining HP technologies and services with McAfee. McAfee and Dell partner together across all markets from innovative offerings geared to the consumer. including the HP Secure Advantage security portfolio of products and services. improve risk management. we’ve applied enterprise expertise and broad security leadership to track down and eliminate the sources of IT risk.

McAfee and Verizon Business now offer a comprehensive portfolio of managed security services (MSS) to enterprises.Polycom Polycom and McAfee have partnered to jointly develop and deliver Secure Unified Communications and Collaboration. leveraging the strength of Verizon Business MSS offerings and McAfee technology. Polycom and McAfee are taking a proactive approach to further enhance the security features of Polycom’s video. next-generation firewall capabilities including application and identity policy control. telepresence. ALLIANCES 123 . Verizon Verizon Business and McAfee have formed a global strategic alliance to provide integrated security solutions to businesses and government agencies worldwide. encrypted filtering. web filtering. and infrastructure solutions. Verizon Business also offers the full complement of McAfee enterprise security solutions to its diverse client base through Verizon’s customer premises equipment catalog. The McAfee Web Gateway for Riverbed provides market-leading Web 2. shielding Polycom telepresence users. VPN. and McAfee Global Threat Intelligence.0 security including inbound and outbound advanced web filtering. from potential and increasingly sophisticated security threats while making it easier to comply with privacy and confidentiality mandates. anti-malware. The McAfee Firewall for Riverbed delivers best of breed. Polycom plans to design solutions that feature McAfee threat protection. Riverbed McAfee and Riverbed have partnered to deliver best-of-breed WAN optimization and branch office security on a single device. and McAfee Global Threat Intelligence. With security threats on the rise. Together. from the desktop to the fully immersive suite. customers minimize the hardware infrastructure footprint at the branch office and reduce operational overhead. SSL scanning. The McAfee Web Gateway Virtual Appliance and the Firewall Enterprise Virtual Appliance solutions can run on the Riverbed Services Platform that resides within the Riverbed Steelhead Appliance. anti-virus. With these joint solutions.

and go green. These efforts include supporting VMware security technologies such as vShield. VMware and McAfee are helping customers reduce capital and operating expenses. Look for our most up-to-date list of partners at www. By working together.mcafee. ensure business continuity. 124 ALLIANCES . developing products such as McAfee MOVE AV that address specific virtualization security challenges. and ensuring McAfee products are compatible with VMware platforms. strengthen security.VMware McAfee and VMware work together to help organizations secure their virtualized data centers and cloud infrastructures.com/global_alliances.

and lower operational costs • Innovative integrations built on customer-driven use cases improve threat visibility and create powerful new security behaviors and workflows. collaborative approaches to detect threats. reduce time to problem resolution. Validated SIA partner solutions receive the “McAfee Compatible” logo. ALLIANCES 125 . such as McAfee Encrypted USB. For example. and ensure compliance. the broad McAfee portfolio allows efficiencies and leverage at other integration points. an SIA partner might link its real-time monitoring and threat detection with McAfee incident response and compliance reporting. The McAfee Security Innovation Alliance (SIA) technology partnering program • • Accelerates the development of interoperable security products Simplifies the integration of these products into complex customer environments Delivers solutions to maximize the value of existing investments. Leaders leverage our extensible platform While many SIA partners integrate with McAfee ePO. reduce risk. and McAfee Vulnerability Manager. McAfee provides developer support and then performs compatibility testing.McAfee Security Innovation Alliance (SIA) Partnerships that extend the value of intelligent security Today’s security challenges require open. With over 100 vendors in various stages of integration. SIA has become the security industry’s premier technology partnering program. McAfee Firewall Enterprise.

reducing risk. After completing McAfee integration testing for at least one use case. and ensuring compliance. the partner is promoted to Technology Partner and their integrated product becomes “McAfee Compatible. Each company begins as an Associate Partner. followed on the next few pages by details on our Sales Teaming Partners. PARTNER MARKET CATEGORIES ASSOCIATE PARTNERS TECHNOLOGY PARTNERS SALES TEAMING PARTNERS Security Event and Log Management • Bridge security monitoring and incident response • Reduce costs by faster time to problem resolution • Simplify compliance lifecycle Application and Database Security • Manage application security risk • Protect applications against tampering • Secure databases against internal and external threats Theft and Forensics • Augment incident response with powerful forensics • Extend endpoint security to track and recover stolen laptops • Investigate employees suspected of wrongdoing Risk and Compliance • Measure enterprise-wide risk. collaborative approach to detecting threats.McAfee SIA Partner Directory Create your trusted technology environment The SIA program enables an open. consolidate reporting • Mitigate risk through targeted policies and controls • Track compliance with security metrics and scorecards • • • • • CorreLog NetIQ Novell S21sec Tier-3 Veracode • • HP Q1 Labs • • • • • • ArcSight eIQnetworks LogLogic LogRhythm NitroSecurity SenSage Application Security. The chart below lists the McAfee Security Innovation Alliance Partners at the time this guide went to press. SIA partners are screened for leadership and innovation in their respective market segments. Inc. Arxan Guardium Secerno Absolute Software AccessData HBGary • • Sentrigo • • • • • • Mandiant Raytheon Oakley • • Allen Corporation Guidance Software • • • • • • • • • • • • • • • Archer Technologies Courion Cyber-Ark Lieberman Software NetWitness NSSPlus OpenPages Overtis Quest Software Rev2 Networks SignaCert Tiversa • • • RedSeal Systems Skybox Security Telos • • • • • • • Agiliance BDNA Centrify ClearPoint Metrics Infoblox Prevari Triumfant 126 ALLIANCES .” Selected Technology Partners that complement the McAfee product portfolio are invited to become Sales Teaming Partners and help large organizations achieve more complete security solutions.

