2013-endpoint security at a glance_v4.0

Upload: sidney-webba

Post on 13-Oct-2015

17 views

Category:

Documents


0 download

TRANSCRIPT

  • Complete Endpoint Protection [here]

    Complete Endpoint Protection SaaS [here]

    McAfee VirusScan Enterprise [here]

    McAfee VirusScan for Server/Storage [here]

    McAfee Deep Defender [here]

    McAfee HIPS [here]

    McAfee Application Control [here]

    McAfee Change Control [here]

    McAfee MOVE AV [here]

    McAfee Drive Encryption [here]

    McAfee Endpoint Encryption for File/Folder [here]

    McAfee Virtual Patching for Databases [here]

    McAfee Database Activity Monitoring [here]

    McAfee Vulnerability Scan for Databases [here]

    McAfee ePolicy Orchestrator (ePO) [here]

    McAfee Real-Time for ePO [here]

    McAfee ePO Deep Command [here]

    McAfee Global Threat Intelligence (GTI) [here]

    McAfee Complete Endpoint Security

    All you need to know in one place

  • McAfee Endpoint Security

    Educational Tools Customer facing

    Why do we need more than AntiVirus? Explain Customers the Need for an Defense in Depth approach...

    Anatomy of Every Attack 4 Phases Concept [here]

    Aberdeen Group WP: Endpoint Security: Anti-Virus Alone is Not Enough [here]

    McAfee Solution Brief: The Evolving Landscape of Desktop Security [here]

    The Paradigm Shift Why do we need hardware assited Security [here]

    Root out Rootkits An inside look at Deep Defender [here]

    Fighting Rootkits Blueprint Level 3 [here]

    Whitepaper HIPS in a Day Which value can we deliver in one day [here]

    Gartner Endpoint Protection Buyers Guide [here]

    Why not choose Microsoft?

    IT-Harvest WP: VALUE AND COST ANALYSIS of Microsoft Endpoint Protection Versus Best of Breed Solutions [here]

    Email Template for customer considering Microsoft Forefront [here]

    The Best Way to protect Windows 8 [here]

    Detection Rates

    NSS Test Lab Exploit Report [here]

    NSS Test Lab Exploit Evasion Report [here]

    AV-Test.org Rootkit Protection Report [here]

    Where to find Release Notes, Admin Guides, Best Practice Guides?

    Technical Product Documentation [here]

  • McAfee Products

    Endpoint

    Protection

    (EPS)

    Endpoint

    Advanced

    (EPA)

    Complete

    Enterprise

    (CEE>1000)

    Complete

    Business

    (CEB

  • McAfee Products

    Security Suite

    for

    Server

    Security Suite for

    Server Hypervisor Edition

    Security Suite

    for Virtual

    Infrastructure

    Security Suite

    for

    Databases

    McAfee ePolicy Orchestrator (ePO - Security Management Platform)

    McAfee VirusScan Enterprise

    McAfee VirusScan Enterprise Linux (Desktop)

    McAfee VirusScan Enterprise Linux (Server)

    McAfee Application Control (Desktop)

    McAfee Application Control (Server)

    McAfee MOVE Virtual Desktop Infrastructure

    McAfee Database Activity Monitor

    McAfee Database Vulnerability Monitor

    Licensed Server Hypervisor Virtual Desktop Database

    Complete Datacenter Protection Suites

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    Reduce management, license and infrastructure cost Reduce urgency of patching Streamlining event management and escalations Streamlining compliance reporting / analytics / trending

    A single platform to secure Desktops to Datacenters Security technology that protects from Chip to Cloud Context awareness across Data, Devices and Applications Single, integrated management console and single client agent

    (reduce TCO)

    Proactive and real-time malware detection and True behavioral host based IPS

    Proven and robust technology protects 150 Mio. Endpoints

    Symantec [here] Trend [here] Sophos [here] Microsoft [here] Kaspersky [here]

    Reduce management, license and infrastructure cost Reduce urgency of patching Streamlining event management and escalations Streamlining compliance reporting / analytics / trending

    Version: 9.0

    Supported OS: [here]

    Product Page

    Endpoint Suite FAQ

    Sales Play

    Sales Play Competitve

    Datasheet Complete Enterprise

    Datashet Complete Business

    Endpoint Presentation

    McAfee Website

    NSS Labs Test Report

    AV-Test.org Rootkit Test

    Gartner Buyers Guide Free Trial CEE Suite

    Complete Endpoint Protection Suites

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    Endpoint security against constantly evolving threats without complex management

    Reduce time and IT costs as economic factors that limit IT personnel.

