2013-endpoint security at a glance_v4.0
TRANSCRIPT
-
Complete Endpoint Protection [here]
Complete Endpoint Protection SaaS [here]
McAfee VirusScan Enterprise [here]
McAfee VirusScan for Server/Storage [here]
McAfee Deep Defender [here]
McAfee HIPS [here]
McAfee Application Control [here]
McAfee Change Control [here]
McAfee MOVE AV [here]
McAfee Drive Encryption [here]
McAfee Endpoint Encryption for File/Folder [here]
McAfee Virtual Patching for Databases [here]
McAfee Database Activity Monitoring [here]
McAfee Vulnerability Scan for Databases [here]
McAfee ePolicy Orchestrator (ePO) [here]
McAfee Real-Time for ePO [here]
McAfee ePO Deep Command [here]
McAfee Global Threat Intelligence (GTI) [here]
McAfee Complete Endpoint Security
All you need to know in one place
-
McAfee Endpoint Security
Educational Tools Customer facing
Why do we need more than AntiVirus? Explain Customers the Need for an Defense in Depth approach...
Anatomy of Every Attack 4 Phases Concept [here]
Aberdeen Group WP: Endpoint Security: Anti-Virus Alone is Not Enough [here]
McAfee Solution Brief: The Evolving Landscape of Desktop Security [here]
The Paradigm Shift Why do we need hardware assited Security [here]
Root out Rootkits An inside look at Deep Defender [here]
Fighting Rootkits Blueprint Level 3 [here]
Whitepaper HIPS in a Day Which value can we deliver in one day [here]
Gartner Endpoint Protection Buyers Guide [here]
Why not choose Microsoft?
IT-Harvest WP: VALUE AND COST ANALYSIS of Microsoft Endpoint Protection Versus Best of Breed Solutions [here]
Email Template for customer considering Microsoft Forefront [here]
The Best Way to protect Windows 8 [here]
Detection Rates
NSS Test Lab Exploit Report [here]
NSS Test Lab Exploit Evasion Report [here]
AV-Test.org Rootkit Protection Report [here]
Where to find Release Notes, Admin Guides, Best Practice Guides?
Technical Product Documentation [here]
-
McAfee Products
Endpoint
Protection
(EPS)
Endpoint
Advanced
(EPA)
Complete
Enterprise
(CEE>1000)
Complete
Business
(CEB
-
McAfee Products
Security Suite
for
Server
Security Suite for
Server Hypervisor Edition
Security Suite
for Virtual
Infrastructure
Security Suite
for
Databases
McAfee ePolicy Orchestrator (ePO - Security Management Platform)
McAfee VirusScan Enterprise
McAfee VirusScan Enterprise Linux (Desktop)
McAfee VirusScan Enterprise Linux (Server)
McAfee Application Control (Desktop)
McAfee Application Control (Server)
McAfee MOVE Virtual Desktop Infrastructure
McAfee Database Activity Monitor
McAfee Database Vulnerability Monitor
Licensed Server Hypervisor Virtual Desktop Database
Complete Datacenter Protection Suites
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Reduce management, license and infrastructure cost Reduce urgency of patching Streamlining event management and escalations Streamlining compliance reporting / analytics / trending
A single platform to secure Desktops to Datacenters Security technology that protects from Chip to Cloud Context awareness across Data, Devices and Applications Single, integrated management console and single client agent
(reduce TCO)
Proactive and real-time malware detection and True behavioral host based IPS
Proven and robust technology protects 150 Mio. Endpoints
Symantec [here] Trend [here] Sophos [here] Microsoft [here] Kaspersky [here]
Reduce management, license and infrastructure cost Reduce urgency of patching Streamlining event management and escalations Streamlining compliance reporting / analytics / trending
Version: 9.0
Supported OS: [here]
Product Page
Endpoint Suite FAQ
Sales Play
Sales Play Competitve
Datasheet Complete Enterprise
Datashet Complete Business
Endpoint Presentation
McAfee Website
NSS Labs Test Report
AV-Test.org Rootkit Test
Gartner Buyers Guide Free Trial CEE Suite
Complete Endpoint Protection Suites
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Endpoint security against constantly evolving threats without complex management
Reduce time and IT costs as economic factors that limit IT personnel.