and Services • Centrally protect both physical and virtual infrastructure • Track location and events for wireless assets • Reduce PC power consumption without compromising security • Coordinate data loss prevention with digital vaulting • Turnkey integration services for McAfee customers • • • • • • • ActivIdentity Avencis Evidian Imprivata i-Sprint Passlogix Ciphent Pareto Networks • • MXI Security SecureAuth • • • • • • • • • 1E Altor Networks Autonomic Software DG Technology ForeScout Intrinsic SEP Software Sipera Systems StillSecure • • • • • • • • AirPatrol Corporation AirTight Networks Catbird CommVault Insightix Verdiem For the most up-to-date information. ALLIANCES 127 . refer to www.com/sia. IT.mcafee.PARTNER MARKET CATEGORIES ASSOCIATE PARTNERS TECHNOLOGY PARTNERS SALES TEAMING PARTNERS Authentication and Encryption • Prevent unauthorized access to sensitive data • Reduce risk through strong authentication • Support a range of smart cards and biometric options • • • • • • • • • • • • • • • • • • • • 2e2 Assured Information Security Athena Authenex Avtor Buypass AS Buysec Ceedo Chicony CryptoTech DigitalPersona Hitachi Key Ovation PreciseBiometrics Sagem Orga Spyrus SUNZone SyferLock Toshiba America Information Systems Validity Novell • • • • • • • • • • • • • • • • Actividentity AET Aladdin Alcatel-Lucent Charismathics Gemalto HID Global Key Tronic Kobil Luxtrust Oberthur Passfaces SCM Vasco UPEK ZF Electronics • • • • Absolute Identification MXI Security RingCube Voltage Security Single Sign-On • Secure and seamless single sign-on experience to applications and other resources • Secures information access at the point of initial system boot • Eliminates multiple passwords Other Security.

McAfee SIA Sales Teaming Partners Driving more complete security solutions to large organizations All of the McAfee SIA Sales Teaming Partners highlighted in the next few pages offer proven McAfee Compatible solutions and work with McAfee to help maximize the value of your investments. Absolute ID has integrated its Virtual System on a Stick (ViSoS) with McAfee encrypted USB drives. product. For the most complete list of partners and their planned or completed integrations. please see the partner directory at www. search for. McAfee ePO enhances the forensic effort by correlating users in its database with assets or activities under investigation. analyze. internal investigations. provides investigators with the tools to preview. process. By combining ViSoS with any standards-based network.mcafee. these reports help IT asset managers track. Based on Computrace agent call patterns. AccessData AccessData. 128 ALLIANCES . and remote data delete solutions for organizations and consumers. Absolute Software Corporation Absolute Software provides subscription-based computer theft recovery. a pioneer in the digital forensics industry.com/sia. and to distribute digital data without the risk of piracy or theft. and forensically preserve electronic evidence for the purposes of criminal investigations. Absolute’s McAfee ePO plug-in deploys Computrace agents on McAfee ePO-managed assets and delivers periodic summary reports from these assets into McAfee ePO dashboards. identify. IT asset management. business partners. users now have the ability to securely collaborate with colleagues. and e-discovery. Absolute Identification Absolute ID is an innovative provider of data-centric protection products and services. incident response. and more. and recover stolen laptops and other mobile devices. You can use McAfee ePO to deploy AccessData agents on McAfee ePO-managed assets and view agent coverage reports that include publisher. and supply chains and with the controlled distribution mechanisms inherent in Absolute ID’s ViSoS solution. version.

AirTight Networks AirTight Networks provides technology to automatically detect. Application Security. Inc. while ensuring that those organizations meet or exceed regulatory compliance and audit requirements. McAfee Endpoint Encryption. The McAfee Compatible integration of Agiliance RiskVision with McAfee ePO and McAfee Vulnerability Manager offers a unique. McAfee Risk Advisor. quickly deployable. giving network administrators the ability to manage. DbProtect allows organizations to secure their most sensitive data from internal and external threats. compliance and security management in real time. and events and take corrective action. and enforce wireless network policies from the central McAfee ePO management console. organization-wide risk. closed-loop risk management solution for risk-based security with exceptional accuracy and coverage. organizations can secure their valuable laptops and PCs against today’s wide range of mobile and wireless threats. ALLIANCES 129 . AirPatrol Corporation AirPatrol’s Wireless Policy Manager (WPM) extends the capabilities of the McAfee ePolicy Orchestrator platform into the wireless regime. AirTight will integrate summary reports on wireless security event data from AirTight SpectraGuard Enterprise into McAfee ePO dashboards. distribute. The data for these reports will be provided by both SpectraGuard Sensors for WLAN security and SpectraGuard SAFE agents for wireless endpoint protection. AirPatrol’s WPM secures the wireless interfaces on endpoints and allows IT Administrators to easily enforce common sense rules that govern how employees use their wireless resources. block. With WPM. SpectraGuard SAFE agents will also report the endpoint wireless vulnerability level and related data to McAfee ePO. McAfee ePO administrators can view and report on database vulnerabilities. and locate current and emerging wireless threats.Agiliance Agiliance enables highly scalable. classify. The integrated solution allows McAfee ePO administrators to deploy DbProtect agents and seamlessly link DbProtect’s real-time database monitoring with McAfee incident response. and McAfee VirusScan Enterprise. threats. DbProtect is integrated with McAfee ePO. RiskVision is also interoperable with McAfee Policy Auditor.

