SIA Partner Directory

SIA Partner List

SIA Partner Description McAfee Compatible
Absolute ID

Absolute ID is an innovative provider of data-centric protection products and services. Every Absolute ID solution employs proprietary cryptography technology that creates sophisticated, highly secure data files; dramatically enhances data availability, confidentiality, and integrity; and prevents unauthorized access or theft of digital data while lowering total cost of ownership.

Advanced Software Products Group

Advanced Software Products Group, Inc. (ASPG), a leader in data center security software since 1986, offers flagship products including MegaCryption (data encryption for z/OS, UNIX, LINUX and Windows), ReACT (enterprise password reset and synchronization), and ERQ (RACF administration, reporting and custom user scripting). Data centers worldwide continue to make ASPG software solutions their products of choice to increase productivity, protect data, and solve critical issues in their z/OS and enterprise environments. ASPG offers innovative software solutions for data security, storage administration, capacity planning, system productivity and CICS productivity.

ASPG will create an interface between its Enterprise Self-Service Password Reset product ReACT, and McAfee’s Endpoint Encryption. ReACT normally allows users who have forgotten their system/application passwords to automatically reset or unlock those accounts after performing a few simple authentication steps. These capabilities will be extended to allow a user whose system is secured by McAfee Endpoint Encryption to authenticate and unlock the system in the event that they have lost or forgotten their EP password or PIN, without the need to call a help desk or support group for assistance.


The Dutch company A.E.T. Europe B.V. (AET), headquartered in Arnhem and founded in 1998, is committed to IT security. AET is setting new standards in the crucial business area of developing middleware and card management systems for smart cards and USB tokens with its SafeSign Identity Client and BlueX digital ID management.

The combination of SafeSign Identity Client (IC) and McAfee Endpoint Encryption pre-boot authentication integrates authentication, access control, and hard disk encryption. Customers using smart cards or USB tokens for local access control at the McAfee secured client can add applications to the smart card or USB token as the demand grows, without having to change the smart cards, USB tokens, or client infrastructure.

McAfee Compatible solution:
SafeSign and McAfee Drive Encryption.

AirPatrol Corporation

AirPatrol delivers wireless threat management solutions that empower customers to have total awareness of wireless 802.11 and cellular devices within their facility and total control over how corporate wireless and USB endpoint assets are used. The company’s comprehensive suite of location-based wireless security products enable security professionals in the government, financial, healthcare, corporate enterprise, and retail industries to keep pace with the expanding security requirements of an increasingly mobile world.

AirPatrol’s Wireless Policy Manager (WPM) extends the capabilities of McAfee’s ePolicy Orchestrator (ePO) platform into the wireless regime, giving network administrators the ability to manage, distribute, and enforce wireless network policies from their central ePO management console. AirPatrol’s WPM is specifically designed to secure wireless interfaces on endpoints and allows IT administrators to easily enforce common-sense rules that govern how employees use wireless resources. With WPM, organizations can secure valuable laptops and PCs against today’s wide range of mobile and wireless threats.

Read the solution brief for more details

McAfee Compatible solution:
AirPatrol WPM 2.0 and McAfee ePO.


AlgoSec is a market leader in network security policy management. AlgoSec enables security and operations teams to intelligently automate the policy management of firewalls, routers, VPNs, proxies, and related security devices, improving operational efficiency, ensuring compliance, and reducing risk. More than 900 of the world’s leading enterprises, MSSPs, auditors, and consultancies rely on AlgoSec Security Management Suite for unmatched automation of firewall operations, auditing and compliance, risk analysis, and the security change workflow.

AlgoSec enables organizations running McAfee Firewall Enterprise to automate firewall management by ensuring correct policy configuration and continuous compliance. AlgoSec discovers unused and risky rules, automatically generates compliance reports, and automates the change workflow process to improve both security and operational efficiency.

Read the solution brief for more details

McAfee Compatible solution:
AlgoSec Security Management Suite 6.3 and McAfee Firewall Enterprise.

Allen Corporation of America

Allen Corporation of America provides cybersecurity research, technology, and training solutions to organizations and individuals tasked with detecting and investigating cybercrimes. Allen Corporation’s Advanced Threat Identification-Preemptive Defense (ATI-PD)™, efficiently enforces authorized use policies and protects against insider threats.

By leveraging the investments that organizations have made in McAfee endpoint protection suites, extending the one security agent and centralized management view provided by McAfee ePO, and utilizing the enforcement features of McAfee Host Intrusion Prevention, ATI-PD helps companies protect their critical assets and save time and money. ATI-PD leverages the signature database of one of the industry’s leading malware discovery tools for forensic investigations, WetStone Technologies™ Gargoyle Investigator™, enabling ATI-PD to detect and block the execution of thousands of malicious programs and tools in categories such as steganography, hacker toolkits, encryption, keyloggers, wireless surveillance, password crackers, and anti-forensics.

McAfee Compatible solution:
Allen Corporation Advanced Threat Identification-Preemptive Defense (ATI-PD) software version 1.0 and McAfee Host Intrusion Prevention software and McAfee ePO, with McAfee Agent on Windows workstations and servers [EOL].


Apperian is the industry pioneer for mobile application management. Its cloud-based platform is the standard for managing corporate mobile apps and data in the enterprise. Unlike traditional approaches, Apperian protects and manages just what matters most -the actual apps and data- with a seamless user experience that doesn’t require intrusive technology on user devices. The solution ensures ongoing compliance with security policies and simplifies managing all stages of the mobile app lifecycle, streamlining the complexity of supporting ever-changing versions of apps, operating systems and devices — whether personal (BYOD) or corporate owned. Apperian powers the world’s leading enterprise app stores for hundreds of thousands of users.

Apperian and McAfee have joined forces to bring the power of mobile app management and security to McAfee customers without requiring cumbersome technology on user’s devices. Through McAfee’s ePolicy Orchestrator (ePO), insights into user’s app-level activity help mobile administrators drive the adoption of custom-built apps. Customers utilizing Apperian and ePO can centrally manage app-based policies that can be designed and applied to enterprise apps to ensure mobile compliance across the organization.

Read the solution brief for more details

McAfee Compatible solution:
Apperian EASE with McAfee ePO.

Aruba Networks

Aruba Networks is a leading provider of next-generation network access solutions for the mobile enterprise. The company's Mobility-Defined Networks empower IT departments to support #GenMobile, a new generation of tech-savvy users who rely on mobile devices for every aspect of work and personal communication. Aruba delivers a secure mobility experience by automating infrastructure-wide performance optimization and security actions that previously required manual IT intervention. The results are dramatically improved security, higher productivity, and lower operating costs.

Aruba has partnered with McAfee to deliver an end-to-end enterprise risk mitigation and management solution by integrating with the McAfee SIEM solution. Aruba's ClearPass, a security and management solution, is a McAfee SIEM supported device. ClearPass is an ultra-scalable, high-availability AAA solution with policy management, guest network access, device on-boarding, and device health checks, with a complete understanding of context. It leverages a user's role, device, location, application-use, and time-of-day to execute custom security policies, accelerate device deployments, and streamline network operations across wired, wireless and VPNs. Both the McAfee SIEM solution and ClearPass are positioned as Leaders in Gartner Magic Quadrants, and used together deliver enterprise-class network access.

McAfee Compatible solution:
Aruba Networks ClearPass 5.x and McAfee ESM.

Autonomic Software

Autonomic Software develops autonomic desktop management, security, and power management solutions. Autonomic Software's Autonomic Network & System Administration (ANSA) products offer a range of endpoint management capabilities, including patch management, asset management, software deployment, configuration management, government/corporate conformance and policy monitoring, software audit/compliance, and power conservation management.

Autonomic Software's ANSA Platinum Power Management plug-in is integrated with McAfee ePO, providing McAfee ePO users with a comprehensive solution to manage desktop and laptop power usage. With this, enterprises can significantly cut energy costs, reduce global carbon emissions, and increase their networks' "green" footprint. McAfee ePO users have the benefit of applying power policies through a familiar interface and know that they are enforced.

Read the solution brief for more details

McAfee Compatible solutions:
Autonomic Power Manager 1.3.3 and McAfee ePO
Autonomic Patch Manager 2.1 and McAfee ePO
Autonomic EndPoint Manager 1.2 and McAfee ePO


Avecto is a leader in Windows privilege management, helping organizations to deploy secure and compliant desktops, laptops, and servers. Avecto’s mission is to enable customers to lower operating costs and improve system security through the removal of user admin rights. By removing admin rights with Avecto’s award winning Privilege Guard technology, organizations empower all Windows-based users with the permissions they require to perform their roles, without compromising the integrity and security of their systems. Customers with up to 400,000 end users have chosen Avecto Privilege Guard to help them strengthen security across their Windows-based environments.

The integration of Avecto’s Privilege Guard with the McAfee ePolicy Orchestrator (McAfee ePO) platform delivers near real-time monitoring of all privileged activity across McAfee ePO-managed assets, accelerating the roll out of least-privilege desktops through integrated agent and policy deployment. Rich, contextual dashboards and reports provide granular risk and compliance data to enable users to quickly identify and address privileged access requirements. Combining Avecto Privilege Guard with McAfee ePO software gives users increased productivity, simplifies Windows 7 migrations, and delivers comprehensive privilege management across the enterprise.

Read the solution brief for more details

McAfee Compatible solution:
Avecto Privilege Guard 3.8 and McAfee ePO.


Avencis is a leading independent European vendor specializing in strong authentication and credentials management, providing field-proven solutions to hundreds of customers worldwide. In addition to its own technology, Avencis leverages its strategic technological partnerships to provide security solutions to enterprises and organizations ranging from 1,000 to 150,000 users. Thousands of users use Avencis products and solutions daily to securely and seamlessly access their working environment.

SSOX, Avencis' E-SSO product, together with McAfee’s Endpoint Encryption for PCs, will provide strong authentication, access control, and single sign-on to any application and resource, throughout the enterprise. The joint solution secures access to information, from the initial system boot to the applications themselves, smoothly and seamlessly, bringing tremendous benefits both in terms of information security, convenience, and cost-effectiveness.

McAfee Compatible solution:
Avencis SSOX and McAfee Endpoint Encryption on Windows 2008, XP, and VISTA [EOL].


AVOB — Alternative Vision Of Business — is a leading provider of power management and green IT solutions. Established in 15 countries, AVOB offers businesses EnergySaver, its flagship enterprise solution, which reduces networked PCs energy consumption and carbon footprint by up to 75%.

AVOB Energy Saver 5 is fully integrated in the McAfee ePolicy Orchestrator (ePO) platform. Installation and deployment are seamless, directly managed through the ePO console and can take only a few minutes. An intuitive graphical user interface simplifies the setting of your energy policies and schedules to match the needs of users across your network, without impacting productivity. AVOB’s reliable and secure wake technology allows PCs to emerge from sleep modes for a nightly update and to go back to sleep before waking up in the morning prior to use. AVOB and McAfee customers can save from $20 to $65 per PC each year with a rapid ROI within months.

