Complete Endpoint Protection

Download Report

Transcript Complete Endpoint Protection

Complete Endpoint Protection
Shakeel Ali, CISSP
Sales Engineer
Malware Continues to Grow…
New Malware Samples
14,000,000
New malware
samples grew 22%
from Q4’12 to Q1‘13
12,000,000
10,000,000
2012 new malware
sample discoveries
increased 50%
over 2011.
8,000,000
6,000,000
4,000,000
2,000,000
0
Q1
Q2
Q3
Q4
Q1
Q2
Q3
Q4 Q1
Q2
Q3
Q4
Q1
2010 2010 2010 2010 2011 2011 2011 2011 2012 2012 2012 2012 2013
Malware continues to grow and get more sophisticated…
2
Source: McAfee Labs ,2013
Four Phases of an Attack
Example: Fake AV
First
Contact
Local
Execution
Establish
Presence
Malicious
Activity
Physical Access
Exploit
Download Malware
Propagation
Unsolicited Message
Social Engineering
Escalate Privilege
Bot Activities
Adware and
Adware & Scareware
Scareware
Malicious Website
Configuration Error
Network Access
How the attacker first crosses
path with target.
3
How the attacker gets code
running first time on target
machine.
Persist on System
Identity and
Financial Fraud
Self-Preservation
Tampering
How the attacker persists code
on the system, to survive
reboot, stay hidden, hide from
user and security software.
The business logic, what the
attacker wants to accomplish,
steal passwords, bank fraud,
purchase Fake AV.
The Evolving Endpoint
Desktop
Servers
(Physical and Virtual)
Tablets
Smartphones
Laptop
Databases
ATM’s
Removable Media Storage
WORKSPACE
Storage
DATACENTER
Medical Devices
MOBILE AND FIXED
FUNCTION
Traditional Architecture for Endpoint Security
HIPS
Agent
DLP
Agent
Encryption
Antimalware
Agent
WhiteListing
Systems
Management
Agent
Mobile Devices
EVERY
SOLUTION HAS A
CONSOLE
EVERY
CONSOLE
REQUIRES
A SERVER
EVERY
SERVER REQUIRES
AN OS and a
Database
EVERY OS/DB REQUIRES
PEOPLE, MAINTENANCE,
PATCHING
WHERE DOES
IT END?
McAfee Endpoint Protection Platform Strategy
Complete Endpoint Security
Data Center
Embedded
Virtual
Server
Mobile
Laptop
Desktop
Desktop/Laptop
Windows Only
Blacklist Files
Focus on Devices
Static Device Policy
Disparate,
Disconnected Management
Unified Security
Operations
Security Information
and Events
Cloud
Application
Risk and Compliance
Database
OS
HW-Enhanced
FIRST-GENERATION
COMPLETE ENDPOINT SECURITY
4 Phase Protection Methods
First
Contact
Local
Execution
McAfee® SiteAdvisor®
Website Filtering
Establish
Presence
McAfee VirusScan® Enterprise
On-Access Scanning
McAfee Enterprise
Mobility Management
File Scanning
Database Vulnerability Blocking
McAfee Device Control
McAfee Deep Defender
Physical File Transfer
Rootkit Prevention
McAfee Desktop Firewall
McAfee Web Gateway and
McAfee Email Gateway
Web Filtering
Email Filtering
Write Blocking
McAfee Database Activity Monitor
Mobile Device Management
McAfee Desktop Firewall
Malicious
Activity
McAfee Host Intrusion Prevention
Behavioral Prevention
Buffer Overflow Prevention
McAfee Application Control for Servers or Desktops
Install and Execution Prevention
Change Protection
McAfee is a Proven Leader in Endpoint Security
Six Year Gartner Magic Quadrant
Leadership Track Record
• Superior Manageability with ePO
• Next Generation Endpoint Platform Vision
• Security Connected Vision
• Advancing Protection Rankings
• Comprehensive Solution Strength
• Intel / McAfee Together
Jan 2014
8
Complete Endpoint Protection—Enterprise
Complete Simplicity
•
•
•
•
•
Unified, open security management for all endpoints
One solution for PC, Mac, Linux, mobile or virtual
ePO Real Time makes data that was impossible to collect, possible
Turnkey simple installation in minutes
Use less resources to manage security with single console
Complete Performance
•
•
•
•
Security optimized for high performance across all platforms
Dynamic whitelisting offers a no-scanning, small desktop footprint
Real-time visibility reducing time to reaction by 10 to 1000 times
Smart scanning technology optimizes CPU and memory usage
Endpoint Protection
Windows & Unix AV
Mac & Linux AV
Deep Defender
Endpoint Firewall
Host Intrusion Prevention
Application Blocking
Application Control – Desktop
9
The market’s broadest set of security technologies
Proven leader in blocking exploits, evasion and stealthy threats
Deep Defender blocks stealth attacks with hardware approach
Application Whitelisting shown to provide 100% protection