130 ALLIANCES . BDNA BDNA’s Discover product scans endpoint computers for installation of McAfee ePO software components. receive alerts from. and policy enforcement to the virtual data center. safeguard their assets and processes. and policy breaches. and validation by deploying a virtual appliance inside VMware ESX or Citrix XenServer. Arxan Arxan integrates its real-time application security checks and tampering alerts with McAfee ePO. audit. Catbird’s V-Security product suite provides security. change control. Catbird Catbird brings visibility. compliance violations. By passing alerts generated from correlated events into McAfee ePO. improving the context for targeted countermeasure. Notifications from GuardIT appear in McAfee ePO dashboards. current McAfee ePO customers gain additional visibility into. so they can limit and preempt enterprise risk. Administrators can thereby gain greater visibility during the interval between the onset of an application attack and when the application is fully compromised. control. and remediation functions provided by McAfee security solutions. separation of duties. With the integration of V-Security. Catbird’s solution complements McAfee systems and network security offerings for virtualized environments. and control risk. and manage policies for their virtual network environments. ArcSight integrates with McAfee ePO to enable closed-loop security monitoring. helping customers identify security gaps and bring previously unprotected assets under McAfee ePO security management. log management. This capability significantly shifts the balance of security in favor of defenders by reducing the number of vulnerable assets in dynamic. enabling security administrators to respond immediately with appropriate countermeasures. and policy enforcement.ArcSight ArcSight helps customers comply with corporate and regulatory policy. rapidly evolving enterprise IT infrastructures. the ArcSight SIEM Platform drives the quick detection of security threats.

Centrify Centrify DirectControl for Mac OS X integrates with McAfee ePO software. data center. recovery. McAfee ePO. This resulting enterprise-wide visibility helps organizations meet their end-to-end data security needs. For the first time. and McAfee Vulnerability Manager. and effectiveness of controls supporting your compliance and risk management programs. aggregating and correlating not just logs but adding configuration. risk. Centrify DirectControl for Mac OS X enables centralized user management and authentication including smartcard login. CommVault A singular vision — a belief in a better way to address current and future data management needs — guides CommVault in the development of Singular Information Management solutions for high-performance data protection. Each is designed to securely access McAfee application databases to instantly deliver meaningful indicators that continuously monitor the state. network. a centralized IT team can now manage Mac systems in the same way they manage Windows PCs — using the same familiar Windows tools and processes. and network flow data into a single. and compliance requirements. and administrative rights. centralized access controls. McAfee customers can now also view eIQnetworks’ reports directly on McAfee ePO dashboards for visibility into the organization’s security and compliance environment. ClearPoint offers specifically crafted Metric Apps that leverage data from McAfee ePO and McAfee Vulnerability Manager. group management. CommVault Simpana is integrated with McAfee ePO. ALLIANCES 131 . SecureVue uses information from the McAfee Network Security Platform. and archive events to McAfee ePO dashboards and giving administrators and compliance officers a more complete view of the state of their business-critical information. sending status updates on backup. vulnerability. universal availability. asset. and simplified management of data on complex storage networks. giving IT and desktop managers the ability to centrally deploy DirectControl and integrate Mac systems into Active Directory. eIQnetworks eIQnetworks is redefining security and compliance management by fostering collaboration across security. ClearPoint Metrics ClearPoint delivers unified visibility and active performance management for IT security governance. and audit teams to more quickly isolate the root cause of security issues and ensure compliance mandates are being enforced. as well as extensive controls over user and system configurations via Active Directory Group Policy enforcement. comprehensive enterprise view. performance. quality.

The integration then provides the single source of truth about the network for effectively managing security. When used together. analysis. and respond to advanced malware. collection. Infoblox Infoblox’s NetMRI integration with McAfee ePO extends the reach of McAfee risk and compliance management solutions deeper within network infrastructure. and other cybercrime activities. and the identities of those using the devices. and up-to-date inventory of devices. and report results to the McAfee ePO console for optimal corrective action.Guardium Guardium. accurate. and database configuration changes can now be displayed in McAfee ePO dashboards. policy violations. diagnose. including database vulnerabilities. scan physical memory for malicious and unauthorized code. change. and access of network device configuration. Critical security information. delivers a widely used solution for preventing information leaks from the data center and ensuring the integrity of enterprise data. targeted threats. Insightix BSA Visibility updates the McAfee ePO asset database in near real time allowing McAfee ePO to maintain a comprehensive. Guardium’s database security solution has been integrated with McAfee ePO. the database security company. HB Gary Digital DNA is integrated with McAfee ePO so that McAfee customers can deploy Digital DNA. their profiles. and compliance information. accelerating the identification and remediation of risks associated with policy violations and access breaches. and risk against all devices. storage. NetMRI sends key alerts such as rogue network changes and compliance violations to McAfee ePO. HBGary HBGary specializes in developing advanced computer analysis products to detect. compliance. Insightix Insightix is an innovator of real-time security intelligence and control solutions. 132 ALLIANCES . you can take control of and automate network change while dramatically reducing operational and compliance risks as well as costs. McAfee ePO and Guardium deliver a more comprehensive security and compliance solution with reduced operational costs. By automating the discovery.