Read the solution brief for more details

McAfee Compatible solution:
AVOB Energy Saver 5 for McAfee ePO.

Blackridge Technology

Founded in 2008, BlackRidge Technology, the Identity Aware Network company, provides innovative Identity-based cyber security solutions protecting web-based cloud, mobile and data center infrastructures against sophisticated security threats. Built upon patented Transport Access Control (TAC) technology, BlackRidge Eclipse prevents attackers from performing reconnaissance of high-value and mission-critical network assets by denying them the ability to communicate anonymously.

By integrating BlackRidge Eclipse into the McAfee ePO platform customers will gain the ability to manage Identities and their associated policies through a unified view.

Blue Coat

Blue Coat, formerly Solera Networks is a pioneer in delivering Network Security Analytics — a high-speed network monitoring and forensics platform for complete network capture, classification, indexing, visualization, and reconstruction of any network event. Solera DS Appliances record, classify, and index every packet, flow, and attribute at line rates up to 10 Gbps, on physical and virtual networks. Solera Networks appliances integrate into existing security workflows and support best-of-breed security tool environments, giving security professionals comprehensive network visibility.

The integration with McAfee Network Security Platform through McAfee Network Security Manager provides an efficient workflow for network event investigation and analysis. By leveraging Solera Networks APIs, security analysts or incident responders have content "look-back" capabilities for a full view of historical network events, enabling forensically complete incident investigation. Users can pivot data from event parameters in Network Security Manager — such as time, port, source, and destination IP addresses — directly into Solera DS Forensics Appliances for complete context and packet-level evidence surrounding any event.

McAfee Compatible solution:
Solera DS Appliances (DS 5200, DS 3200, and DS 1200) and McAfee Network Security Platform Appliances (M8000, M6050, M4050, M3050, and M2750).

Boldon James

For over 20 years Boldon James software has helped organizations with the most demanding communication requirements to manage sensitive information securely and in compliance with legislation and standards. Boldon James extends the capabilities of Microsoft core infrastructure products to allow secure information exchange. In particular, the Boldon James Classifier products provide users with a means to classify and protectively mark emails, documents, and files from within familiar office productivity tools — improving data loss prevention measures and reducing archiving costs. Boldon James is a wholly-owned subsidiary of QinetiQ, with offices in the US, Europe, and Australia, and channel partners worldwide.

Boldon James Classifier integrates with McAfee Network Data Loss Prevention to reduce the risk of data loss by applying the insight of each worker to data loss prevention decisions. Classifier captures the user's knowledge of the business value of data, in the form of visual and metadata markings applied to messages and documents. This user perspective can then be used to supplement automated content scanning, in order to deliver more accurate data loss prevention outcomes with fewer false positives, improved user acceptance, and greater risk reduction.

Read the solution brief for more details

McAfee Compatible solution:
Boldon James Classifier 3.0 and McAfee Network Data Loss Prevention


BowBridge Software is a leading provider of content security solutions for mission-critical SAP applications. The AntiVirus Bridge products secure file transfers and data feeds into SAP applications and protect them from malware and other content-based threats, such as cross-site scripting and active content. BowBridge content security products have been certified multiple times by SAP and it has a wealth of experience in securing the most complex SAP implementations.

With BowBridge’s latest generation of solutions, customers worldwide benefit from the integration of McAfee virus scan technology into AntiVirus Bridge for SAP solutions. The combination delivers high performance and maximum protection in the most demanding enviroments. AntiVirus Bridge will feed content security related events directly into McAfee ePolicy Orchestrator (McAfee ePO). This will allow customers to monitor and report on their SAP infrastructure without having to access the SAP system, resulting in a more streamlined and consolidated security view.

Read the solution brief for more details

McAfee Compatible solution:
BowBridge Antivirus Bridge for SAP solutions 3.0 and McAfee ePolicy Orchestrator.

BP Informatica

BP Informatica is an innovator of real-time security intelligence and control solutions. Its flagship product, Kataskopeo, understands network protocols and digital content. By analyzing network behavior and application domain, Kataskopeo manages content for compliance of business policy and regulations. With the KWeb and KDB/KDB2 module, it also provides end to end application monitoring though the ZOs IT environment, helping IT organizations and businesses improve performance and security compliance.

BP Informatica has integrated the KatasKopeo software suite with McAfee Vulnerability Manager for Databases to enhance visibility and deliver compliance through integrated audit reports.


Brinqa is a leading provider of unified risk analytics across operations, assets, and individuals — resulting in a single assessment, monitoring, and reporting platform for IT risk. Brinqa software and cloud services leverage an organization’s existing investments in systems, security, and governance programs to gather, identify, and analyze risk data to quickly respond to emerging threats. Organizations are reducing their IT risk management and compliance costs by over 50% through real-time risk analytics, automated risk assessments, prioritized remediation, actionable insights, and improved communication. Brinqa offers solutions in the following areas — information technology risk management, vendor risk management, and compliance risk management.

The McAfee and Brinqa integrated solution offers customers the ability to have a unified view of risk that has been classified for easy prioritization. The joint solution offers full network asset life-cycle management, integrated risk scoring for identification, and evaluation of critical assets, which results in continuous and comprehensive risk analysis. The correlated and analyzed asset and vulnerability risk data results in normalized vulnerabilities and incidents. The result is information with business context that produces analytics focused on reducing an organization’s risk.

McAfee Compatible solution:
Brinqa GRC Platform 3.5, Brinqa Risk Manager 3.5, and McAfee Vulnerability Manager.


BUFFERZONE is a patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity. By isolating potentially malicious content from web browsers, email, and removable media, BUFFERZONE complements McAfee endpoint security products and defends against advanced threats that evade detection. BUFFERZONE includes a configurable bridge for transferring content and data safely between the container and secure network zones, and provides critical intelligence for enterprise-wide security analytics. Easy to deploy and configure, BUFFERZONE is a lightweight solution that works seamlessly with McAfee to provide cost-effective containment for up to thousands of endpoints.

BUFFERZONE is integrated with McAfee ePolicy Orchestrator (ePO) to enable customers to distribute, install, and set policy for BUFFERZONE.

McAfee Compatible solution:
BUFFERZONE 4.11 and McAfee ePolicy Orchestrator


Buguroo is specialized in application security and cyber intelligence solutions. The Buguroo product suite provides static security analysis of source code, dynamic security assessments of applications and IT assets, early warning services, and cyberthreat-related information. These capabilities, available from the cloud or through onsite appliances, can be leveraged by correlating results obtained from multiple sources to deliver the most accurate and reliable business-oriented security findings.

Integration of Buguroo's product suite with the McAfee ePolicy Orchestrator platform enables organizations to effectively perform security assessments against applications and IT assets, manage findings, and create custom reports. Information about cyberthreats affecting customers' brands, applications and IT assets — such as phishing, cybersquatting, malware, information leakages, and botnets — will also be available for review, response and remediation.


Ceedo Technologies delivers workspace virtualization solutions that extend the reach of business computing to unmanaged PCs. Ceedo allows enterprises to deploy their business applications to a portable virtual workspace that works instantly on any Windows PC, enabling them to provision teleworkers, temps, contractors, and partners without the need to manage additional desktops or increase their data center capacity. Ceedo’s products have been deployed on over four million devices worldwide, where they are managed and used daily by consumers, enterprises, and service providers.


Charismathics is a global leader in identity management software. Its premier product, the Charismathics Smart Security Interface (CSSI), makes it cost-effective and easy for enterprises to integrate multiple authentication solutions into a single, transparent interface. Since 2003, Charismathics has pioneered the field of Public Key Infrastructure (PKI), introducing the first PKI client to support Trusted Platform Modules (TPMs) and the first PKI client to support pre-boot environments. Charismathics offers security products and PKI consulting in a variety of industries, including banking and finance, healthcare, telecommunications, security, government, and PC manufacturing.

Charismathics enables the McAfee Endpoint Encryption client’s broad use of the smart card security chip operating system through integration with CSSI, even into existing PKI-2FA infrastructures. This partnership helps build awareness surrounding pre-boot authentication, and delivers an enhanced, unified security approach to a wide range of enterprise clients and individual users.

McAfee Compatible solution:
Charismathics Smart Security Interface software and Charismathics Plug-n-Crypt USB device and McAfee Endpoint Encryption (EoL).

Core Security

Core Security provides the industry’s first comprehensive attack intelligence platform. With Core Security, enterprises and security professionals can focus on the most likely threats to their critical business assets by modeling, simulating, and testing what an actual attacker would do. Core Security helps more than 1,400 customers worldwide identify the most vulnerable areas of their IT environments to improve the effectiveness of remediation efforts and ultimately secure the business. Core Security patented, proven, award-winning enterprise products and solutions are backed by more than 15 years of applied expertise from Core Labs research and Core Security Consulting Services.

Core Insight leverages vulnerability scans from McAfee MVM and also plans to enrich the value of McAfee ePO platform by providing predictive security intelligence capabilities. By enabling multi-vector threat simulation and live attack execution, ePO users will have the ability to see high-priority risks and prioritize remediation tasks against validated network, application and end user vulnerabilities. As a result, McAfee customers will obtain valuable intelligence regarding their organization’s real-time security posture, while connecting real risks to specific operational and business goals.

Read the solution briefs (ePO, MVM) for more details.

McAfee Compatible solutions:
Core insight 2.6 and McAfee Vulnerability Manager
CORE Insight Enterprise 2.8 and McAfee ePO


CorreLog SIEM Agent for IBM z/OS converts z/OS security and operational events in real time to SIEM-ready syslog format. The result is an aggregation of IBM z/OS event data plus distributed syslog data viewable in McAfee Enterprise Security Manager, CorreLog Server, and/or other SIEM operations consoles. The aggregated event data populates these console dashboards in real time for an IT admin team to proactively manage system-wide IT security.

CorreLog SIEM Agent for z/OS ships with CorreLog dbDefender, which provides real-time monitoring of DB2. Any organization with PCI DSS or other industry-standard compliance requirements will benefit greatly from the up-to-the-second data activity monitoring provided by dbDefender. Database activity monitoring capabilities in dbDefender include privileged-user monitoring, recording invalid access attempts, auditing creation/deletion of system-level objects, and other attempts to alter the secure state of DB2.


CounterTack turns the tables on attackers and puts the enterprise back in control of protecting its endpoints. Using stealth, attacker-developed technology and combining it with big data to supercharge endpoints with real-time, forensic-level analysis, CounterTack gives security teams an unobstructed context and visibility into the unseen, the known, and the targeted-attack landscape, for prioritized security outcomes. CounterTack helps organizations regain control against targeted persistent threats by detecting endpoint attacks early and often, across the enterprise by collecting and analyzing data on all OS behaviors from a position of stealth. As a result, incident responders and security teams are able to make better overall security decisions using real-time threat context to automatically analyze endpoint threats, prioritize attacks that need immediate attention, and prevent lateral movement through enterprise systems. Ultimately, CounterTack gives teams the capability to assess their next point of exposure, with the capability to monitor endpoints at scale and correlate malicious endpoint behavior, enterprise-wide.

