SIA Partner Directory

SIA Partner List

SIA Partner Description McAfee Compatible
Absolute ID

Absolute ID is an innovative provider of data-centric protection products and services. Every Absolute ID solution employs proprietary cryptography technology that creates sophisticated, highly secure data files; dramatically enhances data availability, confidentiality, and integrity; and prevents unauthorized access or theft of digital data while lowering total cost of ownership.

Advanced Software Products Group

Advanced Software Products Group, Inc. (ASPG), a leader in data center security software since 1986, offers flagship products including MegaCryption (data encryption for z/OS, UNIX, LINUX and Windows), ReACT (enterprise password reset and synchronization), and ERQ (RACF administration, reporting and custom user scripting). Data centers worldwide continue to make ASPG software solutions their products of choice to increase productivity, protect data, and solve critical issues in their z/OS and enterprise environments. ASPG offers innovative software solutions for data security, storage administration, capacity planning, system productivity and CICS productivity.

ASPG will create an interface between its Enterprise Self-Service Password Reset product ReACT, and McAfee’s Endpoint Encryption. ReACT normally allows users who have forgotten their system/application passwords to automatically reset or unlock those accounts after performing a few simple authentication steps. These capabilities will be extended to allow a user whose system is secured by McAfee Endpoint Encryption to authenticate and unlock the system in the event that they have lost or forgotten their EP password or PIN, without the need to call a help desk or support group for assistance.


The Dutch company A.E.T. Europe B.V. (AET), headquartered in Arnhem and founded in 1998, is committed to IT security. AET is setting new standards in the crucial business area of developing middleware and card management systems for smart cards and USB tokens with its SafeSign Identity Client and BlueX digital ID management.

The combination of SafeSign Identity Client (IC) and McAfee Endpoint Encryption pre-boot authentication integrates authentication, access control, and hard disk encryption. Customers using smart cards or USB tokens for local access control at the McAfee secured client can add applications to the smart card or USB token as the demand grows, without having to change the smart cards, USB tokens, or client infrastructure.

McAfee Compatible solution:
SafeSign and McAfee Drive Encryption 7.1.


Agiliance is a leading independent provider of Governance, Risk and Compliance (GRC) solutions. Delivered on-demand or on-premise, Agiliance GRC technology minimizes manual auditing through scalable automation to enable closed loop risk management and continuous compliance. Agiliance customers use real-time risk analysis to optimize business performance and make better investment decisions. Unlike legacy offerings that can take nearly a year to deploy, Agiliance’s Global 2000 and public sector customers deploying the RiskVision™ platform achieve demonstrable value within 30 days on-demand, and within 90 days on-premise, made possible by Agiliance’s extensive library of technology integrations and GRC content. RiskVision scales with businesses, effectively managing data, assets, people and processes to achieve exceptional risk and compliance coverage.

The McAfee portfolio of products automates the collection, testing and enforcement of security controls throughout the enterprise. Agiliance enables highly scalable, quickly deployable, organization-wide risk, compliance and security management in real-time. The McAfee Compatible integration of Agiliance RiskVision with McAfee ePO and McAfee Vulnerability Manager offers a unique, closed-loop risk management solution for risk-based security with exceptional accuracy and coverage. RiskVision is also interoperable with McAfee Policy Auditor, McAfee Risk Advisor, McAfee Endpoint Encryption and McAfee VirusScan Enterprise.

McAfee Compatible solution:
Agiliance Risk Vision 6.0 with McAfee ePO 4.5 [EOL] and Agiliance Risk Vision 6.0 with McAfee Vulnerability Manager 6.5 [EOL].

AirPatrol Corporation

AirPatrol delivers wireless threat management solutions that empower customers to have total awareness of wireless 802.11 and cellular devices within their facility and total control over how corporate wireless and USB endpoint assets are used. The company’s comprehensive suite of location-based wireless security products enable security professionals in the government, financial, healthcare, corporate enterprise, and retail industries to keep pace with the expanding security requirements of an increasingly mobile world.

AirPatrol’s Wireless Policy Manager (WPM) extends the capabilities of McAfee’s ePolicy Orchestrator (ePO) platform into the wireless regime, giving network administrators the ability to manage, distribute, and enforce wireless network policies from their central ePO management console. AirPatrol’s WPM is specifically designed to secure wireless interfaces on endpoints and allows IT administrators to easily enforce common-sense rules that govern how employees use wireless resources. With WPM, organizations can secure valuable laptops and PCs against today’s wide range of mobile and wireless threats.

Read the solution brief for more details

McAfee Compatible solution:
AirPatrol WPM 1.0 and McAfee ePO 4.6.


AlgoSec is a market leader in network security policy management. AlgoSec enables security and operations teams to intelligently automate the policy management of firewalls, routers, VPNs, proxies, and related security devices, improving operational efficiency, ensuring compliance, and reducing risk. More than 900 of the world’s leading enterprises, MSSPs, auditors, and consultancies rely on AlgoSec Security Management Suite for unmatched automation of firewall operations, auditing and compliance, risk analysis, and the security change workflow.

AlgoSec enables organizations running McAfee Firewall Enterprise to automate firewall management by ensuring correct policy configuration and continuous compliance. AlgoSec discovers unused and risky rules, automatically generates compliance reports, and automates the change workflow process to improve both security and operational efficiency.

Read the solution brief for more details

McAfee Compatible solution:
AlgoSec Security Management Suite 6.3 and McAfee Firewall Enterprise 7.0 and 8.2.

Allen Corporation of America

Allen Corporation of America provides cybersecurity research, technology, and training solutions to organizations and individuals tasked with detecting and investigating cybercrimes. Allen Corporation’s Advanced Threat Identification-Preemptive Defense (ATI-PD)™, efficiently enforces authorized use policies and protects against insider threats.

By leveraging the investments that organizations have made in McAfee endpoint protection suites, extending the one security agent and centralized management view provided by McAfee ePO, and utilizing the enforcement features of McAfee Host Intrusion Prevention, ATI-PD helps companies protect their critical assets and save time and money. ATI-PD leverages the signature database of one of the industry’s leading malware discovery tools for forensic investigations, WetStone Technologies™ Gargoyle Investigator™, enabling ATI-PD to detect and block the execution of thousands of malicious programs and tools in categories such as steganography, hacker toolkits, encryption, keyloggers, wireless surveillance, password crackers, and anti-forensics.

McAfee Compatible solution:
Allen Corporation Advanced Threat Identification-Preemptive Defense (ATI-PD) software version 1.0 and McAfee Host Intrusion Prevention software version 7.0 and McAfee ePO 4.5, with McAfee Agent version 4.5 on Windows workstations and servers [EOL].


Since 2008, Allgress has been helping risk and security professionals apply business risk context to security so that senior management can make informed decisions that align with top business priorities. Allgress provides Global 2000 organizations the insight to communicate and manage risk posture with a business focus to better evaluate the costs and benefits of remediating enterprise risks, security, and compliance. Unlike other risk management solutions, Allgress reduces the complexity to derive value in days instead of months by streamlining implementation, automating manual tasks, and providing effective visual management of the entire risk, security, and compliance process.

The Allgress Insight Risk Management Suite automates the collection of vulnerability data from the McAfee Risk Management solution through seamless integration to McAfee Vulnerability Manager. This enables comprehensive end-to-end lifecycle management of governing risk programs with recognized frameworks, standards, and best practices to align with top business priorities. The integrated solution allows for converging disparate risk silos so business stakeholders can easily gain immediate intuitive insight to understand and prioritize resources and budgets for more predictable business outcomes without an army of consultants.


Apperian is the industry pioneer for mobile application management. Its cloud-based platform is the standard for managing corporate mobile apps and data in the enterprise. Unlike traditional approaches, Apperian protects and manages just what matters most -the actual apps and data- with a seamless user experience that doesn’t require intrusive technology on user devices. The solution ensures ongoing compliance with security policies and simplifies managing all stages of the mobile app lifecycle, streamlining the complexity of supporting ever-changing versions of apps, operating systems and devices — whether personal (BYOD) or corporate owned. Apperian powers the world’s leading enterprise app stores for hundreds of thousands of users.

Apperian and McAfee have joined forces to bring the power of mobile app management and security to McAfee customers without requiring cumbersome technology on user’s devices. Through McAfee’s ePolicy Orchestrator (ePO), insights into user’s app-level activity help mobile administrators drive the adoption of custom-built apps. Customers utilizing Apperian and ePO can centrally manage app-based policies that can be designed and applied to enterprise apps to ensure mobile compliance across the organization.

Read the solution brief for more details

McAfee Compatible solution:
Apperian EASE with McAfee ePO software 4.6, 5.0, and 5.1.

Aruba Networks

Aruba Networks is a leading provider of next-generation network access solutions for the mobile enterprise. The company's Mobility-Defined Networks empower IT departments to support #GenMobile, a new generation of tech-savvy users who rely on mobile devices for every aspect of work and personal communication. Aruba delivers a secure mobility experience by automating infrastructure-wide performance optimization and security actions that previously required manual IT intervention. The results are dramatically improved security, higher productivity, and lower operating costs.

Aruba has partnered with McAfee to deliver an end-to-end enterprise risk mitigation and management solution by integrating with the McAfee SIEM solution. Aruba's ClearPass, a security and management solution, is a McAfee SIEM supported device. ClearPass is an ultra-scalable, high-availability AAA solution with policy management, guest network access, device on-boarding, and device health checks, with a complete understanding of context. It leverages a user's role, device, location, application-use, and time-of-day to execute custom security policies, accelerate device deployments, and streamline network operations across wired, wireless and VPNs. Both the McAfee SIEM solution and ClearPass are positioned as Leaders in Gartner Magic Quadrants, and used together deliver enterprise-class network access.

McAfee Compatible solution:
Aruba Networks ClearPass 5.x and McAfee ESM 9.1.


AsdeqDocs®, from AsdeqLabs, is a powerful and intuitive enterprise mobile content management (EMCM) solution that enables the secure bidirectional distribution of sensitive corporate documents to and from a tablet device (iPad and Android). AsdeqDocs deeply integrates with an enterprise’s existing IT infrastructure, security policies, and business practices, allowing mobile users the ability to access documents stored within an extensive suite of common backend enterprise document repositories.

AsdeqDocs is fully offline enabled, and stores documents on the device within a highly secure custom container. AsdeqDocs turns what until now has been seen as largely a consumer-oriented device, into a secure, powerful, and productive tool for business users. In the McAfee Security Innovation Alliance program, AsdeqDocs will be integrated with McAfee Enterprise Mobility Management.


Authernative provides innovative user authentication solutions enabling secure mobile, online, and cloud access. Its AuthGuard® versatile authentication server offers a range of multi-factor authentication options based on random partial shared-secret recognition. AuthGuard’s enhanced password, pattern-based one-time PIN, and out-of-band and mobile client user authentication methods provide scalable security, high usability, electronic mass deployment, lower TCO, and device/platform independency.

Authernative will integrate its AuthGuard® server auditing services which accompany its best-in-class authentication with the McAfee ePolicy Orchestrator (McAfee ePO) platform. Authernative and McAfee offer a complementary solution for tracking and auditing strong user authentication options and user authentication events.

Autonomic Software

Autonomic Software develops autonomic desktop management, security, and power management solutions. Autonomic Software's Autonomic Network & System Administration (ANSA) products offer a range of endpoint management capabilities, including patch management, asset management, software deployment, configuration management, government/corporate conformance and policy monitoring, software audit/compliance, and power conservation management.

Autonomic Software's ANSA Platinum Power Management plug-in is integrated with McAfee ePO, providing McAfee ePO users with a comprehensive solution to manage desktop and laptop power usage. With this, enterprises can significantly cut energy costs, reduce global carbon emissions, and increase their networks' "green" footprint. McAfee ePO users have the benefit of applying power policies through a familiar interface and know that they are enforced.

Read the solution brief for more details

McAfee Compatible solutions:
Autonomic Power Manager 1.3.3 and McAfee ePO 4.6
Autonomic Patch Manager 2.1 and McAfee ePO 4.6 and 5.1
Autonomic EndPoint Manager 1.2 and McAfee ePO 4.6


Avecto is a leader in Windows privilege management, helping organizations to deploy secure and compliant desktops, laptops, and servers. Avecto’s mission is to enable customers to lower operating costs and improve system security through the removal of user admin rights. By removing admin rights with Avecto’s award winning Privilege Guard technology, organizations empower all Windows-based users with the permissions they require to perform their roles, without compromising the integrity and security of their systems. Customers with up to 400,000 end users have chosen Avecto Privilege Guard to help them strengthen security across their Windows-based environments.

The integration of Avecto’s Privilege Guard with the McAfee ePolicy Orchestrator (McAfee ePO) platform delivers near real-time monitoring of all privileged activity across McAfee ePO-managed assets, accelerating the roll out of least-privilege desktops through integrated agent and policy deployment. Rich, contextual dashboards and reports provide granular risk and compliance data to enable users to quickly identify and address privileged access requirements. Combining Avecto Privilege Guard with McAfee ePO software gives users increased productivity, simplifies Windows 7 migrations, and delivers comprehensive privilege management across the enterprise.

Read the solution brief for more details

McAfee Compatible solution:
Avecto Privilege Guard 3.8 and McAfee ePO 4.6.


Avencis is a leading independent European vendor specializing in strong authentication and credentials management, providing field-proven solutions to hundreds of customers worldwide. In addition to its own technology, Avencis leverages its strategic technological partnerships to provide security solutions to enterprises and organizations ranging from 1,000 to 150,000 users. Thousands of users use Avencis products and solutions daily to securely and seamlessly access their working environment.

SSOX, Avencis' E-SSO product, together with McAfee’s Endpoint Encryption for PCs, will provide strong authentication, access control, and single sign-on to any application and resource, throughout the enterprise. The joint solution secures access to information, from the initial system boot to the applications themselves, smoothly and seamlessly, bringing tremendous benefits both in terms of information security, convenience, and cost-effectiveness.

McAfee Compatible solution:
Avencis SSOX and McAfee Endpoint Encryption v6.0 on Windows 2008, XP, and VISTA [EOL].


AVOB — Alternative Vision Of Business — is a leading provider of power management and green IT solutions. Established in 15 countries, AVOB offers businesses EnergySaver, its flagship enterprise solution, which reduces networked PCs energy consumption and carbon footprint by up to 75%.

AVOB Energy Saver 5 is fully integrated in the McAfee ePolicy Orchestrator (ePO) platform. Installation and deployment are seamless, directly managed through the ePO console and can take only a few minutes. An intuitive graphical user interface simplifies the setting of your energy policies and schedules to match the needs of users across your network, without impacting productivity. AVOB’s reliable and secure wake technology allows PCs to emerge from sleep modes for a nightly update and to go back to sleep before waking up in the morning prior to use. AVOB and McAfee customers can save from $20 to $65 per PC each year with a rapid ROI within months.

Read the solution brief for more details

McAfee Compatible solution:
AVOB Energy Saver 5 for McAfee ePO 4.6.

Blackridge Technology

Founded in 2008, BlackRidge Technology, the Identity Aware Network company, provides innovative Identity-based cyber security solutions protecting web-based cloud, mobile and data center infrastructures against sophisticated security threats. Built upon patented Transport Access Control (TAC) technology, BlackRidge Eclipse prevents attackers from performing reconnaissance of high-value and mission-critical network assets by denying them the ability to communicate anonymously.

By integrating BlackRidge Eclipse into the McAfee ePO platform customers will gain the ability to manage Identities and their associated policies through a unified view.

Boldon James

For over 20 years Boldon James software has helped organizations with the most demanding communication requirements to manage sensitive information securely and in compliance with legislation and standards. Boldon James extends the capabilities of Microsoft core infrastructure products to allow secure information exchange. In particular, the Boldon James Classifier products provide users with a means to classify and protectively mark emails, documents, and files from within familiar office productivity tools — improving data loss prevention measures and reducing archiving costs. Boldon James is a wholly-owned subsidiary of QinetiQ, with offices in the US, Europe, and Australia, and channel partners worldwide.

