Difference between revisions of "MAC w/ ePO"

From ESS-WIKI
Jump to: navigation, search
(Overview)
(Overview)
Line 5: Line 5:
 
*Locks down the protected endpoints against threats and unwanted changes, with no file system scanning or other periodic activity that could impact system performance.
 
*Locks down the protected endpoints against threats and unwanted changes, with no file system scanning or other periodic activity that could impact system performance.
 
*Augments traditional security solutions and enables IT to allow only approved system and application software to run. Blocks unauthorized or vulnerable applications that may compromise endpoints without imposing operational overhead. This ensures that end‑users cannot accidentally introduce software that poses a risk to the business.
 
*Augments traditional security solutions and enables IT to allow only approved system and application software to run. Blocks unauthorized or vulnerable applications that may compromise endpoints without imposing operational overhead. This ensures that end‑users cannot accidentally introduce software that poses a risk to the business.
 +
*Uses dynamic whitelisting to ensure that only trusted applications run on devices, servers, and desktops. McAfee’s dynamic whitelisting trust model eliminates the labor and cost associated with other whitelisting technologies, thereby reducing overhead and increasing continuity.
 +
*Provides IT control over endpoints and helps enforce software license compliance. With Application Control, IT departments can eliminate unauthorized software on endpoints, while providing employees greater flexibility to use the resources they need to get their jobs done.
 +
*Eliminates the need for IT administrators to manually maintain lists of approved applications. This enables IT departments to adopt a flexible approach where a repository of trusted applications can run on endpoints. This prevents execution of all unauthorized software scripts and dynamic link libraries (DLLs), and further defends against memory exploits.
 +
*Works effectively when integrated with McAfee ePO and in standalone mode without network access. The product is designed to operate in a variety of network and firewall configurations.
 +
*Runs transparently on endpoints. It can be set up quickly with very low initial and ongoing operational overhead and minimal impact on CPU cycles.
  
 
=Features=
 
=Features=
 
=Supported Operating Systems=
 
=Supported Operating Systems=
 
=Documents=
 
=Documents=

Revision as of 06:44, 31 May 2016

Overview

Today’s IT departments face tremendous pressure to ensure that their endpoints comply with many different security policies, operating procedures, corporate IT standards, and regulations. Extending the viability of fixed function devices such as point‑of‑sale (POS) terminals, customer service terminals, and legacy Windows NT platforms has become critical.
Application Control uses dynamic whitelisting to ensure that only trusted applications run on devices, servers and desktops. This provides IT with the greatest degree of visibility and control over clients, and helps enforce software license compliance. Here are some product features.

  • Protects your organization against malware attacks before they occur by proactively controlling the applications executing on your desktops, laptops, and servers.
  • Locks down the protected endpoints against threats and unwanted changes, with no file system scanning or other periodic activity that could impact system performance.
  • Augments traditional security solutions and enables IT to allow only approved system and application software to run. Blocks unauthorized or vulnerable applications that may compromise endpoints without imposing operational overhead. This ensures that end‑users cannot accidentally introduce software that poses a risk to the business.
  • Uses dynamic whitelisting to ensure that only trusted applications run on devices, servers, and desktops. McAfee’s dynamic whitelisting trust model eliminates the labor and cost associated with other whitelisting technologies, thereby reducing overhead and increasing continuity.
  • Provides IT control over endpoints and helps enforce software license compliance. With Application Control, IT departments can eliminate unauthorized software on endpoints, while providing employees greater flexibility to use the resources they need to get their jobs done.
  • Eliminates the need for IT administrators to manually maintain lists of approved applications. This enables IT departments to adopt a flexible approach where a repository of trusted applications can run on endpoints. This prevents execution of all unauthorized software scripts and dynamic link libraries (DLLs), and further defends against memory exploits.
  • Works effectively when integrated with McAfee ePO and in standalone mode without network access. The product is designed to operate in a variety of network and firewall configurations.
  • Runs transparently on endpoints. It can be set up quickly with very low initial and ongoing operational overhead and minimal impact on CPU cycles.

Features

Supported Operating Systems

Documents