The CounterTack Sentinel real-time endpoint threat detection and response platform will extend the McAfee Enterprise Security Manager for enhanced visibility on enterprise workstation and server endpoints. The combination of Sentinel being used in concert with McAfee Enterprise Security Manager will give security teams and incident responders advanced attack detection and context so organizations can make better security decisions and counter the most critical endpoint threats with an intelligent, rapid response.


Courion offers a comprehensive identity and access management solution that equips you with visual real-time identity and access information. Quickly and confidently provide open and compliant access to applications and data, recognize and reduce risk as it occurs, streamline compliance activity, and expedite audits.

Courion will integrate identity-related information with McAfee ePO to link users, access policies, and sensitive data throughout the enterprise. This will help answer questions such as: Where is sensitive data? Who has access to it? What kind of access and controls are in place for different users and resources? The joint solution will help bridge the knowledge gap between user identity and access policies in heterogeneous customer environments.


CryptoTech provides hardware-based signature and authentication solutions with a strong commitment to ease of use, flexibility, and security on crypto smart cards and USB tokens. As optimal personal sensitive data protection and storage devices, hardware tokens are widely integrated with CryptoTech’s own or third-party software solutions dealing with PKI-based model of information security.

CryptoTech is committed to open standards and plans to provide a security solution that combines the strengths of McAfee Endpoint Encryption with the protection of secret keys offered by their smart card product line CryptoCard multiSIGN family.


CyberArk is the only security company that proactively stops the most advanced cyberthreats that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyberthreats before causing irreparable business damage. CyberArk is trusted by the world’s leading companies to protect their highest value information assets, infrastructure, and applications, while ensuring tight regulatory compliance and audit requirements.

CyberArk Privileged Account Security Solution integrated with McAfee Enterprise Security Manager enables security teams to monitor and protect privileged activity, and gain unified, real-time visibility, enabling the identification of critical security threats associated with privileged account activities. The solution generates exceptional detailed tracking and reporting on all privileged activity, meeting auditing and compliance requirements.

CyberArk Privileged Account Security integrated with McAfee ePolicy Orchestrator (McAfee ePO) provides privileged account security monitoring. CyberArk sends McAfee ePO alerts regarding the usage of privileged account credentials. IT administrators can set policies for alerts to be sent to McAfee ePO based on their most important IT. The solution generates compliance reports directly from the McAfee ePO.

The McAfee Enterprise Security Manager and CyberArk Privileged Threat Analytics integrated solution provides unmatched privileged activity intelligence empowering organizations to quickly identify and disrupt the most critical in-progress attacks.

Read the solution brief for more details (CyberArk Privileged Threat Analytics)

Read the solution brief for more details (CyberArk Privileged Account)

McAfee Compatible solutions:
CyberArk Privileged Account Security Solution with McAfee Enterprise Security Manager and McAfee ePO
CyberArk Privileged Threat Analytics with McAfee Enterprise Security Manager


CyberPoint delivers innovative, leading-edge cybersecurity products, solutions, and services to customers worldwide. Its internal research and development team takes the practical lessons learned from engagements and develops products that put that knowledge to work for commercial, international, and Federal Government customers. DarkPoint, an enterprise and cloud-based product, automates complex malware analysis to enable junior analysts, SOC operators, and forensic responders to efficiently analyze large volumes of malware. The DarkPoint intelligent workflows, fully extensible platform, and pattern matching capabilities enable organizations to see the impact of malware across their enterprises.

DarkPoint plans to integrate with McAfee Advanced Threat Defense to provide custom workflows and pattern matching using McAfee Advanced Threat Defense analysis capabilities. This solution will enable large and small enterprises to encapsulate processes, procedures, and workflows into a complete malware analysis solution designed to stop today’s threats and identify tomorrow’s problems.


Founded in 2011, CyberSponse is a leading provider of automated incident response (IR) solutions for cyber security threat management. The scalable and integrated IR platform helps companies prevent the destructive brand impact and financial losses of data breaches by providing advanced out-of-band IR automation. Designed for computer security incident response teams (CSIRTs), CyberSponse allows them to securely and seamlessly communicate across the organization, while automating workflows and tasks. Organizations across a wide range of markets including financial services, healthcare, retail, government, higher education, utilities, and hospitality turn to CyberSponse to shorten the time it takes to resolve cyber threats. CyberSponse workflow automation and tracking features make it the only platform available for full Tier 4 NIST compliance. It enables adaptive response, while including all stakeholders and facilitating information sharing with other organizations through its participation with information sharing and analysis centers (ISACs).

The CyberSponse IR360 platform integrates with McAfee Enterprise Security Manager by ingesting McAfee SIEM data and automatically initiating workflows for IR teams. CyberSponse couples with McAfee tools and enables teams to effectively operate and maintain full awareness and execution of their response plans and policies. CyberSponse provides IR teams with full command-and-control capabilities and the ability to manage SIEM data.


Cyvera is an innovative provider of cyberdefense solutions, protecting organizations from sophisticated, targeted cyberattacks that strive to gain access to sensitive data assets or destruct the operational infrastructure. With Cyvera's products, organizations can block the most up-to-date computer attacks, even when the attacks utilize novel methods, known only to the perpetrators — from zero-day malware and highly obfuscated exploits to any other form of attack that aims to evade existing security solutions. Cyvera's products are based on a new concept of cyberattack prevention. Instead of trying to monitor, sample, or analyze actions to identify the attack — and only then to contain it — Cyvera first obstructs the attack flow, and only following the successful prevention, extracts information and valuable intelligence on the attack.

When Cyvera is integrated with McAfee ePolicy Orchestrator (McAfee ePO), the solution provides an additional significant layer of security. Organizations can deploy Cyvera's solution with no additional agent installed or separated distribution and management systems. Cyvera TRAPS, together with McAfee security, can provide your organization with the most comprehensive solution against targeted attacks.


DearBytes believes in free and secure Internet. To reach the perfect balance, DearBytes security experts are passionate and highly motivated to help customers gain and maintain control over their valuable assets and information. DearBytes is one of the leading IT security service providers in The Netherlands, and has insights into the daily, real-world challenges companies face when controlling security. The solution-driven attitude of DearBytes led to the development of various tailor-made solutions such as Dear360 (based on the McAfee Security Connected Framework), Bytescan, and its highly valued managed services program.

Bytescan is DearBytes' advanced second-opinion antimalware solution, powered by HitmanPro. By integrating Bytescan into McAfee ePolicy Orchestrator (McAfee ePO), organizations are now able to easily implement a multivendor approach to secure their endpoints, managed from one security console. Bytescan is a great addition to endpoint protection for incident response purposes. HitmanPro has a track-record for providing solutions to remediate infected machines and continuously proves to be on top of this game. It is exactly that HitmanPro engine that is at the core of Bytescan and is now available for management from McAfee ePO.

McAfee Compatible solution:
DearBytes Bytescan 2.0 and McAfee ePO


Def-Logix, Inc. is an emerging leader in the provision of Information Assurance, Software Engineering, and Information Technology services to the Defense, Intelligence and Commercial communities. Our mission is to provide innovative technological expertise and solutions to our customers. We offer specialized services in computer and network security and state-of-the-art technology solutions to serve the critical needs of our government and commercial customers. Def-Logix sets itself apart by the caliber of its work and a strong culture of innovation.

Deployable Enhanced Forensics (DEF) - End Node Detector (END) includes cutting edge tools for performing computer/network forensics in the Enterprise. It automatically correlates boundary network events to host systems, and then automatically collects forensic information from effected devices. This information is analyzed by a server to determine if the system has been compromised. DEF-END will be integrated with ePO, with incidents reported back to ePO dashboards where appropriate action can be taken by system administrators or incident responders.

DG Technology

DG Technology Consulting provides IT solutions to maximize clients’ IT investments. The company’s solutions are backed by the most talented technologists and best-of-breed products and services from the top IT companies in the world. Technology changes constantly, yet customers must keep up with those changes to ensure the business is secured, managed, and supported 24/7. DG Technology believes and has proven that the foundation for success in this type of environment is through strong partnerships with companies and individuals. While no one entity can be everything for every company, a network of partners can help ensure success.

Many of the largest companies in the world run critical applications on an IBM z/OS platform referred to as a mainframe, making security on this platform increasingly important. To support compliance and security, some companies are writing in-house systems to build compliance reports. This model is not sustainable.

The DG Technology Mainframe Event Acquisition System (MEAS) was designed from the ground up to enable mainframe users to collect, store, report, and analyze data real time, through seamless integration with the McAfee ePolicy Orchestrator (ePO) and Enterprise Security Manager (ESM) platforms. McAfee ePO and ESM, along with MEAS, enable organizations to quickly and easily monitor and report on the mainframe platform just as they do on the other platforms. Now companies can ensure compliance across the enterprise and are immediately notified of any security breaches on the mainframe with existing staff. Leveraging the power of McAfee ePO and ESM, MEAS identifies critical events and allows clients to report, alert, monitor and manage those events in real time. Through the same McAfee ePO console used today, clients can monitor their entire enterprise and identify trends and potential threats from all vectors.

McAfee Compatible solutions:
Mainframe Event Acquisition System (MEAS) 4.0 with McAfee ePO
Mainframe Event Acquisition System (MEAS) 4.0 with McAfee Enterprise Security Manager

Digital Authentication Technologies

Digital Authentication Technologies, Inc. (DAT) offers truly trustworthy identify for location. The DAT mission is to assure that critical business information assets and functions can be protected, controlled, and monitored by location to reduce risks, whether in the cloud or on a user's device. Having recognized that other location technologies such as geo-location, triangulation, and IP address lookup are susceptible to spoofing, DAT pioneered a set of enabling technologies and services collectively known as Contextual Location Fingerprint (CLF) that are not susceptible to practical spoofing attempts. For instance, CLF can be used to assure that servers are in secure data centers, administrators are in secure network operation centers, mobile device users can have privileges to data and applications parsed as they move from trusted locations to the unknown, and anonymous and remote attackers must overcome significantly more complex hurdles.

When integrated within a broader set of policy-definition/policy-enforcement tools such as McAfee ePolicy Orchestrator, CLF dramatically reduces serious vulnerabilities in critical infrastructure and information systems. This includes the risks that arise when the location of a machine matters greatly, but it cannot be established with a high level of assurance by other approaches.


Evidian, an affiliate of Bull Group, is one of the major worldwide vendors of identity and access management (IAM) software. Evidian’s solutions include IAM Suite, Enterprise Single Sign-On (SSO), and network and system management. Evidian’s software helps more than 700 organizations worldwide improve agility, enhance security, and comply with laws and regulations, while reducing costs.

