Sie sind auf Seite 1von 22

Complete Endpoint Protection [here]

Complete Endpoint Protection SaaS [here]


McAfee VirusScan Enterprise [here]
McAfee VirusScan for Server/Storage [here]
McAfee Deep Defender [here]
McAfee HIPS [here]
McAfee Application Control [here]
McAfee Change Control [here]
McAfee MOVE AV [here]
McAfee Drive Encryption [here]
McAfee Endpoint Encryption for File/Folder [here]
McAfee Virtual Patching for Databases [here]
McAfee Database Activity Monitoring [here]
McAfee Vulnerability Scan for Databases [here]
McAfee ePolicy Orchestrator (ePO) [here]
McAfee Real-Time for ePO [here]
McAfee ePO Deep Command [here]
McAfee Global Threat Intelligence (GTI) [here]



McAfee Complete Endpoint Security
All you need to know in one place
McAfee Endpoint Security
Educational Tools Customer facing
Why do we need more than AntiVirus? Explain Customers the Need for an Defense in Depth approach...
Anatomy of Every Attack 4 Phases Concept [here]
Aberdeen Group WP: Endpoint Security: Anti-Virus Alone is Not Enough [here]
McAfee Solution Brief: The Evolving Landscape of Desktop Security [here]
The Paradigm Shift Why do we need hardware assited Security [here]
Root out Rootkits An inside look at Deep Defender [here]
Fighting Rootkits Blueprint Level 3 [here]
Whitepaper HIPS in a Day Which value can we deliver in one day [here]
Gartner Endpoint Protection Buyers Guide [here]

Why not choose Microsoft?
IT-Harvest WP: VALUE AND COST ANALYSIS of Microsoft Endpoint Protection Versus Best of Breed Solutions [here]
Email Template for customer considering Microsoft Forefront [here]
The Best Way to protect Windows 8 [here]

Detection Rates
NSS Test Lab Exploit Report [here]
NSS Test Lab Exploit Evasion Report [here]
AV-Test.org Rootkit Protection Report [here]

Where to find Release Notes, Admin Guides, Best Practice Guides?
Technical Product Documentation [here]
McAfee Products
Endpoint
Protection
(EPS)
Endpoint
Advanced
(EPA)
Complete
Enterprise
(CEE>1000)
Complete
Business
(CEB<1000)
McAfee ePolicy Orchestrator (ePO - Security Management Platform)
Anti-Virus / Antispyware (Windows for Desktop and Server)
Anti-Virus Multiplatform (MAC / Linux / Unix for Desktop only) NEW NEW
Anti-Virus for Storage Servers (NAP)
Anti-Virus for SharePoint
Deep Defender (Desktop and Server)
NEW
NEW NEW
Desktop Firewall
Host IPS (Desktop)
Access Protection & Application Blocking (build-in VSE and HIPS)
Application Control (Desktop)
NEW
NEW
Safe Search (SiteAdvisor Enterprise incl. Web Filter Endpoint)
Security for Email Servers (Microsoft Exchange and Lotus Domino)
Device Control
Full Disk Encryption (Windows / MAC)
Endpoint Encryption for File & Folder NEW
EMM & Secure Container (Android) & VirusScan Mobile (Android)
NEW
NEW NEW
Real-Time for ePO
NEW
NEW NEW NEW NEW
ePO Deep Command Discovery
Risk Advisor
NEW
NEW
Complete Endpoint Protection Suites
McAfee Products
Security Suite
for
Server
Security Suite for
Server Hypervisor
Edition
Security Suite
for Virtual
Infrastructure
Security Suite
for
Databases
McAfee ePolicy Orchestrator (ePO - Security Management Platform)
McAfee VirusScan Enterprise
McAfee VirusScan Enterprise Linux (Desktop)
McAfee VirusScan Enterprise Linux (Server)
McAfee Application Control (Desktop)
McAfee Application Control (Server)

McAfee MOVE Virtual Desktop Infrastructure
McAfee Database Activity Monitor
McAfee Database Vulnerability Monitor
Licensed Server Hypervisor Virtual Desktop Database
Complete Datacenter Protection Suites
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


Reduce management, license and infrastructure cost
Reduce urgency of patching
Streamlining event management and escalations
Streamlining compliance reporting / analytics / trending

