McAfee® Security Solutions for Windows

McAfee® Security Solutions for Windows

Toshiba Global Commerce Solutions (TGCS) and McAfee have partnered to provide Security Solutions for TGCS POS systems running Windows® operating systems.

The retail industry’s complex and distributed IT infrastructure represents a potential goldmine to cyber criminals intent on stealing credit card information and other sensitive customer data. In addition to retailers’ office computing resources, point-of-sale (POS) devices such as checkout terminals, and information kiosks are particularly vulnerable to malware attacks. Downtime resulting from attacks not only impacts productivity but can also result in a significant financial burden.

Toshiba recognizes that the current retail environment has operational, support, revenue stream and end-customer challenges and has partnered with McAfee® to help retailers protect their customers and their brands by building a robust cyber security platform for Windows® that includes system integrity, change control and policy compliance.

The suite of products include:

  • McAfee® Embedded Control (Whitelisting) software combines industry-leading whitelisting and change control technology to ensure that only trusted applications run on fixed function devices.
  • McAfee® Endpoint Security (Antivirus) enables customers to respond to and manage the threat defense lifecycle.
  • McAfee ePolicy Orchestrator® (McAfee ePO™) security management software provides a single console to monitor, deploy, and manage endpoints.

 

 

McAfee® Embedded Control (Whitelisting) software

Feature Benefits
Blocks unauthorized, vulnerable, or malicious applications Maintains the integrity of critical systems to ensure that only approved software runs on the point-of-service infrastructure without imposing additional operational overhead.
Dynamic whitelisting trust model Keeps systems tightly secured, yet allows for authorized updates or changes to be made from administrator-defined trusted sources. This eliminates the manual and costly support associated with other whitelisting technologies, as no databases, rules, or updates are needed.
Leverages change-control technology  Block unwanted, out-of-policy changes before they occur. Protection is linked directly to policy, and changes can be verified against the change source, time window, or approved change ticket.


McAfee® Endpoint Security (Antivirus)software

Feature Benefits
Real-time communication between threat defenses Events and threat insights are shared with multiple technologies to take immediate actions against suspicious applications, downloads, websites, and files. Redundancies caused by multiple point products or defenses can be found and removed
Common endpoint architecture  Integrates several layers of protection to allow threat insights to be shared for faster convictions and analysis. Actionable insights are delivered and can be used to create indicators of attack and compromise.
The client repairs the endpoint following a conviction to the last known good state Immediately prevent infection and reduce the time required for IT security administrators to solution.
Maintains the integrity of your system   Allows only authorized code to run and only authorized changes to be made. It automatically creates a dynamic whitelist of the “authorized code” on the POS system. The system is locked down to the known good baseline: no program or code outside the authorized set can run, and no unauthorized changes can be made
Combined with McAfee ePolicy Orchestrator® (McAfee ePO™) console Provides integrated audit and compliance reports to help satisfy multiple compliance regulations.


McAfee ePolicy Orchestrator® (McAfee ePO™ security management) software

Feature Benefits
A single pane of glass to monitor, deploy and manage every endpoint, other Intel Security capabilities, and more than 130 third-party security solutions Further reduce complexity with customizable views and actionable workflows in understandable language.
Tools to quickly assess security posture, locate infections, and mitigate the impact of threats Quarantines systems, stops malicious processes, or blocks data exfiltration
Consolidated and easy to use network security tasks Manage and enforce network security using policy assignments and client tasks. Update the detection definition (DAT) files, anti-virus engines, and other security content. Create reports, using the built-in query system wizard, that display informative user-configured charts and tables containing your network security data

 

Key Prerequisites: Both McAfee Embedded Control with ePolicy Orchestrator and McAfee Endpoint Security 10 with ePolicy Orchestrator are available for sale only for use with Toshiba POS systems and devices.  Licenses must be purchased concurrently with POS device purchase, or for POS devices previously purchased.
Supported Windows Platforms for Embedded Control and Endpoint Security 10: POSReady 7
Windows 7
Windows 10
Supported Windows Server platforms for ePolicy Orchestrator: Windows Server 2008 R2 Service Pack 1
Windows Server 2012
Windows Server 2012 Service Pack 1
Windows Server 2012 R2
Key Prerequisites:
McAfee Embedded Control with ePolicy Orchestrator One-year entitlement subscription. This entitlement is licensed at the Windows terminal level and is required for each terminal that has the software installed. Support for McAfee Embedded Control with ePolicy Orchestrator is included for the duration of the entitlement subscription.
McAfee Endpoint Security 10 with ePolicy Orchestrator One-year entitlement subscription. This entitlement is licensed at the Windows terminal level and is required for each terminal that has the software installed. Support for McAfee Endpoint Security 10 with ePolicy Orchestrator is included for the duration of the entitlement subscription.