View, report, and enforce policies on all users in the environment without maintaining multiple management consoles
Apply same security to mobile users
Always on guard endpoint security Real-time protection from the Cloud Best-In-Class availability - McAfee SaaS infrastructure provides
99.98% availability, ensures reliability, and reduces the need for
additional security management software, hardware, support, or
dedicated IT staff
Symantec has separate management console not integrated with their existing Hosted Email protection
Trend does not offer integration with email, web, or vulnerability management protection.
Trend has three offerings in three consoles
How much time is spent per week on your security? How well do your existing tools let you report on your risk
exposure?
How much onsite hardware and software do you have to manage security?
What process do you have to ensure protection to all users?
Version: 6.0
Supported OS: [here]
Whats New [here]
Product Page
SaaS Endpoint Presentation
SaaS Endpoint FAQ
SaaS Call Script
Sales Play
Datasheet SaaS Endpoint
SaaS Solution Brief
McAfee Website
Free Trial
Complete Endpoint Protection - SaaS
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
McAfee discovers approx. 120.000 new threats each day customer have the challenge to update all endpoints in time
Traditional VSE is resource intensive and working signature based only
Protect your organization more efficient against zero day attacks
Maximum defense against malware Proactive protection from attacks through Real-time scanning Centralized Management and integration with other endpoint
technologies
Low impact on performance with VSE 8.8 Enhanced security powered by McAfee Global Threat Intelligence
Symantec [here] Trend [here] Sophos [here] Microsoft [here] Kaspersky [here]
Does your current solution provide behavioral zero day protection?
Is your current antimalware solution slowing your systems to a halt when doing on demand scans?
Does your current solution report on other point products as well? How much time is spent managing your current AV solution?
Version: 8.8 Patch 3
Support Windows [here]
Support Linux [here]
Support MAC [here]
Release Notes
Product Page Datasheet Complete Enterprise
Datashet Complete Business
Endpoint Presentation
Technical Product Documentation
McAfee Website
McAfee VirusScan Enterprise
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Malware within Microsoft Excahnge and Lotus Domino mail servers, Microsoft Sharepoint and SAP NetWeaver applications
may not be detected by file system scanner
How to detect and protect hardware NetApp filers and Sun StorageTek NAS
Malware detection on each client is less effiecient than central scanning
Provide scanning, cleaning, protection and assurance that mail systems and applications are clean and safe
Protect storage hardware centrally Aviod the need to rely on endpoint protection only
Symantec Trend Kaspersky Sophos AVG
Are you looking to offer additional protection to mail systems, applications and storage?
Are you looking to integrate management and reporting of this solutions into existing McAfee endpoint protection?
VirusScan for Storage [here]
VirusScan for SAP [here]
VirusScan for Sharepoint [here]
VirusScan for Linux [here]
VirusScan for Email [Lotus / Exchange]
Product Page Datasheet Storage
Datasheet SAP
Datasheet Sharepoint
Datasheet Linux
Datasheet Email
McAfee Website
Free Trial Storage
McAfee VirusScanning for Server/Storage
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Threats are changing to more sophisticated advanced persistent threats (APTs) - Companies today dont know they are infected with stealth malware
Rootkits hide within the operating system (42 Rootkits in 2007; ~2 million in 2011)
Detection relies on up-to-date protection, but APTs are often zero day attacks
Removal requires extra tools/system rebuild Clean-up cost per endpoint ~ $500
Operates beyond the operating system Expose Hidden Threats Enhanced zero-day protection against Stealth techniques and
rootkits
Stop data Loss - detect malware early Provide a new vantage point on security - no place for stealth
attacks to hide
Lower costs - reduce downtime and clean-up costs Easy deployment and management Real-Time protection of MBR, BIOS and Kernel
NO
All major competitors Symantec, Trend, Sophos, Kaspersky, CA, etc.
rely on detection and removal by software running above the
operating system or with standalone tools this approach results in the problem statement
Have you heard about the latest threats such as NightDragon, Suxnet and Shady Rat?