A single platform to secure Desktops to Datacenters
Security technology that protects from Chip to Cloud
Context awareness across Data, Devices and Applications
Single, integrated management console and single client agent
(reduce TCO)
Proactive and real-time malware detection and True behavioral host
based IPS
Proven and robust technology protects 150 Mio. Endpoints

Symantec [here]
Trend [here]
Sophos [here]
Microsoft [here]
Kaspersky [here]
Reduce management, license and infrastructure cost
Reduce urgency of patching
Streamlining event management and escalations
Streamlining compliance reporting / analytics / trending

Version: 9.0
Supported OS: [here]

Product Page
Endpoint Suite FAQ
Sales Play
Sales Play Competitve

Datasheet Complete Enterprise
Datashet Complete Business
Endpoint Presentation
McAfee Website
NSS Labs Test Report
AV-Test.org Rootkit Test
Gartner Buyers Guide
Free Trial CEE Suite
Complete Endpoint Protection Suites
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


Endpoint security against constantly evolving threats without
complex management
Reduce time and IT costs as economic factors that limit IT
personnel.
View, report, and enforce policies on all users in the environment
without maintaining multiple management consoles
Apply same security to mobile users

Always on guard endpoint security
Real-time protection from the Cloud
Best-In-Class availability - McAfee SaaS infrastructure provides
99.98% availability, ensures reliability, and reduces the need for
additional security management software, hardware, support, or
dedicated IT staff

Symantec has separate management console not integrated with
their existing Hosted Email protection
Trend does not offer integration with email, web, or vulnerability
management protection.
Trend has three offerings in three consoles

How much time is spent per week on your security?
How well do your existing tools let you report on your risk
exposure?
How much onsite hardware and software do you have to manage
security?
What process do you have to ensure protection to all users?

Version: 6.0
Supported OS: [here]
Whats New [here]
Product Page
SaaS Endpoint Presentation
SaaS Endpoint FAQ
SaaS Call Script
Sales Play
Datasheet SaaS Endpoint
SaaS Solution Brief
McAfee Website
Free Trial
Complete Endpoint Protection - SaaS
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


McAfee discovers approx. 120.000 new threats each day
customer have the challenge to update all endpoints in time
Traditional VSE is resource intensive and working signature
based only
Protect your organization more efficient against zero day attacks

Maximum defense against malware
Proactive protection from attacks through Real-time scanning
Centralized Management and integration with other endpoint
technologies
Low impact on performance with VSE 8.8
Enhanced security powered by McAfee Global Threat Intelligence

Symantec [here]
Trend [here]
Sophos [here]
Microsoft [here]
Kaspersky [here]

Does your current solution provide behavioral zero day
protection?
Is your current antimalware solution slowing your systems to a
halt when doing on demand scans?
Does your current solution report on other point products as well?
How much time is spent managing your current AV solution?

Version: 8.8 Patch 3
Support Windows [here]
Support Linux [here]
Support MAC [here]
Release Notes

Product Page Datasheet Complete Enterprise
Datashet Complete Business
Endpoint Presentation
Technical Product Documentation

McAfee Website

McAfee VirusScan Enterprise
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


Malware within Microsoft Excahnge and Lotus Domino mail
servers, Microsoft Sharepoint and SAP NetWeaver applications
may not be detected by file system scanner
How to detect and protect hardware NetApp filers and Sun
StorageTek NAS
Malware detection on each client is less effiecient than central
scanning

Provide scanning, cleaning, protection and assurance that mail
systems and applications are clean and safe
Protect storage hardware centrally
Aviod the need to rely on endpoint protection only

Symantec
Trend
Kaspersky
Sophos
AVG

Are you looking to offer additional protection to mail systems,
applications and storage?
Are you looking to integrate management and reporting of this
solutions into existing McAfee endpoint protection?