Web/Messaging Security and Mobile
SiteAdvisor with Web Filter
Anti-malware Email
Mobile Device Management



Data Protection
Complete Protection
•
•
•
•

Device Control

Management & Deployment
ePO
Real-time for ePO


Complete Endpoint Protection—Business
Complete Simplicity
•
•
•
•
Unified, open security management for all endpoints
One solution for PC, Mac, Linux mobile or virtual
Turnkey simple installation in minutes
Use less resources to manage security with single console
Complete Performance
• Security optimized for ultimate performance on any platform
• Real-time visibility reducing time to reaction 10X to 1000X
• Smart scanning technology optimizes CPU and memory
usage
Complete Protection
• The market’s broadest set of security technologies
• Proven leader in blocking exploits and stealthy threats
• Deep Defender blocks stealth attacks with hardware
approach
Endpoint Protection

Windows & Unix AV
Mac & Linux AV
Storage Server AV
SharePoint AV
Deep Defender
Endpoint Firewall
Intrusion Prevention
Application Blocking







Web/Messaging Security and Mobile
Antimalware Email
SiteAdvisor with Web Filtering
Mobile Device Management



Data Protection
Device Control
Drive Encryption
File & Removable Media Prot.



Management & Deployment
10
ePO
Real-time for ePO


Complete Protection—Proven by Independent Testing
Day Zero Rootkit Protection
Combined Detection Rates
McAfee
Symantec
Sophos
Kaspersky
F-Secure
Microsoft
AVG
ESET
Trend
Norman
Panda
48 of 48
100%
40 of 48
32 of 48
83%
67%
McAfee
DeepDefender
Microsoft System Center
2012 Endpoint Protection
Symantec
Endpoint Protection
Source: AV-Test 2013
Exploit
Evasion
Combined
97%
100%
99%
91%
100%
96%
88%
97%
93%
92%
92%
92%
79%
88%
84%
65%
100%
83%
76%
88%
82%
71%
92%
82%
73%
53%
63%
47%
75%
61%
41%
75%
58%
Source: NSS Labs 2013
VSE On-Access, HIPS, and Dynamic Application Control
Collection
Missed
Detected
Total
Detected (%)
Missed (%)
Anti-Malware Desktop
0
4634
4634
100.000
0.000
Spyware
0
1773
1773
100.000
0.000
Trojan
0
910
910
100.000
0.000
Overall
0
7317
7317
100.000
0.000
Source: Westcoast Labs 2012
Broad Solution Coverage for Enterprise Problems
Server
Protection
•
•
•
•
Data
Protection
• Complete Data Protection
• Encryption
• DLP: Endpoint and Network
Data Center Suites
Application Control for Servers
MOVE (McAfee Optimized for Virtual Environments)
Database Security
Risk
Management
• Vulnerability Manager
• Policy Auditor
Security
Management
• Deep Command
• New offerings coming in 2H 2013
For More Information: www.McAfee.com/endpoint
www.mcafee.com/endpoint
On The
Web
Whitepapers
and Solution
Briefs
Third Party
Reviews
Four
Phases Video
Complete Performance, Protection, Simplicity
Complete
Performance
Dynamic Whitelisting, Smart Scanning, Real Time
Management, Dynamic Risk Assessment
Complete
Protection
#1 in Exploit, Evasion and Rootkit Protection
Complete
Simplicity
McAfee leads in Management, Scalability and Reaction time.
ePolicy Orchestrator
McAfee ePolicy Orchestrator (McAfee ePO)
Security Management Platform for unified management of endpoint,
network, and data security.
• End-to-end visibility
• An open, extensible architecture
• Proven efficiencies
Complete Management
• Personalized Command Center
• Drag-and-Drop Dashboards and
Actionable Reports
• Role-based Access Control
• Powerful Workflows
• Enterprise-ready
• Extensible Framework
16
Real Time for ePolicy Orchestrator
Real Time for McAfee ePO is the first to let you instantly find any information
about any computer, deploy products, or update configurations in the
environment in a matter of seconds.
• Instant information on the state of computing assets
• Increased protection through policy enforcement
• Cross-referenced threat information with a large, continuously monitored
peer-to-peer network
Complete Management
• Integrated within McAfee ePO workflow
• Instant visibility and real-time actions
• Predefined content
with periodic updates
17
McAfee Application Control for Desktop
McAfee Application Control software provides complete protection
from unwanted applications and code—blocking threats without requiring
signature updates.
• Protect against zero-day and APTs
without signature updates
• Strengthen security and lower ownership
costs with dynamic whitelisting
Complete
Endpoint Security
• Block known and unknown threats
• Use whitelisting to only allow approved
applications to run
• Integrates with McAfee ePO console for
centralized IT management
• Easily protect unsupported legacy
systems, such as Microsoft Windows NT
and 2000
18
• Automatically accept new
software added through
your authorized processes
• Provide flexibility to desktop
users by optionally allowing
them to approve new
applications
McAfee Data Center Suites
McAfee Data Center Suites provide complete protection for physical and
virtualized server—superior threat blocking with minimal signature-based scans.
• Low overhead, increased security
for demanding server environments
• Use whitelisting to only allow
approved applications to run,
denies malware.
Complete
Endpoint Security
• Integrates with McAfee ePO console for
centralized IT management
• Integrates with VMware, Microsoft
HyperV and Citrix
• Easily protect unsupported legacy
systems, such as Microsoft Windows NT
and 2000
19
• Protect against zero-day and APTs
without signature updates
• Strengthen security and
lower ownership costs with
dynamic whitelisting
•
Integrates with GTI to classify
binaries as Good, Bad and Unknown
McAfee Datacenter
Security Suite for
Server
McAfee Virus Scan
Enterprise –Windows
and Linux