    View, report, and enforce policies on all users in the environment without maintaining multiple management consoles

    Apply same security to mobile users

    Always on guard endpoint security Real-time protection from the Cloud Best-In-Class availability - McAfee SaaS infrastructure provides

    99.98% availability, ensures reliability, and reduces the need for

    additional security management software, hardware, support, or

    dedicated IT staff

    Symantec has separate management console not integrated with their existing Hosted Email protection

    Trend does not offer integration with email, web, or vulnerability management protection.

    Trend has three offerings in three consoles

    How much time is spent per week on your security? How well do your existing tools let you report on your risk

    exposure?

    How much onsite hardware and software do you have to manage security?

    What process do you have to ensure protection to all users?

    Version: 6.0

    Supported OS: [here]

    Whats New [here]

    Product Page

    SaaS Endpoint Presentation

    SaaS Endpoint FAQ

    SaaS Call Script

    Sales Play

    Datasheet SaaS Endpoint

    SaaS Solution Brief

    McAfee Website

    Free Trial

    Complete Endpoint Protection - SaaS

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    McAfee discovers approx. 120.000 new threats each day customer have the challenge to update all endpoints in time

    Traditional VSE is resource intensive and working signature based only

    Protect your organization more efficient against zero day attacks

    Maximum defense against malware Proactive protection from attacks through Real-time scanning Centralized Management and integration with other endpoint

    technologies

    Low impact on performance with VSE 8.8 Enhanced security powered by McAfee Global Threat Intelligence

    Symantec [here] Trend [here] Sophos [here] Microsoft [here] Kaspersky [here]

    Does your current solution provide behavioral zero day protection?

    Is your current antimalware solution slowing your systems to a halt when doing on demand scans?

    Does your current solution report on other point products as well? How much time is spent managing your current AV solution?

    Version: 8.8 Patch 3

    Support Windows [here]

    Support Linux [here]

    Support MAC [here]

    Release Notes

    Product Page Datasheet Complete Enterprise

    Datashet Complete Business

    Endpoint Presentation

    Technical Product Documentation

    McAfee Website

    McAfee VirusScan Enterprise

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    Malware within Microsoft Excahnge and Lotus Domino mail servers, Microsoft Sharepoint and SAP NetWeaver applications

    may not be detected by file system scanner

    How to detect and protect hardware NetApp filers and Sun StorageTek NAS

    Malware detection on each client is less effiecient than central scanning

    Provide scanning, cleaning, protection and assurance that mail systems and applications are clean and safe

    Protect storage hardware centrally Aviod the need to rely on endpoint protection only

    Symantec Trend Kaspersky Sophos AVG

    Are you looking to offer additional protection to mail systems, applications and storage?

    Are you looking to integrate management and reporting of this solutions into existing McAfee endpoint protection?

    VirusScan for Storage [here]

    VirusScan for SAP [here]

    VirusScan for Sharepoint [here]

    VirusScan for Linux [here]

    VirusScan for Email [Lotus / Exchange]

    Product Page Datasheet Storage

    Datasheet SAP

    Datasheet Sharepoint

    Datasheet Linux

    Datasheet Email

    McAfee Website

    Free Trial Storage

    McAfee VirusScanning for Server/Storage

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    Threats are changing to more sophisticated advanced persistent threats (APTs) - Companies today dont know they are infected with stealth malware

    Rootkits hide within the operating system (42 Rootkits in 2007; ~2 million in 2011)

    Detection relies on up-to-date protection, but APTs are often zero day attacks

    Removal requires extra tools/system rebuild Clean-up cost per endpoint ~ $500

    Operates beyond the operating system Expose Hidden Threats Enhanced zero-day protection against Stealth techniques and

    rootkits

    Stop data Loss - detect malware early Provide a new vantage point on security - no place for stealth

    attacks to hide

    Lower costs - reduce downtime and clean-up costs Easy deployment and management Real-Time protection of MBR, BIOS and Kernel

    NO

    All major competitors Symantec, Trend, Sophos, Kaspersky, CA, etc.

    rely on detection and removal by software running above the

    operating system or with standalone tools this approach results in the problem statement

    Have you heard about the latest threats such as NightDragon, Suxnet and Shady Rat?

