AppVero logo

Exploring McAfee ENS Threat Prevention for Businesses

Visual representation of McAfee ENS dashboard showcasing threat detection metrics
Visual representation of McAfee ENS dashboard showcasing threat detection metrics

Intro

In the rapidly evolving landscape of cybersecurity, businesses must adopt effective measures to protect their digital assets. McAfee Endpoint Security (ENS) Threat Prevention stands out as a robust solution for organizations seeking to bolster their defenses against emerging threats. This article examines its core functionalities, deployment strategies, and overall value in B2B software ecosystems. The aim is to provide decision-makers with insights into how McAfee ENS can be integrated into their existing frameworks, ensuring that they can make informed choices regarding endpoint protection.

Key Features

Overview of Features

McAfee ENS Threat Prevention offers a comprehensive suite of features designed to address various cybersecurity challenges. Key functionalities include:

  • Advanced Malware Detection: Utilizing machine learning and behavioral analysis to detect and neutralize malware threats before they cause harm.
  • Web Control: Providing the ability to manage web access and protect users from malicious websites.
  • Data Loss Prevention (DLP): Safeguarding sensitive data by preventing unauthorized transfers and detecting potential leaks.
  • Unified Management Console: Centralized management for streamlined security configurations and real-time monitoring of endpoint activities.

These features work in tandem to create a more resilient defensive posture for businesses, allowing them to respond proactively to threats.

Unique Selling Points

McAfee ENS stands apart in the crowded cybersecurity market due to several unique selling points:

  • Seamless Integrations: The solution can easily integrate with existing IT infrastructures, enabling organizations to leverage their current investments effectively.
  • Scalability: Ideal for businesses of varying sizes, McAfee ENS can grow alongside an organization, adapting to increasing demands without significant overhauls.
  • Cloud Compatibility: The solution supports cloud-based environments, ensuring protection extends beyond traditional endpoint devices to include cloud applications and services.

These attributes make it particularly attractive for IT professionals and decision-makers looking for comprehensive and adaptable security solutions.

Pricing Structure

Tiered Pricing Plans

Understanding the pricing structure is crucial for businesses planning to implement McAfee ENS Threat Prevention. McAfee offers tiered pricing plans that cater to the diverse needs of organizations. Each plan provides different access levels to features, ensuring companies can select an option that fits their budget and requirements.

Features by Plan

  • Basic Plan: Includes core functionalities like malware detection and web control.
  • Advanced Plan: Adds features such as Data Loss Prevention and advanced threat intelligence, providing enhanced security measures.
  • Enterprise Plan: Delivers comprehensive access, including full integration capabilities and premium support services.

Each plan scales according to resource needs, enabling businesses to invest strategically in their cybersecurity measures.

"Evaluating the capabilities of a security solution is vital. The unique features of McAfee ENS offer real advantages to proactive cybersecurity strategies."

By diving deep into the workings and offerings of McAfee ENS Threat Prevention, this article intends to equip organizations with knowledge that supports effective purchasing decisions, facilitating better protection against ever-evolving cyber threats.

Prologue to McAfee Endpoint Security

In today's digital environment, endpoint security stands as a critical pillar in the overall cybersecurity posture of any organization. McAfee Endpoint Security (ENS) is a robust solution designed to address a wide array of threats targeting devices connected to an enterprise network. This section aims to introduce McAfee ENS by shedding light on its primary functionalities and the overall importance of threat prevention.

What is McAfee Endpoint Security?

McAfee Endpoint Security is an advanced security suite developed by McAfee, a prominent player in the cybersecurity space. It comprises multiple layers of protection that encompass various components such as malware protection and web security. These features work in harmony to protect endpoints from diverse threats, including viruses, spyware, and ransomware.

The product utilizes a centralized management console, simplifying the administration of security policies across an organization. This allows IT personnel to maintain oversight and ensure that all endpoints comply with security standards. Its architecture is built to adapt to evolving cyber threats, ensuring continued relevance in a rapidly changing landscape. Overall, McAfee ENS is engineered to safeguard not just individual devices, but also the collective integrity of an organization’s digital assets.

Importance of Threat Prevention

Threat prevention is essential for preserving the operational integrity of any business. With the rise of sophisticated cyber threats, organizations cannot afford to overlook the efficacy of their security measures. McAfee ENS prioritizes proactive defenses against potential attacks.

