Secure Computing Licensing Benefits Pricing
Secure Computing Licensing Benefits
Get the industry’s best protection
Use proactive intent analysis to filter out malicious content from web traffic in real time. By scanning a web page’s active content, emulating and understanding its behavior, and predicting its intent, McAfee Web Gateway proactively protects against zero-day and targeted attacks. Outbound malware detection identifies and isolates existing infections phoning home, and prevents sensitive data from leaving the organization through Web 2.0 sites.
Use hybrid security to enhance protection
Web Gateway combines local protection from its powerful, proactive intent analysis with cloud-based intelligence (powered by McAfee Labs) to provide advanced protection. For both URL categorization and security-focused web reputation, choose between on-premise and cloud look-ups, or opt to use a combination of both for optimal protection and performance. Cloud-based virus look-up capabilities, through McAfee Artemis technology, enable Web Gateway to provide greater protection while optimizing security on a single platform.
Extend control with a powerful policy engine
A powerful policy engine enables unmatched flexibility and control in creating and applying policy, supporting the multi-tenancy needs of the largest enterprises and service providers. Web Gateway also extends this flexible control to web applications. Beyond simply allowing or denying access, Web Gateway provides detailed control over how web applications are used, including popular instant-messaging applications.
Block data loss
Keep confidential information from leaking out of your organization by scanning user-generated content on all key web protocols. Have advanced data loss needs? Rely on Web Gateway to integrate with McAfee Data Loss Prevention (DLP) solutions.
Protect encrypted traffic
Close the new backdoor through your security barrier with fully integrated malware detection, SSL inspection, and certificate validation directly on the Web Gateway appliance.
Leverage powerful reporting tools and customizable dashboards
Identify your organization’s usage trends, isolate problems, document inappropriate web activity, and comply with regulations with powerful reporting capabilities and integration with the McAfee ePolicy Orchestrator (ePO) platform. Use this information to tailor filtering settings to best enforce your web-usage policies.
McAfee SmartFilter is the intelligent web filtering software solution designed to prevent your employees from accessing sites that expose your organization to viruses, malware, and other security risks, while reducing legal liability, maximizing employee productivity, and preserving bandwidth for business-related activities.
Industry-leading protection — Puts an end to malicious code and web-borne viruses that can enter the network when users unknowingly visit infected websites. SmartFilter uses McAfee TrustedSource Global Threat Intelligence technology to proactively block traffic to sources that may pose a security risk.
Reduced risk and increased productivity — Filters and monitors Internet use to control outbound web access and protect against web-based threats. SmartFilter helps you reduce legal liability, increase employee productivity, and preserve bandwidth for productive work.
Full flexibility — Includes predefined filtering policies for over 35 million blockable websites in more than 90 categories. Customize (add categories, create block/allow lists, exempt certain URLs, and more) as needed.
Secure anytime, anywhere protection that is always current
Protect your entire network, even roaming users, against fast-changing malware, spyware, and phishing schemes. McAfee SaaS Web Protection delivers a broad defense that is continuously updated through the cloud, so it is never outdated.
Get convenient policy enforcement and reporting
Enforce Internet-use policies and gain visibility into web usage with detailed reports by user group. Custom web-based dashboards enable easy monitoring, tuning, and reporting for seamless control over inappropriate Internet use. Monitor trends and better understand how your organization uses the web and email, so you can isolate problems, document inappropriate activity, and comply with regulations.
Link more than 100 content categories to your specific user communities and gain quick, custom content control that can help protect your business against wasted time, clogged bandwidth, and legal liabilities.
Scale protection with your business needs
Replace escalating demands for on-premise capital equipment and IT staffing with our Security-as-a-Service. Your web traffic is automatically routed to our nearest data center, which is built with the capacity and performance to instantaneously handle all requests. With no onsite equipment, client components, or security updates to manage, you save on IT administration.
Protect against all inbound threats
Get powerful anti-spam technology that identifies and blocks incoming spam with over 99% accuracy while protecting against viruses, malware, phishing, directory harvest, denial of service (DoS), bounceback attacks, zero-hour threats, and spam surges.