Together, Evidian Enterprise SSO and McAfee Endpoint Encryption for PCs provide single sign-on authentication to applications and other environments, complementing and extending the data protection capabilities of McAfee Endpoint Encryption. The combined solution secures information access at the point of initial system boot, eliminating multiple passwords and thwarting possible pre-boot attacks.

Read the solution brief for more details

McAfee Compatible solution:
Evidian Enterprise SSO version 8.0 and McAfee Endpoint Encryption (EoL).


Fasoo has built a worldwide reputation as an enterprise digital rights management (EDRM) solution provider with industry-leading solutions and services. Fasoo EDRM allows organizations to prevent unintended information disclosure or exposure, ensuring a secure information-sharing environment, to better manage workflows and simplify secure collaborations both internally and externally. Fasoo has successfully retained its leadership in the EDRM market by deploying enterprise-wide solutions for more than 1,100 organizations, securing more than 2 million users. Fasoo is seeing continuous improvement in its global market position, based on its unique technology, ongoing R&D, and strategic approach to comprehensive product capabilities. Fasoo is also planning for future expansion through new business models, including database security (Solidbase), static code analysis (Sparrow), and content platform solutions.

DLP and EDRM are typically thought of as separate solutions that could replace each other; however, security requirements of organizations generally require both DLP and EDRM. DLP’s ability to scan, detect data, and enforce appropriate actions using contextual awareness helps in reducing the risk of losing sensitive data through exfiltration. When sensitive data has been legitimately sent to authorized users outside the organization, EDRM protects the data from subsequent transfers to unauthorized users. Fasoo EDRM integrated with McAfee DLP forms an essential solution to protect sensitive data, both within and outside of the organization. Considering most data leaks originate from insiders who have or had authorized access to sensitive documents, organizations must enhance existing security infrastructures with data-centric security solutions to persistently protect data in use. This integrated solution enables organizations to allow DLP to scan DRM-protected documents and apply DLP policies; enforce DLP policy engines to encrypt (reclassify) as DRM-protected documents; and secure data persistently to reduce the risk of losing sensitive data from both insiders and outsiders.


FireMon, formerly Secure Passage, provides enterprise security management software that gives companies deeper visibility and tighter control over their network security infrastructure. A leading provider of firewall policy, risk, and compliance management solutions, FireMon’s flagship product, Security Manager, simplifies and automates the analysis of configuration and change management processes to enhance security, optimize performance, and speed compliance reporting. Security Manager analyzes changes and performs audits in real time, simplifies policy management, and enforces configuration governance across firewalls, switches, routers, and other network devices. Security Manager is the only solution on the market that can be customized to meet the unique audit and compliance reporting requirements for networks of all sizes, while enabling IT organizations to do more with less effort. Enterprise-strength deployments of Security Manager around the world support more than 40,000 active security devices.

FireMon Security Manager helps keep McAfee Firewall Enterprise running smoothly with a complete configuration management solution. Wizard-based discovery monitors device configurations and verifies their current state, usage, and connections. FireMon Security Manager also monitors the complete McAfee Firewall Enterprise infrastructure, where it checks for user editing events and captures a full audit trail of operations. Enforcement points are monitored for policy installations and inefficiencies, as well as usage.

McAfee Compatible solutions:
FireMon Security Manager 6.0 and McAfee Firewall Enterprise
FireMon Security Manager 6.0 and McAfee Vulnerability Manager
FireMon Security Manager 6.0 and McAfee Next Generation Firewall


ForeScout is a provider of clientless network access control and policy enforcement that does not require installing a client on endpoints, such as laptops, desktops, VoIP phones, PDAs, printers, and other devices. ForeScout’s CounterACT appliance provides a range of enforcement options when policy violations are detected.

ForeScout has partnered with McAfee to deliver a unique and powerful solution for continuous monitoring and mitigation of enterprise risk. CounterACT is a network appliance (or virtual appliance) which installs out-of-band, therefore adding no latency or potential for failure to the network. Through advanced integration modules, ForeScout CounterACT shares information with McAfee ePO and McAfee ESM, and both McAfee ePO and McAfee ESM can trigger ForeScout CounterACT to perform network actions such as to quarantine a device.

Read the solution brief for more details

McAfee Compatible solutions:
ForeScout CounterACT 6.3.4 and McAfee ePO
ForeScout CounterACT 6.3.4 and McAfee Enterprise Security Manager


Fortscale enables enterprises to easily run User Behavior Analytics in order to Analyze, Profile, Discover and Investigate suspicious or malicious user activity. Fortscale makes it easier for security analytics teams to discover malicious insiders and external intruders that have compromised user credentials. The Fortscale solution integrates a proven big data platform with advanced machine learning algorithms to analyze log data, gain better visibility into user behavior patterns and pinpoint potential risks for immediate investigation. Risk-prioritized analysis of user behavior and access activity improve the effectiveness of the security team, without requiring technical expertise or adding more security analysts. Its advanced machine-learning algorithms extract SIEM or log data repository and pinpoint high-risk user behavior or access without writing rules or setting thresholds.

Fortscale's User Behavior analytics solution will leverage the McAfee Enterprise Security Manager (ESM) solution and provide back to McAfee Enterprise Security Manager user-related threat analytics, risk scoring of users and machine learning-based visibility of user activity. It will provide McAfee Enterprise Security Manager with an enriched layer that profiles user behavior to help enterprise security analysts identify user-related threats, malicious insiders, compromised accounts, suspicious behavior and risky access to data.


FortyCloud is a pioneer in network Security-as-a-Service for the cloud, providing innovative solutions for cloud-based security that are blending software-defined networking and software defined security technologies. The company helps customers reduce operating costs, increase scalability, and fortify security without requiring in-house security expertise. The FortyCloud distinct cloud security solution for Infrastructure-as-a-Service lets organizations build their own secure, scalable, and virtual private cloud network — regardless of cloud vendor.

FortyCloud enables organizations to extend their IT operations to the public cloud, without compromising security, by connecting on-premises McAfee Next Generation Firewalls to the FortyCloud solution in the cloud. The solution integrates with existing identity infrastructure (e.g. Active Directory) to provide secure access to the cloud. It also secures the cloud environment itself by providing firewall policies, data-in-motion encryption, and real-time visibility. The combined McAfee-FortyCloud solution allows organizations to offload IT operations to any cloud datacenter and even to multiple clouds simultaneously.

Read the solution brief for more details

McAfee Compatible solution:
FortyCloud Gateway 0.3.8 or later and McAfee Next Generation Firewall.


Gemalto is a leader in digital security and delivers solutions that meet the growing, worldwide demand for mobile connectivity, identity and data protection, credit card safety, health and transportation services, e-government, and national security. Gemalto supplies governments, wireless operators, banks, and enterprises with a wide range of secure personal devices, such as SIM cards in mobile phones, smart banking cards, smart card access badges, electronic passports, and USB tokens for online identity protection. To complete the solution, Gemalto also provides software, systems, and services to help customers achieve their goals.

Gemalto’s security products, such as .NET cards and Smart Enterprise Guardian (SEG), are interoperable with McAfee Endpoint Encryption, enabling the highest levels of security to protect company assets, data, and brands.

Read the solution brief for more details

McAfee Compatible solution:
Gemalto Smart Cards: .NET, CyberFlex Access 64K, Classic TPC IM, and LuxTrust GemP15-1, and McAfee Endpoint Encryption.

Guidance Software

Guidance Software is a leader in digital investigations. The EnCase platform enables corporations and government agencies to conduct thorough, network-enabled, and court-validated digital investigations. More than 100 of the Fortune 500 and over half of the Fortune 50 use EnCase solutions, including Allstate, Chevron, Ford, General Electric, Honeywell, Mattel, Northrop Grumman, Pfizer, UnitedHealth Group, and Viacom.

With the release of EnCase v6.14, Guidance customers can take advantage of the McAfee ePolicy Orchestrator (ePO) deployment and reporting functionality. This allows joint customers to conduct digital investigations on assets managed by McAfee ePO.

Read the solution brief for more details

Guidance EnCase v6.19 is also interoperable with McAfee EEPC v6.x. This functionality allows mutual customers to decrypt the drive before forensic inspection.

McAfee Compatible solutions:
Guidance EnCase 7.5 and McAfee ePO
Guidance EnCase 6.19 and McAfee EEPC


GuruCul is a premier security risk intelligence provider, featuring GuruCul Risk Analytics (GRA), an Identity-Centric Behavioral Risk Intelligence platform. GRA is a big data enabled Human and Machine Security Analytics solution providing Actionable Risk Intelligence. GuruCul solutions improve risk, threat, and compliance postures by applying a unique identity-centric approach of correlating identity, activity, and access information to provide actionable data and prioritized alerts. GuruCul has developed the industry's most advanced patent pending algorithms for behavior risk profiling and analyzing trends to detect threats and anomalous behavior. The GRA helps organizations efficiently protect intellectual property and regulate information.

Integrating GRA into McAfee Enterprise Security Manager (ESM) will provide a complete view of human and machine risk by correlating advanced SIEM events with identity-centric behavioral risk analytics. For the first time it will be possible to measure, monitor, and report on risk with machine and human behavioral patterns together. The combined McAfee ESM and GRA solution will create a whole new classification of defense-in-depth capability using anomaly detection and logic through risk algorithms that will run over a big data (Hadoop) platform. The seamless integration will provide actionable risk intelligence framework to defend against malicious events such as malware, insider threats, or other unforeseen risks. McAfee ESM and GRA can create predictive models to see patterns of emerging risk such as disgruntled employees, or an ID that was stolen or hacked and used to steal IP. GRA provides visualizations and metrics directly to non-technical end-users to take immediate action on serious risky events quickly.

McAfee Compatible solution:
GuruCul GRA and McAfee ESM.


HBGary specializes in developing advanced computer analysis products to detect, diagnose, and respond to advanced malware, targeted threats, and other cybercrime activities. HBGary’s flagship product, Digital DNA, delivers unparalleled detection coupled with post-exploitation forensics to provide dynamic analysis of malware.

Through this partnership, Digital DNA is now integrated with the McAfee ePolicy Orchestrator (ePO) platform, so that McAfee customers can deploy Digital DNA, scan physical memory for malicious and unauthorized code, and report results to the McAfee ePO console for optimal corrective action.

Read the solution brief for more details

McAfee Compatible solution:
HBGary Active Defense 2.0.0 with McAfee ePO.

Hewlett Packard

HP, the world’s largest technology company, simplifies the technology experience for consumers and businesses with a portfolio that spans printing, personal computing, software, services, and IT infrastructure. HP’s Secure Advantage solutions provide an integrated approach to securing this portfolio, allowing customers to more easily protect resources and data.

By combining HP technologies and services with McAfee as part of the SIA program, enterprises gain end-to-end solutions that better address critical security challenges, improve risk management, and ease the path to compliance.

HID Global

HID Global is the trusted source for secure identity solutions for millions of customers around the world. Recognized for robust quality, innovative designs, and industry leadership, HID Global supplies OEMs, system integrators, and application developers in a variety of markets, including physical and logical access control, card personalization, e-government, cashless payment, and industry and logistics. HID Global is headquartered in Irvine, CA, and has over 1,700 employees worldwide.