Boldon James Classifier integrates with McAfee Network Data Loss Prevention to reduce the risk of data loss by applying the insight of each worker to data loss prevention decisions. Classifier captures the user's knowledge of the business value of data, in the form of visual and metadata markings applied to messages and documents. This user perspective can then be used to supplement automated content scanning, in order to deliver more accurate data loss prevention outcomes with fewer false positives, improved user acceptance, and greater risk reduction.

Read the solution brief for more details

McAfee Compatible solution:
Boldon James Classifier 3.0 and McAfee Network Data Loss Prevention 9.0


BowBridge Software is a leading provider of content security solutions for mission-critical SAP applications. The AntiVirus Bridge products secure file transfers and data feeds into SAP applications and protect them from malware and other content-based threats, such as cross-site scripting and active content. BowBridge content security products have been certified multiple times by SAP and it has a wealth of experience in securing the most complex SAP implementations.

With BowBridge’s latest generation of solutions, customers worldwide benefit from the integration of McAfee virus scan technology into AntiVirus Bridge for SAP solutions. The combination delivers high performance and maximum protection in the most demanding enviroments. AntiVirus Bridge will feed content security related events directly into McAfee ePolicy Orchestrator (McAfee ePO). This will allow customers to monitor and report on their SAP infrastructure without having to access the SAP system, resulting in a more streamlined and consolidated security view.

Read the solution brief for more details

McAfee Compatible solution:
BowBridge Antivirus Bridge for SAP solutions 3.0 and McAfee ePolicy Orchestrator 5.1.

BP Informatica

BP Informatica is an innovator of real-time security intelligence and control solutions. Its flagship product, Kataskopeo, understands network protocols and digital content. By analyzing network behavior and application domain, Kataskopeo manages content for compliance of business policy and regulations. With the KWeb and KDB/KDB2 module, it also provides end to end application monitoring though the ZOs IT environment, helping IT organizations and businesses improve performance and security compliance.

BP Informatica has integrated the KatasKopeo software suite with McAfee Vulnerability Manager for Databases to enhance visibility and deliver compliance through integrated audit reports.

McAfee Compatible solution:
Kataskopeo KDB v 2.0 and McAfee Database Activity Monitoring v4.2 and/or v4.3.


Brinqa is a leading provider of unified risk analytics across operations, assets, and individuals — resulting in a single assessment, monitoring, and reporting platform for IT risk. Brinqa software and cloud services leverage an organization’s existing investments in systems, security, and governance programs to gather, identify, and analyze risk data to quickly respond to emerging threats. Organizations are reducing their IT risk management and compliance costs by over 50% through real-time risk analytics, automated risk assessments, prioritized remediation, actionable insights, and improved communication. Brinqa offers solutions in the following areas — information technology risk management, vendor risk management, and compliance risk management.

The McAfee and Brinqa integrated solution offers customers the ability to have a unified view of risk that has been classified for easy prioritization. The joint solution offers full network asset life-cycle management, integrated risk scoring for identification, and evaluation of critical assets, which results in continuous and comprehensive risk analysis. The correlated and analyzed asset and vulnerability risk data results in normalized vulnerabilities and incidents. The result is information with business context that produces analytics focused on reducing an organization’s risk.

McAfee Compatible solution:
Brinqa GRC Platform 3.5, Brinqa Risk Manager 3.5, and McAfee Vulnerability Manager 6.5.


BUFFERZONE patented technology is a patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity. By isolating potentially malicious content from web browsers, email, and removable media, BUFFERZONE complements McAfee endpoint security products and defends against advanced threats that evade detection. BUFFERZONE includes a configurable bridge for transferring content and data safely between the container and secure network zones, and provides critical intelligence for enterprise-wide security analytics. Easy to deploy and configure, BUFFERZONE is a lightweight solution that works seamlessly with McAfee to provide cost-effective containment for up to thousands of endpoints.

BUFFERZONE integrates with McAfee ePolicy Orchestrator platform to enable mutual customers to manage configuration, rule creation, and reporting while leveraging existing investments in McAfee technology to monitor, scan, and remediate BUFFERZONE’s virtual environment.

McAfee Compatible solution:
BUFFERZONE 4.11 and McAfee ePolicy Orchestrator 4.5 and higher


Buguroo is specialized in application security and cyber intelligence solutions. The Buguroo product suite provides static security analysis of source code, dynamic security assessments of applications and IT assets, early warning services, and cyberthreat-related information. These capabilities, available from the cloud or through onsite appliances, can be leveraged by correlating results obtained from multiple sources to deliver the most accurate and reliable business-oriented security findings.

Integration of Buguroo's product suite with the McAfee ePolicy Orchestrator platform enables organizations to effectively perform security assessments against applications and IT assets, manage findings, and create custom reports. Information about cyberthreats affecting customers' brands, applications and IT assets — such as phishing, cybersquatting, malware, information leakages, and botnets — will also be available for review, response and remediation.


Ceedo Technologies delivers workspace virtualization solutions that extend the reach of business computing to unmanaged PCs. Ceedo allows enterprises to deploy their business applications to a portable virtual workspace that works instantly on any Windows PC, enabling them to provision teleworkers, temps, contractors, and partners without the need to manage additional desktops or increase their data center capacity. Ceedo’s products have been deployed on over four million devices worldwide, where they are managed and used daily by consumers, enterprises, and service providers.


Charismathics is a global leader in identity management software. Its premier product, the Charismathics Smart Security Interface (CSSI), makes it cost-effective and easy for enterprises to integrate multiple authentication solutions into a single, transparent interface. Since 2003, Charismathics has pioneered the field of Public Key Infrastructure (PKI), introducing the first PKI client to support Trusted Platform Modules (TPMs) and the first PKI client to support pre-boot environments. Charismathics offers security products and PKI consulting in a variety of industries, including banking and finance, healthcare, telecommunications, security, government, and PC manufacturing.

Charismathics enables the McAfee Endpoint Encryption client’s broad use of the smart card security chip operating system through integration with CSSI, even into existing PKI-2FA infrastructures. This partnership helps build awareness surrounding pre-boot authentication, and delivers an enhanced, unified security approach to a wide range of enterprise clients and individual users.

McAfee Compatible solution:
Charismathics Smart Security Interface software and Charismathics Plug-n-Crypt USB device and McAfee Endpoint Encryption 5.x (EoL).


Since its founding in 1993, Circadence® has pioneered smarter, faster, and more cost-effective solutions for improving IT performance. What started with an innovative platform for making massively multiplayer online games run faster has quickly grown into one of the most capable suite of optimization solutions available. Circadence’s proprietary optimization protocol drives its solutions, enabling the Circadence MVO™ 1200 WAN Optimization suite of solutions. Deploying Circadence MVO solutions – as hardware or software – extends the capabilities of existing network infrastructures, dramatically improves data transport speed, and ensures uptime of critical point-to-point Internet communications during any situation.

Circadence has partnered with McAfee and will integrate the MVO 1200 WAN Optimization suite with the McAfee ePO platform. Through this integration, customers will benefit from increased visibility and control of MVO from the ePO dashboard, allowing them to manage Circadence solutions using fewer resources while keeping administration costs low, all resulting in increased productivity.

McAfee Compatible solution:
Circadence MVO 1200 WAN Optimization suite and McAfee ePO 4.6.

Confident Technologies

Confident Technologies, Inc. (CTI) provides image-based, multifactor authentication solutions that are highly secure and easy to use. The company’s unique, image-based approach generates one-time passwords (OTPs) and delivers an entirely out-of-band multifactor authentication solution for strong user authentication that is simple to deploy, easy to use, and cost effective. Users authenticate by simply identifying a few pictures that fit their previously-chosen, secret authentication categories. Built with responsive design, Confident Technologies’ image-based authentication solutions are ideally suited for use on mobile devices, allowing users to authenticate with just a few quick taps on the touchscreen. CTI’s image-based, multifactor authentication solutions provide strong user authentication, one-time passwords and out-of-band authentication for secure access to online accounts, web services, applications and other environments.

CTI’s image-based authentication and verification solutions have been fully integrated with the McAfee Enterprise Security Manager (ESM), McAfee’s Security Information and Event Management (SIEM) platform. CTI’s technologies are used to capture IP addresses and other data of users accessing enterprise systems or online accounts, and feed that data to McAfee ESM for analysis and risk management. With this integration, CTI solutions are able to provide progressive authentication based upon risk factors and security level, as well as to provide McAfee ESM with data that can be used to identify and block malicious IP addresses, brute force attacks and other web-born security threats. Image-based authentication solutions for web, mobile and multifactor authentication can be inserted as a layer of authentication anywhere in the enterprise that will gain benefit from the additional threat intelligence fed into McAfee ESM.

McAfee Compatible solution:
Confident Image Shield 2.31 and McAfee ESM 9.1.3.

Core Security

Core Security provides the industry’s first comprehensive attack intelligence platform. With Core Security, enterprises and security professionals can focus on the most likely threats to their critical business assets by modeling, simulating, and testing what an actual attacker would do. Core Security helps more than 1,400 customers worldwide identify the most vulnerable areas of their IT environments to improve the effectiveness of remediation efforts and ultimately secure the business. Core Security patented, proven, award-winning enterprise products and solutions are backed by more than 15 years of applied expertise from Core Labs research and Core Security Consulting Services.

Core Insight leverages vulnerability scans from McAfee MVM and also plans to enrich the value of McAfee ePO platform by providing predictive security intelligence capabilities. By enabling multi-vector threat simulation and live attack execution, ePO users will have the ability to see high-priority risks and prioritize remediation tasks against validated network, application and end user vulnerabilities. As a result, McAfee customers will obtain valuable intelligence regarding their organization’s real-time security posture, while connecting real risks to specific operational and business goals.

Read the solution briefs (ePO, MVM) for more details.

McAfee Compatible solutions:
Core insight 2.6 and McAfee Vulnerability Manager 7.5
CORE Insight Enterprise 2.8 and McAfee ePO 4.6


CorreLog SIEM Agent for IBM z/OS converts z/OS security and operational events in real time to SIEM-ready syslog format. The result is an aggregation of IBM z/OS event data plus distributed syslog data viewable in McAfee Enterprise Security Manager, CorreLog Server, and/or other SIEM operations consoles. The aggregated event data populates these console dashboards in real time for an IT admin team to proactively manage system-wide IT security.

CorreLog SIEM Agent for z/OS ships with CorreLog dbDefender, which provides real-time monitoring of DB2. Any organization with PCI DSS or other industry-standard compliance requirements will benefit greatly from the up-to-the-second data activity monitoring provided by dbDefender. Database activity monitoring capabilities in dbDefender include privileged-user monitoring, recording invalid access attempts, auditing creation/deletion of system-level objects, and other attempts to alter the secure state of DB2.


CounterTack turns the tables on attackers and puts the enterprise back in control of protecting its endpoints. Using stealth, attacker-developed technology and combining it with big data to supercharge endpoints with real-time, forensic-level analysis, CounterTack gives security teams an unobstructed context and visibility into the unseen, the known, and the targeted-attack landscape, for prioritized security outcomes. CounterTack helps organizations regain control against targeted persistent threats by detecting endpoint attacks early and often, across the enterprise by collecting and analyzing data on all OS behaviors from a position of stealth. As a result, incident responders and security teams are able to make better overall security decisions using real-time threat context to automatically analyze endpoint threats, prioritize attacks that need immediate attention, and prevent lateral movement through enterprise systems. Ultimately, CounterTack gives teams the capability to assess their next point of exposure, with the capability to monitor endpoints at scale and correlate malicious endpoint behavior, enterprise-wide.

The CounterTack Sentinel real-time endpoint threat detection and response platform will extend the McAfee Enterprise Security Manager for enhanced visibility on enterprise workstation and server endpoints. The combination of Sentinel being used in concert with McAfee Enterprise Security Manager will give security teams and incident responders advanced attack detection and context so organizations can make better security decisions and counter the most critical endpoint threats with an intelligent, rapid response.


Courion offers a comprehensive identity and access management solution that equips you with visual real-time identity and access information. Quickly and confidently provide open and compliant access to applications and data, recognize and reduce risk as it occurs, streamline compliance activity, and expedite audits.

Courion will integrate identity-related information with McAfee ePO to link users, access policies, and sensitive data throughout the enterprise. This will help answer questions such as: Where is sensitive data? Who has access to it? What kind of access and controls are in place for different users and resources? The joint solution will help bridge the knowledge gap between user identity and access policies in heterogeneous customer environments.


CryptoTech provides hardware-based signature and authentication solutions with a strong commitment to ease of use, flexibility, and security on crypto smart cards and USB tokens. As optimal personal sensitive data protection and storage devices, hardware tokens are widely integrated with CryptoTech’s own or third-party software solutions dealing with PKI-based model of information security.

CryptoTech is committed to open standards and plans to provide a security solution that combines the strengths of McAfee Endpoint Encryption with the protection of secret keys offered by their smart card product line CryptoCard multiSIGN family.


CyberArk® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments.

CyberArk’s PIM Suite integration for McAfee ePO provides near real-time alerts and a view of Privileged User activity and accountability for critical IT assets, including servers, databases, networking components & applications across the datacenter, which is particularly useful for highly regulated firms, service providers and government agencies.

Read the solution brief for more details

CyberArk’s Application Identity Manager (AIM) integration for McAfee Vulnerability Manager (MVM) provides a fully automated, ultrasecure and auditable run-time vulnerability scanning authentication capability. The integration provides enhanced information security for MVM’s privileged access credentials by storing them within Enterprise Password Vault (EPV) and optionally changing the credentials after every use, without operator intervention or knowledge.

McAfee Compatible solutions:
CyberArk PIM Suite 6.0 & 7.0 and McAfee ePO 4.6
CyberArk Application Identity Manager, EPV, and McAfee Vulnerability Manager 7 & 7.5


CyberPoint delivers innovative, leading-edge cybersecurity products, solutions, and services to customers worldwide. Its internal research and development team takes the practical lessons learned from engagements and develops products that put that knowledge to work for commercial, international, and Federal Government customers. DarkPoint, an enterprise and cloud-based product, automates complex malware analysis to enable junior analysts, SOC operators, and forensic responders to efficiently analyze large volumes of malware. The DarkPoint intelligent workflows, fully extensible platform, and pattern matching capabilities enable organizations to see the impact of malware across their enterprises.

DarkPoint plans to integrate with McAfee Advanced Threat Defense to provide custom workflows and pattern matching using McAfee Advanced Threat Defense analysis capabilities. This solution will enable large and small enterprises to encapsulate processes, procedures, and workflows into a complete malware analysis solution designed to stop today’s threats and identify tomorrow’s problems.


Founded in 2011, CyberSponse is a leading provider of automated incident response (IR) solutions for cyber security threat management. The scalable and integrated IR platform helps companies prevent the destructive brand impact and financial losses of data breaches by providing advanced out-of-band IR automation. Designed for computer security incident response teams (CSIRTs), CyberSponse allows them to securely and seamlessly communicate across the organization, while automating workflows and tasks. Organizations across a wide range of markets including financial services, healthcare, retail, government, higher education, utilities, and hospitality turn to CyberSponse to shorten the time it takes to resolve cyber threats. CyberSponse workflow automation and tracking features make it the only platform available for full Tier 4 NIST compliance. It enables adaptive response, while including all stakeholders and facilitating information sharing with other organizations through its participation with information sharing and analysis centers (ISACs).

The CyberSponse IR360 platform integrates with McAfee Enterprise Security Manager by ingesting McAfee SIEM data and automatically initiating workflows for IR teams. CyberSponse couples with McAfee tools and enables teams to effectively operate and maintain full awareness and execution of their response plans and policies. CyberSponse provides IR teams with full command-and-control capabilities and the ability to manage SIEM data.


