Skip to content
Home > McAfee > A New Approach to IT Security: Prevent Stealthy Threats and Improve Security Management
 

A New Approach to IT Security: Prevent Stealthy Threats and Improve Security Management

White Paper Published By: McAfee
McAfee
Published:  Feb 06, 2013
Type:  White Paper
Length:  19 pages

The purpose of this guide is to show you how to address the challenges of today’s threat landscape by using integrated security solutions from Intel and McAfee. Find out how McAfee* Deep Defender* hardware-assisted security and McAfee ePolicy Orchestrator* (McAfee ePO*) Deep Command* security management work together with Intel® Core™ vPro™ processors2 to help you prevent stealthy threats and improve security management for client endpoints.



Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss, ssdt, hardware assisted security, hardware enhanced security, zero-day malware, zero-day rootkit, kernel layer security

Find Research