McAfee McAfee Application Control – WIN-MFE-AC

Compare

McAfee – WIN-MFE-AC – McAfee Application Control | Embedded Software

SKU: WIN-MFE-AC Category:

Description

McAfee Application Control

Centrally managed whitelisting.

Fast, flexible, and scalable protection against zero-day and advanced persistent threats

McAfee Application Control blocks unauthorized executables on servers, corporate desktops, and fixed-function devices.

Block threats without list management or signature updates

Save time and lower costs using a dynamic trust model, local and global reputation intelligence, real-time behavioral analytics, and auto-immunization of endpoints.

Stop unwanted applications

Block executable files, libraries, drivers, Java apps, ActiveX controls, scripts, and specialty code.

Protect fixed-function, legacy systems, and modern IT investments

Safeguard older operating systems, such as Microsoft Windows NT, 2000, and XP as well as recent operating systems such as Microsoft Windows 10.

Reduce patch cycles and protect memory

Maintain regular patch cycles and prevent whitelisted applications from being exploited via memory buffer overflow attacks on Windows 32- and 64-bit systems.

Thwart threats with intelligent whitelisting

Reduce risks from unauthorized applications and code

Know the reputation of every file and application in your environment and categorize them as good, bad, and unknown with real-time McAfee Global Threat Intelligence combined with local intelligence from McAfee Threat Intelligence Exchange, an optional module sold separately.

Leverage three whitelisting options

Default Deny allows software execution based on an approved whitelist or authorization by trusted channels. Detect and Deny allows software execution through signature-less reputation verification, and Verify and Deny allows the execution of applications that are verified by sandbox testing.

Balance protection and performance

Additional detection engines, including signatures, reputation, and real-time emulation, reduce the number of files requiring more resource-intensive malware sandbox analysis.

 Watch Video