Cybertap delivers powerful and human-oriented tools to investigators of net-based activity. Cybertap supports ’Insider Threat’ investigations, eDiscovery, eFOIA, lawful intercept of network traffic, many intelligence uses, cybersecurity, and net-based crime damage assessments. Current generation tools provide a net-oriented view of activity consisting of IP addresses, traffic type, and some basic content inspection, but human-oriented activity doesn’t operate on these elements. Cybertap Recon operates on and reassembles captured network traffic back to its original form: PDF documents, web pages, MySpace, Chat sessions, photos, VoIP sessions, etc. and then indexes everything, to include attribute data, metadata, and IP addresses. Recon then provides investigators with powerful tools to search, visualize, make associations among, and export relevant data sets in support of information security, loss (intellectual property, money, and sensitive materials) prevention, Human Resources actions, Legal filings, and State and Local law enforcement crimes investigations. Cybertap makes the lowest level data relevant to the highest level investigators.

Cybertap Recon will integrate with the McAfee ePO platform to provide an alerting mechanism for the triggering of human-oriented network activity investigations employing the Recon tools. This joint solution will result in the quickest reaction to anomalous events and most thorough investigation of their substance and impact.


Cylance, Inc., a global provider of cybersecurity products and services, is changing the way companies, governments and end users proactively solve the world’s most difficult security problems. Through a holistic security process called Presponse™, Cylance couples the understanding of a hacker’s mentality with algorithmic intelligence and technology to be truly predictive and preventive against advanced threats. Powered by a global user community and an elite team of security experts, Cylance is solving large and complex problems simply and elegantly. Cylance's integration with McAfee ePO makes smart solutions smarter. Focused on advanced threat intelligence for incident response, forensics, and IT departments, this combination of security provides the most efficient and effective contextual information to classify the unknown as either safe or a threat.


Cyvera is an innovative provider of cyberdefense solutions, protecting organizations from sophisticated, targeted cyberattacks that strive to gain access to sensitive data assets or destruct the operational infrastructure. With Cyvera's products, organizations can block the most up-to-date computer attacks, even when the attacks utilize novel methods, known only to the perpetrators — from zero-day malware and highly obfuscated exploits to any other form of attack that aims to evade existing security solutions. Cyvera's products are based on a new concept of cyberattack prevention. Instead of trying to monitor, sample, or analyze actions to identify the attack — and only then to contain it — Cyvera first obstructs the attack flow, and only following the successful prevention, extracts information and valuable intelligence on the attack.

When Cyvera is integrated with McAfee ePolicy Orchestrator (McAfee ePO), the solution provides an additional significant layer of security. Organizations can deploy Cyvera's solution with no additional agent installed or separated distribution and management systems. Cyvera TRAPS, together with McAfee security, can provide your organization with the most comprehensive solution against targeted attacks.


DearBytes helps organizations gain and maintain control over the security of critical assets and information. As a security service provider, DearBytes has extraordinary insights into the daily, real-world challenges companies face controlling security. The solution-driven attitude of DearBytes led to the development of various tailor-made solutions such as Dear360 (security risk management using McAfee technology), Bytescan, and its highly valued managed services program.

Bytescan is DearBytes’ advanced second-opinion antimalware solution, powered by HitmanPro. After the integration of Bytescan into McAfee ePolicy Orchestrator (McAfee ePO), organizations will be able to easily implement a multivendor approach to secure their endpoints, managed from one security console. Detected malware by Bytescan will be immediately available for analysis by McAfee Labs, which will allow for faster detection and removal of malicious software using McAfee VirusScan Enterprise.


Def-Logix, Inc. is an emerging leader in the provision of Information Assurance, Software Engineering, and Information Technology services to the Defense, Intelligence and Commercial communities. Our mission is to provide innovative technological expertise and solutions to our customers. We offer specialized services in computer and network security and state-of-the-art technology solutions to serve the critical needs of our government and commercial customers. Def-Logix sets itself apart by the caliber of its work and a strong culture of innovation.

Deployable Enhanced Forensics (DEF) - End Node Detector (END) includes cutting edge tools for performing computer/network forensics in the Enterprise. It automatically correlates boundary network events to host systems, and then automatically collects forensic information from effected devices. This information is analyzed by a server to determine if the system has been compromised. DEF-END will be integrated with ePO, with incidents reported back to ePO dashboards where appropriate action can be taken by system administrators or incident responders.

DG Technology

DG Technology Consulting provides IT solutions to maximize clients’ IT investments. The company’s solutions are backed by the most talented technologists and best-of-breed products and services from the top IT companies in the world. Technology changes constantly, yet customers must keep up with those changes to ensure the business is secured, managed, and supported 24/7. DG Technology believes and has proven that the foundation for success in this type of environment is through strong partnerships with companies and individuals. While no one entity can be everything for every company, a network of partners can help ensure success.

Many of the largest companies in the world run critical applications on an IBM z/OS platform referred to as a mainframe, making security on this platform increasingly important. To support compliance and security, some companies are writing in-house systems to build compliance reports. This model is not sustainable.

The DG Technology Mainframe Event Acquisition System (MEAS) was designed from the ground up to enable mainframe users to collect, store, report, and analyze data real time, through seamless integration with the McAfee ePolicy Orchestrator (ePO) and Enterprise Security Manager (ESM) platforms. McAfee ePO and ESM, along with MEAS, enable organizations to quickly and easily monitor and report on the mainframe platform just as they do on the other platforms. Now companies can ensure compliance across the enterprise and are immediately notified of any security breaches on the mainframe with existing staff. Leveraging the power of McAfee ePO and ESM, MEAS identifies critical events and allows clients to report, alert, monitor and manage those events in real time. Through the same McAfee ePO console used today, clients can monitor their entire enterprise and identify trends and potential threats from all vectors.

McAfee Compatible solutions:
Mainframe Event Acquisition System (MEAS) 4.0 with McAfee ePO 4.6
Mainframe Event Acquisition System (MEAS) 4.0 with McAfee Enterprise Security Manager 9.3

Digital Authentication Technologies

Digital Authentication Technologies, Inc. (DAT) offers truly trustworthy identify for location. The DAT mission is to assure that critical business information assets and functions can be protected, controlled, and monitored by location to reduce risks, whether in the cloud or on a user's device. Having recognized that other location technologies such as geo-location, triangulation, and IP address lookup are susceptible to spoofing, DAT pioneered a set of enabling technologies and services collectively known as Contextual Location Fingerprint (CLF) that are not susceptible to practical spoofing attempts. For instance, CLF can be used to assure that servers are in secure data centers, administrators are in secure network operation centers, mobile device users can have privileges to data and applications parsed as they move from trusted locations to the unknown, and anonymous and remote attackers must overcome significantly more complex hurdles.

When integrated within a broader set of policy-definition/policy-enforcement tools such as McAfee ePolicy Orchestrator, CLF dramatically reduces serious vulnerabilities in critical infrastructure and information systems. This includes the risks that arise when the location of a machine matters greatly, but it cannot be established with a high level of assurance by other approaches.

Endgame Systems

Endgame systems provides real-time analytics, data visualization, cutting edge vulnerability research and knowledge discovery capabilities that support security in cyberspace by revolutionizing the detection and mitigation of cyber threats. Endgame’s solutions meet the most demanding national cyber-security challenges of the US government's defense and intelligence organizations as well as those of large commercial customers.

Endgame helps customers leverage internal and external knowledge sources to dynamically defend their network enclaves from cyber threats. Endgame plans to integrate with McAfee ePO to provide a command and control overlay across endpoint devices, giving enterprise security teams the ability to dynamically defend their networks from a centralized situational awareness and cyber security platform.


ESNC is a leading provider of security solutions to cover protection, detection, and response specific to SAP systems, which protects companies from cyber and internal fraud attacks. ESNC secures the business-critical SAP infrastructure of its global customers against SAP security threats. The ESNC Security Suite includes audit and assessments, PCI DSS 3.0, ISO 27001, SOX and industry-specific compliance, remediation and risk management, security policy enforcement, penetration testing, ABAP code security assessment and correction, and real-time monitoring, fraud detection and prevention modules, which customers can pick and choose. ESNC also provides innovative managed security cloud solutions based on its correlation engine for securing SAP systems.

ESNC Security Suite integrates with McAfee Enterprise Security Manager for real-time SAP-specific attack and fraud detection. This solution prevents disasters by identifying user actions with a high probability of fraud, such as manipulation of vendor and customer data, and payment processing information including invoicing. It integrates with business processes to determine business-specific attacks and decreases the risks to reputation, business objectives, and financials of the customers.


Evidian, an affiliate of Bull Group, is one of the major worldwide vendors of identity and access management (IAM) software. Evidian’s solutions include IAM Suite, Enterprise Single Sign-On (SSO), and network and system management. Evidian’s software helps more than 700 organizations worldwide improve agility, enhance security, and comply with laws and regulations, while reducing costs.

Together, Evidian Enterprise SSO and McAfee Endpoint Encryption for PCs provide single sign-on authentication to applications and other environments, complementing and extending the data protection capabilities of McAfee Endpoint Encryption. The combined solution secures information access at the point of initial system boot, eliminating multiple passwords and thwarting possible pre-boot attacks.

Read the solution brief for more details

McAfee Compatible solution:
Evidian Enterprise SSO version 8.0 and McAfee Endpoint Encryption 5.2 (EoL).


Evolven redefines change and configuration management with its groundbreaking Change and Configuration Monitoring and Analytics. Evolven’s software-as-a-service and on-premise solutions enable companies to dramatically increase the stability and safety of their IT environments, reduce the risk of production issues, cut environment incident investigation time and effort, and lower operating costs.

Evolven is working to integrate its change and configuration analytics solution with McAfee ePO. The joint solution will allow customers in IT operations to know exactly what has changed in their environments by collecting, analyzing, and auditing detailed configuration data.


Fasoo has built a worldwide reputation as an enterprise digital rights management (EDRM) solution provider with industry-leading solutions and services. Fasoo EDRM allows organizations to prevent unintended information disclosure or exposure, ensuring a secure information-sharing environment, to better manage workflows and simplify secure collaborations both internally and externally. Fasoo has successfully retained its leadership in the EDRM market by deploying enterprise-wide solutions for more than 1,100 organizations, securing more than 2 million users. Fasoo is seeing continuous improvement in its global market position, based on its unique technology, ongoing R&D, and strategic approach to comprehensive product capabilities. Fasoo is also planning for future expansion through new business models, including database security (Solidbase), static code analysis (Sparrow), and content platform solutions.

DLP and EDRM are typically thought of as separate solutions that could replace each other; however, security requirements of organizations generally require both DLP and EDRM. DLP’s ability to scan, detect data, and enforce appropriate actions using contextual awareness helps in reducing the risk of losing sensitive data through exfiltration. When sensitive data has been legitimately sent to authorized users outside the organization, EDRM protects the data from subsequent transfers to unauthorized users. Fasoo EDRM integrated with McAfee DLP forms an essential solution to protect sensitive data, both within and outside of the organization. Considering most data leaks originate from insiders who have or had authorized access to sensitive documents, organizations must enhance existing security infrastructures with data-centric security solutions to persistently protect data in use. This integrated solution enables organizations to allow DLP to scan DRM-protected documents and apply DLP policies; enforce DLP policy engines to encrypt (reclassify) as DRM-protected documents; and secure data persistently to reduce the risk of losing sensitive data from both insiders and outsiders.

Fidelis Security Systems

General Dynamics Fidelis Cybersecurity Solutions produces network-connected products that enable organizations to discover, investigate, and contain advanced threats by providing deep visibility and control over network content, channels, and locations throughout all phases of the threat life cycle — from initial infiltration through command and control communication, lateral propagation, and data exfiltration. The Fidelis XPS products include a broad spectrum of technologies and dynamic threat intelligence that identify threats by decoding and analyzing network traffic in real time, and record or block suspicious or malicious network sessions.

The Fidelis XPS CommandPost management system will integrate with McAfee ePolicy Orchestrator (McAfee ePO) software, giving ePO administrators a high level of visibility over network threats identified by the Fidelis XPS sensors.

McAfee Compatible solution:
Fidelis XPS and McAfee ePO 4.6.


FireMon, formerly Secure Passage, provides enterprise security management software that gives companies deeper visibility and tighter control over their network security infrastructure. A leading provider of firewall policy, risk, and compliance management solutions, FireMon’s flagship product, Security Manager, simplifies and automates the analysis of configuration and change management processes to enhance security, optimize performance, and speed compliance reporting. Security Manager analyzes changes and performs audits in real time, simplifies policy management, and enforces configuration governance across firewalls, switches, routers, and other network devices. Security Manager is the only solution on the market that can be customized to meet the unique audit and compliance reporting requirements for networks of all sizes, while enabling IT organizations to do more with less effort. Enterprise-strength deployments of Security Manager around the world support more than 40,000 active security devices.

FireMon Security Manager helps keep McAfee Firewall Enterprise running smoothly with a complete configuration management solution. Wizard-based discovery monitors device configurations and verifies their current state, usage, and connections. FireMon Security Manager also monitors the complete McAfee Firewall Enterprise infrastructure, where it checks for user editing events and captures a full audit trail of operations. Enforcement points are monitored for policy installations and inefficiencies, as well as usage.

McAfee Compatible solutions:
FireMon Security Manager 6.0 and McAfee Firewall Enterprise 8
FireMon Security Manager 6.0 and McAfee Vulnerability Manager 7.5
FireMon Security Manager 6.0 and McAfee Next Generation Firewall 5.6


fixIQ® is a comprehensive IT asset management solution with a centralized and intuitive web-based interface. fixIQ is an all-in-one solution that enables thorough and effective management of IT assets throughout the organization from a single interface, including compliance, license management, policy enforcement, and patches. Based on real-time tracking technology, all data collected is stored in a centralized database that sets the foundation for an array of powerful analysis features.

fixIQ is integrated with the McAfee ePolicy Orchestrator (ePO) platform, providing improved visibility and more complete management of assets on a network. The combined network information from both products empowers administrators to make more effective policy enforcement decisions.

McAfee Compatible solution:
fixIQ 9.31 and McAfee ePO 4.6


Fixmo is the mobile risk management (MRM) company that enables protected and compliant mobile computing in the workplace. Fixmo’s products help enterprises and government agencies secure and manage their mobile devices, protect their corporate data, maintain system integrity, and prove regulatory compliance. Fixmo’s Enterprise Mobility Platform (Fixmo EMP) technology has been developed as part of a Cooperative Research and Development Agreement (CRADA) with the U.S. National Security Agency (NSA) and is deployed within government agencies and enterprise customers around the world.

McAfee and Fixmo are working closely together to integrate McAfee ePolicy Orchestrator (McAfee ePO) and Fixmo’s Enterprise Mobility Platform. The integration will give administrators the power to view mobile-related information and statistics collected through Fixmo EMP from within the McAfee ePO console, as well as enact mobile management commands from within the console that would be executed by Fixmo EMP. As a mobile security innovator, Fixmo is eager to provide tight integration with McAfee ePO, the industry standard in advanced security management.


ForeScout is a provider of clientless network access control and policy enforcement that does not require installing a client on endpoints, such as laptops, desktops, VoIP phones, PDAs, printers, and other devices. ForeScout’s CounterACT appliance provides a range of enforcement options when policy violations are detected.

ForeScout has partnered with McAfee to deliver a unique and powerful solution for continuous monitoring and mitigation of enterprise risk. CounterACT is a network appliance (or virtual appliance) which installs out-of-band, therefore adding no latency or potential for failure to the network. Through advanced integration modules, ForeScout CounterACT shares information with McAfee ePO and McAfee ESM, and both McAfee ePO and McAfee ESM can trigger ForeScout CounterACT to perform network actions such as to quarantine a device.

Read the solution brief for more details

McAfee Compatible solutions:
ForeScout CounterACT 6.3.4 and McAfee ePO 4.6
ForeScout CounterACT 6.3.4 and McAfee Enterprise Security Manager 9.1


Fortscale enables enterprises to easily run User Behavior Analytics in order to Analyze, Profile, Discover and Investigate suspicious or malicious user activity. Fortscale makes it easier for security analytics teams to discover malicious insiders and external intruders that have compromised user credentials. The Fortscale solution integrates a proven big data platform with advanced machine learning algorithms to analyze log data, gain better visibility into user behavior patterns and pinpoint potential risks for immediate investigation. Risk-prioritized analysis of user behavior and access activity improve the effectiveness of the security team, without requiring technical expertise or adding more security analysts. Its advanced machine-learning algorithms extract SIEM or log data repository and pinpoint high-risk user behavior or access without writing rules or setting thresholds.