McAfee Application
Control - Server

McAfee MOVE Virtual Desktop
Infrastructure

McAfee ePO

Performance
McAfee Application Control = Low Performance Impact
100%
AV + HIPs
McAfee App Control
90%
80%
70%
Utilization
60%
50%
40%
30%
20%
10%
Endpoint Resource Usage
(for illustration only)
McAfee VirusScan Enterprise
McAfee VirusScan Enterprise proactively stops and removes threats, extends
coverage for new security risks, and reduces the cost of managing responses.
• Unbeatable malware detection
and removal
• Proactive protection from
zero-day attacks
Complete
Endpoint Security
• Protect your files from viruses, worms, rootkits,
Trojans, and other threats
• Proactive protection against new and unknown
buffer-overflow exploits that target
vulnerabilities in Microsoft applications
• Easily configure policies to manage and
remove quarantined items
• Supports users who are using both Microsoft
Outlook and Lotus Notes
• Supports Windows desktop OS (2000, XP,
Vista, 7, 8) and Windows Server OS (2000,
2003, 2008, 2012)
• Integrates with McAfee GTI
for real-time defense
• Managed by ePO for
deployment, configuration,
enforcement
and reporting
• Optimized for fast performance
and educed system impact
NSS Labs Protection & Evasion Test 2013:
(VSE/HIPS/SAE)
McAfee Host IPS
McAfee Host Intrusion Prevention for Desktop delivers unprecedented levels
of protection from known and unknown zero-day threats by combining signature
and behavioral intrusion prevention system (IPS)
• Enforce the broadest IPS and zero-day threat protection
coverage across all levels: network, application, and
system execution
• Advanced threat protection through dynamic, stateful
desktop firewall
Complete
Endpoint Security
• Behavioral Analysis - zero-day attack
protection
• Mitigates patch deployment
urgency
• Ensure applications only
perform legal operation
• Vulnerability shielding capabilities for up
to 100% MS vulnerability coverage
22
• Single, unified management by ePO
• Patch endpoints less frequently and with less urgency
• Location aware policies provide specific protection
based on location
Rootkit Threats
New Master Boot Record Threats
700,000
Master Boot Record
600,000
MBR attack-related
samples jumped to over
600k in Q4 2012.
500,000
400,000
300,000
200,000
100,000
0
Q1
2010
23
Q2
2010
Q3
2010
Q4
2010
Q1
2011
Q2
2011
Q3
2011
Q4
2011
Q1
2012
Q2
2012
Q3
2012
Q4
2012
McAfee Deep Defender
McAfee Deep Defender is a next generation of hardware-enhanced
endpoint security, enabled by McAfee DeepSAFE technology, operating
beyond the operating system, designed to detect, block and remediate
advanced, hidden attacks.
• Deeper level of protection
beyond the OS
• Real-time kernel-level
monitor of memory
Complete
Endpoint Security
• DeepSAFE technology loads
before the OS
• Prevent kernel mode rootkits from
installing
• Protection from previously
hidden threats beyond the
OS for enhanced security
• Exposes hidden malware
• MBR & BIOS protection
• Jointly developed by McAfee & Intel
• Managed by ePO
• Operates beyond the OS
• Runs in conjunction of other anti-malware
software
• Supports all Intel Core i3, i5, i7, as well as
Xeon
24
• AV-Test Deep Defender Competitive Test 2013
McAfee Endpoint Encryption
McAfee Endpoint Encryption solutions use industry-leading encryption
algorithms and offers multiple layers of data protection to transparently secure a
broader scope of confidential information
• Drive and file/folder encryption for Microsoft
Windows PCs or Mac OS X
• Enables automatic, transparent encryption
without hindering performance
Complete
Endpoint Security
• Enforces strong access control with preboot authentication
• Prevents unauthorized access to
information on PCs, laptops, network
servers, and removable media
• Provides key-sharing mechanisms that
allow users to share files securely
• Centrally managed with ePO
• Enhanced performance through