reporting. sessions transporting threats. and remediate security threats. McAfee ePO users now have visibility from within McAfee ePO into the underlying network infrastructure. Events are summarized. such as starting a compliance check using McAfee Policy Auditor. and vulnerabilities in real time. Any computer can be instantly transformed into a standard IT-managed system while maintaining both performance and security. correlated. compromised data. databases. drill-down view of specific events and individual data fields. and alerting on 100 percent of IT log data from virtually any source. and the location of the offenders. Alerts appear in actionable McAfee ePO reports to facilitate corrective actions. and operational excellence will be able to leverage information provided by McAfee ePO and will in turn enhance McAfee ePO analytics with information about user and system behavior. enabling faster remediation and policy enforcement through the broad McAfee portfolio. All NitroView correlated security events are visible with a real-time. ALLIANCES 133 . running a virus scan with McAfee VirusScan Enterprise. secure USB desktop. The MXI Security Stealth ZONE platform leverages the industry-leading hardware security features of the McAfee Encrypted USB product line to deliver a superior. security.LogLogic LogLogic provides an enterprise-class platform for collecting. NitroSecurity The bidirectional integration of McAfee ePO and NitroView extends McAfee ePO visibility to events. LogLogic’s integrated analysis applications for compliance. updating security policies. enhancing endpoint protection with the McAfee Host Intrusion Prevention System. storing. and applications to identify. pushing out new signature sets or patches. and analyzed so the user sees a reduced number of prioritized events and can quickly access months and years of data. track. LogLogic intends to provide bilateral integration between its open log management and intelligence platform and McAfee ePO. activity. LogRhythm LogRhythm’s incident detection now drives automated alerting to McAfee ePO. and more. MXI Security MXI Security provides managed portable security solutions that combine the power of secure storage with identity and access management services. and logs from networks.

on-premises. Ringcube RingCube vDesk integrates with McAfee Encrypted USB drives to create a portable desktop virtualization solution for the enterprise. Using data created by these McAfee solutions. or security violations to be displayed in McAfee ePO dashboards.Prevari Prevari provides industry-leading solutions that objectively and quantitatively measure. and outsources. and risk management goals with specific business objectives. SecureAuth SecureAuth for SSO is an integrated strong authentication platform that provides transparent. disaster recovery. This integration also drives down the cost and complexity of protection and compliance. and cloud-based resources. users can securely access their own corporate desktop from any PC for remote access. McAfee Vulnerability Manager and McAfee Policy Auditor provide organizations with automated methods to quickly and accurately identify technical vulnerability exposures and to audit configuration policy compliance. or temporary access by consultants. audit events. SecureAuth leverages a user’s domain authentication from a McAfee encrypted workstation and then performs an identity translation to local. augmenting McAfee incident response and compliance validation. model. Prevari TRM provides a common language for managing technology risk across the enterprise. reports. and security policy decisions on the fly. aligning technology. SecureAuth supports regulations such as PCI DSS. Using vDesk. contractors. 134 ALLIANCES . secure single sign-on (SSO) for on-premise web applications. allowing Secerno DataWall to deliver accurate alerts. compliance. HIPAA. This patented technology integrates with McAfee ePO to allow select database transactions. and manage technology risk. McAfee Encrypted USB drives ensure that RingCube’s workspaces are protected by the highest two-factor biometric user authentication and the strongest AES 256-bit hardware encryption to prevent data leakage and unauthorized access. and FFIEC. Used in conjunction with McAfee Endpoint Encryption. off premise cloud applications as well as traditional VPN resources. all from a single appliance. Secerno Secerno DataWall understands the intent of every SQL interaction with a database.

Verdiem Verdiem is an enterprise software company focused on PC Power Management and Green IT. provides innovative security solutions that protect employee and customer data in email. Inc. and execute reports. customers gain a 360-degree view of activity across the network to meet their compliance. McAfee ePO users can switch to TRM to view the details of the changes detected. security.com/sia for the latest information on these and other SIA partners. ALLIANCES 135 . Voltage Security Voltage Security. By utilizing the two solutions concurrently. IT administrators can deploy Surveyor agents using McAfee ePO and coordinate power management of PCs with scheduled scans and updates.mcafee. all while keeping their networks secure. or databases. This will enable security updates to run off-hours without affecting end-user productivity. Verdiem’s Surveyor has been tested with McAfee ePO and enables enterprises to reduce their operational costs and maximize energy savings of their PC infrastructure. This integration provides McAfee ePO users additional insight into the security readiness of the endpoint population through Triumfant’s ability to identify and analyze unusual changes to each machine. Triumfant The integration of Triumfant Resolution Manager (TRM) with McAfee ePO allows customers to view unwanted changes and unexpected conditions detected by TRM through the McAfee ePO console. and root-cause investigation requirements. Through this integration. Refer to www. review and execute the synthesized remediation. organizations can be certain that all inbound or outbound messages are secured per corporate policy and not dependent on individual user action.SenSage The SenSage log data management solution enables reporting on log data from virtually any McAfee product and publishes eighteen summary reports directly to McAfee ePO dashboards. McAfee ePO users can “click through” the reports and automatically drill into the details for root cause analysis in the SenSage Event Data Warehouse. documents. Voltage SecureMail Gateway integrates with the McAfee Email Gateway for automated and policy driven email encryption and helps organizations fulfill regulatory compliance on their email messaging platforms.