By employing techniques such as behavioral analysis and heuristic scanning, McAfee's threat prevention mechanisms identify and neutralize threats before they can escalate into more significant issues. This proactive stance significantly mitigates the risks associated with security breaches, such as data loss and reputational damage.

"Proactive threat prevention is not just a strategy; it's a necessity in today's interconnected world, where the cost of a breach can be detrimental to business continuity."

Moreover, implementing a robust threat prevention strategy can help organizations comply with regulatory requirements, thereby avoiding penalties associated with non-compliance. It ultimately allows businesses to concentrate on growth and innovation instead of constantly battling cybersecurity risks, making McAfee Endpoint Security a crucial component for any organization aiming to fortify its defenses in a digital landscape.

Core Features of McAfee ENS Threat Prevention

The core features of McAfee ENS Threat Prevention represent the foundation of its effectiveness in mitigating risks associated with cybersecurity threats. In a landscape where businesses face constant challenges from various types of malicious software, understanding these features is integral for decision-makers. The utility of these features extends beyond mere protection; they form a comprehensive security strategy that adapts to emerging threats. Organizations must consider how these tools integrate into their existing security frameworks and how they align with their risk profiles. The functionalities in this module provide significant benefits such as robust defense mechanisms, an efficient response to incidents, and a user-oriented approach.

Illustration of integration capabilities of McAfee ENS with other cybersecurity tools
Illustration of integration capabilities of McAfee ENS with other cybersecurity tools

Malware Protection

Malware protection is one of the primary features of McAfee ENS Threat Prevention. It plays a crucial role in identifying and neutralizing various types of malware, including viruses, Trojans, and spyware. The system employs advanced heuristics and behavioral analysis to detect suspicious activities. This proactive detection is vital since many modern attacks utilize fileless techniques. The aim is to provide continuous scanning and monitoring of endpoints to ensure they remain safeguarded against potential threats.

Additionally, malware protection ensures that endpoints are updated regularly. McAfee leverages the cloud to update its malware definitions, making certain that users have the latest protection. This not only prevents the spread of malware but also mitigates the impact of potential breaches.

Ransomware Defense Mechanisms

Ransomware attacks have become increasingly prevalent, and McAfee addresses this challenge head-on with specialized defense mechanisms. These mechanisms are designed to detect unusual behaviors that are characteristic of ransomware activity, such as the rapid encryption of files. When such actions are identified, the system notifies administrators automatically and takes corrective actions as needed.

The capabilities of the ransomware defense are not just reactive but also preventive. By utilizing machine learning algorithms, McAfee can identify new and evolving ransomware threats. Businesses are not only protected from current ransomware but are also safeguarded against future ones. This dual approach significantly reduces the risk of costly downtime due to data loss.

Web and Email Security

Web and email security are critical components of McAfee ENS Threat Prevention. In today’s digital environment, the majority of attacks leverage these channels, making it essential for any security solution to address them effectively. McAfee ensures that web traffic is analyzed in real time to block access to malicious sites. This is coupled with email filtering that scans incoming messages for phishing attempts and harmful attachments.

The collaboration between web and email security features will aid in creating a multi-layered defense strategy. Each component works in concert to provide a cohesive security posture that limits vulnerabilities. Additionally, employees are educated about potential threats through real-time alerts, which enhances the overall security culture within a business.

File Integrity Monitoring

File integrity monitoring is another crucial feature of McAfee ENS. This function continuously checks files for unauthorized changes or suspicious activities. It serves a dual purpose: ensuring that sensitive files remain unaltered and facilitating compliance with regulatory requirements. Organizations must maintain records that demonstrate the integrity of their sensitive data, especially in regulated industries like finance and healthcare.

By integrating file integrity monitoring with other security features, McAfee creates a holistic view of endpoint activity. The system can trigger alerts based on deviations from normal behavior, enabling swift incident response. This allows businesses to contain and remediate issues before they escalate into larger security incidents.

In summary, the core features of McAfee ENS Threat Prevention act as a protective barrier against evolving cybersecurity threats. From malware detection to file integrity monitoring, these features work cohesively to safeguard organizational assets.