Are you using Intel Core i3, i5 or i7 chips? How do you check for rootkits? Have you experienced rootkit infection? Has your AV product been able to remove the rootkit natively? How easy has removal been?
Version: 1.6
Supported OS: [here]
Supports Intel Core i3, i5, and i7 processors
Release Notes
Product Page
Sales Play
Datasheet
Presentation
Whitepaper: Paradigm Shift
AV Test Report
Technical Product Documentation
McAfee Website
Free Trial
Video
Best Practice Guide
McAfee Deep Defender
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
VirusScan signatures alone is not good enough anymore Better Zero-Day protection Patching is costly, time consuming and difficult to achieve Unpatched systems introduce weaknesses that AntiVirus alone
cannot mitigate
Many high profile attacks rely on unpatched vulnerabilities Host firewalls are complex to configure, with risk of denying
access to legitimate traffic
Gain behavioral protection against 95% of vulnerabilities with no configuration updates required (no signatures)
Closes the threat window with up-to-date, reputation-based intelligence about bad network connections (GTI integration)
Protects desktops and servers against botnets and DDoS attacks Patch endpoints less frequently and with less urgency Manage compliance with easy to-understand actionable views,
workflow, event monitoring, and reporting
ThirdBrigade Deep Security Host IPS IBM Proventia Cisco CSA End of Life Symantec Sophos
How often do you patch? How long does it take you to patch? How much does out of band patching cost? How do you protect unpatched systems? How do you lock down access to critical or vulnerable resoucres
Version: 8.0 Patch 3
Supported OS: [here] Product Page
Sales Play
Datasheet HIPS for Desktops
Datasheet HIPS for Server
Presentation
Whitepaper: HIPS in a Day
Technical Product Documentation
McAfee Website
Free Trial
McAfee Host IPS
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Legacy devices with costly support and no protection/patches available
Fixed resource systems that cannot use conventional security technology i.e. AV
Dealing with zero day threats and the operational cost of clean ups
Cost associated with testing of AV signatures and ops management
Protect against zero-day and advanced persistent threats without signature updates
Strengthen security, improve performance and lower ownership costs with dynamic whitelisting
Efficiently control application access with McAfee ePO softwares centralized management platform
Reduce patch cycles through secure whitelisting and advanced memory protection
Secure critical systems and legacy systems (W2k or XP)
Bit9 [here] Microsoft [here] Lumension
Do you have any Legacy apps / systems? Do you have systems with limited resources or that cannot run
traditional security i.e. Utility, Medical devices, ATMs, POS, etc How often do you need to patch? Are you concerned about the impact of zero day threats on your
organisation?
How do you protect critical servers and infrastructure?
Version: 6.1
Supported OS: [here]
Linux, Solaris, Windows
Product Page
Sales Play
Datasheet
Presentation
WP: Evolving Desktop Secuirty
WP: Securing Fixed Devices
Technical Product Documentation
McAfee Website
Free Trial
WP: Securing evolving Datacenter
Video
Best Practice Guide
McAfee Application Control
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Visibility - Who, What, When = Impact? Ineffective Security Reactive, Manual, Point Solutions Reduced Availability & Compliance Configuration errors = 60-65% downtime rising to 80% (Gartner &
Forrester)
Reactive Compliance
Monitor - Continuous visibility Assess - Track work flow and record change details Enforce - Authorised changes Value - Increased ROI (reduced OPEX) Upsell DAM & App Control Sell primarily to Operations & IT Security is Tier II
TripWire [here] Visibility but no control Continuous monitoring limited to Windows only Position Config Control Suite
LogRhythm & Splunk Integrity monitoring (free) & basic scheduled scanning Not core focus, focus on log management
Downtime incurred by software changes? Compliance violations or fines? Manual change control? Visibility of all changes? Monitor effectiveness of change controls?
