Many businesses and corporations have traditionally only secured their network communications just after the point of origination and just before the point of destination. This means that the actual line was made secure, not the end points of it.
As a result, this has often been a very neglected area that has not been secured. As a result, the cyber-attacker has been able to penetrate these two endpoints, and from there, gain access to the entire network infrastructure over a period of time.
Many organizations are now starting to realize these weak spots and are now taking a proactive approach with regards to endpoint security. Once such solution is McAfee Endpoint Security Suite.
What Is the McAfee Endpoint Security Suite?
This is a solution that provides end-to-end network security protection. It comes as one cohesive package and is centrally managed. It has been designed to replace legacy products which came as separate packages, such as:
- VirusScan Enterprise
- McAfee SiteAdvisor
- McAfee Host Intrusion Prevention.
The McAfee Suite actually consists of numerous products, that have been geared specifically for two different types of deployments: Basic and Dynamic.
The products are as follows:
- Endpoint Protection (EPS)
- Endpoint Protection – Advanced (EPA)
- Total Protection for Endpoint – Enterprise Edition (TPE)
- Total Protection for Secure Business (TEB)
There are four different core segments to these abovementioned products, and are as follows:
- Cyber-Threat Prevention: This is a sophisticated component that offers new and advanced malware scanning features. This helps a business to thwart imminent threats and isolate any malware that has entered into the network infrastructure. This part can fight off all of the latest malware threats including file less memory attacks, ransomware, zero-day attacks, Business Email Compromise (BEC), phishing and so forth.
- Web Security: This prevents your employees (and even other kinds of users) (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Ravi Das (writer/revisions editor). Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/8e52mS6MGl4/