    Are you using Intel Core i3, i5 or i7 chips? How do you check for rootkits? Have you experienced rootkit infection? Has your AV product been able to remove the rootkit natively? How easy has removal been?

    Version: 1.6

    Supported OS: [here]

    Supports Intel Core i3, i5, and i7 processors

    Release Notes

    Product Page

    Sales Play

    Datasheet

    Presentation

    Whitepaper: Paradigm Shift

    AV Test Report

    Technical Product Documentation

    McAfee Website

    Free Trial

    Video

    Best Practice Guide

    McAfee Deep Defender

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    VirusScan signatures alone is not good enough anymore Better Zero-Day protection Patching is costly, time consuming and difficult to achieve Unpatched systems introduce weaknesses that AntiVirus alone

    cannot mitigate

    Many high profile attacks rely on unpatched vulnerabilities Host firewalls are complex to configure, with risk of denying

    access to legitimate traffic

    Gain behavioral protection against 95% of vulnerabilities with no configuration updates required (no signatures)

    Closes the threat window with up-to-date, reputation-based intelligence about bad network connections (GTI integration)

    Protects desktops and servers against botnets and DDoS attacks Patch endpoints less frequently and with less urgency Manage compliance with easy to-understand actionable views,

    workflow, event monitoring, and reporting

    ThirdBrigade Deep Security Host IPS IBM Proventia Cisco CSA End of Life Symantec Sophos

    How often do you patch? How long does it take you to patch? How much does out of band patching cost? How do you protect unpatched systems? How do you lock down access to critical or vulnerable resoucres

    Version: 8.0 Patch 3

    Supported OS: [here] Product Page

    Sales Play

    Datasheet HIPS for Desktops

    Datasheet HIPS for Server

    Presentation

    Whitepaper: HIPS in a Day

    Technical Product Documentation

    McAfee Website

    Free Trial

    McAfee Host IPS

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    Legacy devices with costly support and no protection/patches available

    Fixed resource systems that cannot use conventional security technology i.e. AV

    Dealing with zero day threats and the operational cost of clean ups

    Cost associated with testing of AV signatures and ops management

    Protect against zero-day and advanced persistent threats without signature updates

    Strengthen security, improve performance and lower ownership costs with dynamic whitelisting

    Efficiently control application access with McAfee ePO softwares centralized management platform

    Reduce patch cycles through secure whitelisting and advanced memory protection

    Secure critical systems and legacy systems (W2k or XP)

    Bit9 [here] Microsoft [here] Lumension

    Do you have any Legacy apps / systems? Do you have systems with limited resources or that cannot run

    traditional security i.e. Utility, Medical devices, ATMs, POS, etc How often do you need to patch? Are you concerned about the impact of zero day threats on your

    organisation?

    How do you protect critical servers and infrastructure?

    Version: 6.1

    Supported OS: [here]

    Linux, Solaris, Windows

    Product Page

    Sales Play

    Datasheet

    Presentation

    WP: Evolving Desktop Secuirty

    WP: Securing Fixed Devices

    Technical Product Documentation

    McAfee Website

    Free Trial

    WP: Securing evolving Datacenter

    Video

    Best Practice Guide

    McAfee Application Control

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    Visibility - Who, What, When = Impact? Ineffective Security Reactive, Manual, Point Solutions Reduced Availability & Compliance Configuration errors = 60-65% downtime rising to 80% (Gartner &

    Forrester)

    Reactive Compliance

    Monitor - Continuous visibility Assess - Track work flow and record change details Enforce - Authorised changes Value - Increased ROI (reduced OPEX) Upsell DAM & App Control Sell primarily to Operations & IT Security is Tier II

    TripWire [here] Visibility but no control Continuous monitoring limited to Windows only Position Config Control Suite

    LogRhythm & Splunk Integrity monitoring (free) & basic scheduled scanning Not core focus, focus on log management

    Downtime incurred by software changes? Compliance violations or fines? Manual change control? Visibility of all changes? Monitor effectiveness of change controls?

