Application Control

Application Control

McAfee Application Control prevents zero-day and APT attacks by blocking execution of unauthorized applications.

Intel Security

Intel Security

Features

  • Protect against zero-day and APTs without signature updates.
  • Uses McAfee Global Threat Intelligence and McAfee Threat Intelligence Exchange to provide global and local reputation of files and applications.
  • Strengthen security and lower ownership costs with dynamic whitelisting that automatically accepts new software added through your trusted channels.
  • Efficiently control application access with McAfee® ePolicy Orchestrator® (McAfee ePO™) software, a centralized platform for management of McAfee security solutions.
  • Reduce patch cycles through secure whitelisting and advanced memory protection.
  • Keep systems current with the latest patches using trusted updaters.
  • Enforce controls on connected or disconnected servers, virtual machines, endpoints, fixed devices such as point-of-sale terminals, and legacy systems such as Microsoft Windows XP.
  • Allow new applications based on application rating or self-approval for improved business continuity.
  • Maintain user productivity and server performance with a low-overhead solution.
  • Easily protect legacy systems and modern technology investments.

Description

McAfee Application Control prevents zero-day and APT attacks by blocking execution of unauthorized applications. Using our inventory feature, you can easily find and manage application-related files. It groups binaries (EXEs, DLLs, drivers, and scripts) across your enterprise by application and vendor, displays them in an intuitive, hierarchical format, and intelligently classifies them as well-known, unknown, and known-bad applications. Using whitelisting, you can prevent attacks from unknown malware by allowing only known good whitelisted applications to run. Works with GTI, TIE and ATD.

 Supported platforms

  • Microsoft Windows (32-bit and 64-bit)
  • Embedded: XPE, 7E, WEPOS, POSReady 2009, WES 2009, 8, 8.1 Industry, 10
  • Server: 2008, 2008 R2, 2012, 2012 R2
  • Desktop: NT, 2000, XP, Vista, 7, 8, 8.1, 10 Linux
  • Red Hat/CentOS 5, 6, 7
  • SUSE/openSUSE 10, 11
  • Oracle Enterprise Linux 5, 6, 7
  • Ubuntu 12.04

Links

Data Sheet
Solution Brief
Product Guide
Potentially Unwanted Programs
Case Study – Cemex
ExpertCenter

Download as PDF