HID Crescendo Contact Card C700, a highly secure multi-technology smart card with out-of-the-box, standards-compliant support for existing physical and logical access control applications, is now integrated with McAfee Endpoint Encryption. Most HID Global’s smart card readers are also integrated with McAfee Endpoint Encryption, providing joint customers with a more complete secure identity solution.

McAfee Compatible solutions:
McAfee Endpoint Encryption and AET SafeSign Identity Client with HID Crescendo Contact Card C700
McAfee Endpoint Encryption and HID OMNIKEY (1021 USB, 3021 USB, 3121 USB, 3621 PinPad USB, 3821 PinPad USB, 3921 USB, 5121 USB (contact interface only), 5125 USB Prox (contact interface only), 5321 USB (contact interface only), 5325 USB Prox (contact interface only), 6121 Mobile USB, 6321 USB (contact interface only), 4040)

Hitachi Global Storage Technologies

Hitachi ID Systems, Inc. is a leading provider of identity and access management solutions. Hitachi ID software helps almost 1000 organizations with over 12 million combined users meet security, internal control, regulatory compliance, IT cost reduction and user service objectives. The Hitachi ID Management Suite includes Identity Manager, Password Manager and Privileged Access Manager. These products manage identities, entitlements, and authentication factors across both on-premise and SaaS applications in the cloud.

Hitachi ID Password Manager is integrated with McAfee Endpoint Encryption and enables users who forgot their PC activation password to securely authenticate themselves on a phone call to an IVR system, by answering security questions or providing a biometric voice print sample. Once authenticated, users can access an unlock code for their PC and get back to work. All this is done via self-service, eliminating calls to the help desk and reducing IT support cost.

Hitachi Global Storage Technologies offers a complete portfolio of storage products and services for consumers and business users. The company’s advanced hard disk drives and solid state drives are designed for use in a broad range of market segments and applications, including notebook and desktop computers, consumer electronics devices, and enterprise servers and storage arrays. Hitachi’s G-Technology and SimpleTech product lines deliver innovative external storage for consumers, small businesses, and creative professionals. As part of the SIA program, Hitachi Global Storage Technologies will work with McAfee to integrate its "TCG Opal" standard compliant encrypting hard drives with McAfee Endpoint Encryption.

Read the solution brief (McAfee Drive Encryption) for more details
Read the solution brief (McAfee ePolicy Orchestrator) for more details

McAfee Compatible solution:
Hitachi ID Password Manager 7.x and McAfee Drive Encryption.


HyTrust®, headquartered in Mountain View, CA, is a leader in policy management and access control delivering automated controls and visibility that allow its customers to scale their cloud infrastructure, virtualize even g Tier 1 applications, achieve compliance, and enable multi-tenancy.

HyTrust has developed an integrated solution with McAfee ePO to provide rich event reporting and policy enforcement for virtual infrastructure, including trusted cloud computing with Intel Trusted Execution Technology (TXT).

Read the solution brief for more details

McAfee Compatible solutions:
HyTrust CloudControl 3.0 McAfee ePolicy Orchestrator
HyTrust CloudControl 3.6 and McAfee Enterprise Security Manager

Icon Labs

Icon Labs is an RTOS-focused Security Company. Icon Labs’ Floodgate™ Defender is one of the EDN Hot 100 products of 2011. The Floodgate product family (Floodgate Defender, Floodgate Agent, and Floodgate Aware) provides protection, security management, and situational awareness for RTOS or legacy endpoint devices. You can apply this product to individual endpoints or in groups to create a secure enclave of protected devices.

The Floodgate product family extends the capabilities of McAfee ePO to legacy embedded devices, giving network administrators visibility and management of devices that are otherwise not visible to security management systems. You can implement the Floodgate product family as a bump-in-the-wire solution for legacy devices such as unmanaged SCADA or RTOS-based systems, or integrated into new device designs. Floodgate provides system administrators the ability to view device status and manage, distribute, and enforce packet filtering policies from their central ePO management console.

Read the solution brief for more details
Read the solution brief for more details (DoD guidelines)

McAfee Compatible solutions:
Icon Labs Floodgate Defender 2.8 and McAfee ePolicy Orchestrator
Icon Labs Floodgate Defender Proxy 1.0 and McAfee ePolicy Orchestrator
Icon Labs Floodgate Defender appliance 2.8, Floodgate RTOS Software Security Suite and McAfee ePolicy Orchestrator


Imprivata is a leading independent vendor focused on simplifying and securing user access. By strengthening user authentication, streamlining application access, and simplifying compliance reporting across multiple computing environments, customers can align security with user workflows and realize substantial productivity gains, while lowering IT costs. Headquartered in Lexington, MA, Imprivata partners with over 200 resellers, and serves the access security needs of more than 1,000 customers around the world.

Imprivata OneSign Authentication Management, Single Sign-On, and Secure Walk-Away products have been tested for compatibility with McAfee’s Endpoint Encryption for PCs (EEPC) product. Starting from the initial system boot, the joint solutions provide secure,seamless access and single sign-on to applications and other network resources, and protect unattended workstations from unauthorized access.

McAfee Compatible solution:
Imprivata OneSign 4.5 Authentication Management, Single Sign-On, and Secure Walk-Away with McAfee Endpoint Encryption and Windows XP.


InfoReliance is an industry leader providing cyber security, software engineering, cloud computing and IT support to the US Federal government. As an innovator in IT services for the federal sector, InfoReliance has developed, designed, deployed and secured solutions that transform the business operations of clients across the globe. After spending more than a decade securing systems and networks across distributed and highly targeted enterprises, InfoReliance developed the CloudHASH Security Suite to address real-world gaps in available technology – gaps that attackers exploit every day.

CloudHASH Security is a suite of modules that will integrate with McAfee ePO to simplify enterprise desktop firewall configuration, enhance malware detection, and add desktop banner management. Host Firewall Orchestrator is a desktop firewall management module that will streamline firewall configuration with McAfee’s Host Intrusion Prevention System. The Host Security Sentinel module will allow security engineers to build advanced custom signatures, including historical analysis through the ePO console to quickly investigate malware on all hosts in an enterprise. The Dynamic Desktop Banner module presents is a customizable, color-coded banner across the top of every user’s computer screen and will be centrally controlled through the ePO console. These modules will complement existing ePO implementations to create a richer endpoint protection solution.

McAfee Compatible solutions:
InfoReliance CloudHASH Security Host Firewall Orchestrator and McAfee ePO
InfoReliance CloudHASH Security Host Communicator 1.0.32 and McAfee ePO


Intel application security and identity solutions consist of identity-driven software and appliances that are now sold as McAfee-branded solutions. Among these, the McAfee Services Gateway secures SOA, REST, or Cloud Web Services for cross-domain, B2B, and EAI. Another solution, McAfee Identity Manager, delivers SSO, provisioning, and second-factor authentication for user-to-cloud access with connectors for Google Apps,, Taleo, and SharePoint.

The McAfee Cloud Security Platform includes a set of Intel modules that provide security for all cloud traffic (email, web, and identity authentication) between the enterprise and the cloud. The web service security module is powered by McAfee Services Gateway while the identity and access management module is powered by McAfee Identity Manager.

Learn more about the McAfee-Intel combined solution

McAfee Services Gateway also integrates with the McAfee ePolicy Orchestrator (ePO) platform for security event monitoring across a single node or cluster of gateways. The administrator can use ePO software to provide visibility into critical security events such as XML content threats, authentication failures, suspicious behavior, and potential denial of service threats in a single, consolidated dashboard. The integration provides visibility into past security events, as well as recent changes to the security posture of the device to reflect protective action taken by the gateway.

McAfee Compatible solutions:
McAfee Identity Manager and McAfee Cloud Security Platform
McAfee Services Gateway and McAfee ePO

Internet Identity

IID empowers threat intelligence sharing for enterprises and governments in a trusted environment that reaches beyond limited trust groups. The company aggregates and analyzes widely sourced threat data, and delivers actionable intelligence to facilitate the protection of assets, brands, and users. Top financial firms, the largest government agencies, and leading e-commerce companies, social networks, and ISPs leverage IID to detect and mitigate threats.

By integrating IID’s Resolver and Signals solutions into McAfee ePolicy Orchestrator (ePO), there's no more digging through mountains of data to determine if an enterprise is at risk. The joint IID-McAfee solution enables organizations to get real-time alerts about the latest Internet threats and compromised machines living on their network, all in one place. With this centralization and consolidation of resources, organizations can save valuable time while protecting mission- and business-critical data and communications. By doing so, organizations can concentrate more on their core business.

Read the solution brief for more details

McAfee Compatible Solution:
IID Resolver and Signals with McAfee ePO.


Invincea is a premier innovator in secure virtualization of desktop applications, protecting enterprise networks from Internet-based threats, such as spear phishing. The company’s solutions offer a unique ability to protect networks against all types of threats directed at end users — including zero-day threats — by seamlessly moving applications that render untrusted content into controlled, secure virtual environments that automatically detect and terminate threats in real time. Invincea seamlessly moves the browser, PDF reader, complete Office Suite, .zip and .exe file types from the native operating system into fully virtualized and secure environments, harnessing desktop resources without changing the user experience or requiring additional network bandwidth or footprint.

Invincea's integration with McAfee ePO enables joint customers to automatically import Invincea Threat Data generated at the desktop point-of-attack into McAfee ePO dashboards. This information provides an extensive forensic footprint of the attempted breach – providing unparalleled visibility into the methods, targets and frequency of attacks. This data is available in real-time to administrators to gather electronic intelligence to support broader incident response, discovery, and corporate investigations.

Read the solution brief for more details

McAfee Compatible solution:
Invincea Threat Data Server v1 and v2, and McAfee ePO.


IronKey solutions meet the challenge of protecting today’s mobile workforce, featuring secure USB solutions for data transport and mobile workspaces. The IronKey line includes the world’s leading hardware encrypted USB storage devices and PC on a Stick workspaces for Windows To Go.

The IronKey product family includes advanced biometric and non-biometric USB flash and hard drives as well as centralized management through McAfee ePolicy Orchestrator (ePO) 4.6 and 5.1. IronKey is the only USB solution that can be managed with ePO to support features such as password reset, the ability to remotely wipe or disable devices that are lost or stolen, and more.

IronKey is the mobile security portfolio of Imation

McAfee Compatible solution:
IronKey eUSB for McAfee ePO, IronKey secure storage: F100, F150, and H100, IronKey biometric secure storage: F200 and H200


IScan Online is the industry’s first data breach risk intelligence platform that puts a real-time dollar amount on an organization’s security risk. IScan’s patented discovery process uncovers sensitive data and vulnerabilities, and financially prioritizes the results in reports that speak the language of the C-suite. The iScan platform answers the following questions:

  • What data is at risk and who currently has access to it?
  • How can attackers get access to it?
  • What will it cost when breached?