136 ALLIANCES .

identity thieves. . and protects you from hackers.McAfee for the Home McAfee For the Home McAfee can proactively protect you and your entire family. Mac. or mobile device. Award-winning software guards against dangerous websites and online interactions. helps avoid phishing scams. and other cyber hazards. Our software combines the most effective threat detection with the fastest performance and the lowest impact on your computer and online experience. We can even locate or lock a lost device. on your PC.

McAfee for the Home Revolutionary Security. McAfee consumer software applies McAfee Global Threat Intelligence to instantly detect and block viruses and stop web threats before they damage your home computer or mobile device. traditional security updates are no longer enough. Products for the PC Suites (see next page for comparison chart) • • • McAfee AntiVirus Plus 2011 McAfee Internet Security 2011 McAfee Total Protection 2011 Specialty services • • • McAfee Family Protection McAfee Online Backup McAfee SiteAdvisor LIVE Products for Mac • • McAfee Internet Security 2011 for Mac McAfee Family Protection for Mac Products for mobile devices • • McAfee Family Protection (iPhone/iPod Touch/iPad Edition) McAfee WaveSecure . your family. Specialized software extends our proactive security to your mobile devices. Made for You With thousands of new malware threats surfacing each day. and your identity to help secure all the facets of your digital world. The products grouped below appear alphabetically in the listings that follow. the software’s innovative design simplifies your security experience while offering essential protection. Engineered for the fastest performance ever.

email. or hacked Defends your PC from intruders on your home network. and network. stolen. and blocks your PC when exposed to potential threats • • • • • • • • • • • • • • • • • • • Faster PC performance No scan interruptions Check status at a glance with completely redesigned home screen Simplified security management with intelligent alerts Enjoy safer web surfing with McAfee SiteAdvisor® Better PC health with QuickClean™ Remove digital files thoroughly Anti-spam and email protection Protect digital files and memories with automatic online backup Child protection with enhanced parental controls Secure valuable files with Anti-Theft File Protection (note: English versions only) Home network defense protection Better protection from dangerous websites with McAfee SiteAdvisor LIVE McAFEE FOR THE HOME McAFEE TOTAL PROTECTION McAFEE ANTIVIRUS PLUS • • • • • • • • • • • • • • 139 .Integrated Suites for Home Users We apply advanced ideas. or instant messages. surfing. protects against identity theft. and shopping thanks to identification of potentially harmful websites QuickClean eliminates junk files that can hurt PC performance Shred files to prevent future access Advanced identification prevents spam from clogging your inbox Take the hassle out of manually saving files with 1GB or 2GB of remote online storage Manage your children’s online usage more effectively Lock private data in your encrypted vault. home computer. so there’s no gap in your protection Extensive speed enhancements include faster scans and faster updates Schedule security scans and updates so you can work or play without interruptions Monitor threats blocked and check security status at a glance with the easy-to-use security status area Get crucial product alerts that are less intrusive and easier to understand Enjoy safer Internet searching. so files are safe if your PC is lost. McAFEE INTERNET SECURITY Superb malware detection Exclusive McAfee Active Protection™ technology instantly analyzes and blocks new and emerging threats in milliseconds. blocking access to sensitive files Identifies harmful links in your browser. and global threat intelligence to help you protect your family and guard your data. integrated management.

our robust two-way firewall blocks outsiders from hacking into your PC. while it keeps sensitive information from leaking out if the system is compromised. and online protection McAfee AntiVirus Plus detects. relying on traditional security updates isn’t enough anymore. such as update time and scanning. Leveraging the same real-time global threat intelligence used in our enterprise products. anti-spyware. Unlike the competition. delivered within a completely redesigned. our powerful safety rating system that lets you know if a site is risky. firewall. revolutionary McAfee Active Protection™ technology provides the fastest protection against threats to your PC. McAfee helps ensure that you are running the most current security to combat ever-evolving Internet threats. Award-winning anti-virus. No guesswork. just essential protection. before you click. firewall.McAfee AntiVirus Plus 2011 Essential. no stress. With continuous and automatic updates. And you can now schedule scans and updates to minimize any disruption to your day. Strengths • Essential PC protection includes anti-malware. our innovative design simplifies your experience while offering essential protection. spyware. we analyze and block new and emerging threats in milliseconds. even rootkits — insidious programs designed to tamper with your PC. and removes viruses. adware. or that specific defenses may need some attention. and scanning optimization Always-current malware detection with exclusive McAfee Active Protection Reengineered for 8 times faster subsequent scan time Includes 30 days of free phone support (US only) and unlimited email and chat assistance • • • 140 McAFEE FOR THE HOME . so you do not have to wait for regular updates to arrive. A simple color-coded security bar tells you if you can relax. instantly understandable home screen. In addition. award-winning PC protection for carefree computing With thousands of new viruses created every day. Better than ever Our latest release includes dramatic improvements to performance. McAfee AntiVirus Plus software also features the McAfee SiteAdvisor site rating system. The result: no gap in your protection. McAfee AntiVirus Plus instantly detects and blocks viruses. safe surf and search. blocks. even stopping web-based threats before they download to your PC. Engineered for the fastest performance ever.