    Version: 6.1

    Supported OS: [here]

    Linux, Solaris, Windows,

    AIX, HP-UX

    Product Page

    Sales Play

    Datasheet

    Presentation

    WP: Continous Compliance

    Technical Product Documentation

    McAfee Website

    Free Trial

    Whitepaper on Website

    McAfee Change Control

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    Minimize performance impact of security scanning if you install 10 times AV in 10 virtual sessions this will 10 times impact the

    physical hypervisor performance

    Virtualized environments are difficult to predict load and capacity plan

    IT is striving to make the most efficient utilization of high cost infrastructure

    Update DAT files in virtual session, e.g. Non-Persitent virtual sessions

    Optimization of AV for virtual machines Offloads virus scanning and .DATs Provides 60% more VM density over traditionally deployed

    security

    Schedule scanning for servers based on load of the hypervisor and other parameters

    MOVE is the ONLY product providing 3 deployement options: 1. Multi Platform, 2. Agentless (vShield only), 3. Offline Scanning

    Trend Symantec Kaspersky

    Additional, Minimal, or Optimal? Is Security causing performance impact in your virtual

    environment?

    Is your security team involved in your Virtualization Project? Are you using VirusScan in your virtual Session? Which Hypervisors are you using, e.g. Vmware, Citrix, Microsoft

    HyperV?

    Version: 2.6

    Supported OS: [here]

    Product Page

    Sales Play

    Datasheet

    Presentation

    Solution Brief

    Datacenter Security

    Technical Product Documentation

    McAfee Website

    Whitepaper on Website

    Free Trial

    Video: Why MOVE

    McAfee MOVE AV

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    Secure mobile data: Protect confidential data from unauthorized access and exposure that may result in data loss/breach

    Compliance Reporting Data breach law compliance: Data breach and privacy laws

    require public disclosure of data loss events and can impose

    significant financial penalties

    Full Disk Encryption to secures data on desktops, laptops as well as MAC OS based systems

    Integration with ePO Deep Command to provide secure Wake-On-Lan

    Single-Sign-On with Windows Smart Card and PKI Support in PreBoot The last 5 years clear leader in the Gartner Magic Quadrant Support for Endpoint Encryption GO diagnostics reporting plugin for

    ePO

    Checkpoint [here] Sophos Symantec [here] Microsoft BitLocker [here] PGP

    Do you have to comply with data breach or privacy laws? Does you know where your sensitive data resides? Have any of your employees had their device lost or stolen? Would you like to reduce the burden of audit by being able to

    prove compliance more easily?

    How do you protect data on removable media?

    Version: 7.1

    Support Windows [here]

    Support MAC OS [here]

    Product Page

    Sales Play

    Datasheet

    Presentation

    Gartner Report

    Technical Product Documentation

    McAfee Website

    Export Regulation

    FIPS Certification

    CCEAL 4 Certification

    Customer Stories Website

    McAfee Drive Encryption

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    System Administrator can access all data on the network and file servers

    Secure mobile data: Protect confidential data from unauthorized access and exposure that may result in data loss/breach

    Compliance Reporting Data breach law compliance: Data breach and privacy laws

    require public disclosure of data loss events and can impose

    significant financial penalties

    Policy based encryption of files&folders on file servers as well as locally

    Transparent Encryption of any removable media no admin rights or software installtion required device can be used any time and anywhere

    Persistent encryption to safeguard sensitive data wherever it goes (file & folder)

    Integration with DLP Endpoint to enforce encryption of sensitive data (rule based)

    Checkpoint [here] Sophos Symantec [here] Microsoft [here] PGP

    Do you have to comply with data breach or privacy laws? Does you know where your sensitive data resides? Have any of your employees had their device lost or stolen? Would you like to reduce the burden of audit by being able to

    prove compliance more easily?

    How do you protect data on removable media?