Version: 6.1
Supported OS: [here]
Linux, Solaris, Windows,
AIX, HP-UX
Product Page
Sales Play
Datasheet
Presentation
WP: Continous Compliance
Technical Product Documentation
McAfee Website
Free Trial
Whitepaper on Website
McAfee Change Control
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Minimize performance impact of security scanning if you install 10 times AV in 10 virtual sessions this will 10 times impact the
physical hypervisor performance
Virtualized environments are difficult to predict load and capacity plan
IT is striving to make the most efficient utilization of high cost infrastructure
Update DAT files in virtual session, e.g. Non-Persitent virtual sessions
Optimization of AV for virtual machines Offloads virus scanning and .DATs Provides 60% more VM density over traditionally deployed
security
Schedule scanning for servers based on load of the hypervisor and other parameters
MOVE is the ONLY product providing 3 deployement options: 1. Multi Platform, 2. Agentless (vShield only), 3. Offline Scanning
Trend Symantec Kaspersky
Additional, Minimal, or Optimal? Is Security causing performance impact in your virtual
environment?
Is your security team involved in your Virtualization Project? Are you using VirusScan in your virtual Session? Which Hypervisors are you using, e.g. Vmware, Citrix, Microsoft
HyperV?
Version: 2.6
Supported OS: [here]
Product Page
Sales Play
Datasheet
Presentation
Solution Brief
Datacenter Security
Technical Product Documentation
McAfee Website
Whitepaper on Website
Free Trial
Video: Why MOVE
McAfee MOVE AV
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Secure mobile data: Protect confidential data from unauthorized access and exposure that may result in data loss/breach
Compliance Reporting Data breach law compliance: Data breach and privacy laws
require public disclosure of data loss events and can impose
significant financial penalties
Full Disk Encryption to secures data on desktops, laptops as well as MAC OS based systems
Integration with ePO Deep Command to provide secure Wake-On-Lan
Single-Sign-On with Windows Smart Card and PKI Support in PreBoot The last 5 years clear leader in the Gartner Magic Quadrant Support for Endpoint Encryption GO diagnostics reporting plugin for
ePO
Checkpoint [here] Sophos Symantec [here] Microsoft BitLocker [here] PGP
Do you have to comply with data breach or privacy laws? Does you know where your sensitive data resides? Have any of your employees had their device lost or stolen? Would you like to reduce the burden of audit by being able to
prove compliance more easily?
How do you protect data on removable media?
Version: 7.1
Support Windows [here]
Support MAC OS [here]
Product Page
Sales Play
Datasheet
Presentation
Gartner Report
Technical Product Documentation
McAfee Website
Export Regulation
FIPS Certification
CCEAL 4 Certification
Customer Stories Website
McAfee Drive Encryption
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
System Administrator can access all data on the network and file servers
Secure mobile data: Protect confidential data from unauthorized access and exposure that may result in data loss/breach
Compliance Reporting Data breach law compliance: Data breach and privacy laws
require public disclosure of data loss events and can impose
significant financial penalties
Policy based encryption of files&folders on file servers as well as locally
Transparent Encryption of any removable media no admin rights or software installtion required device can be used any time and anywhere
Persistent encryption to safeguard sensitive data wherever it goes (file & folder)
Integration with DLP Endpoint to enforce encryption of sensitive data (rule based)
Checkpoint [here] Sophos Symantec [here] Microsoft [here] PGP
Do you have to comply with data breach or privacy laws? Does you know where your sensitive data resides? Have any of your employees had their device lost or stolen? Would you like to reduce the burden of audit by being able to
prove compliance more easily?
How do you protect data on removable media?