Fortscale's User Behavior analytics solution will leverage the McAfee Enterprise Security Manager (ESM) solution and provide back to McAfee Enterprise Security Manager user-related threat analytics, risk scoring of users and machine learning-based visibility of user activity. It will provide McAfee Enterprise Security Manager with an enriched layer that profiles user behavior to help enterprise security analysts identify user-related threats, malicious insiders, compromised accounts, suspicious behavior and risky access to data.


FortyCloud is a pioneer in network Security-as-a-Service for the cloud, providing innovative solutions for cloud-based security that are blending software-defined networking and software defined security technologies. The company helps customers reduce operating costs, increase scalability, and fortify security without requiring in-house security expertise. The FortyCloud distinct cloud security solution for Infrastructure-as-a-Service lets organizations build their own secure, scalable, and virtual private cloud network — regardless of cloud vendor.

FortyCloud enables organizations to extend their IT operations to the public cloud, without compromising security, by connecting on-premises McAfee Next Generation Firewalls to the FortyCloud solution in the cloud. The solution integrates with existing identity infrastructure (e.g. Active Directory) to provide secure access to the cloud. It also secures the cloud environment itself by providing firewall policies, data-in-motion encryption, and real-time visibility. The combined McAfee-FortyCloud solution allows organizations to offload IT operations to any cloud datacenter and even to multiple clouds simultaneously.

Read the solution brief for more details

McAfee Compatible solution:
FortyCloud Gateway 0.3.8 or later and McAfee Next Generation Firewall 5.7.

Fox Technologies

Fox Technologies (FoxT) provides an access management solution suite that enforces privileged user access policies for servers and end user access policies to applications through a single, non-intrusive platform, across Windows, Unix and Linux servers, in conjunction with existing IDM systems and Directories. Powerful controls over privileged users and accounts, as well as automatic provisioning and de-provisioning of user access rights greatly reduces the risk of a security breach. In addition, the FoxT solutions automatically consolidate the detailed user activity logs from across disparate systems and produces specific audit and compliance reports.

The integration of FoxT solutions with McAfee ePO enables the management of authentication and authorization policies for both users with elevated privileges and traditional users to servers and applications, using the McAfee ePO console for both solution deployment and reporting.

Read the solution brief for more details

McAfee Compatible solution:
FoxT ServerControl 6.6.2 for RedHat Linux, Solaris, and Windows with McAfee ePO 4.6.


Gemalto is a leader in digital security and delivers solutions that meet the growing, worldwide demand for mobile connectivity, identity and data protection, credit card safety, health and transportation services, e-government, and national security. Gemalto supplies governments, wireless operators, banks, and enterprises with a wide range of secure personal devices, such as SIM cards in mobile phones, smart banking cards, smart card access badges, electronic passports, and USB tokens for online identity protection. To complete the solution, Gemalto also provides software, systems, and services to help customers achieve their goals.

Gemalto’s security products, such as .NET cards and Smart Enterprise Guardian (SEG), are interoperable with McAfee Endpoint Encryption, enabling the highest levels of security to protect company assets, data, and brands.

Read the solution brief for more details

McAfee Compatible solution:
Gemalto Smart Cards: .NET, CyberFlex Access 64K, Classic TPC IM, and LuxTrust GemP15-1, and McAfee Endpoint Encryption 7.0.

Guidance Software

Guidance Software is a leader in digital investigations. The EnCase platform enables corporations and government agencies to conduct thorough, network-enabled, and court-validated digital investigations. More than 100 of the Fortune 500 and over half of the Fortune 50 use EnCase solutions, including Allstate, Chevron, Ford, General Electric, Honeywell, Mattel, Northrop Grumman, Pfizer, UnitedHealth Group, and Viacom.

With the release of EnCase v6.14, Guidance customers can take advantage of the McAfee ePolicy Orchestrator (ePO) deployment and reporting functionality. This allows joint customers to conduct digital investigations on assets managed by McAfee ePO.

Read the solution brief for more details

Guidance EnCase v6.19 is also interoperable with McAfee EEPC v6.x. This functionality allows mutual customers to decrypt the drive before forensic inspection.

McAfee Compatible solutions:
Guidance EnCase 7.5 and McAfee ePO 4.6
Guidance EnCase 6.19 and McAfee EEPC 6.x and 7.x


GuruCul is a premier security risk intelligence provider, featuring GuruCul Risk Analytics (GRA), an Identity-Centric Behavioral Risk Intelligence platform. GRA is a big data enabled Human and Machine Security Analytics solution providing Actionable Risk Intelligence. GuruCul solutions improve risk, threat, and compliance postures by applying a unique identity-centric approach of correlating identity, activity, and access information to provide actionable data and prioritized alerts. GuruCul has developed the industry's most advanced patent pending algorithms for behavior risk profiling and analyzing trends to detect threats and anomalous behavior. The GRA helps organizations efficiently protect intellectual property and regulate information.

Integrating GRA into McAfee Enterprise Security Manager (ESM) will provide a complete view of human and machine risk by correlating advanced SIEM events with identity-centric behavioral risk analytics. For the first time it will be possible to measure, monitor, and report on risk with machine and human behavioral patterns together. The combined McAfee ESM and GRA solution will create a whole new classification of defense-in-depth capability using anomaly detection and logic through risk algorithms that will run over a big data (Hadoop) platform. The seamless integration will provide actionable risk intelligence framework to defend against malicious events such as malware, insider threats, or other unforeseen risks. McAfee ESM and GRA can create predictive models to see patterns of emerging risk such as disgruntled employees, or an ID that was stolen or hacked and used to steal IP. GRA provides visualizations and metrics directly to non-technical end-users to take immediate action on serious risky events quickly.

McAfee Compatible solution:
GuruCul GRA and McAfee ESM 9.1.


HBGary specializes in developing advanced computer analysis products to detect, diagnose, and respond to advanced malware, targeted threats, and other cybercrime activities. HBGary’s flagship product, Digital DNA, delivers unparalleled detection coupled with post-exploitation forensics to provide dynamic analysis of malware.

Through this partnership, Digital DNA is now integrated with the McAfee ePolicy Orchestrator (ePO) platform, so that McAfee customers can deploy Digital DNA, scan physical memory for malicious and unauthorized code, and report results to the McAfee ePO console for optimal corrective action.

Read the solution brief for more details

McAfee Compatible solution:
HBGary Active Defense 2.0.0 with McAfee ePO 4.6 and 5.1.

Hewlett Packard

HP, the world’s largest technology company, simplifies the technology experience for consumers and businesses with a portfolio that spans printing, personal computing, software, services, and IT infrastructure. HP’s Secure Advantage solutions provide an integrated approach to securing this portfolio, allowing customers to more easily protect resources and data.

By combining HP technologies and services with McAfee as part of the SIA program, enterprises gain end-to-end solutions that better address critical security challenges, improve risk management, and ease the path to compliance.

HID Global

HID Global is the trusted source for secure identity solutions for millions of customers around the world. Recognized for robust quality, innovative designs, and industry leadership, HID Global supplies OEMs, system integrators, and application developers in a variety of markets, including physical and logical access control, card personalization, e-government, cashless payment, and industry and logistics. HID Global is headquartered in Irvine, CA, and has over 1,700 employees worldwide.

HID Crescendo Contact Card C700, a highly secure multi-technology smart card with out-of-the-box, standards-compliant support for existing physical and logical access control applications, is now integrated with McAfee Endpoint Encryption. Most HID Global’s smart card readers are also integrated with McAfee Endpoint Encryption, providing joint customers with a more complete secure identity solution.

McAfee Compatible solutions:
McAfee Endpoint Encryption v5 and AET SafeSign Identity Client with HID Crescendo Contact Card C700
McAfee Endpoint Encryption v6 and HID OMNIKEY (1021 USB, 3021 USB, 3121 USB, 3621 PinPad USB, 3821 PinPad USB, 3921 USB, 5121 USB (contact interface only), 5125 USB Prox (contact interface only), 5321 USB (contact interface only), 5325 USB Prox (contact interface only), 6121 Mobile USB, 6321 USB (contact interface only), 4040)

Hitachi Global Storage Technologies

Hitachi ID Systems, Inc. is a leading provider of identity and access management solutions. Hitachi ID software helps almost 1000 organizations with over 12 million combined users meet security, internal control, regulatory compliance, IT cost reduction and user service objectives. The Hitachi ID Management Suite includes Identity Manager, Password Manager and Privileged Access Manager. These products manage identities, entitlements, and authentication factors across both on-premise and SaaS applications in the cloud.

Hitachi ID Password Manager is integrated with McAfee Endpoint Encryption and enables users who forgot their PC activation password to securely authenticate themselves on a phone call to an IVR system, by answering security questions or providing a biometric voice print sample. Once authenticated, users can access an unlock code for their PC and get back to work. All this is done via self-service, eliminating calls to the help desk and reducing IT support cost.

Hitachi Global Storage Technologies offers a complete portfolio of storage products and services for consumers and business users. The company’s advanced hard disk drives and solid state drives are designed for use in a broad range of market segments and applications, including notebook and desktop computers, consumer electronics devices, and enterprise servers and storage arrays. Hitachi’s G-Technology and SimpleTech product lines deliver innovative external storage for consumers, small businesses, and creative professionals. As part of the SIA program, Hitachi Global Storage Technologies will work with McAfee to integrate its "TCG Opal" standard compliant encrypting hard drives with McAfee Endpoint Encryption.

Read the solution brief (McAfee Drive Encryption) for more details
Read the solution brief (McAfee ePolicy Orchestrator) for more details

McAfee Compatible solution:
Hitachi ID Password Manager 7.x and McAfee Drive Encryption 7.1.


HyTrust®, headquartered in Mountain View, CA, is a leader in policy management and access control delivering automated controls and visibility that allow its customers to scale their cloud infrastructure, virtualize even g Tier 1 applications, achieve compliance, and enable multi-tenancy.

HyTrust has developed an integrated solution with McAfee ePO to provide rich event reporting and policy enforcement for virtual infrastructure, including trusted cloud computing with Intel Trusted Execution Technology (TXT).

Read the solution brief for more details

McAfee Compatible solutions:
HyTrust CloudControl 3.0 McAfee ePolicy Orchestrator 4.6
HyTrust CloudControl 3.6 and McAfee Enterprise Security Manager 9.4

Icon Labs

Icon Labs is an RTOS-focused Security Company. Icon Labs’ Floodgate™ Defender is one of the EDN Hot 100 products of 2011. The Floodgate product family (Floodgate Defender, Floodgate Agent, and Floodgate Aware) provides protection, security management, and situational awareness for RTOS or legacy endpoint devices. You can apply this product to individual endpoints or in groups to create a secure enclave of protected devices.

The Floodgate product family extends the capabilities of McAfee ePO to legacy embedded devices, giving network administrators visibility and management of devices that are otherwise not visible to security management systems. You can implement the Floodgate product family as a bump-in-the-wire solution for legacy devices such as unmanaged SCADA or RTOS-based systems, or integrated into new device designs. Floodgate provides system administrators the ability to view device status and manage, distribute, and enforce packet filtering policies from their central ePO management console.

Read the solution brief for more details
Read the solution brief for more details (DoD guidelines)

McAfee Compatible solutions:
Icon Labs Floodgate Defender 2.8 and McAfee ePolicy Orchestrator 4.6, 5.1
Icon Labs Floodgate Defender Proxy 1.0 and McAfee ePolicy Orchestrator 4.6, 5.1
Icon Labs Floodgate Defender appliance 2.8, Floodgate RTOS Software Security Suite and McAfee ePolicy Orchestrator 4.6, 5.1


IdentityX Inc.(a Daon affiliate) is an identity assurance company. Daon develops technology that empowers organizations and people to interact with trust, ease and confidence. IdentityX is a new, highly innovative, game-changing identity assurance technology that leverages latest generation smart devices (e.g. iPhone, iPad, Android, Windows Phone 7 and Blackberry) to enable risk-aware authentication and validation of a user’s identity. It can be embedded in smart-device apps or can be a separate (out-of-band) authentication mechanism to traditional systems.

IdentityX Authenticator will integrate with McAfee ePO and other McAfee products to securely authenticate individuals for transactions of consequence and to support data security by verifying the identity of the user. Working together, IdentityX and McAfee will authenticate identity to a high level of fidelity. The solution will work with all leading mobile and desktop devices providing customers with a flexible, scalable way to meet their needs for identity assurance for all types of digital interactions.


IronKey solutions meet the challenge of protecting today’s mobile workforce, featuring secure USB solutions for data transport and mobile workspaces. The IronKey line includes the world’s leading hardware encrypted USB storage devices and PC on a Stick workspaces for Windows To Go.

The IronKey product family includes advanced biometric and non-biometric USB flash and hard drives as well as centralized management through McAfee ePolicy Orchestrator (ePO) 4.6 and 5.1. IronKey is the only USB solution that can be managed with ePO to support features such as password reset, the ability to remotely wipe or disable devices that are lost or stolen, and more.

IronKey is the mobile security portfolio of Imation

McAfee Compatible solution:
IronKey eUSB for McAfee ePO, IronKey secure storage: F100, F150, and H100, IronKey biometric secure storage: F200 and H200


Imprivata is a leading independent vendor focused on simplifying and securing user access. By strengthening user authentication, streamlining application access, and simplifying compliance reporting across multiple computing environments, customers can align security with user workflows and realize substantial productivity gains, while lowering IT costs. Headquartered in Lexington, MA, Imprivata partners with over 200 resellers, and serves the access security needs of more than 1,000 customers around the world.

Imprivata OneSign Authentication Management, Single Sign-On, and Secure Walk-Away products have been tested for compatibility with McAfee’s Endpoint Encryption for PCs (EEPC) product. Starting from the initial system boot, the joint solutions provide secure,seamless access and single sign-on to applications and other network resources, and protect unattended workstations from unauthorized access.

McAfee Compatible solution:
Imprivata OneSign 4.5 Authentication Management, Single Sign-On, and Secure Walk-Away with McAfee Endpoint Encryption v6 and Windows XP.


InfoReliance is an industry leader providing cyber security, software engineering, cloud computing and IT support to the US Federal government. As an innovator in IT services for the federal sector, InfoReliance has developed, designed, deployed and secured solutions that transform the business operations of clients across the globe. After spending more than a decade securing systems and networks across distributed and highly targeted enterprises, InfoReliance developed the CloudHASH Security Suite to address real-world gaps in available technology – gaps that attackers exploit every day.

CloudHASH Security is a suite of modules that will integrate with McAfee ePO to simplify enterprise desktop firewall configuration, enhance malware detection, and add desktop banner management. Host Firewall Orchestrator is a desktop firewall management module that will streamline firewall configuration with McAfee’s Host Intrusion Prevention System. The Host Security Sentinel module will allow security engineers to build advanced custom signatures, including historical analysis through the ePO console to quickly investigate malware on all hosts in an enterprise. The Dynamic Desktop Banner module presents is a customizable, color-coded banner across the top of every user’s computer screen and will be centrally controlled through the ePO console. These modules will complement existing ePO implementations to create a richer endpoint protection solution.

McAfee Compatible solutions:
InfoReliance CloudHASH Security Host Firewall Orchestrator and McAfee ePO 4.6
InfoReliance CloudHASH Security Host Communicator 1.0.32 and McAfee ePO 4.6


Intel application security and identity solutions consist of identity-driven software and appliances that are now sold as McAfee-branded solutions. Among these, the McAfee Services Gateway secures SOA, REST, or Cloud Web Services for cross-domain, B2B, and EAI. Another solution, McAfee Identity Manager, delivers SSO, provisioning, and second-factor authentication for user-to-cloud access with connectors for Google Apps,, Taleo, and SharePoint.

