Chip-to-application transformation

McAfee introduces two new suites: McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. These suites are the first to link security from chip to OS to applications, protecting against new threat vectors and bringing critical visibility to risk management. The suites are the first to include McAfee Deep Defender, a rootkit protection based on hardware-enhanced security jointly developed by Intel and McAfee, dynamic whitelisting, risk intelligence, and real-time security management. By including mobile device management and support for Macs and Linux, McAfee suites help businesses of all sizes protect devices, data and applications.

Security staff will benefit from the extended span of coverage managed within a single console. IT administrators can see efficient installation in minutes, not hours, to ease deployment. End users benefit from higher performance scanning that minimises the potential overhead of effective protection. Competitive pricing meets the needs of budget-minded buyers while delivering significant value for customers with mission-critical security needs. Finally, new incentives and affordable pricing engage the channel to help businesses with different budgets to adopt these unique products for protection and performance.


New Threats Demand a New Standard of Protection
Modern threats start with an ever-increasing stream of phishing, malicious web pages, rootkits, and compromised devices. These initial contacts can turn into persistent, multi-stage, targeted attacks. The explosion of devices multiplies the chance of an attack affecting the mobile workforce, who can unknowingly endanger the business and systems when reconnecting to the corporate network. McAfee tackles these obstacles with its Complete Endpoint Protection suites that target every phase of stealthy malware and persistent attacks.


Tested and Proven
Dynamic and distributed organisations, especially those with stringent requirements to safeguard data as well as verify and report on regulatory compliance, can rest assured since the new McAfee Complete Endpoint Protection suites include some of the most highly-ranked security technology in the industry. In comparative testing done by AV-Test, McAfee software scored 100% in rootkit protection with McAfee Deep Defender. In the 2013 Corporate Endpoint Protection Group Test by NSS Labs, McAfee software received the highest score in defending against exploit and evasion attacks. Also, in a study conducted by West Coast Labs, McAfee software scored 100% in malware protection with the combination of McAfee Application Control, McAfee VirusScan® Enterprise, and McAfee Host Intrusion Prevention, three of the central products in the McAfee Complete Endpoint Protection—Enterprise suites.


Below are just a few of the many capabilities offered by products included in the McAfee Complete Endpoint Protection suites:
· Real Time for McAfee ePO—uses a specialised design and best practice questions and actions within the workflow to help every administrator understand their security posture up to 1,000 times faster than any other means, and take action easily and immediately to manage potential risks.
· McAfee® Enterprise Mobility Management (McAfee EMM)—mobile device management and secure container are fully integrated within the McAfee®ePolicyOrchestrator® (McAfee ePO) platform environment, adding smartphones and tablets so customers can use a single pane of glass and integrated policy environment to manage all endpoints, including the suites’ multi-platform package of Macs, Windows, and Linux. To read the full EMM press release, also announced today, click here.
· McAfee Deep Defender—endpoints are protected from stealthy attacks through jointly developed Intel and McAfee hardware-enhanced security that goes beyond the operating system, protecting where traditional security tools can’t reach.
· McAfee Application Control for PCs—dynamic whitelisting for laptops and desktops reduces the chance of infection or disruption by containing the applications a user can run, including preventing malware from executing. The technology has been shown by West Coast Labs to offer 100% protection rates with very low system overhead.
· McAfee Risk Advisor—helps administrators instantly see which assets are at highest risk so they can protect the most essential assets first and accurately.


“A few years ago, McAfee created the first security suites. We remain a market leader in what is estimated by IDC to be a $2B market in 20131. That’s more than half of all endpoint security sales,” said Candace Worley, senior vice president and general manager of endpoint security at McAfee. “Now, through performance and automation enhancements to our existing market-leading defences and integration of distinctive and compelling new protections, McAfee suites again define a new level of endpoint protection—one that is firing on all cylinders: speed, security, simplicity, and value.”
McAfee Complete Endpoint Protection suites incorporate ePolicy Orchestrator software, the world’s leading security management system, a central part of McAfee’s Security Connected management platform. This management system has been enhanced with RealTime for McAfee ePO software, which allows administrators to directly and instantly understand and manage endpoint health across all devices to keep critical assets and data secured and available.


“With the McAfee ePO platform we receive heartbeat status in real time, while gaining visibility into important background information so that we can conduct comprehensive statistical analysis and reporting,” said Rick Snyder, Endpoint Security Supervisor at Boston Scientific.“As a medical device company dedicated to less-invasive medicine, we see the McAfee ePO platform as the most effective solution for managing our entire environment from a single point.”


McAfee’s endpoint security provides complete protection technology for all devices, the data that runs through them, and the applications that run on them. Our comprehensive, tailored solutions reduce complexity to achieve multi-layer endpoint defence that won’t impact productivity and blends traditional smart malware scanning, dynamic whitelisting, behavioral day-zero intrusion prevention, unified management and integrated threat intelligence. McAfee uniquely provides a comprehensive approach to devices, protection technology and management.

Research shows ‘game needs to be changed,’ with security innovation years behind that of the attackers, the board a decade behind security discussions and regulation needing more industry input.
73% of organizations lack automated patch management, and 62% experienced incidents involving exploitation of a vulnerability for which a patch was available but had not yet been deployed.
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to help secure, isolate and recover data from a ransomware attack.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that the UK’s Mid-Market IT Leadership expects to see a shortfall in IT spend in 2022. While 52% of IT decision-makers believe their 2021 budget met the ambitions of their team, there seems to be less certainty and confidence about future finances — 61% think their budget will need to increase in 2022, but only 13% expect it to.
Research from Avast has found that employees in almost a third (31%) of Small and Medium Businesses (SMBs) in the UK are connecting to the corporate network using personal devices that do not have any security controls in place, according to IT Decision Makers (ITDMs) within SMBs.
This year, over half of MSPs or their end customers have been attacked by ransomware but only 53% offer backup services.
Palo Alto Networks has introduced Prisma® Cloud 3.0, said to be the industry’s first integrated platform to shift security left—significantly improving organizations’ entire cloud security posture by reducing security risk at runtime.
Trend Micro has published new research revealing that 90% of IT decision makers claim their business would be willing to compromise on cybersecurity in favor of digital transformation, productivity, or other goals. Additionally, 82% have felt pressured to downplay the severity of cyber risks to their board.