Version: 4.1
Supported OS: [here] Product Page
Sales Play
Datasheet
Technical Product Documentation
McAfee Website
Export Regulation
McAfee Endpoint Encryption for File/Folder
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Patching of 100s or 1000s of database is a painful job Databases are often not patched Patching needs DOWNTIME and TESTING Releasing a new patch by the vendor increases the knowledge
about vulnerabilities
Patches are only provided for supported releases
Protects vulnerabilities of the database against attacks Reports attacks against the database Old and unsupported database versions are also protected More than 430 rules available Ready-To-Run immediate after installing the software NO downtime of the database during install and update
Imperva Guardium (IBM) [here]
Do you install the patches in time? Are there unsupported (old) database versions running? How long does it take to patch all the databases?
Version: 4.3
Supported OS: [here] Product Page
Sales Play
Datasheet
Presentation
WP: Overcoming Patching
Challenges
Technical Product Documentation
McAfee Website
SC Magazine Award
2013
Free Trial
McAfee Virtual Patching for Databases
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Not enough knowledge about who is accessing the data Unauthorized or undesired access to the database Customer is not able to patch all the databases timely Customer need to be compliant
Protecting the customers most valuable data stored in databases Detect and/or prevent unauthorized access to the database Virtual Patching allows a better planning for patching and reduce
the need to patch
Helps to enforce Compliance in the database (PCI-DSS, HIPAA, SOX ...)
Auditing accessing or modifying data Flexible reporting for Auditors, Security Team, Management
Oracle needs a specific server for scanning the network traffic [here]
Imperva networkbased appliance Guardium (IBM) networkbased appliance [here]
All of them see the incoming SQL-Statement, McAfee DAM sees also the targeted objects inside the database
Where are the sensitive data? Do you install all the patches after they are released by the
vendor?
Do you use databases which are not longer supported by the vendor?
Do you get any info or alert, when a high priviliged user (e.g. Database Administraor) accesses data he should nnot access?
Are your databases compliant?
Version: 4.3
Supported OS: [here] Product Page
Sales Play
Datasheet
Presentation
Technical Product Documentation
McAfee Website
Free Tria
Video l
McAfee Database Activity Monitoring
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
In huge environments with 100s or 1000s of database there is often no knowledge about the exact number of database
Database often are not compliant to internal or external regulation Senesitive data (password, credit card number, PII) is often
located in many database
Database are often installed in different ways, some are secure others not
Offers an exact overview about configuration and status of the scanned databases
Reports can used as TO DO for the DBA FIX Scripts helps the DBA Reporting: Patch Level, unsecure configuration, violation of
regulations, vulnerabilites, sensitive data ...
Reporting to: Management, Auditor, Security Staff and DBAs More than 4.200 single cheks Customer checks for specific requirenments
Application Security Imperva Guardium (IBM) [here] Next Generation Security
Where are the sensitive data? Are there accounts with weak or default password? Do you know all you DBAs or are there DBA-accounts in the
database you dont know? Are backdoors installed inside the database? Is the database well configured? Are the databases patched? What about the patch level? Is there vulnerable program code inside the database?
Version: 4.3
Supported OS: [here]
Product Page
Sales Play
Datasheet
Presentation
Whitepaper Website
Technical Product Documentation
McAfee Website
Free Trial
Video
McAfee Vulnerability Scan for Databases
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Management complexity from siloed security, compliance tools and processes
High operational costs to implement and maintain policies and protections
Low visibility of IT security posture slows remediation and reporting times, increasing risk
End-to-end visibility with single point of reference for security and compliance across IT infrastructure
Extensible framework that integrates with critical enterprise infrastructure, such as Microsoft Active Directory and Service Desk
solutions
Actionable reporting and event handling with an automated response system to streamline event management and common
tasks
Supercharge ePO ePO Deep Command out-of-band management and Real-Time for ePO to real-time visibility and action
n/a How many management and reporting tools do you use to manage security across your enterprise?
When Microsoft (or another critical software or infrastructure vendor) announces a vulnerability, how do you know all of your
systems are up to date?
How do you get the status of your internal or regulatory policy compliance across your entire infrastructure?
How much time do you spend performing every day tasks that could be automated?