Deployment and Integration

The deployment and integration of McAfee Endpoint Security (ENS) Threat Prevention is crucial for organizations aiming to establish a robust security posture. As cyber threats evolve, the ability to effectively deploy this solution and seamlessly integrate it within existing systems can determine its success in protecting sensitive data. This section addresses the different deployment options available and the integration capabilities with other security tools.

Deployment Options

Companies can opt for either on-premises deployment or cloud-based deployment based on their security needs and operational characteristics. Each option has its own advantages and considerations that organizations should evaluate carefully.

On-Premises Deployment

On-premises deployment involves setting up the McAfee ENS software within the organization's own infrastructure. This method is highly regarded for its control and security. Organizations choose this method for various reasons, including data sovereignty and compliance needs.

A key characteristic of on-premises deployment is the centralized control it offers. Organizations can limit access to sensitive data, which is critical for industries that manage highly confidential information. Moreover, with an on-premises setup, security teams can customize configurations based on specific requirements and incident response strategies.

The unique feature of this deployment type is the hardware independence it provides. Unlike cloud-based systems that rely on internet connectivity and external servers, on-premises installations operate directly on local servers, which can improve response times during crucial incidents. However, this comes with a trade-off, as the burden of system maintenance, updates, and infrastructure costs falls on the organization. Hence, while the on-premises approach can be a beneficial choice for many, it requires significant resources and skilled personnel to manage effectively.

Cloud-Based Deployment

Cloud-based deployment provides an alternative that leverages the power of the cloud. Organizations are increasingly turning to this model due to its scalability and flexibility. With cloud-based solutions, it is easier to manage licenses, updates, and storage without heavy investment in physical infrastructure.

The significant characteristic of cloud-based deployment is its ability to provide immediate accessibility. This means that teams can monitor and respond to threats from anywhere with an internet connection. Additionally, cloud-based systems can automatically scale resources based on demand, which is particularly beneficial for businesses that experience variations in user loads.

A unique feature of this model is the reduction in time spent on deployment. Organizations can quickly implement McAfee ENS solutions without extensive server setup or hardware validation. However, this convenience may come with concerns related to data privacy and reliance on third-party services. Organizations must evaluate whether the cloud-based approach aligns with their regulatory requirements and operational preferences.

Integration with Existing Infrastructure

Proper integration of McAfee ENS with existing security infrastructures is vital for comprehensive protection. It ensures that the solution works in tandem with current security measures, enhancing overall effectiveness against cyber threats.

Compatibility with Other Security Tools

Compatibility with other security tools is a crucial aspect of integration. McAfee ENS is designed to work alongside various security applications, allowing organizations to build a multi-layered defense strategy. This compatibility furthers the organization's ability to respond to threats by utilizing existing security investments.

A major advantage of this compatibility is it provides users with centralized visibility. Security personnel can easily access critical data and insights from multiple tools within a single interface, which helps in making informed decisions quicker. The integration also helps enhance overall threat intelligence by pooling data from various systems.

One downside may be the potential complexity introduced when integrating multiple tools. Organizations must ensure they allocate sufficient time and resources for integration efforts to avoid errors and security gaps.

API Availability

Graph depicting performance metrics of McAfee ENS in various environments
Graph depicting performance metrics of McAfee ENS in various environments

API availability is an essential feature that facilitates integration. McAfee ENS comes equipped with APIs that enable developers to create custom integrations tailored to specific organizational needs. This functionality allows seamless communication between McAfee’s products and other systems within the organization.

The API's flexibility is a key characteristic that adds significant value. It provides organizations with the ability to automate processes, enabling faster responses to detected threats while conserving valuable human resources for strategic initiatives.

Despite its advantages, the use of APIs often demands additional developer resources. Organizations must weigh the benefits of custom solutions against the potential costs of development and testing.

User Experience and Management

In the realm of cybersecurity, the efficacy of threat prevention tools hinges significantly on user experience and management functionalities. McAfee Endpoint Security (ENS) is no exception. A streamlined user experience combined with robust management capabilities ensures that IT professionals can deploy, monitor, and adjust security measures efficiently. This not only enhances organizational productivity but also fosters a proactive security culture.

User Interface Design

An intuitive user interface (UI) for McAfee ENS is key to enhancing usability. The design must prioritize simplicity while facilitating complex security tasks. An effective UI allows IT administrators to navigate the system with ease. With a well-organized dashboard, necessary metrics and options are readily accessible.