VirusScan for Storage [here]
VirusScan for SAP [here]
VirusScan for Sharepoint [here]
VirusScan for Linux [here]
VirusScan for Email [Lotus / Exchange]

Product Page Datasheet Storage
Datasheet SAP
Datasheet Sharepoint
Datasheet Linux
Datasheet Email

McAfee Website
Free Trial Storage
McAfee VirusScanning for Server/Storage

USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


Threats are changing to more sophisticated advanced persistent
threats (APTs) - Companies today dont know they are infected
with stealth malware
Rootkits hide within the operating system (42 Rootkits in 2007; ~2
million in 2011)
Detection relies on up-to-date protection, but APTs are often zero
day attacks
Removal requires extra tools/system rebuild
Clean-up cost per endpoint ~ $500

Operates beyond the operating system
Expose Hidden Threats
Enhanced zero-day protection against Stealth techniques and
rootkits
Stop data Loss - detect malware early
Provide a new vantage point on security - no place for stealth
attacks to hide
Lower costs - reduce downtime and clean-up costs
Easy deployment and management
Real-Time protection of MBR, BIOS and Kernel
NO

All major competitors Symantec, Trend, Sophos, Kaspersky, CA, etc.
rely on detection and removal by software running above the
operating system or with standalone tools this approach results in
the problem statement

Have you heard about the latest threats such as NightDragon,
Suxnet and Shady Rat?
Are you using Intel Core i3, i5 or i7 chips?
How do you check for rootkits?
Have you experienced rootkit infection?
Has your AV product been able to remove the rootkit natively?
How easy has removal been?

Version: 1.6
Supported OS: [here]
Supports Intel Core
i3, i5, and i7 processors
Release Notes

Product Page
Sales Play
Datasheet
Presentation
Whitepaper: Paradigm Shift
AV Test Report
Technical Product Documentation
McAfee Website
Free Trial
Video
Best Practice Guide

McAfee Deep Defender
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


VirusScan signatures alone is not good enough anymore
Better Zero-Day protection
Patching is costly, time consuming and difficult to achieve
Unpatched systems introduce weaknesses that AntiVirus alone
cannot mitigate
Many high profile attacks rely on unpatched vulnerabilities
Host firewalls are complex to configure, with risk of denying
access to legitimate traffic

Gain behavioral protection against 95% of vulnerabilities with no
configuration updates required (no signatures)
Closes the threat window with up-to-date, reputation-based
intelligence about bad network connections (GTI integration)
Protects desktops and servers against botnets and DDoS attacks
Patch endpoints less frequently and with less urgency
Manage compliance with easy to-understand actionable views,
workflow, event monitoring, and reporting
ThirdBrigade Deep Security Host IPS
IBM Proventia
Cisco CSA End of Life
Symantec
Sophos

How often do you patch?
How long does it take you to patch?
How much does out of band patching cost?
How do you protect unpatched systems?
How do you lock down access to critical or vulnerable resoucres

Version: 8.0 Patch 3
Supported OS: [here]
Product Page
Sales Play
Datasheet HIPS for Desktops
Datasheet HIPS for Server
Presentation
Whitepaper: HIPS in a Day
Technical Product Documentation


McAfee Website
Free Trial
McAfee Host IPS
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


Legacy devices with costly support and no protection/patches
available
Fixed resource systems that cannot use conventional security
technology i.e. AV
Dealing with zero day threats and the operational cost of clean
ups
Cost associated with testing of AV signatures and ops
management

Protect against zero-day and advanced persistent threats without
signature updates
Strengthen security, improve performance and lower ownership costs
with dynamic whitelisting
Efficiently control application access with McAfee ePO softwares
centralized management platform
Reduce patch cycles through secure whitelisting and advanced
memory protection
Secure critical systems and legacy systems (W2k or XP)

Bit9 [here]
Microsoft [here]
Lumension

Do you have any Legacy apps / systems?
Do you have systems with limited resources or that cannot run
traditional security i.e. Utility, Medical devices, ATMs, POS, etc
How often do you need to patch?
Are you concerned about the impact of zero day threats on your
organisation?
How do you protect critical servers and infrastructure?

Version: 6.1
Supported OS: [here]
Linux, Solaris, Windows

Product Page
Sales Play
Datasheet
Presentation
WP: Evolving Desktop Secuirty
WP: Securing Fixed Devices
Technical Product Documentation
McAfee Website
Free Trial
WP: Securing evolving Datacenter
Video
Best Practice Guide

McAfee Application Control
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


Visibility - Who, What, When = Impact?
Ineffective Security Reactive, Manual, Point Solutions
Reduced Availability & Compliance
Configuration errors = 60-65% downtime rising to 80% (Gartner &
Forrester)
Reactive Compliance

Monitor - Continuous visibility
Assess - Track work flow and record change details
Enforce - Authorised changes
Value - Increased ROI (reduced OPEX)
Upsell DAM & App Control
Sell primarily to Operations & IT Security is Tier II

TripWire [here]
Visibility but no control
Continuous monitoring limited to Windows only
Position Config Control Suite
LogRhythm & Splunk
Integrity monitoring (free) & basic scheduled scanning
Not core focus, focus on log management

Downtime incurred by software changes?
Compliance violations or fines?
Manual change control?
Visibility of all changes?
Monitor effectiveness of change controls?

