aidarrow-end-inversearrow-endarrow-left-angulararrow-left-angularWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareArticleUse caseWebinarResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days

McAfee ePO Edition

Featuring centralized management via the McAfee ePolicy Orchestrator and real-time intelligence from the McAfee Threat Intelligence Exchange and Data Exchange Layer, Defendpoint ePO Edition offers a proactive approach to endpoint security by managing the removal of admin rights, achieving least privilege and reducing your attack surface overnight.

Technical benefits of Defendpoint for McAfee ePO

Defendpoint ePO edition is a fully integrated privilege management solution for removing admin rights.

  • Leverage existing infrastructure

    Integrating with your established McAfee ePO system means there’s no additional infrastructure investment and the single, lightweight Avecto agent makes for a more stable endpoint and reduced support costs.

  • Manage security needs in one location

    With Defendpoint managed in McAfee ePO, there is no need for multiple management platforms to manage IT security needs. ePO serves as the one central hub - for managing McAfee applications and Avecto’s Defendpoint, as well as managing mixed Windows and Mac endpoints.

  • Work more efficiently

    Managing user policies requires lots of time to manage. The integration between reporting and policy editing of Defendpoint within ePO eliminates this complexity and allows you to work more efficiently by enabling you report on and understand the behavior of endpoints and manage policy accordingly.

  • Scalable: seamlessly grows as business grows

    Despite offering unmatched capabilities, Defendpoint starts simple and stays simple. Policy rules are flexible enough to meet the most complex business and security requirements while remaining easy to understand how they will affect outcomes for any user in any role.

  • Smart: leverages McAfee threat intelligence data

    Defendpoint is Data Exchange Layer (DXL)-ready and integrated with the McAfee Threat Intelligence Exchange (TIE). Configuration changes are informed by TIE application reputation data, with Defendpoint reporting available right inside the ePO console to drive risk-based policy adjustments.

Why Defendpoint?

Defendpoint protects against the biggest area of attack, protecting corporate IP by removing local admin rights and the most dangerous sysadmin privileges. We advocate the removal of admin rights from all users, before layering on your PASM vaulting technology.

Compliance mandates aren’t always easy to meet. We’ll help you get on track.

Defendpoint meets least privilege and identity access management guidelines by removing user / admin privileges and whitelisting trusted applications across all endpoints - even in the data center - while trend reporting and analysis demonstrates compliance with GDPR, SOX, PCI, DSS, NIST, HIPPA and many more.

Learn more about meeting compliance

Don't leave cyber security to chance

Deter insider attacks by giving access to only to the applications, tasks, and scripts users need. And prevent external attacks that rely on trusted applications and elevated privileges to execute malware and move laterally across your network.

Free your users from security barricades

The turn-key Quick Start policy makes automated privilege access achievable overnight. Users operate from the safety of standard user accounts while enjoying the flexibility of admin accounts - all without IT frustration. The single lightweight agent makes deployment and maintenance simple.

Ready to learn more?

Eliminating privileges is one of the most essential risk mitigation strategies for any organization. Learn what makes Avecto a leader Privileged Elevation and Delegation Management and how Defendpoint helps organizations achieve secure and compliant endpoints.