When evaluating the UI, consider the following:

  • Clarity: Clear labels and icons help users find tools without confusion.
  • Accessibility: Features are often categorized logically, reducing the time needed to access different sections.
  • Personalization: Users can often customize their experience, adapting views and settings to fit their workflow.

Overall, a strong UI design encourages efficient task execution and minimizes the learning curve for new users.

Centralized Management Console

The centralized management console is a pivotal component of McAfee ENS, enabling administrators to oversee multiple endpoints from a single interface. This feature is critical, particularly for organizations with varied IT environments that might include on-premises and cloud-based deployments.

Some notable benefits include:

  • Real-time Visibility: Administrators can monitor system performance and threats as they arise.
  • Easiness to Run Reports: Generating security reports becomes straightforward, providing insights into potential areas of improvement.
  • Bulk Management: Tasks such as software updates, configuration changes, and policy applications can be performed across multiple devices simultaneously, streamlining management processes.

Centralized management reduces oversight complexity and supports a quicker response to emerging threats.

Policy Management

Effective policy management forms the backbone of any successful cybersecurity strategy. In McAfee ENS, policy management is designed to be both comprehensive and user-friendly. Administrators can set up, adjust, and enforce policies to ensure compliance with security protocols.

Key aspects of policy management include:

  • Configurable Security Policies: Tailoring security measures to meet specific organizational needs is vital. Users can define rules concerning malware scans, firewall settings, and application control.
  • Policy Enforcement: The system automatically enforces policies across the network, minimizing vulnerabilities from human error.
  • Audit Trails: Continuous monitoring and audit logs help in tracking compliance activities, an essential aspect for organizations that must adhere to regulatory requirements.

"In the world of cybersecurity, simplicity and efficiency are crucial in addressing complex threats effectively."

This understanding is vital for decision-makers tasked with selecting the right tools to defend their organizations against evolving cyber threats.

Performance Metrics

In the realm of endpoint security, performance metrics serve as a critical gauge to evaluate the effectiveness of any given solution. They allow organizations to measure capabilities that directly impact their security posture and operational efficiency. McAfee ENS Threat Prevention is no exception. It is important for IT professionals and decision-makers to understand various performance metrics, as these elements inform choices about deployment and optimization.

Detection Rates

Detection rates are fundamental in assessing the ability of McAfee ENS to identify threats accurately. A high detection rate means that the software can identify a significant percentage of known malware and potential vulnerabilities. This is crucial for preventing breaches and ensuring the safety of sensitive data. Organizations value solutions that can distinguish malicious files from benign ones effectively.

Factors affecting detection rates include:

  • Signature Updates: Regular updates improve detection of new threats.
  • Heuristic Analysis: Analyzing behaviors to detect unknown malware enhances accuracy.
  • Integration: Compatibility with threat intelligence feeds enriches detection capabilities.

A detailed analysis shows that McAfee ENS maintains competitive detection rates, positioning it as a viable choice among enterprise solutions. However, it's essential to consider real-world performance, as lab tests can sometimes produce different results than actual deployments.

Impact on System Performance

The impact of security software on system performance cannot be overlooked. Users demand efficient tools that do not immobilize their systems or slow down critical applications. McAfee has focused on minimizing resource usage while still providing powerful protection.

When evaluating this impact, consider:

Infographic detailing unique features of McAfee ENS and their benefits
Infographic detailing unique features of McAfee ENS and their benefits
  • CPU and Memory Usage: Monitoring how much of system resources are consumed during scans is essential.
  • Disk I/O Operations: Excessive read/write operations can degrade performance.
  • Usability: The software should have an unobtrusive presence, allowing for smooth user experience.

Many organizations appreciate the balanced approach McAfee ENS offers in this respect. By utilizing intelligent algorithms, it can run background scans without disrupting user activity, which is an essential consideration for firms focusing on productivity.

Response Times

Response time reflects how quickly McAfee ENS can react to detected threats. This metric is vital, as faster response translates to reduced window for exploitation of vulnerabilities. Organizations facing active threats must prioritize solutions that offer rapid response.