Version: 6.1
Supported OS: [here]
Linux, Solaris, Windows,
AIX, HP-UX
Product Page
Sales Play
Datasheet
Presentation
WP: Continous Compliance
Technical Product Documentation
McAfee Website
Free Trial
Whitepaper on Website
McAfee Change Control
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


Minimize performance impact of security scanning if you install
10 times AV in 10 virtual sessions this will 10 times impact the
physical hypervisor performance
Virtualized environments are difficult to predict load and capacity
plan
IT is striving to make the most efficient utilization of high cost
infrastructure
Update DAT files in virtual session, e.g. Non-Persitent virtual
sessions

Optimization of AV for virtual machines
Offloads virus scanning and .DATs
Provides 60% more VM density over traditionally deployed
security
Schedule scanning for servers based on load of the hypervisor
and other parameters
MOVE is the ONLY product providing 3 deployement options:
1. Multi Platform, 2. Agentless (vShield only), 3. Offline Scanning

Trend
Symantec
Kaspersky

Additional, Minimal, or Optimal?
Is Security causing performance impact in your virtual
environment?
Is your security team involved in your Virtualization Project?
Are you using VirusScan in your virtual Session?
Which Hypervisors are you using, e.g. Vmware, Citrix, Microsoft
HyperV?

Version: 2.6
Supported OS: [here]

Product Page
Sales Play
Datasheet
Presentation
Solution Brief
Datacenter Security
Technical Product Documentation
McAfee Website
Whitepaper on Website
Free Trial
Video: Why MOVE
McAfee MOVE AV
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


Secure mobile data: Protect confidential data from unauthorized
access and exposure that may result in data loss/breach
Compliance Reporting
Data breach law compliance: Data breach and privacy laws
require public disclosure of data loss events and can impose
significant financial penalties
Full Disk Encryption to secures data on desktops, laptops as well
as MAC OS based systems
Integration with ePO Deep Command to provide secure Wake-
On-Lan
Single-Sign-On with Windows
Smart Card and PKI Support in PreBoot
The last 5 years clear leader in the Gartner Magic Quadrant
Support for Endpoint Encryption GO diagnostics reporting plugin for
ePO
Checkpoint [here]
Sophos
Symantec [here]
Microsoft BitLocker [here]
PGP

Do you have to comply with data breach or privacy laws?
Does you know where your sensitive data resides?
Have any of your employees had their device lost or stolen?
Would you like to reduce the burden of audit by being able to
prove compliance more easily?
How do you protect data on removable media?

Version: 7.1
Support Windows [here]
Support MAC OS [here]

Product Page
Sales Play

Datasheet
Presentation
Gartner Report
Technical Product Documentation




McAfee Website
Export Regulation
FIPS Certification
CCEAL 4 Certification
Customer Stories Website


McAfee Drive Encryption
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


System Administrator can access all data on the network and file
servers
Secure mobile data: Protect confidential data from unauthorized
access and exposure that may result in data loss/breach
Compliance Reporting
Data breach law compliance: Data breach and privacy laws
require public disclosure of data loss events and can impose
significant financial penalties

Policy based encryption of files&folders on file servers as well as
locally
Transparent Encryption of any removable media no admin
rights or software installtion required device can be used any
time and anywhere
Persistent encryption to safeguard sensitive data wherever it goes
(file & folder)
Integration with DLP Endpoint to enforce encryption of sensitive
data (rule based)

Checkpoint [here]
Sophos
Symantec [here]
Microsoft [here]
PGP

Do you have to comply with data breach or privacy laws?
Does you know where your sensitive data resides?
Have any of your employees had their device lost or stolen?
Would you like to reduce the burden of audit by being able to
prove compliance more easily?
How do you protect data on removable media?