McAfee ePolicy Orchestrator deploys and schedules iScan Data Breach Risk Intelligence via the deployment package in the iScan dashboard. Data is imported automatically into McAfee Enterprise Security Manger to create a comprehensive security management picture of events, threats, and risk data for your organization. McAfee Enterprise Security Manager leverages iScan Online RESTful API for making data breach risk intelligence available.

Read the solution brief for more details

McAfee Compatible solution:
iScan Online and McAfee Enterprise Security manager 9.4


IXIA BreakingPoint Actionable Security Intelligence protects enterprises, service providers, and government agencies by providing global visibility into emerging threats and actionable insight to harden and maintain resilient defenses. With the exclusive ability to capture and control global threat intelligence at Internet-scale, IXIA BreakingPoint delivers a product capable of battle-testing IT infrastructures, training cyber warriors, tuning systems and policies, and transforming security processes to be proactive and effective. IXIA BreakingPoint bridges the gap between IT testing, monitoring, and operations and will pursue integration with McAfee solutions to deliver the advance insight needed to harden highly dynamic converged and mobile networks, virtualized data centers, and applications.

IXIA Net Optics is a leading global provider of intelligent access and monitoring architecture solutions that deliver real-time IT visibility, monitoring, and control, helping customers achieve peak performance in network analytics, compliance, and security. For 15 years, Net Optics served customers across the financial, telecommunication, healthcare, and government sectors. Today's capabilities span virtualization, 10G, and 4G/LTE, enabling uncompromising security, regulatory compliance, and network monitoring, all while streamlining management and controlling costs. Solutions include the revolutionary Phantom Virtual Tap; Director xStream Pro; Indigo Pro; and appTap. Net Optics has worked with McAfee to ensure that its network taps are interoperable with the McAfee Network Security Platform.

Read the solution brief for more details

McAfee Compatible solutions:
IXIA BreakingPoint CTM products (Storm, FireStorm, and FireStorm One) v2.0.0 through current (v3.1.0) with McAfee Firewall Enterprise for all non-proxy traffic
McAfee Network Security Platform and the following Net Optics taps: RG-830 (Regen, 8x1 Inline Fiber, 1G), RG-840x (Regen, 8x1 Inline Fiber, 10G,SR), RGN-GCU-IL8 (Regen,8x1,IL,Copper,1G), TP-50SR5-LCSLM (Slim Tap,LC, Fiber, 10G 50um), TP-LR5-LCSLM (Slim Tap,LC, Fiber, 10G 8.5um)

Lieberman Software

Lieberman Software provides a broad range of powerful security management and reporting tools for Microsoft Windows IT administrators that help accomplish weeks of tedious administrative work in minutes. The company also provides cross-platform privileged identity management solutions that are used by large government organizations, commercial enterprises, and cloud infrastructure providers. Lieberman Software’s solutions are known for their rapid deployment; low initial and ongoing TCO; ability to scale and handle complex, dynamic environments; and achievement of comprehensive regulatory compliance in a matter of weeks.

Lieberman Software will integrate its privileged identity management solution with McAfee ePolicy Orchestrator (ePO) software by passing alerts generated from privileged account password activity to ePO dashboards. This will help answer questions such as:

  • Who has been accessing which sensitive accounts for what purpose?
  • When were privileged account passwords last changed?
  • What kinds of access controls are in place for privileged resources?
The joint solution will prove compliance with governance, risk, and compliance (GRC) mandates like HIPAA, SOX, and PCI DSS through integrated audit reports. Lieberman Software will also use McAfee ePO to deploy its suite of tools for IT administrators and provide reporting and remediation of security configurations for Microsoft Windows workstations and servers.

Read the solution brief for more details

McAfee Compatible solution:
Lieberman Enterprise Random Password Manager 4.8.3 and McAfee ePO.


LOGbinder puts application audit logs for Microsoft Exchange, Microsoft SharePoint, and SQL Server where they belong — in McAfee Enterprise Security Manager. It collects audit log data trapped inside those applications, translates it to meaningful information, and delivers this enriched data via Syslog and many other output options. Founded by Randy Franklin Smith of Ultimate Windows Security, LOGbinder software preserves audit log integrity, uses least privilege, makes little impact on the monitored environment, and is focused on getting audit logs where they belong quickly and automatically.

With LOGbinder and McAfee Enterprise Security Manager, there is no need to build rules and alerts for handling the audit events because the McAfee Enterprise Security Manager developers have already prepared them, minimizing in-house work.

McAfee Compatible solution:
LOGbinder and McAfee Enterprise Security Manager.


As a leading provider of real-time IT security management tools, ManageEngine ensures maximum security of critical IT infrastructure, including firewalls, networks, servers, applications, and desktops. ManageEngine Firewall Analyzer is agentless log analytics and configuration management software for network security devices. The product is used for endpoint security monitoring and analysis, change management, employee Internet monitoring, bandwidth monitoring, capacity planning, policy enforcement, and security and compliance audit reporting.

ManageEngine Firewall Analyzer complements McAfee Firewall Enterprise to strengthen the IT network security with continuous firewall log monitoring. It provides security, attack, virus, and spam reports. The application monitors the bandwidth utilization for both device and interface. It generates real-time alerts for any bandwidth anomaly. The solution offers a wide variety of intranet, Internet, protocol-specific, and usage-specific traffic reports. It offers trend reports for event, protocol, and traffic. Most importantly, it gives user-specific Internet activity and bandwidth usage reports.


MONET+ is a major central European player in the payment solutions industry. MONET+ ranks among the leading suppliers of smart card-based systems on the Czech and Slovak IT markets, providing comprehensive, sophisticated solutions that meet strict compliance and security standards. MONET+ focuses on secure transaction systems and related products, such as secure communication and client authentication. MONET+ solutions are used by companies in the banking sector, large supermarket chains, private companies, and state administration offices. Thousands of users use MONET+ products and solutions daily to securely access their working and user environment.

MONET+ will integrate ProID+, its two-factor authentication product, with McAfee Endpoint Encryption. ProID+ enables secure access to systems via microchip-embedded cards. ProID+ provides strong authentication for end users and single sign-on to any application throughout the enterprise, and delivers implementation of Public Key Infrastructure (PKI) to customer's IT systems. Using the CryptoPlus architecture, which supports a wide range of applications within organizations, ProID+ customers can easily build secure information systems.


NetClean is a world leader in technical solutions for preventing the spread of child sexual abuse content. The products are developed in cooperation with police authorities, and NetClean's proactive solutions are employed by millions of users. NetClean's client portfolio includes, among others, small to multinational companies as well as government agencies, internet providers and police authorities.

The company has integrated its NetClean ProActive platform with the McAfee ePO software, allowing customers to prevent child sexual abuse content from being accessed or shared via a corporate network. Customers can now deploy the NetClean ProActive software quickly and easily to McAfee-managed endpoints, as well as track the number of endpoints protected by NetClean ProActive.

McAfee Compatible solution:
NetClean ProActive 12.1 and McAfee ePO.


NetFort provides software products to monitor activity on virtual and physical networks. Its LANGuardian software provides an extremely robust depth of insight into network activity. LANGuardian helps network administrators troubleshoot bandwidth issues right across the network, perform network forensics on past events, investigate activity on Windows file shares, and keep track of user activity on the Internet. Unlike other packet capture products, LANGuardian does not require dedicated hardware -- it is a software-only solution that runs on industry-standard hardware and virtualized environments. And, because it gathers information from network traffic, no client software is required and there is no impact on network performance. NetFort was established in 2002 and has its headquarters in Galway, Ireland.

LANGuardian will integrate with McAfee ePO by forwarding event information collected through deep packet inspection of network traffic. This data will provide ePO administrators additional insights into network activity, enabling them to drill down from top-level reports to individual network links, client devices, users, file shares, files, websites, and downloads. Reports will include bandwidth usage, web traffic, web access via proxy servers, and activity on Windows file shares.

Read the solution brief for more details


NIKSUN deploys world-class drill down forensics to allow users to Know the Unknown®. The threat of cyber attack is real. Traditional approaches are not enough for today’s cybersecurity risks, and new tools and solutions are often necessary to provide adequate protection. NIKSUN has developed a patented state-of-the-art technology to simultaneously capture, inspect, mine, correlate and store everything traversing the network at multi-gigabit rates.

The NIKSUN NetDetector® & NetDetectorLive® cybersecurity appliances complement the McAfee Network Security Platform (NSP). NIKSUN appliances provide increased network visibility by capturing and storing all packet data providing the ability to analyze, inspect, and correlate all data traversing the network at multi-gigabit rates. The joint McAfee NSP and NIKSUN integrated solution will provide a best-of-breed approach for cyber intrusion, prevention, and advanced network forensic capabilities. The integration will permit immediate drill down to packet level information for granular forensic analysis through the McAfee NSP console. This capability, combined with Niksun’s super fast search and actionable intelligence and the McAfee NSP platform, will rapidly identify vulnerabilities such as zero-day threats and Advanced Persistent Threats (APTs), so that appropriate mitigation steps can be quickly taken.

Read the solution brief for more details

McAfee Compatible solution:
NIKSUN NetDetector Alpine, NetDetectorLive, and NetOmni 4.3.1 and McAfee Network Security Platform


Norse delivers live, actionable threat intelligence that enables organizations to proactively defend against today’s most advanced attack vectors including zero day and advanced persistent threats. Norse’s global threat intelligence platform is a patent-pending infrastructure-based technology that continuously collects and analyzes real-time, high risk Internet traffic – dark intelligence - to identify the sources of cyber attacks and fraud. Norse’s global infrastructure sees attacks as they occur and enables organizations to proactively and automatically stop attacks in progress.

Norse live threat intelligence is the perfect complement to McAfee Global Threat Intelligence. Norse gathers intelligence from 'behind enemy lines', collecting and analyzing dark intelligence from the source - where bad actors operate. The McAfee Compatible integration of Norse with McAfee NTR-CADS provides customers with the most comprehensive information on attack vectors available in the market today.

Read the solution brief for more details

McAfee Compatible solution:
Norse IPViking and McAfee Network Threat Response Cloud Analysis and Deconstruction Services.


nPulse Technologies is the performance leader in packet capture and connection/session analysis. The flagship product, CPX, delivers cost-effective, indexed packet capture at speeds up to 20Gbps. Leading companies in the Financial Services, Federal Government, and Telecommunications sectors rely on CPX for protection of network and security operations. Through its innovative Pivot2Pcap API, CPX significantly enhances existing monitoring and security solutions.

nPulse's partnership with McAfee Enterprise Security Manager allows network security operations personnel to quickly pivot from security alerts in ESM to the packets and session-level decodes for the event. Allowing users to quickly locate and decode an entire session provides greater visibility into potential malicious activities and payloads, while also eliminating the time required to manually collate all of the packets within a session. Users can expand searches to view network activities before and after a security event, further enhancing visibility for incident response and forensics activities.