Key components related to response times include:

  • Real-Time Protection: Immediate actions when a threat is detected are crucial. McAfee ENS provides near-instantaneous alerts and quarantine of threats.
  • System Recovery: Evaluating how quickly the system can recover post-incident is essential. McAfee offers tools for rapid restoration, which is advantageous in mitigating longer downtimes.
  • Automated Responses: The automation of certain responses can drastically reduce the time taken to neutralize threats, preventing further harm.

In summary, assessing detection rates, system performance impact, and response times can provide insights into the capability of McAfee ENS Threat Prevention. These performance metrics are crucial when evaluating its effectiveness within any cybersecurity architecture. Understanding these factors ensures that businesses can align their security strategies with their operational needs.

Case Studies and User Testimonials

Understanding the real-world applications of McAfee Endpoint Security (ENS) Threat Prevention is crucial for stakeholders in today’s complex cybersecurity landscape. Case studies and user testimonials provide insights that transcend mere product specifications. They offer proof of concept and demonstrate how McAfee's solutions perform under varying conditions, showcasing effectiveness, adaptability, and reliability. This information is invaluable for decision-makers assessing multiple security solutions and seeking evidence to support their investment choices.

Successful Implementations

Successful implementations of McAfee ENS reveal common strategies and outcomes that can guide organizations considering this product. One notable case involved a financial services company that faced increasing cyber threats. The company integrated McAfee ENS to bolster its defenses. Within months, the organization reported a 90% reduction in malware incidents. This decrease can be attributed to the combination of powerful malware protection and timely updates from McAfee's threat intelligence.

Another compelling example comes from a healthcare organization. They dealt with sensitive patient data and developed a stringent need for data protection. After deploying McAfee ENS, they experienced not only enhanced security but also streamlined compliance with regulations such as HIPAA. The solution's file integrity monitoring helped maintain rigorous standards, allowing them to focus on patient care rather than security headaches.

These practical instances illustrate how deploying McAfee ENS can create significant change, fostering trust among clients and stakeholders while minimizing potential losses due to security breaches.

User Feedback and Insights

User feedback often reflects a product’s true value. Many IT professionals and system administrators have shared their experiences, providing critical insights into McAfee ENS's performance.

Users frequently commend the centralized management console, which simplifies oversight of security policies across devices. Many report that this functionality saves considerable time compared to previous solutions. Furthermore, the responsiveness of McAfee’s support team has been a recurring theme in positive testimonials. Users appreciate the quick resolution of issues, which is crucial in a field where every second counts.

However, not all feedback is positive. Some users have raised concerns about system performance impact during scans. This dissatisfaction is not universal, but it is a consideration for those with resource-intensive operations. Ultimately, user feedback helps potential customers make informed decisions, focusing on both strengths and areas for improvement in McAfee ENS.

"Real-world usage often shapes our understanding of a product's effectiveness far more than any marketing claim."

Through examining case studies and user testimonials, prospective buyers can ascertain the practical implications of implementing McAfee ENS. These narratives offer grounded perspectives that can significantly influence purchasing decisions.

Competitive Landscape

Understanding the competitive landscape is crucial for any organization evaluating security solutions like McAfee ENS Threat Prevention. This section explores how McAfee’s offering compares with other solutions, highlighting its unique advantages.

Comparative Analysis with Other Solutions

In a crowded cybersecurity market, McAfee stands out for several reasons. When comparing McAfee ENS Threat Prevention to competitors like Symantec Endpoint Protection and CrowdStrike, specific aspects emerge.

  1. Detection Capabilities: McAfee boasts robust malware detection rates. Its machine learning algorithms are designed to identify threats swiftly and accurately. In contrast, some competitors may rely on signature-based detection, which could fall short against zero-day exploits.
  2. User Interface: The user interface of McAfee ENS is often noted for its simplicity, making it suitable for IT departments with varying skill levels. Competitors can sometimes present complex options that could confuse less experienced users.
  3. Integration: McAfee offers extensive integration options, allowing seamless connection with other security tools and infrastructure. This is an advantage over some solutions that may require more complex configurations.
  4. Customer Support: A lot of users report strong customer support from McAfee, which can significantly impact the overall experience and satisfaction for businesses relying on these systems.

Overall, while many cybersecurity solutions exist, McAfee ENS Threat Prevention provides a compelling combination of powerfully integrated features, expert support, and user-friendly design.

Market Positioning

Market positioning of McAfee ENS Threat Prevention reflects its strengths and cumulative advantages, which are relevant for any enterprise considering endpoint security.