support for Intel AES-NI technology
• Remote out-of-band management
with ePO Deep Command
• Supports: Windows 8, 7, Vista, XP
Server 2008, 2003; (32- and 64-bit)
“McAfee positioned as a Leader in the Gartner
Magic Quadrant for Mobile Data Protection for 6
consecutive years and receives highest position
for ability to execute and completeness of vision.”
http://www.mcafee.com/us/independentreports/gartner-mq-mobile-data-protection.aspx
25
Gartner Magic
Quadrant for
Mobile Data
Protection
Sept 2013
McAfee Device Control
McAfee Device Control protects data from falling into the wrong hands via
removable storage devices and media, such as USB drives, MP3 players, CDs,
and DVDs.
• Control how users copy or retrieve data
• Supports USB drives, iPods, recordable
CDs/DVDs, Bluetooth and infrared devices,
imaging equipment, COM and LPT ports.
Complete
Endpoint Security
• Protect your business from data loss
• Maintain control over your confidential
data
• Enable productivity while ensuring data
protection
• Centralize and simplify your security
management
• Prove compliance with less effort
26
• Centrally define, deploy, manage, and update
security policies and agents
• Set device and data policies by user, group,
or department.
• Support compliance with detailed userand device-level logging
• Gather details such as device, time stamp,
and data evidence for prompt and proper audits.
Mobile Threats
Total Mobile Malware Samples in the Database
40,000
35,000
30,000
New malware samples
increased 44x in 2012.
25,000
20,000
15,000
10,000
5,000
0
2004
2005
2006
2007
2008
2009
2010
2011
2012
Malware is getting more sophisticated
27
McAfee Enterprise Mobility Management
McAfee Enterprise Mobility Management enables security and management for
mobile devices, data, and applications
• Support for company- and employee-owned devices
• MDM (Mobile Device Management) – manage policy, provisioning, and security OTA
(over-the-air)
• Security – restrict access, features, functionality, risky devices, email, contacts,
calendar, and more
Complete
Endpoint Security
• ePO Security Management – use ePO to track and manage the device lifecycle with
streamlined processes, automation, dashboards, and granular policy options
• Mobile monitoring, alerting, analytics, and reporting
• Supported Device Platforms:
• Full and select remote data wipe; remote lock
• Apple iOS 4.3, 5.0, 6
• Secure container and anti-malware for Android
• Windows Phone 7.x
• Enterprise class scalability of over 25k devices per
server or over 100k with load balancing
• Android 2.2 and higher
• Simplify using ePO for mobile and traditional
endpoint security management
28
• EMM suite includes McAfee EMM, McAfee Secure
Container for Android, McAfee VirusScan Mobile for Android, and McAfee ePO
McAfee VirusScan Mobile Security
McAfee VirusScan Mobile Security protects mobile devices by scanning and
cleaning malware from files, memory cards, applications, Internet downloads,
text messages, and attachments.
• Always-on protection identifies and
removes malware
• Built from the ground up for mobile
to be light on resources
• Real time scanning and alerts
Complete
Endpoint Security
• Support for Android 2.2 to 4.0
smartphones and tablets
29
• Configurable scanning frequency
and scan depth
• Strong and fast detection
• Independently managed
McAfee VirusScan Enterprise for Storage
McAfee Enterprise VirusScan for Storage extends proven real-time
threat protection to mission critical NAS environments
• McAfee’s proven, award-winning scanning
technology has been extended to storage environments
• Rely on always-on, up-to-date, real-time security
• High availability ensures business continuity
in the unlikely event of a product failure
Complete
Endpoint Security
• Continuous protection for storage devices
and their data
• Cost-effective solution
• Common security management with ePO