McAfee Compatible solution:
nPulse CPX 3.X, 4.0, and McAfee ESM


Nuix enables customers to make fact-based decisions from unstructured data. The patented Nuix Engine is an advanced technology for accessing, understanding, and acting on human-generated and machine information. Its parallel processing technology is unmatched in its ability to expose the content of enterprise information stores such as email databases, archives, file shares, and collaboration systems.

The integration between McAfee and Nuix allows McAfee Enterprise Security Manager to use the Nuix Engine unstructured data scanning and indexing to provide deep and rapid insights into a cyber-security incident of consequence. When McAfee Enterprise Security Manager generates an alert, Nuix scans and indexes relevant data on the identified endpoints, then returns this data to McAfee Enterprise Security Manager for automated response or manual review. Nuix scans are designed to match the nature and severity of McAfee Enterprise Security Manager correlations that generate the alerts.


Onapsis is a leading provider of solutions to protect ERP systems from cyber-attacks. Through unmatched security, compliance and continuous monitoring products for SAP and Oracle ERP applications, Onapsis secures the business-critical infrastructure of its global customers against espionage, sabotage and financial fraud threats. Company's products include Onapsis X1, the first SAP-certified solution to provide automated SAP security assessments, and Onapsis IPS, the most advanced SAP vulnerability signatures for Intrusion Detection and Intrusion Prevention systems.

Onapsis plans to extend the capabilities of McAfee Network Security Platform (NSP) through the unique knowledge-base captured in Onapsis products, enabling customers to enjoy unprecedented visibility and protection against cyber-attacks on their ERP systems. After this integration, customers will be able to effectively decrease the severe risks affecting their most critical business information and processes.


PIOLINK, a leader in application delivery networking, web security, and layer 2/3 switching technology, has made significant contributions to the development of Korean IT infrastructure.

TiFRONT security switch from PIOLINK provides secure L2 switching, blocking anomalous traffic such as TCP Syn flooding and UDP and ARP flooding from PCs. It also prevents unauthenticated hosts and ARP spoofing in a UC environment. As part of the McAfee Security Innovation Alliance, PIOLINK will integrate TiFRONT with McAfee ePolicy Orchestrator (McAfee ePO) and send security events to McAfee ePO dashboards.

McAfee Compatible solution:
PIOLINK TiManager 1.7.1 and McAfee ePO.

Quest Software

Now more than ever, organizations need to work smart and improve efficiency. Quest Software, Inc. creates and supports smart systems management products — helping customers solve everyday IT challenges easier and faster. Quest products and people are dedicated to helping customers manage their critical Microsoft Windows infrastructure, applications, databases, and virtual environments.

Quest Software offers auditing solutions for Active Directory to proactively track, audit, report, and alert on vital configuration changes — in real-time and without the overhead of native auditing. Customers instantly know who made what change, when, and where, as well as the previous and current settings. This level of detailed auditing is important to IT administrators and directors who centrally manage security for IT systems and need to provide an audit trail to show compliance with external regulations. For McAfee customers, the ePolicy Orchestrator (ePO) platform is central to managing security for these systems, networks, data, and compliance. Together, Quest and McAfee will offer a comprehensive solution for auditing changes to Active Directory systems.


Quotium helps businesses protect data and reduce application security risk. It provides automated technologies to make business applications secure and robust while delivering application security that is better, faster, and more accurate than other offerings on the market. For organizations that are looking for a way to embed application security testing in the software lifecycle, Quotium expertise and offerings provide efficient and effective vulnerability detection in an easy-to-use solution. Quotium pioneered the Interactive Application Security Testing (IAST) technology, and the Quotium Seeker software has revolutionized the way web applications are being secured.

Founded and managed by experienced business people and recognized industry leaders Quotium is dedicated to providing quality in software, customer service, and support. It considers that the best ROI in the acquisition of a software solution is directly linked to the quality of the solution. Quotium Seeker will integrate with McAfee SIEM, allowing it to accurately identify real-time application attacks. Customers use Quotium Seeker to identify real world, exploitable vulnerabilities in their applications. Once vulnerability is identified, Seeker will report the exact location and potential exploit to McAfee Enterprise Security Manager. Based on this information, McAfee Enterprise Security Manager will identify when a potential attack is focused on a vulnerable component, and provide real time alerts, without creating any redundant alerts.


Raytheon Company, with 2010 sales of $25 billion, is a technology and innovation leader specializing in defense, homeland security, cybersecurity and other government markets throughout the world. Raytheon SureView enables safe and effective use of mission-critical technologies by capturing human behaviors that serve as warning signs leading up to a breach. SureView replays the event in a DVR-like format providing irrefutable and unambiguous attribution of end-user activity. While offering full context for rapidly discerning malicious from benign actions that are easily reviewed and understood by non-technical personnel—all while respecting employee privacy guidelines. SureView goes beyond DLP to proactive information protection.

Raytheon SureView integrates with the McAfee ePO platform enabling operators to deploy and monitor the health and status of SureView agents, perform version upgrades and remove agents.

McAfee Compatible solution:
Raytheon SureView 6.5 and McAfee ePO [EOL].


Raz-Lee Security is a leading international provider of security, auditing, and compliance (SOX, PCI, HIPAA, etc.) solutions for the IBM i. Raz-Lee’s customers include companies of all sizes, from SMBs to enterprises in all vertical markets and industries. Raz-Lee’s iSecurity suite of products includes both infrastructure security solutions that protect network access, monitor and report on system activities, manage user profiles and authorities, and track software changes, as well as application security solutions which audit database activity, provide real-time alerts when critical business data changes, enable business intelligence analysis of application data changes, and much more. iSecurity has full multi-LPAR management capabilities and works in both green-screen and full GUI modes.

iSecurity’s integration with McAfee Database Activity Monitoring (DAM) will entail collection and transfer of DB2 activity originating on the IBM i. The McAfee sensor running on an external Linux machine will receive events from iSecurity, evaluate each event, and communicate with the DAM server to apply policy rules and report on the events. As such, iSecurity will enable multiplatform users of McAfee DAM to incorporate database and security-related information originating from IBM i systems, resulting in increased security visibility and faster time to problem resolution.

McAfee Compatible solution:
Raz-Lee Firewall 16, Raz-Lee Audit 12, and McAfee Database Activity Monitor.

RedSeal Systems

RedSeal’s advanced analytics engine examines device configurations, scanner data and vulnerability databases, and builds an accurate model of your network. It lets you comprehend your as-built network, including cloud and virtual networks as well as physical and wireless infrastructure. It calculates all possible access paths from any point to any other in the network. This intelligence enables IT and security professionals to automate manual analysis tasks, verify that security access policies work as intended, prioritize high risk vulnerabilities, and accelerate compliance initiatives.

RedSeal works in conjunction with multiple McAfee products to improve network defenses:

  • RedSeal collects configuration data from both McAfee Firewall Enterprise and Next Generation Firewall.
  • RedSeal imports vulnerability scan data from McAfee Vulnerability Manager and combines it with RedSeal’s knowledge of your network to provide a prioritized list of the most critical vulnerabilities and calculate risk scores.
  • RedSeal provides risk scores to McAfee ePolicy Orchestrator.
  • RedSeal reports any events triggered by its findings to McAfee Enterprise Security Manager (ESM), enabling ESM to have a more complete assessment of risk, network security, and vulnerability management.
Read the solution brief for more details

McAfee Compatible solutions:
RedSeal Cybersecurity Analytics Platform
McAfee ePolicy Ochestrator
McAfee Vulnerability Manager
McAfee Firewall Enterprise
McAfee Next Generation Firewall
McAfee Security Management Center
McAfee Enterprise Security Manager


RSA, the Security Division of EMC, is the premier provider of security, risk, and compliance management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption and key management, SIEM, data loss prevention, and fraud protection with industry-leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform, and the data that is generated.

RSA will integrate its RSA® enVision SIEM solution with McAfee ePO to enhance both the real-time detection and automated response to attacks. RSA enVision will send alerts generated from correlated events to McAfee ePO dashboards, including security threats, compliance violations, and policy breaches. McAfee ePO users will be able to respond with targeted countermeasures, audit, and remediation functions provided by McAfee security solutions.


SafeNet is one of the largest data security companies in the world, and is trusted to provide data protection solutions to market-leading organizations around the globe. SafeNet data protection solutions ensure high-value information is secure throughout its lifecycle, providing data security from the data center to the cloud.

Multifactor authentication serves a vital function within any organization — securing access to corporate networks, protecting the identities of users, and ensuring that users are who they claim to be. The recent surge in high-profile security breaches, as well as evolving business environments that require entirely new considerations for access control, such as SaaS applications and mobile device management, represents a shift in how trust and control is established and maintained. SafeNet’s SafeWord authentication products will feature seamless integration with McAfee Firewall Enterprise, a high-assurance firewall that offers strong next-generation capabilities, including application visibility and deep application controls for defense. SafeWord also integrates with Active Directory and VPN platforms, and delivers a choice of one-time password (OTP) authenticators, supporting authentication and SSO for cloud applications.

McAfee Compatible solutions:
SafeNet eToken Pro 32K CardOS 4.2, eToken Pro 64K CardOS 4.2, eToken Java 72k, and EEPC
SafeNet iKey 2032 and EEPC

Sagem Orga

Sagem Orga is a pioneer and global leader in the smart-card industry. The company develops and implements cutting-edge technology to turn the vision of unbounded mobile communications and integrated digital security into a reality.

Security, logical access, and identity management are strategic issues for all enterprises. Protecting access to IT systems and corporate data is more than a necessity. Sagem Orga will work with McAfee to combine McAfee Endpoint Encryption with its smart cards and, optionally, with its biometric terminals. Sagem Orga will leverage its expertise in key technologies to provide enterprises with a solution that prevents data loss, using powerful encryption and strong access control.


Seceon surfaces, manages, and remediates threats, and automatically adapts to prevent advanced threats. Using behavioral analysis, Seceon builds a comprehensive view of how users, devices, applications, and other customer assets including databases interact, and studies these interactions. The solution then uses a combination of algorithms to detect threat indicators. These threat indicators are correlated together and qualified over multiple stages of monitoring to determine if they build up to actual threats thereby eliminating false positives. Finally, threat alerts are displayed in clear concise language, making it easy for untrained staff to understand what is happening and what action to take.

The Seceon Open Threat Management platform and McAfee Enterprise Security Manager are tightly integrated allowing the two to share data. The data is augmented with additional security relevant data surfacing the threats based on behavior, and sends threat-based alterts. Users can choose to drill-down into directly surfaced threats.