    Version: 4.1

    Supported OS: [here] Product Page

    Sales Play

    Datasheet

    Technical Product Documentation

    McAfee Website

    Export Regulation

    McAfee Endpoint Encryption for File/Folder

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    Patching of 100s or 1000s of database is a painful job Databases are often not patched Patching needs DOWNTIME and TESTING Releasing a new patch by the vendor increases the knowledge

    about vulnerabilities

    Patches are only provided for supported releases

    Protects vulnerabilities of the database against attacks Reports attacks against the database Old and unsupported database versions are also protected More than 430 rules available Ready-To-Run immediate after installing the software NO downtime of the database during install and update

    Imperva Guardium (IBM) [here]

    Do you install the patches in time? Are there unsupported (old) database versions running? How long does it take to patch all the databases?

    Version: 4.3

    Supported OS: [here] Product Page

    Sales Play

    Datasheet

    Presentation

    WP: Overcoming Patching

    Challenges

    Technical Product Documentation

    McAfee Website

    SC Magazine Award

    2013

    Free Trial

    McAfee Virtual Patching for Databases

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    Not enough knowledge about who is accessing the data Unauthorized or undesired access to the database Customer is not able to patch all the databases timely Customer need to be compliant

    Protecting the customers most valuable data stored in databases Detect and/or prevent unauthorized access to the database Virtual Patching allows a better planning for patching and reduce

    the need to patch

    Helps to enforce Compliance in the database (PCI-DSS, HIPAA, SOX ...)

    Auditing accessing or modifying data Flexible reporting for Auditors, Security Team, Management

    Oracle needs a specific server for scanning the network traffic [here]

    Imperva networkbased appliance Guardium (IBM) networkbased appliance [here]

    All of them see the incoming SQL-Statement, McAfee DAM sees also the targeted objects inside the database

    Where are the sensitive data? Do you install all the patches after they are released by the

    vendor?

    Do you use databases which are not longer supported by the vendor?

    Do you get any info or alert, when a high priviliged user (e.g. Database Administraor) accesses data he should nnot access?

    Are your databases compliant?

    Version: 4.3

    Supported OS: [here] Product Page

    Sales Play

    Datasheet

    Presentation

    Technical Product Documentation

    McAfee Website

    Free Tria

    Video l

    McAfee Database Activity Monitoring

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    In huge environments with 100s or 1000s of database there is often no knowledge about the exact number of database

    Database often are not compliant to internal or external regulation Senesitive data (password, credit card number, PII) is often

    located in many database

    Database are often installed in different ways, some are secure others not

    Offers an exact overview about configuration and status of the scanned databases

    Reports can used as TO DO for the DBA FIX Scripts helps the DBA Reporting: Patch Level, unsecure configuration, violation of

    regulations, vulnerabilites, sensitive data ...

    Reporting to: Management, Auditor, Security Staff and DBAs More than 4.200 single cheks Customer checks for specific requirenments

    Application Security Imperva Guardium (IBM) [here] Next Generation Security

    Where are the sensitive data? Are there accounts with weak or default password? Do you know all you DBAs or are there DBA-accounts in the

    database you dont know? Are backdoors installed inside the database? Is the database well configured? Are the databases patched? What about the patch level? Is there vulnerable program code inside the database?

    Version: 4.3

    Supported OS: [here]

    Product Page

    Sales Play

    Datasheet

    Presentation

    Whitepaper Website

    Technical Product Documentation

    McAfee Website

    Free Trial

    Video

    McAfee Vulnerability Scan for Databases

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    Management complexity from siloed security, compliance tools and processes

    High operational costs to implement and maintain policies and protections

    Low visibility of IT security posture slows remediation and reporting times, increasing risk

    End-to-end visibility with single point of reference for security and compliance across IT infrastructure

    Extensible framework that integrates with critical enterprise infrastructure, such as Microsoft Active Directory and Service Desk

    solutions

    Actionable reporting and event handling with an automated response system to streamline event management and common

    tasks

    Supercharge ePO ePO Deep Command out-of-band management and Real-Time for ePO to real-time visibility and action

    n/a How many management and reporting tools do you use to manage security across your enterprise?

    When Microsoft (or another critical software or infrastructure vendor) announces a vulnerability, how do you know all of your

    systems are up to date?

    How do you get the status of your internal or regulatory policy compliance across your entire infrastructure?

    How much time do you spend performing every day tasks that could be automated?