• Supports: IBM StoreWize V7000 Unified
System, IBM Sonas,
• HP StorageWorks X9000 Network
Storage Systems
• Sun Storage 7000 Unified Storage
Systems
• Isilon
• Multi-vendor support saves time and IT overhead
and eliminates the need for separate point products
for each vendor
• Deploy ePO to manage all of your new security
solutions or leverage your current investment by
adding VSE for Storage to your ePO infrastructure
McAfee VirusScan Enterprise for Linux
McAfee VirusScan Enterprise for Linux delivers always-on, real-time
anti-virus protection for Linux environments. Its unique, Linux-based
on-access scanner constantly monitors the system for potential attacks.
• Secure your enterprise with always-on protection
– Heuristic scanning
– Archive scanning
– Cross-platform protection
Complete
Endpoint Security
• Supports various Linux distributions
• SuSE Linux 9, 10, 11
• Novell Open Enterprise Server 1, 2
• Red Hat Enterprise 4.x; 5.x; 6.x
• CentOS 4.x, 5.x, 6.x
• Fedora Core 10, 11, and 12
• Ubuntu 8.04, 9.04, 9.10, 10.04, 10.10,
and 11.04
31
• Save time with automatic updates
• Make management easy with McAfee ePolicy
Orchestrator (ePO)
• Deploy new kernels quickly and easily
McAfee SiteAdvisor Enterprise with Web Filtering
McAfee SiteAdvisor Enterprise rates website safety using comprehensive
behavioral and web reputation tests
• Educate end users about the dangers
of searching or surfing the Internet
• Browse safely - color-coded rating
system lets users know which
websites are safe and which are
risky improve productivity
Complete
Endpoint Security
• Advanced anti-phishing and blocking
capabilities
• Websites are classified into 104
categories
• Secure web browsing and content filtering
for business users
• GTI integration provides protection at a
URL level instead of domain level
• Supports IE, Firefox, Chrome browsers
32
• Advanced customization to authorize
or block websites based on overall
site ratings or threat factors
• Integrated URL & content filtering
• Manage with ePO for deployment,
configuration, and reporting
McAfee ePO Deep Command
McAfee ePO Deep Command provides secure and remote out-of-band security
management access to PCs that may be powered off or disabled
• Utilizes Intel® vPro™ Active Management
Technology (AMT)
• Discovers Intel vPro-based PCs in
infrastructure
• Easily configure and provision Intel AMT
from ePO console
Complete
Endpoint Security
• Remotely remediate PCs when disabled
• Conduct wake and patch
• Access PCs at hardware level
• Improve security to all PCs regardless of
state
• Remote out-of-band encryption
management
• Supports Intel Core i5 vPro or
Core i7 vPro
33
• Put protection in place ahead of threats,
even if systems are powered off or
using encryption
• Ensure that powered-off, remote, and
mobile endpoints adhere to policies
and configurations
• Connect to the keyboard, video, and mouse (KVM)
capabilities of supporting Intel® vPro™ systems
• Securely extend the reach of remote remediation
with IP-KVM functionality
McAfee Endpoint Protection for Mac
McAfee Endpoint Protection for Mac secures Apple endpoints with
complete, advanced protection, including anti-virus, anti-spyware,
firewall, and application protection.
– On-access scanning - always-on
protection to stop threats before
they execute
– Scan archives & compressed files,
Apple Mail messages &
network volumes
Complete
Endpoint Security
– System firewall stops network-based
attacks from infecting the Mac
• Adaptive Mode ¬ Helps to learn network
traffic and fine tuning the existing firewall
policies
– Application protection provides the
ability to deny applications that are
not approved to run
• Regular mode ¬ Ensures your firewall
policies are enforced strictly
– Managed by ePO
• DNS Blocking ¬ Blocks access to
unwanted sites
• Location awareness ¬ Ensures correct
policies are enforced based on the
