McAfee Announces Agentless MOVE AV

By

McAfee releases a new agentless MOVE AV with real-time visibility and predictive capability enabled by McAfee Global Threat Intelligence.

McAfee has announced a new agentless deployment option for its McAfee Management for Optimized Virtual Environments (MOVE) AV solution, which provides comprehensive defenses against physical and virtual attacks through a single high-performance console. McAfee MOVE AV is designed to integrate with VMware vShield Endpoint and offers standardized security across all major hypervisors, enabling complete security management and delivery for virtualized environments.

According to the announcement, the McAfee MOVE AV agentless deployment option protects your virtual environment and keeps it free of malware without the bulk of an agent, resulting in easy deployment and setup. Both deployment options (multi-platform and agentless) provide powerful, comprehensive protection and are managed and reported by the McAfee ePolicy Orchestrator platform.

MOVE AV’s integration with VMware vShield Endpoint lets users optimize performance and security in virtual desktop and server environments based on VMware technology. As a part of the McAfee security-connected framework, MOVE AV delivers real-time visibility and predictive capability enabled by McAfee Global Threat Intelligence, which lets customers embrace virtualization while protecting their critical assets and sensitive data, all on one console.

McAfee MOVE AV agentless deployment option is available now. For more information, visit http://www.mcafee.com/move.

04/12/2012

Related content

  • VMware Tools

    VMware’s recent announcement about vCloud Hybrid Service involves expansion of the vCloud suite toward a public/hybrid cloud. In this article, we attempt to shed some light on the huge number of VMware products.

  • An overview of VMware tools
    VMware's recent announcement about vCloud Hybrid Service involves expansion of the vCloud suite toward a public/hybrid cloud. In this article, we attempt to shed some light on the huge number of VMware products.
  • Serious Flaw in Microsoft Word is Being Used to Install Malware
  • PC over IP
    Anyone who has tried to to run graphics-intensive applications using an application-sharing protocol like RDP knows how miserably these technologies fail. But the PCoIP protocol and special hardware means that even heavy-duty workstations can operate remotely.
  • Comparison of forensic toolkits for reconstructing browser sessions
    Criminals often focus on browsers for various attacks because they are a worthwhile, attractive, and often easy target. However, admins can investigate such attacks with forensic tools that provide the ability to reconstruct browser sessions.
comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=