Version: 4.1
Supported OS: [here]
Product Page
Sales Play
Datasheet
Technical Product Documentation


McAfee Website
Export Regulation


McAfee Endpoint Encryption for File/Folder
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


Patching of 100s or 1000s of database is a painful job
Databases are often not patched
Patching needs DOWNTIME and TESTING
Releasing a new patch by the vendor increases the knowledge
about vulnerabilities
Patches are only provided for supported releases

Protects vulnerabilities of the database against attacks
Reports attacks against the database
Old and unsupported database versions are also protected
More than 430 rules available
Ready-To-Run immediate after installing the software
NO downtime of the database during install and update

Imperva
Guardium (IBM) [here]

Do you install the patches in time?
Are there unsupported (old) database versions running?
How long does it take to patch all the databases?

Version: 4.3
Supported OS: [here]
Product Page
Sales Play
Datasheet
Presentation
WP: Overcoming Patching
Challenges
Technical Product Documentation


McAfee Website
SC Magazine Award
2013
Free Trial
McAfee Virtual Patching for Databases
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


Not enough knowledge about who is accessing the data
Unauthorized or undesired access to the database
Customer is not able to patch all the databases timely
Customer need to be compliant

Protecting the customers most valuable data stored in databases
Detect and/or prevent unauthorized access to the database
Virtual Patching allows a better planning for patching and reduce
the need to patch
Helps to enforce Compliance in the database (PCI-DSS, HIPAA,
SOX ...)
Auditing accessing or modifying data
Flexible reporting for Auditors, Security Team, Management


Oracle needs a specific server for scanning the network traffic
[here]
Imperva networkbased appliance
Guardium (IBM) networkbased appliance [here]

All of them see the incoming SQL-Statement, McAfee DAM
sees also the targeted objects inside the database

Where are the sensitive data?
Do you install all the patches after they are released by the
vendor?
Do you use databases which are not longer supported by the
vendor?
Do you get any info or alert, when a high priviliged user (e.g.
Database Administraor) accesses data he should nnot access?
Are your databases compliant?

Version: 4.3
Supported OS: [here]
Product Page
Sales Play
Datasheet
Presentation
Technical Product Documentation

McAfee Website
Free Tria
Video l
McAfee Database Activity Monitoring
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


In huge environments with 100s or 1000s of database there is
often no knowledge about the exact number of database
Database often are not compliant to internal or external regulation
Senesitive data (password, credit card number, PII) is often
located in many database
Database are often installed in different ways, some are secure
others not




Offers an exact overview about configuration and status of the
scanned databases
Reports can used as TO DO for the DBA
FIX Scripts helps the DBA
Reporting: Patch Level, unsecure configuration, violation of
regulations, vulnerabilites, sensitive data ...
Reporting to: Management, Auditor, Security Staff and DBAs
More than 4.200 single cheks
Customer checks for specific requirenments

Application Security
Imperva
Guardium (IBM) [here]
Next Generation Security

Where are the sensitive data?
Are there accounts with weak or default password?
Do you know all you DBAs or are there DBA-accounts in the
database you dont know?
Are backdoors installed inside the database?
Is the database well configured?
Are the databases patched?
What about the patch level?
Is there vulnerable program code inside the database?

Version: 4.3
Supported OS: [here]

Product Page
Sales Play

Datasheet
Presentation
Whitepaper Website
Technical Product Documentation

McAfee Website
Free Trial
Video
McAfee Vulnerability Scan for Databases
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


Management complexity from siloed security, compliance tools
and processes
High operational costs to implement and maintain policies and
protections
Low visibility of IT security posture slows remediation and
reporting times, increasing risk


End-to-end visibility with single point of reference for security and
compliance across IT infrastructure
Extensible framework that integrates with critical enterprise
infrastructure, such as Microsoft Active Directory and Service Desk
solutions
Actionable reporting and event handling with an automated
response system to streamline event management and common
tasks
Supercharge ePO ePO Deep Command out-of-band management
and Real-Time for ePO to real-time visibility and action
n/a How many management and reporting tools do you use to
manage security across your enterprise?
When Microsoft (or another critical software or infrastructure
vendor) announces a vulnerability, how do you know all of your
systems are up to date?
How do you get the status of your internal or regulatory policy
compliance across your entire infrastructure?
How much time do you spend performing every day tasks that
could be automated?
Version: 5.0
Supported Products:
ePO 4.6 [here]
ePO 5.0 [here]
Product Page
Sales Play Security
Connected

