McAfee Endpoint Security Solutions

The Ultimate Defense in Protecting Endpoints Against All Phases of a Malicious Attack

Recently, there has been an emergence of multi-stage attacks deployed in several phases to penetrate an organization’s defenses. Partnering with Intel Security McAfee, Washington Computer Services uses McAfee Endpoint Security Solutions to brings together a strong set of proactive defenses to protect your organization from today’s complex threats at every stage.


Anatomy of an Attack: How a McAfee Complete Endpoint Protection Solution Deployed by Washington Computer Services Defends Your Organization

Pre-Attack:

Proactive measures reduce the attack surface and vulnerabilities.

THE DEFENSE
  • Instant visibility into the security health of your endpoints helps you reduce the attack surface easily and efficiently.

Phase 1 - First Contact:

Malware comes in contact with unsuspecting users, usually through a malicious website. Other access points are removable media, unsolicited messages from social media sites, and misconfigured or unsecured wireless networks.

THE DEFENSE
  • Safe surf and search and web content filtering reduce chance of exposure to or drive-by downloads of malware.
  • Device control blocks use of unapproved storage media that may be infected with malware.
  • Network connection reputation shuts down botnets, denial-of-service attacks, and malicious traffic.
  • Mobile anti-malware prevents compromise of smartphones and tablets.

Phase 2 - Local Execution:

Bad code runs on target machines to exploit vulnerabilities in your applications or your OS. If the malware can subvert protections, it writes its code to disk.

THE DEFENSE
  • Host intrusion prevention blocks exploit and shields unpatched vulnerabilities.
  • Dynamic application control allows installation of only known good files or applications based on dynamic whitelisting.
  • On-access scanning monitors memory and network traffic.
  • Secure container for mobile email protects enterprise data on devices.

Phase 3 - Establish Presence:

Malicious code hides on your system and is made to persist, so that it survives reboot and stays hidden from security measures and from your users.

THE DEFENSE
  • Traditional antivirus and anti-malware.
  • Host intrusion prevention protects during startup and off the network.

Phase 4 - Malicious Activity:

Goal of attack is achieved—from stealing identities and intellectual property theft to bank fraud.

THE DEFENSE
  • Host-based firewalls prevent connections to known malicious bot networks and limit the loss of sensitive data.
  • Whitelisting prevents malicious software from tampering with known good application files and prevents execution of bad code.