  • Target Audience: McAfee targets both small businesses and large enterprises. This broad positioning helps it adapt to varied operational needs.
  • Brand Recognition: With a long history in cybersecurity, McAfee has cultivated a reputable brand. Recognition plays a role in instilling trust, especially in highly sensitive fields like financial services and healthcare.
  • Pricing Strategies: McAfee adopts competitive pricing models, often offering flexible plans that can fit the budgets of organizations in different stages of growth. This can be an attractive point for businesses conscious about costs.
  • Innovation and Updates: By frequently updating its software based on emerging threats, McAfee positions itself as a proactive leader. This approach contrasts with some slower-moving competitors who may not adapt as quickly to evolving cyber threats.

Epilogue

In assessing the McAfee Endpoint Security Threat Prevention, we find multiple dimensions that highlight its significance. The conclusion encapsulates the main arguments and fascinates potential users by synthesizing the critical elements discussed throughout the article. Understanding these points is paramount for businesses aiming to invest in cybersecurity solutions that can effectively shield their operations from increasingly sophisticated threats.

Summary of Key Points

  • Comprehensive Threat Protection: McAfee ENS offers a robust set of features targeting malware, ransomware, and advanced persistent threats, ensuring consistent security for endpoints.
  • Flexible Deployment: Options for on-premises and cloud-based deployment make it suitable for diverse enterprise environments, catering to varying security needs.
  • User-Centric Management: The centralized management console simplifies user interface interactions while enhancing policy management and administrative efficiency.
  • Performance Metrics: Real-world data reveals high detection rates along with minimal impact on system performance, which is essential for organizational productivity.
  • Strategic Position: McAfee competes effectively within the broader landscape of cybersecurity solutions, maintaining a strong market presence through continuous innovation.

Final Recommendations

For organizations considering their cybersecurity strategy, several recommendations are apparent:

  • Assessment of Needs: Evaluate specific business requirements and threats faced before selecting McAfee ENS or any other security product.
  • Integration Planning: Consider compatibility with existing infrastructure. Examine whether integration can be seamless with current security stack and management environments.
  • Trial and Engagement: Engage in a trial period when possible. This helps in understanding functionality, user interface, and overall engagement with the product before committing.
  • Stay Updated: Regularly monitor updates and new features from McAfee. Cybersecurity is a rapidly evolving domain, and ensuring the software is up to date is critical for optimal protection.
Email finder tool interface showcasing user-friendly design
Email finder tool interface showcasing user-friendly design
Discover the top email finder tools of 2021! πŸš€ This analysis reveals vital features, pricing, and experiences to enhance your business outreach. πŸ“§
User interface comparison of Wave and QuickBooks Online
User interface comparison of Wave and QuickBooks Online
Explore the critical differences between Wave and QuickBooks Online for B2B operations. 🧾 Dive into features, pricing, user experience, and support. πŸ“Š
User interface of RingCentral Video Conferencing platform
User interface of RingCentral Video Conferencing platform
Explore RingCentral Video Conferencing in detail! Discover features, benefits, integration options, and future trends to elevate your remote communication. πŸ“žπŸ’»
Comparison of project management software features
Comparison of project management software features
Discover alternatives to Microsoft Project management software. Explore features, pricing, and user reviews to find the best fit for your organization. πŸ“ŠπŸŒ
Overview of MindView Gantt Chart interface showcasing project timelines
Overview of MindView Gantt Chart interface showcasing project timelines
Explore the capabilities of MindView Gantt Chart for project management. Gain insights on integration, user benefits, and valuable experiences. πŸ“ŠπŸ“
Overview of Vinsolutions Cost Structure
Overview of Vinsolutions Cost Structure
Explore Vinsolutions costs in-depth! πŸ“Š Understand pricing models, cost structures, hidden fees, and how they compare to alternatives. Make informed decisions! πŸ’Ό
Overview of process automation solutions
Overview of process automation solutions
Explore the intricacies of process automation software companies, uncovering essential insights, trends, benefits, and challenges. πŸ–₯οΈπŸ€– Empower your decision-making!
Conceptual illustration of elastic email marketing
Conceptual illustration of elastic email marketing
Discover the essentials of elastic email marketing. 🌟 Explore its benefits, tools, and best practices to strengthen your business communication strategies today!