Datasheet
Presentation incl Real-Time
WP: Optimize Security
Management with ePO
Technical Product Documentation
McAfee Website
Whitepaper on Website
Free Trial
eASI Suite Installer Setup
Guide

McAfee ePolicy Orchestrator (ePO)
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


Real-time visibility
Instant control and protection
Address security issues as events are happening
Ascertain Who uses what quickly
Simplify compliance


Instant information provides visibility into the security state and
health of McAfee products on even large numbers of endpoints
Real-Time actions help ensure that defenses are installed,
running, correctly configured, and up to date
An efficient architecture routes around bottlenecks to scale
visibility, updates, and control to large networks
Proactive security management replaces check box compliance
Fully integrated into McAfee ePO
No other vendor can offer this kind of real-time visibility and action Show me systems where scanning is taking over x percent of the
processor?
Get McAfee HIPS Status from all machines
Which McAfee Agents have errors or are not responding?
Which systems do not have [McAfee Product] installed?
When did this system check in last?

Version: 1.0.1
Support ePO 4.6.6 and
above, McAfee Agent
4.6.6 and above

Product Page Datasheet
Presentation
Technical Product Documentation

FAQ

McAfee Real-Time for ePO
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


Cost of Desk-Side IT Visit Increase Operational Costs; Up to
$250/Visit
Endpoint PCs Must Be Resilient and Always Available for End
Users
Fast Threat Propagation Requires Quicker Security Policy
Deployment
Green & Clean Power Initiatives Limit Access for Security
Updates

Protect endpoints ahead of emerging threats
Connect to the disabled PC via Intel AMT, whether the PC is
local or remote
Security maintenance or time-intensive tasks during off hours
without impacting productivity using the AMT Alarm Clock
Wake PCs, update policies, and return them to lower power states
to save energy Green IT
Use the McAfee ePO Deep Command Discovery and Reporting
module to discover Intel vPro AMT-capable PCs in your
environment

Symantec Altiris
IBM LanDesk

Does your company look into green IT initiatives to reduce power
costs?
How many endpoints in your environment are using Intel Core
vPro equipped?
What percentage of your endpoints are powered off during off
hours?
What version of ePO do you have deployed?
How many of your employees are remote or SOHO tele-workers?
Is your company global with many offices around the world?

Version: 2.0
NEW

Supported OS: [here]
Release Notes
Product Page Datasheet
Presentation
Whitepaper on Website
Technical Product Documentation

Demo Video
Video EEPC Remote Unlock
Video EEPC Pwd Reset

McAfee ePO Deep Command
USEFUL LINKS


CUSTOMER PROBLEM


PRODUCT INFO SMP LINKS OTHER CUSTOMER FACING


COMPETITON


VALUE PROPOSITION

QUESTIONS TO ASK


McAfee Labs detects 130.000 new threats every single day
Threats now multiply and morph faster than ever which dictates
against simply signature based defense mechanisms from
identifying new, or zero-day threats
Singature based protection alone cannot protect organization
effectively against the maware explosion
Improved detection of new and zero day threats due to the real
time responsiveness of the GTI cloud based reputation services (4
Billion queries each day)
150 Million Endpoint & Network Sensors
Detection of blended threats across all vectorsfile, web, email,
and network
The most comprehensive reputation systems in the industry
providing reputation and predictive detection across spam,
outbound web, malware, IP, and other threat vectors

All major competitors have a cloud based repution service today.
However McAfee is still the only vendor which offers all
repution vectors such as file, web, email and network in one
single integrated Cloud. Every product in McAfee can learn and
participate from each other
How do you protect your organization against zero-day attacks?
Are all your DAT files up to date each day?
Do you spend too much time reacting to vulnerability and threat
alerts/incidents?
How do you prioritize remediation activities with thousands of
malware samples identified each day and thousands of exploitable
application vulnerabilities identified each year?


Version: Proxy 2.0 Patch 1
Release Notes
Product Page Datasheet GTI Proxy
Presentation GTI Proxy
Presentation McAfee Labs
Technical Product Documentation
FAQ
Threat Center
McAfee Global Threat Intelligence (GTI)

Das könnte Ihnen auch gefallen