The McAfee Cloud Security Platform includes a set of Intel modules that provide security for all cloud traffic (email, web, and identity authentication) between the enterprise and the cloud. The web service security module is powered by McAfee Services Gateway while the identity and access management module is powered by McAfee Identity Manager.

Learn more about the McAfee-Intel combined solution

McAfee Services Gateway also integrates with the McAfee ePolicy Orchestrator (ePO) platform for security event monitoring across a single node or cluster of gateways. The administrator can use ePO software to provide visibility into critical security events such as XML content threats, authentication failures, suspicious behavior, and potential denial of service threats in a single, consolidated dashboard. The integration provides visibility into past security events, as well as recent changes to the security posture of the device to reflect protective action taken by the gateway.

McAfee Compatible solutions:
McAfee Identity Manager and McAfee Cloud Security Platform
McAfee Services Gateway R2.8 and McAfee ePO 4.6

Internet Identity

IID empowers threat intelligence sharing for enterprises and governments in a trusted environment that reaches beyond limited trust groups. The company aggregates and analyzes widely sourced threat data, and delivers actionable intelligence to facilitate the protection of assets, brands, and users. Top financial firms, the largest government agencies, and leading e-commerce companies, social networks, and ISPs leverage IID to detect and mitigate threats.

By integrating IID’s Resolver and Signals solutions into McAfee ePolicy Orchestrator (ePO), there's no more digging through mountains of data to determine if an enterprise is at risk. The joint IID-McAfee solution enables organizations to get real-time alerts about the latest Internet threats and compromised machines living on their network, all in one place. With this centralization and consolidation of resources, organizations can save valuable time while protecting mission- and business-critical data and communications. By doing so, organizations can concentrate more on their core business.

Read the solution brief for more details

McAfee Compatible Solution:
IID Resolver and Signals with McAfee ePO 4.6.


Invincea is a premier innovator in secure virtualization of desktop applications, protecting enterprise networks from Internet-based threats, such as spear phishing. The company’s solutions offer a unique ability to protect networks against all types of threats directed at end users — including zero-day threats — by seamlessly moving applications that render untrusted content into controlled, secure virtual environments that automatically detect and terminate threats in real time. Invincea seamlessly moves the browser, PDF reader, complete Office Suite, .zip and .exe file types from the native operating system into fully virtualized and secure environments, harnessing desktop resources without changing the user experience or requiring additional network bandwidth or footprint.

Invincea's integration with McAfee ePO enables joint customers to automatically import Invincea Threat Data generated at the desktop point-of-attack into McAfee ePO dashboards. This information provides an extensive forensic footprint of the attempted breach – providing unparalleled visibility into the methods, targets and frequency of attacks. This data is available in real-time to administrators to gather electronic intelligence to support broader incident response, discovery, and corporate investigations.

Read the solution brief for more details

McAfee Compatible solution:
Invincea Threat Data Server v1 and v2, and McAfee ePO 4.6.

iScan Online

iScan Online is a pioneering security firm that enables scanning from the cloud to any device — anytime, anywhere. Remote workers, mobile devices, branch offices, and the “bring your own device (BYOD)” trend create a gap in vulnerability, compliance, and security scanning. iScan Online closes this gap by providing visibility to every device no matter where it is and when it accesses a network or applications. iScan Online can perform traditional vulnerability scans, compliance scans (PCI, HIPAA), and data discovery scans (PAN, PII). Delivered via the cloud and performed on the device, iScan Online can scan thousands of devices simultaneously.

Mutual customers will be able to initiate scans by iScan Online using the McAfee ePolicy Orchestrator (McAfee ePO) console, and the results will be integrated into McAfee Enterprise Security Manager, McAfee’s SIEM solution. This will provide McAfee customers more visibility into their vulnerability, compliance, and risk posture.

McAfee Compatible solutions:
iScan Online Cloud based and McAfee ePO 4.6
iScan Online Cloud based and McAfee Enterprise Security Manager 9.4


IXIA BreakingPoint Actionable Security Intelligence protects enterprises, service providers, and government agencies by providing global visibility into emerging threats and actionable insight to harden and maintain resilient defenses. With the exclusive ability to capture and control global threat intelligence at Internet-scale, IXIA BreakingPoint delivers a product capable of battle-testing IT infrastructures, training cyber warriors, tuning systems and policies, and transforming security processes to be proactive and effective. IXIA BreakingPoint bridges the gap between IT testing, monitoring, and operations and will pursue integration with McAfee solutions to deliver the advance insight needed to harden highly dynamic converged and mobile networks, virtualized data centers, and applications.

IXIA Net Optics is a leading global provider of intelligent access and monitoring architecture solutions that deliver real-time IT visibility, monitoring, and control, helping customers achieve peak performance in network analytics, compliance, and security. For 15 years, Net Optics served customers across the financial, telecommunication, healthcare, and government sectors. Today's capabilities span virtualization, 10G, and 4G/LTE, enabling uncompromising security, regulatory compliance, and network monitoring, all while streamlining management and controlling costs. Solutions include the revolutionary Phantom Virtual Tap; Director xStream Pro; Indigo Pro; and appTap. Net Optics has worked with McAfee to ensure that its network taps are interoperable with the McAfee Network Security Platform.

Read the solution brief for more details

McAfee Compatible solutions:
IXIA BreakingPoint CTM products (Storm, FireStorm, and FireStorm One) v2.0.0 through current (v3.1.0) with McAfee Firewall Enterprise 8.0 for all non-proxy traffic
McAfee Network Security Platform and the following Net Optics taps: RG-830 (Regen, 8x1 Inline Fiber, 1G), RG-840x (Regen, 8x1 Inline Fiber, 10G,SR), RGN-GCU-IL8 (Regen,8x1,IL,Copper,1G), TP-50SR5-LCSLM (Slim Tap,LC, Fiber, 10G 50um), TP-LR5-LCSLM (Slim Tap,LC, Fiber, 10G 8.5um)

Lieberman Software

Lieberman Software provides a broad range of powerful security management and reporting tools for Microsoft Windows IT administrators that help accomplish weeks of tedious administrative work in minutes. The company also provides cross-platform privileged identity management solutions that are used by large government organizations, commercial enterprises, and cloud infrastructure providers. Lieberman Software’s solutions are known for their rapid deployment; low initial and ongoing TCO; ability to scale and handle complex, dynamic environments; and achievement of comprehensive regulatory compliance in a matter of weeks.

Lieberman Software will integrate its privileged identity management solution with McAfee ePolicy Orchestrator (ePO) software by passing alerts generated from privileged account password activity to ePO dashboards. This will help answer questions such as:

  • Who has been accessing which sensitive accounts for what purpose?
  • When were privileged account passwords last changed?
  • What kinds of access controls are in place for privileged resources?
The joint solution will prove compliance with governance, risk, and compliance (GRC) mandates like HIPAA, SOX, and PCI DSS through integrated audit reports. Lieberman Software will also use McAfee ePO to deploy its suite of tools for IT administrators and provide reporting and remediation of security configurations for Microsoft Windows workstations and servers.

Read the solution brief for more details

McAfee Compatible solution:
Lieberman Enterprise Random Password Manager 4.8.3 and McAfee ePO 4.6.


LockPath helps companies of all sizes address the increasingly complex issues of regulatory compliance and risk management. Its innovative software provides keen insight by correlating security information from multiple data sources with current regulations and policies to gauge risk. Easy to install and manage, Lockpath’s Keylight platform empowers people at every level in an organization to take control and make better business decisions.

The integration of the Keylight platform with McAfee Vulnerability Manager solution provides mutual customers with greater risk intelligence to tackle their risk and compliance challenges. McAfee Vulnerability Manager’s vulnerability scan data, integrated into the Keylight platform, automatically correlates it to a customer’s assets. Users can utilize Keylight’s advanced reporting capabilities to contextualize vulnerabilities from a business perspective. Managers across the organization have access to a dashboard that provides them with a deeper understanding of the organization’s security and risk posture. Keylight also plans to integrate with McAfee ePO.

Read the solution brief for more details

McAfee Compatible Solution:
Keylight 3.0 and McAfee Vulnerability Manager 7.5


LOGbinder puts application audit logs for Microsoft Exchange, Microsoft SharePoint, and SQL Server where they belong — in McAfee Enterprise Security Manager. It collects audit log data trapped inside those applications, translates it to meaningful information, and delivers this enriched data via Syslog and many other output options. Founded by Randy Franklin Smith of Ultimate Windows Security, LOGbinder software preserves audit log integrity, uses least privilege, makes little impact on the monitored environment, and is focused on getting audit logs where they belong quickly and automatically.

With LOGbinder and McAfee Enterprise Security Manager, there is no need to build rules and alerts for handling the audit events because the McAfee Enterprise Security Manager developers have already prepared them, minimizing in-house work.

McAfee Compatible solution:
LOGbinder and McAfee Enterprise Security Manager 9.4.

LRW Technologies

LRW's Pinecone solution is a secure data platform that encrypts and transports data between an enterprises' backend and a secure, "sandboxed" application on mobile devices. Pinecone is more than just messaging software that offers encrypted e-mail, calendar, and contacts for smart phones and tablets. In addition, it provides secure access to Office, FileShare, and a secure browser, all inside the container. Pinecone secures data at rest and data in transit using AES 256-bit encryption and enables organizations to access legacy systems or develop "in-house" applications utilizing the secure Pinecone data transport. Pinecone is the perfect choice for organizations to secure and manage corporate data and secure custom applications on both corporate issued and BYOD devices.

Pinecone was developed for organizations that are concerned with security, ownership of data, and reliability. Pinecone provides organizations with a solution that is owned and operated completely inside of the enterprise network. Unlike most other solutions on the market today which require data to travel through a third party Network Operating System (NOC), Pinecone utilizes relay servers in the DMZ and inside of the enterprise infrastructure. LRW plans to integrate Pinecone with McAfee ePO, allowing the administrator to access and monitor the relay servers both internally and in the DMZ through a "single pane of glass". The integration will also provide live accessibility to the admin of attacks on the relay or intrusion to the network via the Pinecone architecture.

LuxTrust S.A.

LuxTrust S.A. was founded in November 2005 by the government of Luxembourg and several key players from the private sector to create a digital certification platform using a public key infrastructure (PKI). LuxTrust provides an authentication solution for individuals to access applications online or on an internal network. To guarantee the safety of this authentication, LuxTrust uses strict identification procedures and a national network of registration authorities which are specifically qualified to perform such a task.

LuxTrust offers products (smart cards, signing sticks, Signing Server certificates, SSL and Object certificates) and services (trusted-time stamping and tailor-made PKI solutions) that guarantee secure correspondence. It responds to financial services’ needs for improved security, guaranteed confidentiality, integrity, and proof of documents that are exchanged. All products and services comply with internationally-recognized standards.

McAfee Compatible solution:
McAfee Endpoint Encryption 5.x and LuxTrust Smartcards and Signing Sticks.


As a leading provider of real-time IT security management tools, ManageEngine ensures maximum security of critical IT infrastructure, including firewalls, networks, servers, applications, and desktops. ManageEngine Firewall Analyzer is agentless log analytics and configuration management software for network security devices. The product is used for endpoint security monitoring and analysis, change management, employee Internet monitoring, bandwidth monitoring, capacity planning, policy enforcement, and security and compliance audit reporting.

ManageEngine Firewall Analyzer complements McAfee Firewall Enterprise to strengthen the IT network security with continuous firewall log monitoring. It provides security, attack, virus, and spam reports. The application monitors the bandwidth utilization for both device and interface. It generates real-time alerts for any bandwidth anomaly. The solution offers a wide variety of intranet, Internet, protocol-specific, and usage-specific traffic reports. It offers trend reports for event, protocol, and traffic. Most importantly, it gives user-specific Internet activity and bandwidth usage reports.

McAfee Compatible solution:
ManageEngine and McAfee Firewall Engine 8.


The MITRE Corporation is a not-for-profit organization chartered to work in the public interest. As a national resource, MITRE applies its expertise in systems engineering, information technology, operational concepts, and enterprise modernization to address its sponsors' critical needs. MITRE plans to integrate its technology with McAfee ePO.


Mocana, a leader in mobile app, Android, and iOS security, provides a device-independent security platform that secures mobile and smart connected devices, as well as the apps and services that run on them. The Mocana Mobile App Protection™ (MAP) product enables new layers of security to be wrapped into mobile apps, without having to write any code, and without impacting performance, battery life, or app usability.

Integrating MAP API's for Data at Rest (DAR) with McAfee ePolicy Orchestrator (McAfee ePO) will enable government and enterprise customers to make policy changes on a granular basis to their enterprise apps. By leveraging McAfee ePO with MAP, customers will be able to add Mocana's FIPS 140-2 compatible DAR encryption, per app VPN, secure copy/paste, and other features to their enterprise apps for a more secure mobile device environment.


MONET+ is a major central European player in the payment solutions industry. MONET+ ranks among the leading suppliers of smart card-based systems on the Czech and Slovak IT markets, providing comprehensive, sophisticated solutions that meet strict compliance and security standards. MONET+ focuses on secure transaction systems and related products, such as secure communication and client authentication. MONET+ solutions are used by companies in the banking sector, large supermarket chains, private companies, and state administration offices. Thousands of users use MONET+ products and solutions daily to securely access their working and user environment.

MONET+ will integrate ProID+, its two-factor authentication product, with McAfee Endpoint Encryption. ProID+ enables secure access to systems via microchip-embedded cards. ProID+ provides strong authentication for end users and single sign-on to any application throughout the enterprise, and delivers implementation of Public Key Infrastructure (PKI) to customer's IT systems. Using the CryptoPlus architecture, which supports a wide range of applications within organizations, ProID+ customers can easily build secure information systems.


NetClean is a world leader in technical solutions for preventing the spread of child sexual abuse content. The products are developed in cooperation with police authorities, and NetClean's proactive solutions are employed by millions of users. NetClean's client portfolio includes, among others, small to multinational companies as well as government agencies, internet providers and police authorities.

The company has integrated its NetClean ProActive platform with the McAfee ePO software, allowing customers to prevent child sexual abuse content from being accessed or shared via a corporate network. Customers can now deploy the NetClean ProActive software quickly and easily to McAfee-managed endpoints, as well as track the number of endpoints protected by NetClean ProActive.

McAfee Compatible solution:
NetClean ProActive 12.1 and McAfee ePO 4.6.


NetFort provides software products to monitor activity on virtual and physical networks. Its LANGuardian software provides an extremely robust depth of insight into network activity. LANGuardian helps network administrators troubleshoot bandwidth issues right across the network, perform network forensics on past events, investigate activity on Windows file shares, and keep track of user activity on the Internet. Unlike other packet capture products, LANGuardian does not require dedicated hardware -- it is a software-only solution that runs on industry-standard hardware and virtualized environments. And, because it gathers information from network traffic, no client software is required and there is no impact on network performance. NetFort was established in 2002 and has its headquarters in Galway, Ireland.

LANGuardian will integrate with McAfee ePO by forwarding event information collected through deep packet inspection of network traffic. This data will provide ePO administrators additional insights into network activity, enabling them to drill down from top-level reports to individual network links, client devices, users, file shares, files, websites, and downloads. Reports will include bandwidth usage, web traffic, web access via proxy servers, and activity on Windows file shares.

Read the solution brief for more details


NIKSUN deploys world-class drill down forensics to allow users to Know the Unknown®. The threat of cyber attack is real. Traditional approaches are not enough for today’s cybersecurity risks, and new tools and solutions are often necessary to provide adequate protection. NIKSUN has developed a patented state-of-the-art technology to simultaneously capture, inspect, mine, correlate and store everything traversing the network at multi-gigabit rates.

The NIKSUN NetDetector® & NetDetectorLive® cybersecurity appliances complement the McAfee Network Security Platform (NSP). NIKSUN appliances provide increased network visibility by capturing and storing all packet data providing the ability to analyze, inspect, and correlate all data traversing the network at multi-gigabit rates. The joint McAfee NSP and NIKSUN integrated solution will provide a best-of-breed approach for cyber intrusion, prevention, and advanced network forensic capabilities. The integration will permit immediate drill down to packet level information for granular forensic analysis through the McAfee NSP console. This capability, combined with Niksun’s super fast search and actionable intelligence and the McAfee NSP platform, will rapidly identify vulnerabilities such as zero-day threats and Advanced Persistent Threats (APTs), so that appropriate mitigation steps can be quickly taken.

