McAfee Total Protection for Endpoint 4.5
July 01, 2010
£48 for 501 endpoints
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Provides many very good endpoint protection mechanisms, with a fairly low agent footprint
- Weaknesses: Help file could benefit from a bit more detail. More expensive than most
- Verdict: Other than the slightly above average cost, this solution is a fairly strong offering
McAfee Total Protection for Endpoint 4.5 is a host-based solution that protects laptops, desktops and server machines from various security threats.
It is centrally managed from McAfee's ePolicy Orchestrator (ePO) web-based server console. This is typically installed on a Windows server backend system, with varying support for different versions of Microsoft SQL Server. Currently it does not contain agents for client platforms other than Microsoft Windows.
Getting the management components of McAfee Total Protection up and running was very easy and straightforward. The web-based administrative console has several useful dashboard components for outbreak information and non-compliance status updates. It also has options for distribution and load balancing, through the placement of optional remote agent handlers for larger or more complex network environments.
It is worth noting that it also ships with protection support for Microsoft Exchange and Lotus Domino, however our testing only included the core operating system platform for desktops and servers.
The suite has an abundance of features that you would expect to see in an enterprise class endpoint protection solution. It includes anti-virus, application blocking, desktop firewall, host IPS, web browser protection and rogue system detection for alerting when systems are networked without the agent installed.
Agent deployment is straightforward, although we did notice the push installation lacks a status indicator.
Additionally, policy management of endpoint protection is very detailed, but the screen could benefit from a bit more organisation. Even with these minor shortcomings we were impressed with the low agent footprint and granular control you have over the endpoint agents. It also integrates into third party ticketing systems to help with remediation.
Although a help file is available via the server console, some areas of the documentation were lacking in verbosity. Additionally, some of the core components mentioned in the solution were missing from the main help file entirely. We were shipped additional PDF files for these missing components.
Gold support is included with the purchase price and includes 24/7, 365 days a year phone support, as well as online case management and McAfee's excellent customer portal. Additional support options are available.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry