McAfee Host Intrusion Prevention boxshot.

McAfee Host Intrusion Prevention for Desktops

Published By:  McAfee

Product Variants

Other product variants may be available, please contact us or request a call back if you cannot see what you are looking for.


McAfee Host Intrusion Prevention for Server proactively secures against known and new zero-day attacks. It boosts security and lowers costs by reducing the frequency and urgency of patching. Host Intrusion Prevention integrates with the McAfee ePolicy Orchestrator (ePO) platform for centralized reporting and management that¿s accurate, scalable, easy to use, and works with other McAfee and non-McAfee security products.

Comprehensive security ¿ Host Intrusion Prevention for Server uses multiple proven methods, including behavioral and signature analysis, plus a dynamic stateful firewall buttressed with global reputation technology to block emerging attacks.

Advanced vulnerability-shielding capabilities ¿ Better protection against exploits that target new vulnerabilities means your IT staff has more time for planning, testing, and deploying patches.

Customized server protection ¿ Host Intrusion Prevention for Server helps maintain server uptime with specialized protection for web and database servers.

Enhanced security powered by McAfee Global Threat Intelligence ¿ McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors ¿ file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee¿s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Host Intrusion Prevention for Server uses the McAfee GTI file reputation service and network connection reputation service to find suspicious files before they are identified as carrying malicious payloads, as well as domains/IP addresses that are infected or hosting malware attacks, and block those attacks.

Industry-leading, proactive protection against zero-day threats for desktops and laptops

Shopping Basket
    0 Item(s)

    View and amend your basket
    ISV Royalty Licensing