Version: 5.0
Supported Products:
ePO 4.6 [here]
ePO 5.0 [here]
Product Page
Sales Play Security
Connected
Datasheet
Presentation incl Real-Time
WP: Optimize Security
Management with ePO
Technical Product Documentation
McAfee Website
Whitepaper on Website
Free Trial
eASI Suite Installer Setup
Guide
McAfee ePolicy Orchestrator (ePO)
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Real-time visibility Instant control and protection Address security issues as events are happening Ascertain Who uses what quickly Simplify compliance
Instant information provides visibility into the security state and health of McAfee products on even large numbers of endpoints
Real-Time actions help ensure that defenses are installed, running, correctly configured, and up to date
An efficient architecture routes around bottlenecks to scale visibility, updates, and control to large networks
Proactive security management replaces check box compliance Fully integrated into McAfee ePO
No other vendor can offer this kind of real-time visibility and action Show me systems where scanning is taking over x percent of the processor?
Get McAfee HIPS Status from all machines Which McAfee Agents have errors or are not responding? Which systems do not have [McAfee Product] installed? When did this system check in last?
Version: 1.0.1
Support ePO 4.6.6 and
above, McAfee Agent
4.6.6 and above
Product Page Datasheet
Presentation
Technical Product Documentation
FAQ
McAfee Real-Time for ePO
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
Cost of Desk-Side IT Visit Increase Operational Costs; Up to $250/Visit
Endpoint PCs Must Be Resilient and Always Available for End Users
Fast Threat Propagation Requires Quicker Security Policy Deployment
Green & Clean Power Initiatives Limit Access for Security Updates
Protect endpoints ahead of emerging threats Connect to the disabled PC via Intel AMT, whether the PC is
local or remote
Security maintenance or time-intensive tasks during off hours without impacting productivity using the AMT Alarm Clock
Wake PCs, update policies, and return them to lower power states to save energy Green IT
Use the McAfee ePO Deep Command Discovery and Reporting module to discover Intel vPro AMT-capable PCs in your
environment
Symantec Altiris IBM LanDesk
Does your company look into green IT initiatives to reduce power costs?
How many endpoints in your environment are using Intel Core vPro equipped?
What percentage of your endpoints are powered off during off hours?
What version of ePO do you have deployed? How many of your employees are remote or SOHO tele-workers? Is your company global with many offices around the world?
Version: 2.0 NEW
Supported OS: [here]
Release Notes
Product Page Datasheet
Presentation
Whitepaper on Website
Technical Product Documentation
Demo Video
Video EEPC Remote Unlock
Video EEPC Pwd Reset
McAfee ePO Deep Command
-
USEFUL LINKS
CUSTOMER PROBLEM
PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING
COMPETITON
VALUE PROPOSITION
QUESTIONS TO ASK
McAfee Labs detects 130.000 new threats every single day Threats now multiply and morph faster than ever which dictates
against simply signature based defense mechanisms from
identifying new, or zero-day threats
Singature based protection alone cannot protect organization effectively against the maware explosion
Improved detection of new and zero day threats due to the real time responsiveness of the GTI cloud based reputation services (4
Billion queries each day)
150 Million Endpoint & Network Sensors Detection of blended threats across all vectorsfile, web, email,
and network
The most comprehensive reputation systems in the industry providing reputation and predictive detection across spam,
outbound web, malware, IP, and other threat vectors
All major competitors have a cloud based repution service today. However McAfee is still the only vendor which offers all
repution vectors such as file, web, email and network in one
single integrated Cloud. Every product in McAfee can learn and
participate from each other
How do you protect your organization against zero-day attacks? Are all your DAT files up to date each day? Do you spend too much time reacting to vulnerability and threat
alerts/incidents?
How do you prioritize remediation activities with thousands of malware samples identified each day and thousands of exploitable
application vulnerabilities identified each year?
Version: Proxy 2.0 Patch 1
Release Notes Product Page Datasheet GTI Proxy
Presentation GTI Proxy
Presentation McAfee Labs
Technical Product Documentation
FAQ
Threat Center
McAfee Global Threat Intelligence (GTI)