yet gives children access to appropriate videos. including the use of profanity and sexually explicit terms.McAfee Family Protection Keep your children safe as they learn and explore online Children using the Internet are subject to many threats. Select websites and other content to block using 35 pre-defined categories and set time limits for Internet use. record. strangers. McAfee Family Protection is the easiest. Usage reports help you understand your children’s online activities and empower you to educate them about proper online behaviors. posting of personal information. you can prohibit their use. easy set up so you can start protecting your children within minutes. strangers. or location — on social network sites. you can monitor and record instant message conversations and social networking site activity. social networking risks. so your children cannot communicate with strangers. And you can block unknown email addresses. If specific applications are inappropriate. parents can have peace of mind as children learn. Strengths • • • Fast. If you are on the go. and other online threats McAFEE FOR THE HOME 141 . cyber bullying. address. and enjoy the Internet. Help your children protect their identities and private information Most children do not understand what personal information should or should not be shared. including cyber bullying and improper dialogue with strangers. It grows with your children as their Internet interests change and mature and keeps children of all ages safe from exposure to adult content. you can be notified instantly by email or text message if your child posts personal information — such as phone number. social networking risks. Monitor. McAfee Family Protection prevents distribution of confidential information through file sharing applications and protects your PC against security threats commonly found in them. and other online threats. simple set up so you can start protecting your children within minutes Lets you permit your children to use the Internet while keeping them safe Protects children of all ages from inappropriate content. and if they attempt to access inappropriate sites. Restrict access to objectionable content McAfee Family Protection offers fast. explore. and review cyber interactions To help you keep track of what is happening. including access to inappropriate content. With McAfee Family Protection. Our unique YouTube filtering prevents exposure to objectionable content. most complete way to keep your children safe online. and risky discussions with strangers.

Knowing where they are In parenthood. zoom. landscape view. or remotely disable browsing altogether. Comprehensive reporting. or iPad — have unrestricted access to the Internet. McAfee Family Protection allows you to determine the location of your children’s device where it was last used for Internet browsing. everywhere Our online management portal is accessible via the Internet from a PC or mobile device. As your children surf using these devices. Packaged as a dedicated secure mobile Internet browser. and copy and paste. iPod Touch. It allows you to monitor your children’s browsing activities and see the physical device location where your children last went online. Safe surf and search As kids explore and search online. share links via email. tabbed browsing. McAfee Family Protection helps establish boundaries and automatically blocks inappropriate web pages across different content categories. Strengths • • • Immediate protection with a familiar Safari experience Establishes boundaries for mobile web surfing Helps you locate your children through their devices 142 McAFEE FOR THE HOME . Safari. manage bookmarks. it filters inappropriate websites from search results to prevent intentional and unintentional exposure. McAfee Family Protection for mobile devices protects your children from exposure to inappropriate mobile Internet content and allows you to monitor their online activities. add and remove websites manually. including their physical device locations. animated content. they have access to objectionable websites and content. Being able to identify and prevent objectionable activities lets you educate them about online threats. while allowing appropriate Internet use. You can review a log of all visited and blocked websites. it cannot be relied on as an emergency locator. save images. they naturally cross borders. Features include search bar. McAfee Family Protection offers a superior and safe browsing experience. yet this feature will help you to raise your children more safely. there are situations in which knowing where your children are — or have been — can be priceless. pinch. Your children will recognize and love the device’s default browser.McAfee Family Protection (iPhone / iPod Touch / iPad Edition) Protect and locate your children on their mobile devices Mobile devices — like the Apple iPhone. Since feature accuracy may vary and may not function in all areas. In addition. resize.

effective online security at home. to avoid malware hidden in seemingly innocent sites. while McAfee SiteAdvisor software helps you know if a website is safe before you click. From faster computer startup. award-winning PC security to freely explore online For broad. And PC health tools can remove junk files. to lower CPU usage. more intuitive alerting and help center with contextual help Always-current malware detection with exclusive McAfee Active Protection Tools to improve PC health and destroy sensitive information • • • • • McAFEE FOR THE HOME 143 . Online backups can be fully automated. More of the security you value for your PC and data. with higher performance Our two-way firewall blocks outsiders from hacking into your PC. Superb detection of viruses. McAfee Internet Security combines the essential security of McAfee AntiVirus Plus — anti-malware. and safe search and surf — with anti-spam and email protection. blocks. Engineered for the fastest PC performance ever. firewall. For example. The result: no gap in your protection. phishing attacks. To manage your children’s online usage. you can reserve security scans and updates for when you are not using your PC. reliably destroy unneeded files with confidential data. so you don’t have to wait for regular updates to arrive. new and emerging threats are analyzed and blocked in milliseconds. and clean up your disk to improve system performance. we include powerful parental filtering controls.McAfee Internet Security 2011 Comprehensive. adware. to speedier scans. Unlike the competition. spyware. plus data protection and parental controls. Advanced phishing protection alerts you to websites that may try to steal your identity or gain access to financial information. spyware. our innovative design simplifies your Internet security experience while offering comprehensive protection. automated remote file backup takes the hassle out of backups Lets you manage your tools and schedule scans to avoid disruption Verifies security settings within your home network Smarter. even rootkits — subtle programs designed to tamper with your PC. and other malware Our system detects. and removes viruses. spam. McAfee delivers innovative “silent” features that keep our security software out of your way. Strengths • One GB of online. you will experience significantly improved performance.

