Endpoint Protection

Have you been told that standard antivirus is enough security? The truth is that every business can afford strong, fast, simple security. The McAfee Complete Endpoint Protection suites add defense in depth against the full threat spectrum from zero-day exploits to hacker attacks, protecting Windows, Macs, and Linux systems, as well as mobile devices such as iPhone, iPad, and Android smartphones and tablets. Your endpoint security is all efficiently managed through a single, extensible security management platform. Or, for the ultimate in endpoint security simplicity, choose our cloud Security-as-a-Service (SaaS) solutions.

  • Complete Endpoint Protection — Business

    It's easy to get enterprise security right. A single solution with a single management platform unifies 17 technologies to proactively protect all of your devices — PCs, Macs, Linux systems, smartphones, virtual machines, tablets, and servers. Simplify management and reduce costs while defending your endpoints from today’s most insidious and stealthy threats, including rootkits and advanced persistent threats (APTs).

    With Complete Endpoint Protection — Enterprise, you can customize your enterprise’s security to create the right combination for each user community, from giving power users the freedom and flexibility they demand to applying the tightest control on shared systems. One suite brings you a “complete coverage” toolbox. From easy installation to real-time investigations, it’s all integrated and centralized for efficient management.

    Features & Benefits:

    Top-rated, layered endpoint defense, from chip to cloud
    Advanced antivirus, anti-malware, host intrusion prevention, device control, host-based firewall, dynamic application control, and more tackle malware, zero-day threats, and evasion attacks at every vector — mobile, data, web, email, and network.

    Reduce the application attack surface without labor- and time-intensive whitelist management
    Unique dynamic application control allows installation of only known good files or applications based on a flexible, automated update model.

    Unify and simplify management
    McAfee ePO single-console management streamlines and automates workflow, policy deployment, updates, maintenance, and reporting across all of the technologies that protect your endpoints. Integration with other McAfee and third-party products increases visibility and efficiency as you add to your security arsenal.

    Act faster and more efficiently to stop threats in their tracks
    Real Time for McAfee ePO gives security staff instant access to critical data and guidance to the right responses within the natural workflow.

    Minimize risk
    Clearly identify which assets might be affected by which threats, and whether you have proper protection in place. McAfee Risk Advisor calculates risk scores based on threats, vulnerabilities, asset criticality, and countermeasures to help your in-house security experts optimize and prioritize patching.

    See more and know more for better protection
    Real-time cloud-based McAfee Global Threat intelligence collects the latest data to protect against known and emerging cyberthreats across all vectors — file, web, message, and network.

  • Complete Endpoint Protection — Enterprise

    With McAfee Complete Endpoint Protection — Business, you can spend more time on your business and less time worrying about security. This highly affordable, all-in-one solution provides top-rated endpoint security for all the devices in your enterprise: PCs, Macs, Linux systems, servers, virtual systems, smartphones, and tablets. Quickly and easily layer in protection against today’s most advanced threats, including encryption to protect your valuable data, behavioral zero-day intrusion prevention against attacks, hardware-enhanced protection against low-level, stealthy malware, and email, web, and mobile security to block phishing and multistage attacks. Easy installation and unified management reduce setup and maintenance. You can respond faster than ever.

    Features & Benefits:

    Safeguard all your devices
    License one product to protect all your business assets: PCs, Macs, Linux systems, servers, virtual systems, smartphones, and tablets.

    Top-rated, comprehensive layered protection
    Advanced antivirus, anti-malware, host intrusion prevention, device control, host-based firewall, encryption, and more tackle malware, zero-day threats, and evasion attacks at every vector — mobile, data, web, and email.

    Security built for growing organizations
    We keep it simple for IT administrators to take charge. Install your suite with just four clicks and in less than 20 minutes. Add licenses and products using the same management platform as your business grows.

    Unify and simplify management
    McAfee ePolicy Orchestrator (McAfee ePO) single-console management streamlines and automates workflow, policy deployment, updates, maintenance, and reporting across all of the technologies that protect your endpoints. Integration with other McAfee and third-party products further increases visibility and efficiency as you add to your security arsenal.

    Act faster and more efficiently to stop threats in their tracks
    Real Time for McAfee ePO gives administrators instant access to critical data within the natural McAfee ePO workflow, getting answer

    Protect vital data proactively with encryption
    Deploy industry-leading file, folder, and full disk encryption to secure confidential data across PCs, laptops, network servers, and removable media. Quickly enforce organization-wide encryption policies that are automatic and transparent to users, so files can be securely shared, stored, and transported.

