Defend your endpoint devices with Trellix® Complete Endpoint Protection—Business, an affordable, all-in-one solution that uses collaborative threat and global threat intelligence to defend against advanced threats, encryption to protect your data, and dynamic application containment and machine learning for desktops and laptops to halt zero-day exploits.
Advanced Threat Protection |
Intrusion Prevention and Firewall for Desktops
|
Enables communication between multiple threat defenses for detection of seemingly disconnected events as related and part of a targeted attack. |
Guard against unknown, zero-day threats and new vulnerabilities,reduce patch urgency. |
Email Anti-Malware and Antispam |
Full Disk, File, Folder, Removable Media, and Cloud Storage Encryption |
Detect, clean, and block malware from Microsoft Exchange and Lotus Domino servers with McAfee Security for Email Servers. |
• Secure confidential data across PCs, Macs, laptops, network servers, removable media, and cloud storage services. |
Built for growing organizations
Install in less than 20 minutes with just four clicks. Add licenses and products using the same management platform as your business grows.
Spot threats before they affect your infrastructure
Collect the latest data in real time with Trellix Global Threat Intelligence to protect against known and emerging cyberthreats across files, web, messages, and network.
Strong and Effective Performance
Our extensible endpoint framework can help you see and remove redundancies to improve your IT operational efficiency.
Take Control over the Complete Threat Lifecycle
McAfee Complete Endpoint Protection— Business helps you stay secure and nimble. It provides a collaborative security framework to reduce the complexity of endpoint security environments, better performance to protect you and your users’ productivity, and visibility into advanced threats to speed detection and remediation responses.
Traditional antivirus does not play well with virtualized infrastructure. Trellix® Management for Optimized Virtual Environments AntiVirus (Trellix MOVE AntiVirus) brings optimized, advanced malware protection to your virtualized desktops and servers. Implement across multiple hypervisors, or choose an agentless, tuned option for VMware NSX or VMware vCNS.
Multiplatform for All Major Hypervisors |
Agentless Option for VMware
|
In multiplatform installations, including vSphere, Hyper-V, KVM, and XenServer, the Trellix MOVE AntiVirus agent—a lightweight endpoint component—communicates to the SVM to broker the antivirus processing on behalf of each VM. |
Trellix MOVE AntiVirus leverages VMware NSX or VMware vCNS for better efficiency. In agentless deployments, these use the hypervisor as a high-speed connection to allow the McAfee MOVE AntiVirus security virtual machine (SVM) to scan VMs from outside the guest image. |
Offload virus scanning
Get instant protection for virtual servers and desktops—with minimal impact on memory and processing.
Prevent antivirus storms
Manage peak-demand requests for virus scans that can impact system performance. On-access and on-demand virus scans help eliminate bottlenecks.
Local and global cache of scanned files
Avoid duplicate file scanning once a file is confirmed to be safe.
Elastic provisioning of offload scanning
Scale your scanning power up or down with demand for greater resource efficiency.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
Trellix Data Loss Prevention Endpoint is a comprehensive data loss prevention solution, comprised of agent software installed on end-stations across the enterprise, and a logging and analysis server, through which centrally-managed policies are deployed, real-time events are monitored and reports are generated.
With Trellix DLP solution, centrally managed security policies are applied on end-stations and are used to monitor and restrict the usage and transfer of sensitive data.
The result is a cost-effective and flexible solution that offers innovative methods for preventing classified information from leaking out of the organization and effectively addresses data loss problems.
Manual classification |
User-initiated scan and remediation
|
Empowers end users to manually classify documents, increases employee data protection awareness, and reduces administrative burden. |
Allows end users to run endpoint discovery scans and perform self-remediation actions. |
Enhanced Mac OS support |
No Reboot |
Increases content-aware protection for Mac OS on removable storage, application file access, and network shares. |
Increases administrative efficiency with no upgrade reboot required for McAfee DLP Endpoint 10.0 or higher. |
Real-Time Exfiltration Prevention
Integrated with Trellix Threat Intelligence Exchange and Trellix Data Exchange Layer for visibility and real-time monitoring.
Compliance Enforcement and End User Education
Ensure compliance by addressing day-to-day end-user actions, such as emailing, cloud posting, downloading to removable media devices, and more.
