McAfee Total Protection for Endpoint 4.5
July 01, 2010
£48 for 501 endpoints
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Provides many very good endpoint protection mechanisms, with a fairly low agent footprint
- Weaknesses: Help file could benefit from a bit more detail. More expensive than most
- Verdict: Other than the slightly above average cost, this solution is a fairly strong offering
McAfee Total Protection for Endpoint 4.5 is a host-based solution that protects laptops, desktops and server machines from various security threats.
It is centrally managed from McAfee's ePolicy Orchestrator (ePO) web-based server console. This is typically installed on a Windows server backend system, with varying support for different versions of Microsoft SQL Server. Currently it does not contain agents for client platforms other than Microsoft Windows.
Getting the management components of McAfee Total Protection up and running was very easy and straightforward. The web-based administrative console has several useful dashboard components for outbreak information and non-compliance status updates. It also has options for distribution and load balancing, through the placement of optional remote agent handlers for larger or more complex network environments.
It is worth noting that it also ships with protection support for Microsoft Exchange and Lotus Domino, however our testing only included the core operating system platform for desktops and servers.
The suite has an abundance of features that you would expect to see in an enterprise class endpoint protection solution. It includes anti-virus, application blocking, desktop firewall, host IPS, web browser protection and rogue system detection for alerting when systems are networked without the agent installed.
Agent deployment is straightforward, although we did notice the push installation lacks a status indicator.
Additionally, policy management of endpoint protection is very detailed, but the screen could benefit from a bit more organisation. Even with these minor shortcomings we were impressed with the low agent footprint and granular control you have over the endpoint agents. It also integrates into third party ticketing systems to help with remediation.
Although a help file is available via the server console, some areas of the documentation were lacking in verbosity. Additionally, some of the core components mentioned in the solution were missing from the main help file entirely. We were shipped additional PDF files for these missing components.
Gold support is included with the purchase price and includes 24/7, 365 days a year phone support, as well as online case management and McAfee's excellent customer portal. Additional support options are available.
SC Webcasts UK
Sign up to our newsletters
DV Cleared Systems Architect - 6 Months - London
Computerfutures - London (North), London (Greater)
CISO – Chief Information Security Officer (Up to £100K)
Evolution Recruitment - London (North), London (Greater)
Head of Security Strategy – London
Evolution Recruitment - London (West), London (Greater)
Information Security Manager
Infosec People - Hammersmith, West London
Associate Professor in Cyber Security and Networking
Edinburgh Napier University - Edinburgh, City of Edinburgh
SC Magazine UK Articles
- Russia's Central Bank introduces new mandatory cyber-security regulations
- Singapore to shut off internet access for government agencies
- What exactly will this new bill of rights mean for privacy laws within the UK?
- Epic hack, thousands of salted logins stolen
- 6 in 10 universities hit by ransomware, 2/3 hit multiple times
- SC Awards Europe 2016 winners announcements!
- Microsoft ends common password use and password lockout
- ISIS radicalises 'lone wolves' through strong social media presence
- 1.5 billion Windows computers potentially affected by unpatched 0-day exploit
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: Russian banks, Singapore, ransomware on campus, gaming hacks and more Snowden
- Advocacy groups urge FCC in the US to address connected car technology threat
- Lost devices leading cause of data breaches, report
- WhatsApp to share customer data with Facebook
- Hackers exploit vBulletin flaw to access 27M accounts on 11 websites