    See more and know more for better protection
    Real-time cloud-based McAfee Global Threat Intelligence collects the latest data to protect against known and emerging cyberthreats across all vectors — file, web, message, and network.

  • McAfee & Intel Security

    McAfee and Intel security products bring fresh innovation to secure the future of computing and the Internet. With the development of hardware-assisted endpoint security, you can now communicate with endpoints at a level beyond the operating system and block advanced, hidden attacks.

    Features & Benefits:

    McAfee Deep Defender
    McAfee Deep Defender helps stop advanced stealth attacks with the industry's first hardware-assisted security enabled by McAfee DeepSAFE technology. Unlike traditional security solutions, Deep Defender operates beyond the operating system to provide real-time kernel monitoring to reveal and remove advanced, hidden attacks.

    Stop unknown stealth attacks
    Prevent stealth attacks from compromising your endpoints and stealing confidential data with real-time kernel memory protection operating beyond the operating system.

    Utilize real-time memory and CPU monitoring
    Leverage McAfee DeepSAFE technology, a memory software layer executing in VMX-root mode, to provide real-time kernel memory and CPU event protection with minimal performance impact.

    Get true zero-day protection
    Identify malicious behavior and provide true zero-day protection. McAfee Deep Defender requires no prior knowledge of the rootkit to detect its existence.

    Deploy quickly and manage easily
    Use McAfee ePolicy Orchestrator (ePO) software to remotely deploy and manage McAfee Deep Defender alongside your existing McAfee endpoint security solutions, lowering management overhead and costs.

  • McAfee ePO Deep Command

    McAfee ePO Deep Command utilizes Intel® vPro™ Active Management Technology (AMT) to deliver beyond-the-operating-system management, reducing security operations costs while enhancing your security posture. McAfee ePO Deep Command lets you control powered-off computers to execute security tasks, such as updates, deployments, and configuration changes, as well as performs remote remediation of computers with disabled operating systems.

    Features & Benefits:

    McAfee Deep Defender
    McAfee Deep Defender helps stop advanced stealth attacks with the industry's first hardware-assisted security enabled by McAfee DeepSAFE technology. Unlike traditional security solutions, Deep Defender operates beyond the operating system to provide real-time kernel monitoring to reveal and remove advanced, hidden attacks.

    Discover and simplify Intel AMT provisioning
    Streamline and reduce effort to discover and provision Intel AMT to allow customers to quickly take advantage of McAfee ePO Deep Command on Intel vPro-based PCs.

    Wake and execute security
    Conduct security maintenance or time-intensive tasks during off hours without impacting productivity. Using the AMT Alarm Clock, security administrators can power on and wake up a PC to execute a defined series of security tasks.

    Remotely remediate disabled endpoints
    Connect to the disabled PC via Intel® vPro™ Active Management Technology (AMT), whether the PC is local or remote, to conduct a remote boot from another boot image on the network.

    Get full remote PC control from ePO
    Securely extend the reach of remote remediation with full support of KVM and be able to completely control the remote PC’s keyboard, video, and mouse to greatly simplify remediation capabilities.

    Conduct Remote Encryption Management
    Wake up encrypted PCs with McAfee encryption and conduct security tasks or other updates without the user being involved to authenticate the encryption software. Requires McAfee Endpoint Encryption 7.0.

    Maintain security visibility while lowering costs
    Wake PCs, update policies, and return them to lower power states to save energy and pursue industry incentives to cut power consumption without compromising security.

    Deploy security ahead of the threat
    Protect endpoints ahead of emerging threats. You can update systems before a potential breach and remotely activate countermeasures without impacting productivity.

    Unlock the Power of Intel vPro
    Use the McAfee ePO Deep Command Discovery and Reporting module to discover Intel vPro AMT-capable PCs in your environment. Detailed reports ensure you know exactly what PCs you can deploy the ePO Deep Command agent.



ABOUT US

History
Awards
About the Company
Join Us
Contact Us
Customer List
PRODUCTS

F5 Networks
IXIA
Palo Alto Networks
McAfee
Micro Focus
SERVICE & SUPPORT
SOCIAL MEDIA

  Facebook
  G+
  LinkedIn

Copyright © 2019 B & Data Technology Co.,Ltd