Read the solution brief for more details

McAfee Compatible solution:
NIKSUN NetDetector Alpine, NetDetectorLive, and NetOmni 4.3.1 and McAfee Network Security Platform 7.5


Norse delivers live, actionable threat intelligence that enables organizations to proactively defend against today’s most advanced attack vectors including zero day and advanced persistent threats. Norse’s global threat intelligence platform is a patent-pending infrastructure-based technology that continuously collects and analyzes real-time, high risk Internet traffic – dark intelligence - to identify the sources of cyber attacks and fraud. Norse’s global infrastructure sees attacks as they occur and enables organizations to proactively and automatically stop attacks in progress.

Norse live threat intelligence is the perfect complement to McAfee Global Threat Intelligence. Norse gathers intelligence from 'behind enemy lines', collecting and analyzing dark intelligence from the source - where bad actors operate. The McAfee Compatible integration of Norse with McAfee NTR-CADS provides customers with the most comprehensive information on attack vectors available in the market today.

Read the solution brief for more details

McAfee Compatible solution:
Norse IPViking and McAfee Network Threat Response Cloud Analysis and Deconstruction Services 4.0.


nPulse Technologies is the performance leader in packet capture and connection/session analysis. The flagship product, CPX, delivers cost-effective, indexed packet capture at speeds up to 20Gbps. Leading companies in the Financial Services, Federal Government, and Telecommunications sectors rely on CPX for protection of network and security operations. Through its innovative Pivot2Pcap API, CPX significantly enhances existing monitoring and security solutions.

nPulse's partnership with McAfee Enterprise Security Manager allows network security operations personnel to quickly pivot from security alerts in ESM to the packets and session-level decodes for the event. Allowing users to quickly locate and decode an entire session provides greater visibility into potential malicious activities and payloads, while also eliminating the time required to manually collate all of the packets within a session. Users can expand searches to view network activities before and after a security event, further enhancing visibility for incident response and forensics activities.

McAfee Compatible solution:
nPulse CPX 3.X, 4.0, and McAfee ESM 9.3


Nuix enables customers to make fact-based decisions from unstructured data. The patented Nuix Engine is an advanced technology for accessing, understanding, and acting on human-generated and machine information. Its parallel processing technology is unmatched in its ability to expose the content of enterprise information stores such as email databases, archives, file shares, and collaboration systems.

The integration between McAfee and Nuix allows McAfee Enterprise Security Manager to use the Nuix Engine unstructured data scanning and indexing to provide deep and rapid insights into a cyber-security incident of consequence. When McAfee Enterprise Security Manager generates an alert, Nuix scans and indexes relevant data on the identified endpoints, then returns this data to McAfee Enterprise Security Manager for automated response or manual review. Nuix scans are designed to match the nature and severity of McAfee Enterprise Security Manager correlations that generate the alerts.


Onapsis is a leading provider of solutions to protect ERP systems from cyber-attacks. Through unmatched security, compliance and continuous monitoring products for SAP and Oracle ERP applications, Onapsis secures the business-critical infrastructure of its global customers against espionage, sabotage and financial fraud threats. Company's products include Onapsis X1, the first SAP-certified solution to provide automated SAP security assessments, and Onapsis IPS, the most advanced SAP vulnerability signatures for Intrusion Detection and Intrusion Prevention systems.

Onapsis plans to extend the capabilities of McAfee Network Security Platform (NSP) through the unique knowledge-base captured in Onapsis products, enabling customers to enjoy unprecedented visibility and protection against cyber-attacks on their ERP systems. After this integration, customers will be able to effectively decrease the severe risks affecting their most critical business information and processes.


Overtis is a leading provider of user activity monitoring solutions. VigilancePro from Overtis assists organizations in complying with a wide range of standards, legislation, and regulations by enabling the monitoring of all user activity across all devices and applications, in and out of the cloud. Overtis provides an irrefutable audit trail of who did what, where, and when, through patented integration with physical security systems. Specific user actions, linked to defined content as well as contexts, such as time and location, result in real-time alerts to key personnel, facilitating rapid and appropriate response to compliance and policy breaches. VigilancePro provides a user-centric view that is complementary to NAC, IAM, DLP, and SIM/SEM solutions.

VigilancePro will integrate with the McAfee ePolicy Orchestrator (ePO) platform and send event information and actionable alerts based on user activity to ePO dashboards. The joint solution will allow customers to accurately correlate network events with specific user actions, including full visibility of details such as the application in use, as well as the menu option, button, or keystrokes that gave rise to a particular event. Presenting the complete enterprise security picture in a single view through the McAfee ePO platform will improve compliance while reducing risk, complexity, and cost.


PIOLINK, a leader in application delivery networking, web security, and layer 2/3 switching technology, has made significant contributions to the development of Korean IT infrastructure.

TiFRONT security switch from PIOLINK provides secure L2 switching, blocking anomalous traffic such as TCP Syn flooding and UDP and ARP flooding from PCs. It also prevents unauthenticated hosts and ARP spoofing in a UC environment. As part of the McAfee Security Innovation Alliance, PIOLINK will integrate TiFRONT with McAfee ePolicy Orchestrator (McAfee ePO) and send security events to McAfee ePO dashboards.

McAfee Compatible solution:
PIOLINK TiManager 1.7.1 and McAfee ePO 4.6.

Q1 Labs

Q1 Labs, an IBM Company, is a global provider of high-value, cost-effective network security management products. The growing company’s flagship offering, QRadar, integrates previously disparate functions, including log management, network behavior analytics, and security event management into a total security intelligence solution. QRadar provides users with crucial visibility into what is occurring within their networks, data centers, and applications to better protect IT assets and meet regulatory requirements.

QRadar security information and event management (SIEM) now integrates with the McAfee ePO platform. By combining McAfee ePO’s asset-based system security information with QRadar’s ability to monitor user, application, data center, and network-based security information, customers gain end-to-end visibility and can leverage the inherent operational efficiencies of the high-value, cost-effective QRadar network security management family.

Quest Software

Now more than ever, organizations need to work smart and improve efficiency. Quest Software, Inc. creates and supports smart systems management products — helping customers solve everyday IT challenges easier and faster. Quest products and people are dedicated to helping customers manage their critical Microsoft Windows infrastructure, applications, databases, and virtual environments.

Quest Software offers auditing solutions for Active Directory to proactively track, audit, report, and alert on vital configuration changes — in real-time and without the overhead of native auditing. Customers instantly know who made what change, when, and where, as well as the previous and current settings. This level of detailed auditing is important to IT administrators and directors who centrally manage security for IT systems and need to provide an audit trail to show compliance with external regulations. For McAfee customers, the ePolicy Orchestrator (ePO) platform is central to managing security for these systems, networks, data, and compliance. Together, Quest and McAfee will offer a comprehensive solution for auditing changes to Active Directory systems.


Quotium helps businesses protect data and reduce application security risk. It provides automated technologies to make business applications secure and robust while delivering application security that is better, faster, and more accurate than other offerings on the market. For organizations that are looking for a way to embed application security testing in the software lifecycle, Quotium expertise and offerings provide efficient and effective vulnerability detection in an easy-to-use solution. Quotium pioneered the Interactive Application Security Testing (IAST) technology, and the Quotium Seeker software has revolutionized the way web applications are being secured.

Founded and managed by experienced business people and recognized industry leaders Quotium is dedicated to providing quality in software, customer service, and support. It considers that the best ROI in the acquisition of a software solution is directly linked to the quality of the solution. Quotium Seeker will integrate with McAfee SIEM, allowing it to accurately identify real-time application attacks. Customers use Quotium Seeker to identify real world, exploitable vulnerabilities in their applications. Once vulnerability is identified, Seeker will report the exact location and potential exploit to McAfee Enterprise Security Manager. Based on this information, McAfee Enterprise Security Manager will identify when a potential attack is focused on a vulnerable component, and provide real time alerts, without creating any redundant alerts.


Raytheon Company, with 2010 sales of $25 billion, is a technology and innovation leader specializing in defense, homeland security, cybersecurity and other government markets throughout the world. Raytheon SureView enables safe and effective use of mission-critical technologies by capturing human behaviors that serve as warning signs leading up to a breach. SureView replays the event in a DVR-like format providing irrefutable and unambiguous attribution of end-user activity. While offering full context for rapidly discerning malicious from benign actions that are easily reviewed and understood by non-technical personnel—all while respecting employee privacy guidelines. SureView goes beyond DLP to proactive information protection.

Raytheon SureView integrates with the McAfee ePO platform enabling operators to deploy and monitor the health and status of SureView agents, perform version upgrades and remove agents.

McAfee Compatible solution:
Raytheon SureView 6.5 and McAfee ePO 4.5 [EOL].


Raz-Lee Security is a leading international provider of security, auditing, and compliance (SOX, PCI, HIPAA, etc.) solutions for the IBM i. Raz-Lee’s customers include companies of all sizes, from SMBs to enterprises in all vertical markets and industries. Raz-Lee’s iSecurity suite of products includes both infrastructure security solutions that protect network access, monitor and report on system activities, manage user profiles and authorities, and track software changes, as well as application security solutions which audit database activity, provide real-time alerts when critical business data changes, enable business intelligence analysis of application data changes, and much more. iSecurity has full multi-LPAR management capabilities and works in both green-screen and full GUI modes.

iSecurity’s integration with McAfee Database Activity Monitoring (DAM) will entail collection and transfer of DB2 activity originating on the IBM i. The McAfee sensor running on an external Linux machine will receive events from iSecurity, evaluate each event, and communicate with the DAM server to apply policy rules and report on the events. As such, iSecurity will enable multiplatform users of McAfee DAM to incorporate database and security-related information originating from IBM i systems, resulting in increased security visibility and faster time to problem resolution.

McAfee Compatible solution:
Raz-Lee Firewall 16, Raz-Lee Audit 12, and McAfee Database Activity Monitor 4.4.3.

RedSeal Systems

RedSeal Networks develops security posture management software that enables organizations to assess and strengthen their cyber defenses. Unlike systems that detect attacks once they occur, RedSeal identifies holes in the security infrastructure that could be exploited — before they are discovered by hackers. RedSeal software analyzes and simplifies the complex interaction of firewalls, routers, load balancers, and hosts, delivering in-depth understanding of overall security posture; continuous compliance with regulations such as PCI, FISMA, and SOX; and actionable steps for risk remediation.

RedSeal Vulnerability Advisor analyzes vulnerabilities discovered by McAfee Vulnerability Manager in the context of network security controls. It identifies which vulnerabilities are exposed to untrustworthy networks and which could be used to launch attacks deeper into the network. It prioritizes vulnerabilities for action based on risk, identifies network mitigation options, and reports on portions of the network that require additional scanning.

Read the solution brief for more details

McAfee Compatible solutions:
RedSeal Vulnerability Advisor 6.5 and McAfee Vulnerability Manager 7.5
RedSeal Vulnerability Advisor 6.5 and McAfee Firewall Enterprise 8
RedSeal Vulnerability Advisor 6.5 and McAfee Enterprise Security Manager 9.2
RedSeal Vulnerability Advisor 6.5 and McAfee ePO 4.6
RedSeal Vulnerability Advisor 6.5 and McAfee Next Generation Firewall 5.6


RouteWorks' main focus is to simplify business needs in the field of technology, valuing customer satisfaction. Service offering includes offshore product development, integration, and quality assurance targeted toward small and mid-sized technology organizations. All of the service engagements use industry best practices; including a software development life cycle adopted by software professionals. The service lines are easy to understand, scalable, and flexible enough to meet RouteWorks’ growing client demands.

RouteWorks has partnered with McAfee to deliver a unique set of integration services helping other SIA partners in developing workable interoperable solutions. RouteWorks’ vast expertise in McAfee ePO development will help SIA partners bring their integration solutions to market at a faster pace.


RSA, the Security Division of EMC, is the premier provider of security, risk, and compliance management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption and key management, SIEM, data loss prevention, and fraud protection with industry-leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform, and the data that is generated.

RSA will integrate its RSA® enVision SIEM solution with McAfee ePO to enhance both the real-time detection and automated response to attacks. RSA enVision will send alerts generated from correlated events to McAfee ePO dashboards, including security threats, compliance violations, and policy breaches. McAfee ePO users will be able to respond with targeted countermeasures, audit, and remediation functions provided by McAfee security solutions.


SafeNet is one of the largest data security companies in the world, and is trusted to provide data protection solutions to market-leading organizations around the globe. SafeNet data protection solutions ensure high-value information is secure throughout its lifecycle, providing data security from the data center to the cloud.

Multifactor authentication serves a vital function within any organization — securing access to corporate networks, protecting the identities of users, and ensuring that users are who they claim to be. The recent surge in high-profile security breaches, as well as evolving business environments that require entirely new considerations for access control, such as SaaS applications and mobile device management, represents a shift in how trust and control is established and maintained. SafeNet’s SafeWord authentication products will feature seamless integration with McAfee Firewall Enterprise, a high-assurance firewall that offers strong next-generation capabilities, including application visibility and deep application controls for defense. SafeWord also integrates with Active Directory and VPN platforms, and delivers a choice of one-time password (OTP) authenticators, supporting authentication and SSO for cloud applications.

McAfee Compatible solutions:
SafeNet eToken Pro 32K CardOS 4.2, eToken Pro 64K CardOS 4.2, eToken Java 72k, and EEPC 7.0
SafeNet iKey 2032 and EEPC 7.0

Sagem Orga

Sagem Orga is a pioneer and global leader in the smart-card industry. The company develops and implements cutting-edge technology to turn the vision of unbounded mobile communications and integrated digital security into a reality.

Security, logical access, and identity management are strategic issues for all enterprises. Protecting access to IT systems and corporate data is more than a necessity. Sagem Orga will work with McAfee to combine McAfee Endpoint Encryption with its smart cards and, optionally, with its biometric terminals. Sagem Orga will leverage its expertise in key technologies to provide enterprises with a solution that prevents data loss, using powerful encryption and strong access control.


SandForce is transforming data storage by pioneering the use of standard flash memory in enterprise, client, and industrial computing applications with its innovative Solid State Drive (SSD) processors. By delivering unprecedented reliability, performance, and energy efficiency, SSDs based on patent-pending SandForce DuraClass technology unleash the full potential for mass-market adoption of SSDs using NAND flash memory. Founded in 2006, SandForce is funded by leading venture-capital investors and first-tier storage companies.

SandForce will collaborate with McAfee to develop SSD solutions that leverage TCG security standards. Through its integration with McAfee Endpoint Encryption, SandForce will provide a seamless user experience for the security-minded market.


Seclore is a leading provider of information security and classification solutions, including information usage controls, information rights management (IRM), and secure outsourcing. Seclore has been repeatedly recognized as a leader in its segment, named by Gartner as a “Cool Vendor” and Deloitte as a Technology Fast 50 company. Some of the largest financial services, engineering services, and manufacturing companies across the globe, including Fortune 500 firms and government and intelligence agencies, rely on Seclore technology to make sure information stays in the right hands and cannot be copied, replicated, and shared without permission. Seclore FileSecure is the most integration-friendly IRM and data classification solution in the world, and can also be treated as an infrastructural element — not just a point solution. With its seamless integration capabilities, it works with any existing enterprise IT asset and solution, including DLP, DMS, ECM, ERP, IAM, SIEM, and others.