location from where you are connecting to
the network.
McAfee VirusScan Mobile Security
McAfee VirusScan Mobile Security protects mobile devices by scanning and
cleaning malware from files, memory cards, applications, Internet downloads, text
messages, and attachments.
• Always-on protection identifies and
removes malware
• Built from the ground up for mobile
to be light on resources
• Real time scanning and alerts
Complete
Endpoint Security
• Support for Android 2.1 to 4.0
smartphones and tablets
35
• Configurable scanning frequency
and scan depth
• Strong and fast detection
• Independently managed
McAfee Security for Email Servers
McAfee Security for Email Servers provides comprehensive content security for
Microsoft Exchange and Lotus Domino servers.
• Comprehensive inbound security against
all email-borne threats
• Integrated encryption and data loss prevention
capabilities for compliance and policy enforcement
• Security-as-a-Service (SaaS), on-premises, and
integrated hybrid deployment options
Complete
Endpoint Security
• Platforms supported:
• Microsoft Exchange 2003, 2007,
2010, 2013
• Lotus Domino 8.0, 8.5
• Windows Server 2003, 2008, 2012
• Linux (Domino 8.5) Server
• Novell SUSE Linux Enterprise
Server 10, 11
• Red Hat Enterprise Linux 5.x, 6.x
36
• Cloud-based computing provides virtually
limitless capacity
McAfee Security for Microsoft SharePoint
McAfee Security for Microsoft SharePoint ensures that your corporate
SharePoint deployment does not spread malware, store inappropriate content,
or lead to data loss.
• Prevent SharePoint from becoming a malware vector
by blocking viruses, worms, Trojans, and other
potentially unwanted programs.
• Centralized and local reporting via the McAfee ePO
• Prevent data loss through flexible content filtering
Complete
Endpoint Security
• Supported Platforms:
• Microsoft SharePoint Server 2003, 2007,
2010
• Microsoft SharePoint Services 2.0, 3.0
• Microsoft Windows Server 2003, 2008
37
• Store quarantined documents locally and search
the database by infection name, file name, and
other parameters
• Prevent inappropriate and unauthorized documents
from being stored on your SharePoint server
McAfee Policy Auditor
McAfee Policy Auditor software automates manual audit processes and helps
you report consistently and accurately against internal and external policies.
• Unify management of policy audits and endpoint security
• Run consolidated audits across both managed
(agent-based) and unmanaged (agentless) systems
• Report against key industry mandates and internal
policies
Complete
Endpoint Security
Supported operating systems.
• Microsoft Windows XP, Vista, 7
• Windows Server 2000, 2003, 2008
• Red Hat Enterprise Linux 3.0,4.0,
5.0, 5.1
• MAC OS X 10.4, 10.5
• HP-UX (RISC) 11iv1, 11iv2
• AIX (Power5, Power6) 5.3 TL8 SP5,
6.1 TL2 SP
• Up-to-date data, powerful dashboards and reports,
and built-in waiver management simplify every step
• SCAP-FDCC validated
• Validated by the National Institute of Standards and
Technology (NIST) as conforming to the
SCAP standard
McAfee Web Gateway
McAfee Web Gateway delivers comprehensive security for all aspects of web
traffic, regardless of location or device. McAfee Web Gateway enables today’s
web-centric enterprises with a powerful rules-based engine for optimal policy
flexibility and control.
Complete
Endpoint Security
• Common criteria EAL2+ and FIPS 140-2
Level 2-certified
• Leader in Gartner Magic Quadrant, Web
Gateway for four years running
• Number one-rated antimalware solution
on the market (AV-Test.org)
39
• Geo-location (McAfee GTI)
• Web reputation (McAfee GTI)
– Web filtering (McAfee GTI)
– Dynamic categorization
– File reputation (McAfee GTI)
– SSL scanning
– Media/file analysis
– Data loss prevention
– Signature-based antivirus
– Proactive anti-malware
Product Resources (click on image to browse to web)