Advanced protection capabilities
Leverage fingerprinting, classification, and file tagging to secure sensitive, unstructured data, such as intellectual property and trade secrets.
These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.
Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses.
According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and Internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority.
Trellix® Complete Data Protection addresses all of these concerns and many more.
Protect your data from loss and theft |
Manage native encryption with a single console
|
Encryption solutions are FIPS 140-2 and Common Criteria EAL2+ certified, and accelerated by the Intel Advanced Encryption Standard–New Instructions (Intel AES-NI). |
Manage Apple FileVault on Mac OS X and Microsoft BitLocker on Windows PCs via the McAfee ePO console. Use any combination of Microsoft BitLocker or traditional drive encryption on your Windows endpoints. |
Enterprise-Grade Drive Encryption |
advanced reporting and auditing capabilities |
Secure your confidential data with an enterprise-grade security solution that is FIPS 140-2 and Common Criteria EAL2+ certified, and accelerated with the Intel® Advanced Encryption Standard—New Instructions (Intel AES-NI) set. |
Quickly and easily demonstrate security compliance to internal and external auditors, and other key stakeholders, with comprehensive dashboards via the Trellix ePO console. |
Centralized Security Management and Advanced Reporting
Centrally define, deploy, manage, and update security policies that encrypt, filter, monitor, and block unauthorized access to sensitive data
Removable Media, File and Folder, and Cloud Storage Encryption
Ensure that specific files and folders are always encrypted, regardless of where data is edited, copied, or saved.
Management of Native Encryption
Manage the native encryption functionality offered by Apple FileVault on OS X and Microsoft BitLocker on Windows platforms directly from McAfee® ePolicy Orchestrator® (McAfee ePO™) software.
These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses.
According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and Internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority.
Trellix® Complete Data Protection addresses all of these concerns and many more.
Data Loss Prevention for Greater Control |
Enterprise-Grade Drive Encryption
|
Preventing data loss at the endpoint begins with improving visibility and control over your data, even when it is disguised. |
Uses drive encryption combined with strong access control via two-factor pre-boot authentication to prevent unauthorized access to confidential data on endpoints, including desktops, VDI workstations, laptops, USB drives, CD/DVDs, and more. |
Removable Media, File and Folder, and Cloud Storage Encryption |
Management of Native Encryption |
Specific files and folders are always encrypted, regardless of where data is edited, copied, or saved. |
Management of native encryption allows you to manage the native encryption functionality offered by Apple FileVault on OS X and Microsoft BitLocker on Windows platforms Trellix Complete Data Protection—Advanced 2 Data Sheet directly from Trellix® ePolicy Orchestrator® (McAfee ePO™) software. |
Gain control over your data
Monitor and regulate how employees access, use, and transfer data via common channels, such as email, instant messages, printing, and USB drives—both in and away from the office.
Protect devices with powerful data encryption
Prevent unauthorized system access and render data unreadable in the event of device loss or theft by implementing full-disk encryption and access control. Encryption options include enterprise-grade drive encryption or native encryption management.
Ensure continual file, folder, and cloud protection
Automatically and transparently encrypt files and folders on the fly—before they move through and outside your organization. Encrypt files to cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive.
These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
Advanced Anti-Virus Technology |
Advanced Content Management
|
Trellix anti-virus technology stops most types of virus and malicious code threats; it drills down to find threats in compressed files using advanced heuristics that looks for virus-like behavior and generic detection that looks for variants on known viruses; the result is that your system spots new viruses immediately. |
Trellix Security for Microsoft SharePoint applies rules to more than 300 types of documents, including Adobe Acrobat and Microsoft Office, to prevent inappropriate or unauthorized downloads and uploads. |
Preset Content Rules |
|
Preset content rules gets you started immediately to prevent the spread of inappropriate content. Preset Rules can also be customized, as needed, to meet the growing demands of your business. |
|
Automatic Updating
Trellix Security for Microsoft SharePoint automatically updates virus definitions and scan engines every day to assure up-to-date protection.
Single-Console Management
Manage Trellix Security for Microsoft SharePoint and other McAfee security products with McAfee ePolicy Orchestrator®, which helps you manage your security and view reports from one powerful and easy-to-use console.
Uses Microsoft VSAPI
Provides proactive background scanning by using Microsoft's VSAPI 2.0 technology for SharePoint Portal Server 2001.