Gain real-time Global Threat Intelligence
Count on TrustedSource, the world’s most precise and comprehensive Internet host reputation system. TrustedSource continuously monitors and characterizes Internet senders through a global network of more than 10,000 sensors in 82 countries.
Keep structured and unstructured data secure
Prevent data loss with the industry’s most extensive on-box email data loss prevention (DLP) capabilities. Fingerprinting, lexical analysis, and clustering techniques supplement keyword and pattern matching to detect both structured and unstructured data. Policy-based message handling then prevents outbound data loss. These industry-leading email content analysis tools provide the tightest control of sensitive content in any form to aid compliance with many state, national, and international regulations. McAfee Email Gateway can also integrate with McAfee Network DLP Prevent to enhance the solution’s ability to correctly identify sensitive data and assist in its safe handling.
Simplify email security management
Take advantage of flexible policy creation and enforcement, plus enterprise-class logging and reporting capabilities, to simplify administration and compliance workloads while lowering costs. Email Gateway supports GLBA, HIPAA, SOX, and other compliance mandates.
Stop viruses and malware
Gain integrated protection against email-borne viruses and malware with the McAfee Email Anti-Virus Engine. For enterprises that want to deploy a second anti-virus vendor at the gateway, McAfee Email Gateway can also run Authentium anti-virus.
Support a broad user base
Get policy-based email encryption that uses a combination of B2B (TLS, S/MIME, and OpenPGP) and B2C (push and pull) technologies to ensure that even recipients without encryption capabilities can receive and reply to secure email.
Reap the benefits of a hybrid solution
Choose a hybrid solution by combining the McAfee SaaS Email Protection service with the McAfee Email Gateway appliance. Filter spam in the cloud and protect sensitive data with on-premise appliances which provide data loss prevention, flexible policy creation, and encryption.
McAfee Firewall Profiler (included) — instantly analyzes network traffic and firewall rules to provide insight into the effectiveness of your firewall configuration in enforcing your corporate security policy. Firewall Profiler dramatically reduces the time needed to solve firewall-related network or application outages from hours to minutes, turning substantial manual efforts into a few simple clicks.
McAfee Firewall Reporter (included) — turns audit streams into actionable information. This award-winning security event management (SEM) tool delivers central monitoring plus correlated alerting and reporting to help meet all major regulatory requirements, including PCI DSS, GLBA, HIPAA, SOX, and FISMA.
McAfee Firewall Enterprise Control Center (sold separately) — offers centralized, enterprise-class firewall policy management for global-scale deployments.
Know what users are doing inside your network at all times. Compare user activity against security and business policies to minimize security risks and legal liability. Network User Behavior Analysis complements access control solutions by verifying that users are not bypassing access controls, and helps monitor post-connect user behavior.
Increase efficiency and lower costs
Automate labor-intensive discovery and analysis of what users are actually doing to save time and money. With more accurate and tamperproof information from Network User Behavior Analysis, you can identify and respond to threats more quickly and with greater confidence. Since it provides an intuitive, complete view of who is doing what and where across your network, Network User Behavior Analysis is proven to reduce the cost, effort, and risk associated with network planning and changes.
Enhance user-identity capabilities
Get detailed information about the users who access business-critical applications. Dynamic integration with user directories provides each user’s name, role, and policy context. Any changes made in the directory automatically filter down to Network User Behavior Analysis Monitors.
Simplify compliance and auditing
Make audit preparation faster and easier with ongoing monitoring to ensure compliance with PCI DSS requirements, as well as FISMA, SOX, HIPAA, and GLBA regulations.
Deploy cost-effective, scalable monitoring
Enable out-of-band monitoring with no network reconfiguration. Network User Behavior Analysis Monitor utilizes packet capture (pcap) and network flow data, requires no agents, no application integration, and no recoding. For identity-based monitoring, Network User Behavior Analysis builds on the identity and role information in your existing directories.
Leverage your existing infrastructure
Integrate Network User Behavior Analysis quickly and easily with Active Directory and LDAP-based directories, network routers and switches, non-Microsoft Windows identity clients like Centrify, and flow-based data from Cisco and Juniper.