Boundary-based solutions such as DLP are rendered ineffective when information is sent to vendors, partners, and auditors. An organization has virtually no control over this confidential information once it is sent outside the security perimeter. McAfee and Seclore offer a comprehensive solution that extends and enhances the protection of confidential information to areas beyond the control and scope of DLP. This integration provides end-to-end protection of information and keeps data in control of the enterprise — even when it leaves the control of a DLP solution. IRM can seamlessly take over where DLP endpoint protection ends, and stay with the file wherever it travels. IRM protection and the relevant IRM policies can be automatically applied to files located at end-user endpoints based on triggering of DLP rules. McAfee DLP policies can also be configured — and appropriate actions taken — based on the FileSecure classification of a file. This reduces false positives and protects and controls data persistently, both from accidental and malicious data leakage, and from internal and external users. The FileSecure-McAfee DLP integration allows an organization to tailor IT and data usage policies around business process workflows.

McAfee Compatible solution:
Seclore FileSecure Policy Server 2.29, Seclore Desktop Client 2.29, and McAfee DLP 9.1


SecureAuth for SSO is an integrated strong authentication platform that provides transparent, secure single sign-on (SSO) for on-premise web applications, off-premise cloud applications, and traditional VPN resources, all from a single appliance. Used in conjunction with McAfeeEndpoint Encryption, enterprise IT customers benefit from true end-to-end security while giving end users a familiar experience that does not impact productivity. SecureAuth leverages a user’s domain authentication from a McAfee encrypted workstation and then performs an identity translation to local, on-premise, and cloud-based resources. SecureAuth exceeds the requirements of compliance regulations such as PCI DSS, HIPAA, and FFIEC.


Securonix provides a leading information risk intelligence platform for security and compliance professionals. The platform consumes identity, access, and activity information from any source and then uses behavior, access, and identity risk analytics to continuously identify the highest risk users, resources, and activity in the environment for proactive management. At the enterprise application level, such as SAP and Oracle, Securonix goes deeper to automatically and continuously identify and fingerprint sensitive data for data loss protection while monitoring high-risk activity and access.

McAfee DLP, ePO, and NitroSecurity customers can use Securonix to extend their visibility, monitoring, and critical data protection into key enterprise applications while enriching their security management with advanced identity, access, behavior analysis, and dynamic policies. This integrated McAfee-Securonix solution extends valuable coverage to an enterprise’s critical applications while focusing the output down to an actionable set through analytics.

Read the solution brief for more details

McAfee Compatible solution:
Securonix Identity Intelligence 3.1, Securonix Threat & Risk Intelligence 3.1, Securonix Application Intelligence 3.1 and McAfee Data Loss Prevention 9

Skybox Security

Skybox Security, a leading provider of proactive security risk management solutions for global enterprises, provides automated, non-intrusive tools that detect, prioritize, and drive remediation of critical risks such as exposed vulnerabilities and firewall configuration errors.

The integration of Skybox Risk Control with McAfee Vulnerability Manager enables organizations to identify, prioritize, and rapidly remediate the most critical 1-2 percent of risks detected by McAfee Vulnerability Manager. Skybox simplifies the remediation process by calculating all possible attack vectors; finding the 1-2 percent of vulnerabilities that can be exploited; and proposing the most effective way to block them – whether it be by enabling specific IPS signatures, tuning firewall or router security configurations, or by patching intermediate systems. Skybox’s solution for network security management, which includes Skybox Firewall Assurance, Skybox Network Assurance and Skybox Change Manager, integrates with McAfee Firewall Enterprise to automate enterprise-wide security policy compliance with industry and corporate best practices. Skybox Change Manager streamlines the security change management process to ensure that all changes are evaluated for risk and compliance with corporate policies before being applied to ensure the integrity of your network’s perimeter.

Read more about Skybox and McAfee Vulnerability Manager
Read more about Skybox and McAfee Firewall Enterprise

McAfee Compatible solutions:
Skybox Firewall Assurance 6.5 and Skybox Change Manager 6.5 with McAfee Firewall Enterprise 8
Skybox Risk Control 6.5 with McAfee Vulnerability Manager 7.5
Skybox Firewall Assurance 6.5, Skybox Change Manager 6.5 and McAfee Next Generation Firewall 5.4


Skycure identifies and notifies users and IT personnel about mobile device attacks and security issues then applies protection based on IT policy. This is achieved without accessing business or personal activity on the device and, in consequence, without adding security and privacy concerns. The solution addresses both the needs of the organization and employees.

Skycure with McAfee Enterprise Security Manager will report on security incidents that are detected on the customer’s mobile devices, providing all the data required to perform preventive actions such as blocking access to company resources, or notifying relevant admins.


Softex, founded in 1992, in Austin, Texas, is a leading provider of security software products and solutions. Softex is an established market leader with innovative products in Enterprise Single Sign On (ESSO), Identity and Access Management (IAM), and Data Protection (Self Encrypting Drives) Solutions. SecureDisable — a security solution powered by Intel® Anti-Theft Technology (Intel AT) that can lock-down lost or stolen Intel processor-based notebooks — is the most recent addition to its security products portfolio. SecureDisable can be securely hosted in the cloud by Softex or hosted by customers and solution providers using enterprise software.

After the integration is complete, customers will be able to use the Softex SecureDisable plug-in for McAfee ePolicy Orchestrator (McAfee ePO) software to deploy the client software/agent on ePO-managed assets and view reports from these assets into ePO dashboards. IT Administrators/Helpdesk can report and recover a lost or stolen machine using the existing workflows of the ePO management console.

Solera Networks

Solera Networks is a pioneer in delivering Network Security Analytics — a high-speed network monitoring and forensics platform for complete network capture, classification, indexing, visualization, and reconstruction of any network event. Solera DS Appliances record, classify, and index every packet, flow, and attribute at line rates up to 10 Gbps, on physical and virtual networks. Solera Networks appliances integrate into existing security workflows and support best-of-breed security tool environments, giving security professionals comprehensive network visibility.

The Solera Networks integration with McAfee Network Security Platform through McAfee Network Security Manager provides an efficient workflow for network event investigation and analysis. By leveraging Solera Networks APIs, security analysts or incident responders have content "look-back" capabilities for a full view of historical network events, enabling forensically complete incident investigation. Users can pivot data from event parameters in Network Security Manager — such as time, port, source, and destination IP addresses — directly into Solera DS Forensics Appliances for complete context and packet-level evidence surrounding any event.

Read the solution brief for more details

McAfee Compatible solution:
Solera DS Appliances (DS 5200, DS 3200, and DS 1200) and McAfee Network Security Platform Appliances (M8000, M6050, M4050, M3050, and M2750).


SPP is a value-added technology solution provider based in Vienna, Austria. SPP was founded in July 1987 to distribute standard software products to the Austrian Market and to serve as the local representation for key software manufacturing vendors while delivering high customer satisfaction. Working with major enterprise accounts over the past 10 years, SPP has developed a security tool called DAT-QA. Many large McAfee customers use this tool to comply with their internal requirements.

SPP´s DAT-QA plug-in for McAfee ePO is complementary to McAfee’s AV solution, and is designed for McAfee customers to fully automate their internal QA-process for DAT-files. In addition to McAfee’s comprehensive QA, DAT-QA enables customers to incorporate the specifics of their own IT-environment. New McAfee DAT updates and ExtraDats are run against representative customer client systems to further improve the odds of successful DAT updates. The combination of McAfee QA and the individualized customer QA-process improves the stability and security of customer IT infrastructure.


No organization concerned with the security of its network and external threats would operate without a network firewall, but what is being done about internal threats? Active Directory, which governs access to all systems, applications, and data, is the single, greatest risk for any organization. However, even the best security can easily be compromised with a simple configuration or security group modification. Advanced threats like brute force attacks, account hacking, and horizontal account movement in Active Directory go largely undetected today.

The StealthINTERCEPT Active Directory Firewall safeguards your organization from internal threats by detecting all authentication traffic, protecting against unauthorized changes, enforcing control through granular policies, and feeding actionable security intelligence to McAfee Enterprise Security Manager in real-time. Armed with timely access to the right data, McAfee Enterprise Security Manager can instantly analyze and correlate the intelligence generated by StealthINTERCEPT with other network activities, surfacing previously unavailable insight into threats unfolding inside an organization’s walls.

SyferLock Technology

SyferLock Technology develops authentication solutions that address, fix, and leverage the user’s existing password through patented methodology and solutions. SyferLock allows the use of an existing password, but keys and transmits it as a true, one-time password, without requiring additional hardware, tokens, or client-side software. This is a very secure and flexible self-service that is a low-cost alternative for one-time password generation, compared to deploying costly and cumbersome hardware solutions. SyferLock has three key defining features. First, it addresses and fixes the broken first factor or static password. Second, it allows an alternative to generating one-time passwords without relying on tokens, smart cards, or other hardware, creating a drastic reduction in authentication TCO. Third, it adapts to user and organizational security threats through a self-service layering approach to multi-factor authentication.

SyferLock plans to integrate its authentication solutions with McAfee Endpoint Encryption.


Sypris is a world-class, integrated systems solutions and cyber security provider with over 45 years of global experience. Sypris develops encryption products, Defensive Network Architecture (DNA), advanced cyber security services and electronic manufacturing capabilities that are aligned to provide its customers the best people, processes and technologies to continually exceed expectations. Sypris has strong capabilities in identity authentication and key management, and it promotes an agile, innovative culture by partnering with leading-edge technology companies, agencies and universities.

Sypris has developed a robust Identity Authentication and Key Management System (CKMS) that allows organizations to securely verify the identity of the device and user, as well as the integrity of the data of millions of endpoints. The CKMS product provides key management for a strong host intrusion prevention capability for enterprise networks. Sypris will integrate CKMS into McAfee ePO, allowing McAfee users to manage the identity and authentication of each endpoint from a single interface.


TaaSERA’s malware behavior detection solutions, used by a number of leading government agencies, identify previously unseen attacks as they happen. TaaSERA’s software solutions leverage patented real-time, real-world behavior detection capabilities to highlight the emergence of previously unseen attacks as they are being carried out — providing organizations with the specific information necessary to adjust defenses and remediate infections before they become a breach.

Combining TaaSERA’s evidence-based behavior detection functionality with McAfee ePolicy Orchestrator (McAfee ePO) will allow users to identify zero-day infections sooner, enabling virus and malware scanning and remeditation more quickly than before. This capabilitity will mitigate the risk of malware resulting in a breach.


TeraDact™ Solutions offer an advanced toolset for the management of sensitive information. TeraDact’s software improves upon the existing, at times inefficient, means of protecting sensitive data while ensuring compliance with current information management and sharing policies. Its technology enables users to manually or automatically check, version, and release the right information to the right audience at the right time by utilizing TeraDact’s proprietary sharing and redaction software. TeraDact’s unique and patented Information Identification and Presentation (IIaP™) capabilities make certain that sensitive information such as classified data, personally identifiable information (PII), protected health information (PHI) and all material deemed sensitive by policy or regulation is effectively identified, appropriately labeled and acted upon before changing hands. Information identified for removal, including all of its associated underlying meta-data, is removed thereby eliminating any possibility of a breach because the data no longer resides in the document. TeraDact’s current market focus centers on Government (Information Sharing, FOIA, Declassification), Healthcare (HIPPA, HITECH), Financial Services (SOX) and Legal (E-Discovery and Confidential Filings with Regulatory Authorities).

With TeraDactor's granular approach to producing sanitized documents tailored according to audience, customers are assured protection against potential costs and repercussions resulting from a data breach or non-compliance. TeraDact will integrate TeraDactor with McAfee ePO to enable customers to effectively manage content sharing policies, compliance auditing, collaborative content review, and content checking and redaction processes across multiple repositories and workflows.


TITUS® is a leading provider of security and compliance software that helps organizations share information securely while meeting policy and compliance requirements. TITUS solutions raise awareness and meet regulatory compliance by visually alerting end users to the sensitivity of information. Products include TITUS Classification, a leading message, document, and file classification and labeling solution; TITUS Aware, products that enhance data loss prevention by detecting sensitive information at the desktop; and the TITUS family of security solutions for Microsoft SharePoint. TITUS solutions are deployed to more than 1.5 million users within more than 300 military, government, and enterprise customers worldwide.

TITUS email and document classification complements McAfee Data Loss Prevention (DLP). The integration between TITUS products and McAfee DLP further reduces an organization’s risk of data loss. It does this by capturing end users' inherent knowledge about the sensitivity of documents and making that information available to McAfee host- and network-based DLP in the form of metadata for more accurate decisions and reduced false positives.

Read the solution brief for more details

McAfee Compatible Solution:
TITUS Message Classification v3.5, TITUS Classification for Microsoft Office v3.5, TITUS Classification for Desktop v1.1 with McAfee DLP v9.2 and McAfee ePO v4.6.


Tiversa is a global leader in peer-to-peer (P2P) intelligence and security, serving corporations, global law enforcement, government agencies, and individuals. Its patented technologies can monitor over 550 million users issuing over 1.8 billion searches per day. Tiversa can locate and record exposed sensitive documents in real time, provide geo locations and identities of document disclosure sources, record user-issued searches, and assist in risk mitigation and remediation.

Tiversa has integrated its P2P Breach Protection solution with the McAfee ePolicy Orchestrator (McAfee ePO) platform, providing customers with data loss visibility beyond the corporate perimeter. Tiversa P2P Breach Protection is segmented into three offerings: Corporate Breach Protection, SMB Breach Protection, and Federal Breach Protection. All include real-time data disclosure detection and advanced P2P forensics to mitigate risk, enabling customers to proactively safeguard their sensitive data within the extended enterprise of suppliers, partners, agents, customers, and remote employees.

Read the solution brief for more details

McAfee Compatible Solution:
Tiversa Breach Protection and McAfee ePO 4.6.


Topia Technology is an innovative provider of solutions that securely move and manage data in complex distributed systems. Each solution utilizes proprietary shredding and multi-layer encryption to provide military-grade security for data at-rest and in-transit, ensuring the highest degree of: data integrity, availability, performance, and end-to-end data governance. Topia Technology solutions leverage enterprise infrastructure assets and provide secure syncing and sharing across any device and data repository; lowering total cost of ownership and maximizing workflows.

The Topia Technology Enterprise File Sync and Share Platform (EFSS), Secrata, extends the McAfee ePolicy Orchestrator (McAfee ePO) software security features by providing insight into individual files. This powerful combination of McAfee ePO software and the Secrata Platform provides event information, analysis, auditing, and reporting on file data as it is shared or synced. As files are securely shared both inside and outside the enterprise, the Secrata Platform reports the source, destination, and selected recipient information that can then be used to enforce policy through McAfee ePO software.

Read the solution brief for more details

McAfee Compatible Solution:
McAfee Enterprise Security Manager 9.3 and Secrata 4.3

Toshiba Storage Device Division (SDD)

Toshiba Storage Device Division (SDD), a division of Toshiba America Information Systems, is a market leader in the development, design, and manufacturing of small form factor 2 1/2" and 1 1/8" hard disk drives for original equipment manufacturers, value-added resellers, value-added dealers, systems integrators, distributors, and retailers in the United States. Toshiba SDD also offers a line of personal storage devices that enable consumers to quickly and easily back up personal digital content and entertainment libraries.

Toshiba and McAfee will work to integrate Toshiba’s self-encrypting drive technologies with McAfee data security solutions and upon completion, Toshiba’s products will comply with the Trusted Computing Group’s trusted storage device specifications.

Trapezoid Digital Security Services

Trapezoid is a leader in Trust Data Intelligence (TDI), providing hardware based security architecture solutions for enterprise cloud environments. Through a portfolio of innovative products and managed services, Trapezoid engineers security infrastructure using Intel® Trusted Execution Technology (Intel TXT) for a growing roster of Global 2000 companies. By establishing security policies that take into account hardware data, Trapezoid provides the first ever actionable and reportable hardware-centric security posture.

Trapezoid has teamed with Intel to use Intel TXT trusted values and incorporate these into real world use cases. These use cases will highlight the importance of hardware trust as part of an enterprise’s or cloud provider’s overall security posture. Intel TXT, part of Intel® Xeon® processor E5-family based servers, enables an end user to validate and attest that they are running their applications on both trusted hardware and a trusted hypervisor. In addition, Trapezoid is working with Intel® Identity Protection Technology (Intel® IPT) and Intel® Expressway Cloud Access 360 to help clients work securely on cloud environments. As part of the SIA program, Trapezoid has completed integration into McAfee ePO and McAfee ESM platforms to deliver policy-based management on trusted endpoints.