such as viruses. It annotates each search result with red. and data-stealing code Our firewall can keep uninvited guests from accessing your computer when you are online.McAfee Internet Security for Mac 2011 Comprehensive Mac security to let you freely explore the web While Macs do not get PC viruses. Trojans. worms. and send personal information to cyber criminals. sites. letting you know if a website is safe or hosts potential security flaws. repairing and removing infections from files without damaging format or contents. and rootkits. With the daily emergence of new and more sophisticated Internet threats that could disrupt your digital life. your computer. The safe search feature blocks sites with red annotations so you cannot click on bad links. providing analysis on each website. and sell personal information Indicates website safety before you click and blocks phishing sites Firewall restricts access to your computer and files when you are online Catches emerging Internet threats before they reach you Scans and cleans downloaded files and attachments from email and IM programs Scans any external drive for potential threats to your Mac • • • • • 144 McAFEE FOR THE HOME . It also guards against harmful programs that monitor. Strengths • Protects against harmful programs that monitor. download. So you can exchange files freely. and malicious websites can download malware that you might unknowingly spread to your friends. collect. Phishing websites can steal personal information. and shop on the Internet any time. your identity. McAfee is the number one provider of Internet security and is relentlessly committed to protecting and empowering you on the Web. Safe surfing and searching McAfee SiteAdvisor software adds safety ratings to your browser and search engine results. Real-time protection recognizes phishing websites and blocks them. they are just as vulnerable to Internet threats as PCs. or green ratings. McAfee Internet Security for Mac helps protect your Mac from malware and cyber attacks as it safeguards your personal information from data-stealing programs and would-be hackers. the software scans and cleans file attachments in Apple Mail and iChat programs. It gives you the freedom to explore. you need more than the Mac OS to protect yourself. collect. restricting access to and from specific applications communicating via Internet or local area networks. bots. and your family. any place without fear of criminals or cyber attacks. yellow. Blocks malicious applications.

the backup process is easy because it is fully automated and seamless. prying eyes. McAfee Online Backup. Keep digital information and images safe with strong encryption Your annual subscription provides virtually unlimited offsite storage and online access. Your files are safe and easy to retrieve with just a few mouse clicks. There is no capacity limit. You can restore your files anywhere using any high-speed Internet-enabled PC. McAfee only backs up files that have been added or changed. safe. takes the hassle out of manually backing up all of your valuable digital files — from Microsoft Outlook email and contacts to treasured family photos. giving you a thorough backup. Reliable 128-bit SSL encryption protects your files during backup. Fast.McAfee Online Backup Easily and safely protect all of your digital files and memories Preserve precious memories with our simple. and 448-bit Blowfish encryption protects your files while they are in storage. or inadvertent access. It can also back up open and locked files to ensure a reliable archive. anytime access Even if you experience a catastrophe. saving you time and bandwidth. Your files are encrypted and stored on a secure remote server online. Strengths • • Fast. unlimited online storage. simple setup lets you backup automatically as often as you would like Once you have installed the software. you still have electronic copies archived and available to you from any PC with an Internet connection. powered by Mozy. Convenient anywhere. simple set-up allows automatic backup as often as you like Offsite storage and online access mean even after a disaster you still have electronic copies available All your backed up copies are encrypted for your protection Virtually unlimited storage space Anytime access from any PC with an Internet connection • • • McAFEE FOR THE HOME 145 . giving you peace of mind that your private data is safe from hackers. New and changed file detection makes sure McAfee Online Backup finds and saves the smallest changes. reliable backup After the initial backup. Optimized for convenient. so you can back up all of your precious files.

McAfee SiteAdvisor LIVE Identifies risky websites and protects your PC When any link can lead to a compromised website. McAfee provides almost 3 billion website safety ratings to users of the McAfee SiteAdvisor product line. spam. exploits. and browser exploits. searching. These safety ratings reflect a massive database of test results from millions of automated site visits. Tests detect risks such as spyware. and email registrations. Its Protected Mode prevents PCs from visiting those risky sites by disabling interaction with dangerous “red” sites and downloads. or emailing Password controlled Protected Mode prevents interaction with risky sites Updates and upgrades automatically to protect against new threats • • • 146 McAFEE FOR THE HOME . and Ask. phishing. and green website safety ratings as well as McAfee SECURE trustmarks for sites passing rigorous daily tests. with support from McAfee computer security experts Simple icons appear when browsing. yellow. And it requires no other security software to operate. download installations. link checking in emails and instant messages. Yahoo!. guarded by advanced phishing protection. comprehensive protection from sites that can compromise your identity and your PC. Strengths • Comprehensive advice about sites with spyware. The software also includes unique link checking that warns you about risky websites coming in through instant messaging and email. Improve risk awareness and actively protect users McAfee SiteAdvisor LIVE adds extra data features that inform you how a download meddles with the inner workings of your PC and whether it will properly and completely uninstall. Add it easily to your infrastructure Every day. Bing. You and your family can safely shop and bank online. The core McAfee SiteAdvisor software displays simple red. instant messaging. AOL. and “Protected Mode” to disable interaction with dangerous sites. McAfee SiteAdvisor LIVE goes beyond safe searching and browsing to provide active. McAfee SiteAdvisor LIVE technology works with 20 search engines. including Google. it helps to know in advance — before you click — if a link means trouble. and more. phishing. spam. real-time.