    Version: 5.0

    Supported Products:

    ePO 4.6 [here]

    ePO 5.0 [here]

    Product Page

    Sales Play Security

    Connected

    Datasheet

    Presentation incl Real-Time

    WP: Optimize Security

    Management with ePO

    Technical Product Documentation

    McAfee Website

    Whitepaper on Website

    Free Trial

    eASI Suite Installer Setup

    Guide

    McAfee ePolicy Orchestrator (ePO)

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    Real-time visibility Instant control and protection Address security issues as events are happening Ascertain Who uses what quickly Simplify compliance

    Instant information provides visibility into the security state and health of McAfee products on even large numbers of endpoints

    Real-Time actions help ensure that defenses are installed, running, correctly configured, and up to date

    An efficient architecture routes around bottlenecks to scale visibility, updates, and control to large networks

    Proactive security management replaces check box compliance Fully integrated into McAfee ePO

    No other vendor can offer this kind of real-time visibility and action Show me systems where scanning is taking over x percent of the processor?

    Get McAfee HIPS Status from all machines Which McAfee Agents have errors or are not responding? Which systems do not have [McAfee Product] installed? When did this system check in last?

    Version: 1.0.1

    Support ePO 4.6.6 and

    above, McAfee Agent

    4.6.6 and above

    Product Page Datasheet

    Presentation

    Technical Product Documentation

    FAQ

    McAfee Real-Time for ePO

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    Cost of Desk-Side IT Visit Increase Operational Costs; Up to $250/Visit

    Endpoint PCs Must Be Resilient and Always Available for End Users

    Fast Threat Propagation Requires Quicker Security Policy Deployment

    Green & Clean Power Initiatives Limit Access for Security Updates

    Protect endpoints ahead of emerging threats Connect to the disabled PC via Intel AMT, whether the PC is

    local or remote

    Security maintenance or time-intensive tasks during off hours without impacting productivity using the AMT Alarm Clock

    Wake PCs, update policies, and return them to lower power states to save energy Green IT

    Use the McAfee ePO Deep Command Discovery and Reporting module to discover Intel vPro AMT-capable PCs in your

    environment

    Symantec Altiris IBM LanDesk

    Does your company look into green IT initiatives to reduce power costs?

    How many endpoints in your environment are using Intel Core vPro equipped?

    What percentage of your endpoints are powered off during off hours?

    What version of ePO do you have deployed? How many of your employees are remote or SOHO tele-workers? Is your company global with many offices around the world?

    Version: 2.0 NEW

    Supported OS: [here]

    Release Notes

    Product Page Datasheet

    Presentation

    Whitepaper on Website

    Technical Product Documentation

    Demo Video

    Video EEPC Remote Unlock

    Video EEPC Pwd Reset

    McAfee ePO Deep Command

  • USEFUL LINKS

    CUSTOMER PROBLEM

    PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING

    COMPETITON

    VALUE PROPOSITION

    QUESTIONS TO ASK

    McAfee Labs detects 130.000 new threats every single day Threats now multiply and morph faster than ever which dictates

    against simply signature based defense mechanisms from

    identifying new, or zero-day threats

    Singature based protection alone cannot protect organization effectively against the maware explosion

    Improved detection of new and zero day threats due to the real time responsiveness of the GTI cloud based reputation services (4

    Billion queries each day)

    150 Million Endpoint & Network Sensors Detection of blended threats across all vectorsfile, web, email,

    and network

    The most comprehensive reputation systems in the industry providing reputation and predictive detection across spam,

    outbound web, malware, IP, and other threat vectors

    All major competitors have a cloud based repution service today. However McAfee is still the only vendor which offers all

    repution vectors such as file, web, email and network in one

    single integrated Cloud. Every product in McAfee can learn and

    participate from each other

    How do you protect your organization against zero-day attacks? Are all your DAT files up to date each day? Do you spend too much time reacting to vulnerability and threat

    alerts/incidents?

    How do you prioritize remediation activities with thousands of malware samples identified each day and thousands of exploitable

    application vulnerabilities identified each year?

    Version: Proxy 2.0 Patch 1

    Release Notes Product Page Datasheet GTI Proxy

    Presentation GTI Proxy

    Presentation McAfee Labs

    Technical Product Documentation

    FAQ

    Threat Center

    McAfee Global Threat Intelligence (GTI)