McAfee Compatible Solutions:
Trapezoid Trust Control Suite and McAfee ePO 4.6
Trapezoid Trust Control Suite and McAfee Enterprise Security Manager 9.1


Triumfant offers a one-of-a-kind ability to discover, diagnose, and repair unwanted changes and unexpected conditions on endpoint computers and servers, and automatically corrects those changes and conditions that are problematic to the security, configuration, and performance of each machine.

The integration of Triumfant Resolution Manager (TRM) with the McAfee ePolicy Orchestrator (ePO) platform allows users to view the unwanted changes and unexpected conditions detected by TRM through the ePO console. Users can switch from ePO to TRM to view the details of the changes detected, review and execute the synthesized remediation, and execute reports. This integration provides ePO users with additional insight into the security readiness of the endpoint population through Triumfant’s ability to identify and analyze unusual changes to each machine.

Read the solution brief for more details

McAfee Compatible solution:
Triumfant Resolution Manager 4.3.3 and McAfee ePO 4.0.


As a leading provider of Security Policy Orchestration, Tufin automates and accelerates network configuration changes while maintaining security and compliance. Tufin's award-winning Orchestration Suite gives IT organizations the power and agility to enforce security policy across complex, multi-vendor enterprise networks. With more than 1,300 customers worldwide, Tufin enables IT to positively impact the entire business by reducing the time and cost to implement network changes by up to 80 percent.

Tufin SecureTrack monitors McAfee Firewall Enterprise in real time to give the firewall and security administrator control and visibility over changes made to the firewall policy. Key features include: Interactive Dashboard — Up-to-date picture of outstanding risks, the latest changes to firewall policies, and rules and objects that need clean-up or optimization.Change Management — Immediately assess all of the latest changes to any firewall policy.Risk Management — The SecureTrack risk browser gives you an up-to-the minute picture of firewall risks so you can act immediately.Optimization and Cleanup — With the SecureTrack clean-up browser, you always know about unused rules and objects.Continuous Compliance — SecureTrack continually analyzes changes for compliance with your corporate security policy and with PCI DSS.

Read the solution brief for more details

McAfee Compatible Solutions:
Tufin R13-4 and McAfee Firewall Enterprise 8.3
Tufin R13-3 and McAfee Next Generation Firewall 5.6


Validity Sensors develops a durable, flexible, and high performing biometric fingerprint sensor for information, communication, and entertainment devices. Validity’s fingerprint products enable convenient, secure, and affordable solutions for identity validation, including features such as password replacement, identity verification, centralized management for corporate network security, secure wireless transactions, protection of portable data, and physical access control. As part of the SIA program, Validity will work with McAfee to integrate its authentication solutions with McAfee Endpoint Encryption.

McAfee Compatible solution:
Validity Fingerprint Reader with McAfee Drive Encryption 7.1


VASCO Data Security is the world leader in strong authentication. The company has established a solid reputation in online banking with both authentication and e-signature solutions, and authentication in the application and enterprise security markets. Recently, VASCO launched a range of PKI-based authentication solutions, including DIGIPASS CertiID, a client-based software; and DIGIPASS Key1 and DIGIPASS 860, PKI authenticators. Vasco intends to integrate all of these solutions with McAfee Endpoint Encryption for preboot authentication and disc encryption, adding user authentication for laptop protection to McAfee’s offering.

McAfee Compatible solution:
Vasco DIGIPASS Key 101 (SafeSign Applets) and McAfee Drive Encryption 7.1.1


Virtustream is an enterprise-class cloud software and service provider trusted by enterprises worldwide to migrate and run mission-critical applications in the cloud. The Virtustream xStream cloud management platform (CMP) software and Infrastructure-as-a-Service (IaaS) meets the security, compliance, performance, efficiency, and consumption-based billing requirements of complex production applications in the cloud — whether private, public, or hybrid for enterprises, service providers, and government agencies. The company is headquartered in Washington D.C. with offices in San Francisco, Atlanta, London, Geneva, Dubai, and software development centers in Kaunas, Lithuania, and Pune, India. Virtustream owns and operates data centers in the U.S. and Europe with service provider partner data centers in Latin America, the Middle East, and Asia.

The Virtustream ViewTrust solution is integrated with McAfee ePolicy Orchestrator and McAfee Vulnerability Manager to enable an automated risk assessment of the technical compliance and vulnerability posture of an enterprise’s information systems and related assets. This integration enables enterprise customers to quickly identify and remediate high-impacting business or mission risks efficiently, utilizing advanced security intelligence and analytics in a continuous risk and compliance monitoring solution.


As technology standards continue to coalesce, compliance requirements are evolving in an attempt to address the increased depth, breadth, and complexity of securing and auditing the IT infrastructure to keep important information confidential. A trillion-dollar industry has been built on evolving security threats and the compliance requirements to address them, but VoIP security is an issue that has remained largely unaddressed. VoIP ostensibly is a blind spot in IT infrastructure security. VoIPshield is changing this mindset within the IT industry and providing VoIP audit and security tools that are simple to deploy and maintain, and eliminate that security blind spot.

VoIPshield VoIPaudit 4.0 is the leading application for VoIP audit compliance. VoIPaudit 4.0 is easy to configure and use, and runs a diagnostic on your network that provides a comprehensive report of your network security, including its adherence to leading industry standards. VoIPaudit 4.0 should be run regularly as every time a system has a move, add, or change in its network it opens the system to security risk. When risks are found, VoIPaudit 4.0 gives a comprehensive path to remediation, providing step-by-step instructions on how to make the network compliant. Industry experts agree that audit software is the best first defense in the cybersecurity battle, as over 99% of hacks that occurred in the previous year could have been prevented if industry standards had been followed (Bloomberg News, March 2014).


Vormetric is the industry leader in data security solutions that span physical, virtual, and cloud environments. Vormetric helps over 1,300 customers, including 17 of the Fortune 30 and many of the world’s most security conscious government organizations, to meet compliance requirements and protect what matters — sensitive data. The company’s scalable solution protects any file, any database, and any application — within enterprise data center, cloud, and big data environments — with a high performance, market-leading Vormetric Data Security Platform that incorporates application and transparent encryption, access controls and security intelligence.

Vormetric has partnered with McAfee to extend the data-security coverage of McAfee Database Activity Monitoring (DAM) and McAfee Enterprise Security Manager (ESM). Vormetric adds another layer of security to McAfee DAM by preventing unauthorized users and processes from accessing or viewing the database files through transparent encryption, key management, and access controls. Vormetric provides granular audit logs on file-level access of sensitive data that provides valuable contextual information used by McAfee ESM for compliance reporting or alerting on suspicious and unusual behavior at the file-level.

Read the solution brief for more details

McAfee Compatible solutions:
Vormetric Data Security Manager 5.2.1, Vormetric Transparent Encryption 5.2.1, Vormetric Application Encryption 5.2.1, and McAfee Database Activity Monitor 4.4.3
Vormetric Data Security Manager 5.2.1, Vormetric Transparent Encryption 5.2.1, Vormetric Application Encryption 5.2.1, and McAfee Enterprise Security Manager 9.4

Waterfall Security

Waterfall Security Solutions Ltd. is the leading provider of Unidirectional Security Gateways™ and data diodes for industrial networks, SCADA systems, remote monitoring systems and isolated networks. Waterfall Gateways secure industrial networks from network attacks originating on external networks. Waterfall’s security solutions make it straightforward for utilities and critical infrastructures to achieve compliance with NERC-CIP, NRC, NIST and other regulations as well as with cyber-security best practices. Waterfall’s offerings include support for leading industrial applications, such as: OSIsoft PI™ Historian, GE Proficy™ iHistorian, the Siemens SIMATIC™ and the GE OSM™ remote monitoring platforms, and leading industrial protocols, such as: OPC, Modbus, DNP3 and ICCP.

Waterfall Unidirectional Gateways provide McAfee NitroView SIEM installations with visibility into security events and other information in segregated critical-infrastructure networks. In addition, McAfee and Waterfall have cooperated to test, validate and support Waterfall for NitroView, a Waterfall solution which replicates McAfee NitroView data out of Waterfall-isolated networks. The solution permits the industry-leading NitroView SIEM and other NitroView components inside of security-isolated networks to secure and manage those isolated networks, while still providing visibility into those networks for enterprise-wide NitroView SIEM installations.

McAfee Compatible solution:
Waterfall Unidirectional Gateway and McAfee Enterprise Security Manager (formerly NitroView).


WCK (White Cyber Knight) provides a Governance, Risk and Compliance (GRC) solution which brings clear visibility into the organization’s cyber & IT security risks and their impact on the business. Organizations can use the WCK Business Security Risk Managenent (bSRM) system and decision support tools to prioritize security improvements based on their business needs and security strategy. WCK-bSRM can combine risk management for IT, physical security, and control systems security, providing a unique value for critical infrastructure and manufacturing firms. The solution is simple to implement and use, and enables short time to value – customers can gain insight into their risk posture from existing data within a week from installation.

The integration of WCK-bSRM with the McAfee ePO platform adds the business context to the elements managed by ePO, providing management insight into the business relevance of these elements. By analyzing the dependencies between IT components, systems, business processes and organizational units, WCK-bSRM improves the visibility of the organization’s security risk for assets managed by the ePO platform.

Read the solution brief for more details

McAfee Compatible solution:
WCK-bSRM V 2.10 and McAfee ePO 4.6.

Whitebox Security

Whitebox Security is a leader in the identity and access governance fields. The company pioneered Intelligent Access Governance, which combines the best of Identity Intelligence, and Identity and Access Governance in the WhiteOPS- Access Governance solution. The award winning WhiteOPS solution enables customers to face data governance and security challenges and identify who accessed data, what was done with it, and what was approved.

When integrated into McAfee's DLP suite, WhiteOPS will automatically import data classification results to enable business and IT to get further visibility on their most valuable assets, understand who is using their files and folders, perform permissions reviews, and validate that only the right employees can actually access their sensitive data, as discovered by McAfee's DLP.


WizNucleus is an innovative provider of NERC CIP compliance process automation products for the energy sector. The company is supported by a strong technology platform and industry partnerships. With origins in the nuclear power plant sector, WizNucleus products have built-in and proprietary technology for automating the entire compliance process, which drastically reduces overall compliance costs. The products are specifically designed for the latest regulatory standards.

NERC-Wiz comprehensively addresses all aspects of NERC CIP 002-009 compliance process automation, including cyberassets and evidence management, ESP/PSP definition, network diagramming, personnel risk assessment, change control, documentation, and TFE management. The reporting and audit preparation aspects of the product makes a NERC audit painless. The integration of NERC-Wiz with McAfee Enterprise Security Manager will provide a dynamic and automated compliance management platform that will receive correlated events and alerts based on preconfigured rules.


Xerox Corporation is a leading provider of business process and document management. Its technology, expertise, and services enable workplaces – from small businesses to large global enterprises – to simplify the way work gets done so they operate more effectively. The company also provides extensive leading-edge document technology, services, software and genuine Xerox supplies for graphic communication and office printing environments of any size.

Xerox has integrated its first networked multifunction printer to use McAfee Embedded Control software, a sophisticated filtering method that allows only approved programs to get through. The Xerox and McAfee security solution simplifies processes for IT administrators with software embedded into a multifunction device’s controller (the machine’s main onboard computer) to provide an immediate alert and audit trail to track and investigate the time and origin of security threats – and take appropriate action. This eliminates the need for IT administrators to constantly stay on top of malware threats and proactively block them.

McAfee Compatible solution:
Xerox MFP extension 1.0 and McAfee ePO 4.6.


ZeroFOX, a social risk management company, is pioneering security technology that enables organizations to detect and prevent social media-based cyberthreats, including targeted malware, phishing, social engineering, impersonations, and other fraudulent or malicious activity. Its proprietary Security Analysis Engine (SAE) analyzes social networks and distills threat intelligence through ZeroFOX Enterprise — a centralized, cloud-based platform empowering users to take action on alerts and incoming threats. As the first solution to combat social media risk exposure, ZeroFOX increases an organization’s security posture, while reducing incident response and crisis communications costs.

ZeroFOX raw social media attack data is integrated with McAfee Enterprise Security Manager, parsed, and displayed. The attack data can then be correlated with existing event data to provide a new layer of context within the SIEM solution. This added layer of social media attack intelligence is critical in effectively providing a proactive defense-in-depth security posture — detecting attacks before they hit your network, correlating threats in real time to stop attacks in progress, and understanding the genesis of an attack after it has occurred.

Read the solution brief for more details

McAfee Compatible solution:
ZeroFOX Enterprise 4.5 and McAfee Enterprise Security Manager 9.4.


ZF Electronics (formerly the Cherry Corporation) operates as an independent business unit within the ZF Group. The company develops and produces computer input devices, switching systems, sensor technology, and controls. The well-known Cherry brand is now managed under ZF Electronics’ computer input devices and switches and controls product segments. ZF Electronics has 3,100 employees worldwide and generated total sales of approximately €250 million in 2009.

Most Cherry smart card readers and keyboards are interoperable with McAfee Endpoint Encryption, providing joint customers with a secure identity protection solution.

McAfee Compatible solution:
McAfee Endpoint Encryption v5 (on Windows XP, Vista, 2003, and 2008) and Cherry smart card readers, standalone or built into keyboards, models ST-1044, ST-1210, G83-6744 and G83-6644.

SIA Partner Award 2013

Customer Testimonials

“When I can integrate the best network and security products, it opens the door for a lot of operational advantages.  As a customer of ForeScout and McAfee, their interoperability allows me to automate a number of risk management and incident response tasks, which saves resources and helps my team meet operational and compliance goals.”
– Waqas Akkawi, Director of Information Security, SIRVA Inc.

“There are many ways information can leak out of networks, but until we understand our information we cannot identify if, where and when it may leak. Sharing information with a growing coalition of partners increases the risks in this area. Using TITUS Classification in conjunction with McAfee DLP is one of the steps NATO has taken to ensure that we effectively identify and improve the security of our information.”
– John Tatman, Principal Information Assurance Engineer, NATO

“Having an integrated suite—something that would work enterprise-wide and globally—was of critical importance to us. We have changed our strategy because of McAfee and its ability to offer integrated solutions from so many different vendors. We are very, very pleased with what we have seen so far.”
– Norm Feldheim, CIO, Qualcomm

“At Citrix, we work with a number of security vendors and we are very interested in cross-product integrations that improve protection and compliance. In McAfee’s SIA program, we’ve already identified two such vendor integrations and are looking for more.”
– Tom Krawczyk, Senior Security Architect, Citrix Systems

“We use McAfee Endpoint Encryption as a critical component of our layered protection model against unauthorized access to data while increasingly relying on Imprivata OneSign for Single Sign-on to as many applications as possible. The integration between the two products was absolutely critical to increase stability and therefore lower operating costs because the two share such an important place in the foundation of distributed endpoint security system.”
– David O’Berry, Director of Information Systems and Services, South Carolina Department of Probation, Parole and Pardon Services

Partner Testimonials

“The McAfee SIA program has greatly advanced the cause of multivendor interoperability. Working with McAfee, ActivIdentity has become part of a more complete solution for encryption, authentication, and identity management.”
– Jerome Becquart, Vice President of Products and Services, ActivIdentity

“For Absolute Identification, the McAfee SIA program has been invaluable. Because of this program, we have been able to work closely with McAfee sales and management teams on numerous sales and marketing opportunities over the past year, which has brought us tremendous business benefits.”
– Don Ritzman, CEO & President, Absolute Identification

“The McAfee SIA Program has helped Gemalto provide organizations with an interoperable solution for stronger and earlier authentication that has opened the door to new business opportunities.”
– Cedric Collomb, Senior Vice President, Gemalto

“The SIA Developers Conference gave us a great foundation to accelerate our integration effort with McAfee and a deeper understanding of how to achieve success”
– Della Lowe, Sr. Director of Corporate Marketing, AirTight Networks