and online protection. and easier to use After the rapid installation gets you up and running. McAfee Total Protection builds on the anti-malware. Engineered for the fastest performance. Files are safe if your PC is lost. Strengths • • 2GB of online. firewall. our design simplifies your experience while offering ultimate protection. automated remote file backup Award-winning anti-virus. As it instantly detects and blocks malware. and email security found in our McAfee Internet Security suite and layers in extended data protection and web controls. block. Plus McAfee Antitheft encryption (in English versions) lets you lock private data in an encrypted vault on your PC. you must fight back with extra protection for your data. Scheduled activity throttling works to initiate or resume updates when your PC is idle. web safety. Reinforce security for your family and your PC We take the hassle out of manually backing up your most valuable digital information with two GB of encrypted online data storage. adware. spam. Unlike the competition. with password protection. anti-spyware. award-winning PC and online security for total peace of mind As criminals get more creative. it defends your system and home network and blocks websites that could harm your computer. while home network protection defends your PC from intruders on your home network. blocking access to sensitive files. stolen. And parental controls let you manage Internet use. It can also instantly shield your PC when it is exposed to threats. Our two-way firewall blocks outsiders from hacking into your PC. minimizing interruptions. so you do not have to wait for regular updates to arrive. Faster than ever. phishing attacks. a full system scan will not slow down your computer. McAfee SiteAdvisor LIVE tells you whether a website is safe before you click and checks links within email and instant messages to stop malware and identity theft. plus data and parental controls At-a-glance home screen makes it easy to manage and monitor your PC and network defenses • McAFEE FOR THE HOME 147 .McAfee Total Protection 2011 Ultimate. new and emerging threats are analyzed and blocked in milliseconds. and your PC. or hacked. McAfee Active Protection technology defends against emerging threats Our real-time scanning lets our anti-virus and anti-spyware detect. your home network. firewall. spyware. and remove viruses. and rootkits.

and send a notification to chosen friends via SMS. the first thing you will want to know is where it is. Locate. Strengths • • • Remotely locks down your device Wipes out important data stored on your mobile to protect your privacy Backs up your data from your phone or remotely on the web 148 McAFEE FOR THE HOME . a simple mobile device interface. Backup and restore your data with our convenient management options Regular backups of your data are important for protecting sensitive information and preserving contacts and captured images and videos. and you risk malicious — and expensive — use of both device and data. Choose the extensive functionality of the online portal. and disable your missing mobile device Should your mobile phone disappear. With McAfee WaveSecure. You can remotely wipe all data on the phone as well as its removable memory card. using our web portal or an SMS message from a friend’s phone. You can also set McAfee WaveSecure to automatically lock the phone. track.McAfee WaveSecure For Android. Symbian S60. calendar. McAfee WaveSecure enables you to remotely locate and track your phone. videos. You can also trigger an alarm to help you find it or disrupt a thief. and Java Control of your mobile device and data. anytime and anywhere Your mobile phone contains many details of your life: contacts. or fast PIN-authorized SMS messages from a friend’s phone. With McAfee WaveSecure. thwarting abuse. and send a brief SMS message with instructions for returning it. even to a different phone. lock it. convenient protection for your mobile phone and data. wipe the device. you lose sensitive information and irreplaceable memories. Windows Mobile. display a message if the SIM is changed. and restore your data. You can restore your data any time. and more. BlackBerry. text messages. backup the data. to the same or a replacement device. McAfee WaveSecure enables you to backup your data from your device or remotely through the web portal — so even if your device is missing you can back it up before you wipe it. use our portal or an SMS to ensure that your personal data cannot be accessed or used maliciously. McAfee WaveSecure uses a wipe method compliant with US Department of Defense standards to make sure that the data is gone beyond recovery. you can remotely program the device to receive incoming calls only. If you cannot immediately recover your phone. you can be sure of continuous. you can locate your device via either its built-in GPS or cell tower tracking. Remove your data from a lost device If you know the phone is stolen or lost. photos. If it is lost or stolen.

. Security Connected from McAfee. and endpoint security systems. network.Global Reach. Say “yes” to enabling your business. web. Our open platform lets you integrate security into your existing business processes and security investments. The world’s most comprehensive threat intelligence keeps your security up to date and makes possible self-securing data. email. World-Class Technology Security Connected delivers real-time visibility into the security and risk management profile of your business.

express or implied.888. McAfee creates innovative products that empower home users. McAfee EMM. All rights reserved. prevent disruptions. Other marks and brands may be claimed as the property of others. specifications. McAfee ePO. McAfee SECURE. 17001pdir_cor_ssg_0111 . and descriptions herein are provided for information only and subject to change without notice. QuickClean. and shop the web more securely. is the world’s largest dedicated security technology company. McAfee Total Protection. © 2011 McAfee. businesses. McAfee SiteAdvisor. McAfee Global Threat Intelligence. the public sector.8766 www. Backed by an award-winning research team. identify vulnerabilities. browse. McAfee. Foundstone. and VirusScan are registered trademarks or trademarks of McAfee. Santa Clara. McAfee AppPrism. California. and are provided without warranty of any kind. CA 95054 1. The company delivers proactive and proven solutions and services that help secure systems and networks around the world. McAfee is relentlessly committed to tackling the world’s toughest security challenges. SmartFilter. or its subsidiaries in the United States and other countries. 2821 Mission College Blvd. protect data. McAfee Labs. the McAfee logo. Inc. McAfee Active Protection. SecureOS. FoundScore. and continuously monitor and improve their security. headquartered in Santa Clara. Inc. allowing users to safely connect to the Internet.McAfee. The product plans. McAfee ePolicy Orchestrator. and service providers by enabling them to prove compliance with regulations. Inc.com McAfee.mcafee.847.. Inc.

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer: Get 4 months of Scribd and The New York Times for just $1.87 per week!

Master Your Semester with a Special Offer from Scribd & The New York Times