McAfee Compatible solution:
Seceon Open Threat Management Plaform 2.0+ and McAfee Enterprise Security 9.5+


Seclore is a leading provider of information security and classification solutions, including information usage controls, information rights management (IRM), and secure outsourcing. Seclore has been repeatedly recognized as a leader in its segment, named by Gartner as a “Cool Vendor” and Deloitte as a Technology Fast 50 company. Some of the largest financial services, engineering services, and manufacturing companies across the globe, including Fortune 500 firms and government and intelligence agencies, rely on Seclore technology to make sure information stays in the right hands and cannot be copied, replicated, and shared without permission. Seclore FileSecure is the most integration-friendly IRM and data classification solution in the world, and can also be treated as an infrastructural element — not just a point solution. With its seamless integration capabilities, it works with any existing enterprise IT asset and solution, including DLP, DMS, ECM, ERP, IAM, SIEM, and others.

Boundary-based solutions such as DLP are rendered ineffective when information is sent to vendors, partners, and auditors. An organization has virtually no control over this confidential information once it is sent outside the security perimeter. McAfee and Seclore offer a comprehensive solution that extends and enhances the protection of confidential information to areas beyond the control and scope of DLP. This integration provides end-to-end protection of information and keeps data in control of the enterprise — even when it leaves the control of a DLP solution. IRM can seamlessly take over where DLP endpoint protection ends, and stay with the file wherever it travels. IRM protection and the relevant IRM policies can be automatically applied to files located at end-user endpoints based on triggering of DLP rules. McAfee DLP policies can also be configured — and appropriate actions taken — based on the FileSecure classification of a file. This reduces false positives and protects and controls data persistently, both from accidental and malicious data leakage, and from internal and external users. The FileSecure-McAfee DLP integration allows an organization to tailor IT and data usage policies around business process workflows.

McAfee Compatible solution:
Seclore FileSecure Policy Server 2.29, Seclore Desktop Client 2.29, and McAfee DLP


Securonix provides a leading information risk intelligence platform for security and compliance professionals. The platform consumes identity, access, and activity information from any source and then uses behavior, access, and identity risk analytics to continuously identify the highest risk users, resources, and activity in the environment for proactive management. At the enterprise application level, such as SAP and Oracle, Securonix goes deeper to automatically and continuously identify and fingerprint sensitive data for data loss protection while monitoring high-risk activity and access.

McAfee DLP, ePO, and NitroSecurity customers can use Securonix to extend their visibility, monitoring, and critical data protection into key enterprise applications while enriching their security management with advanced identity, access, behavior analysis, and dynamic policies. This integrated McAfee-Securonix solution extends valuable coverage to an enterprise’s critical applications while focusing the output down to an actionable set through analytics.

Read the solution brief for more details

McAfee Compatible solution:
Securonix Identity Intelligence 3.1, Securonix Threat & Risk Intelligence 3.1, Securonix Application Intelligence 3.1 and McAfee Data Loss Prevention

Skybox Security

Skybox Security, a leading provider of proactive security risk management solutions for global enterprises, provides automated, non-intrusive tools that detect, prioritize, and drive remediation of critical risks such as exposed vulnerabilities and firewall configuration errors.

The integration of Skybox Risk Control with McAfee Vulnerability Manager enables organizations to identify, prioritize, and rapidly remediate the most critical 1-2 percent of risks detected by McAfee Vulnerability Manager. Skybox simplifies the remediation process by calculating all possible attack vectors; finding the 1-2 percent of vulnerabilities that can be exploited; and proposing the most effective way to block them – whether it be by enabling specific IPS signatures, tuning firewall or router security configurations, or by patching intermediate systems. Skybox’s solution for network security management, which includes Skybox Firewall Assurance, Skybox Network Assurance and Skybox Change Manager, integrates with McAfee Firewall Enterprise to automate enterprise-wide security policy compliance with industry and corporate best practices. Skybox Change Manager streamlines the security change management process to ensure that all changes are evaluated for risk and compliance with corporate policies before being applied to ensure the integrity of your network’s perimeter.

Read more about Skybox and McAfee Vulnerability Manager
Read more about Skybox and McAfee Firewall Enterprise

McAfee Compatible solutions:
Skybox Firewall Assurance 6.5 and Skybox Change Manager 6.5 with McAfee Firewall Enterprise
Skybox Risk Control 6.5 with McAfee Vulnerability Manager
Skybox Firewall Assurance 6.5, Skybox Change Manager 6.5 and McAfee Next Generation Firewall


Skycure is a predictive mobile threat defense (MTD) company with proactive defense solutions that actively detect and prevent cyberattacks while preserving user privacy and mobile user experience and reducing the burden on IT. Skycure's mission is to secure both BYO and corporate-owned mobile devices to allow companies to mobilize without compromise. Skycure closes the mobile security gaps in organizations to protect against network-based threats, malware, vulnerability exploits, and other targeted attacks originating from both internal and external sources. Skycure's predictive technology is based on mobile threat intelligence gathered via massive crowd intelligence and sophisticated machine learning.

Skycure provides real-time risk scores and details of cyber-attacks through enhanced visibility on mobile devices that extend beyond traditional SIEM. By leveraging risk intelligence and integration with McAfee Enterprise Security Manager (ESM), Skycure is able to automate remediation effectively and efficiently against targeted mobile attacks, threats and vulnerabilities.

McAfee Compatible Solution:
Skycure Mobile Threat Defense Solution and McAfee Enterprise Security Manager


SPP is a value-added technology solution provider based in Vienna, Austria. SPP was founded in July 1987 to distribute standard software products to the Austrian Market and to serve as the local representation for key software manufacturing vendors while delivering high customer satisfaction. Working with major enterprise accounts over the past 10 years, SPP has developed a security tool called DAT-QA. Many large McAfee customers use this tool to comply with their internal requirements.

SPP´s DAT-QA plug-in for McAfee ePO is complementary to McAfee’s AV solution, and is designed for McAfee customers to fully automate their internal QA-process for DAT-files. In addition to McAfee’s comprehensive QA, DAT-QA enables customers to incorporate the specifics of their own IT-environment. New McAfee DAT updates and ExtraDats are run against representative customer client systems to further improve the odds of successful DAT updates. The combination of McAfee QA and the individualized customer QA-process improves the stability and security of customer IT infrastructure.


As the inventor of the SSH protocol, SSH Communications Security has a twenty-year history of leading the market in developing advanced security solutions that enable, monitor, and manage encrypted networks. Over 3,000 customers across the globe trust the company’s encryption, access control, and encrypted channel monitoring solutions to meet complex compliance requirements, improve their security posture, and save on operational costs.

CryptoAuditor is a network-based, inline virtual appliance that has the capability to control, monitor, and audit encrypted administrator sessions, as well as file transfers. Because CryptoAuditor requires no agents to be deployed or access portal to go through, it is fast to implement and has no impact on end user experience or workflows. When coupled with McAfee Web Gateway, you can apply data loss prevention and antivirus functionality to encrypted sessions running through SSH (SFTP), RDP, or HTTPS.

McAfee Compatible Solution:
CryptoAuditor 1.5 and McAfee Web Gateway, McAfee Enterprise Security Manager


Sypris is a world-class, integrated systems solutions and cyber security provider with over 45 years of global experience. Sypris develops encryption products, Defensive Network Architecture (DNA), advanced cyber security services and electronic manufacturing capabilities that are aligned to provide its customers the best people, processes and technologies to continually exceed expectations. Sypris has strong capabilities in identity authentication and key management, and it promotes an agile, innovative culture by partnering with leading-edge technology companies, agencies and universities.

Sypris has developed a robust Identity Authentication and Key Management System (CKMS) that allows organizations to securely verify the identity of the device and user, as well as the integrity of the data of millions of endpoints. The CKMS product provides key management for a strong host intrusion prevention capability for enterprise networks. Sypris will integrate CKMS into McAfee ePO, allowing McAfee users to manage the identity and authentication of each endpoint from a single interface.


TaaSERA’s malware behavior detection solutions, used by a number of leading government agencies, identify previously unseen attacks as they happen. TaaSERA’s software solutions leverage patented real-time, real-world behavior detection capabilities to highlight the emergence of previously unseen attacks as they are being carried out — providing organizations with the specific information necessary to adjust defenses and remediate infections before they become a breach.

Combining TaaSERA’s evidence-based behavior detection functionality with McAfee ePolicy Orchestrator (McAfee ePO) will allow users to identify zero-day infections sooner, enabling virus and malware scanning and remeditation more quickly than before. This capabilitity will mitigate the risk of malware resulting in a breach.


TeraDact™ Solutions offer an advanced toolset for the management of sensitive information. TeraDact’s software improves upon the existing, at times inefficient, means of protecting sensitive data while ensuring compliance with current information management and sharing policies. Its technology enables users to manually or automatically check, version, and release the right information to the right audience at the right time by utilizing TeraDact’s proprietary sharing and redaction software. TeraDact’s unique and patented Information Identification and Presentation (IIaP™) capabilities make certain that sensitive information such as classified data, personally identifiable information (PII), protected health information (PHI) and all material deemed sensitive by policy or regulation is effectively identified, appropriately labeled and acted upon before changing hands. Information identified for removal, including all of its associated underlying meta-data, is removed thereby eliminating any possibility of a breach because the data no longer resides in the document. TeraDact’s current market focus centers on Government (Information Sharing, FOIA, Declassification), Healthcare (HIPPA, HITECH), Financial Services (SOX) and Legal (E-Discovery and Confidential Filings with Regulatory Authorities).

With TeraDactor's granular approach to producing sanitized documents tailored according to audience, customers are assured protection against potential costs and repercussions resulting from a data breach or non-compliance. TeraDact will integrate TeraDactor with McAfee ePO to enable customers to effectively manage content sharing policies, compliance auditing, collaborative content review, and content checking and redaction processes across multiple repositories and workflows.


TITUS® is a leading provider of security and compliance software that helps organizations share information securely while meeting policy and compliance requirements. TITUS solutions raise awareness and meet regulatory compliance by visually alerting end users to the sensitivity of information. Products include TITUS Classification, a leading message, document, and file classification and labeling solution; TITUS Aware, products that enhance data loss prevention by detecting sensitive information at the desktop; and the TITUS family of security solutions for Microsoft SharePoint. TITUS solutions are deployed to more than 1.5 million users within more than 300 military, government, and enterprise customers worldwide.

TITUS email and document classification complements McAfee Data Loss Prevention (DLP). The integration between TITUS products and McAfee DLP further reduces an organization’s risk of data loss. It does this by capturing end users' inherent knowledge about the sensitivity of documents and making that information available to McAfee host- and network-based DLP in the form of metadata for more accurate decisions and reduced false positives.

Read the solution brief for more details

McAfee Compatible Solution:
TITUS Message Classification v3.5, TITUS Classification for Microsoft Office v3.5, TITUS Classification for Desktop v1.1 with McAfee DLP and McAfee ePO.


Tiversa is a global leader in peer-to-peer (P2P) intelligence and security, serving corporations, global law enforcement, government agencies, and individuals. Its patented technologies can monitor over 550 million users issuing over 1.8 billion searches per day. Tiversa can locate and record exposed sensitive documents in real time, provide geo locations and identities of document disclosure sources, record user-issued searches, and assist in risk mitigation and remediation.

Tiversa has integrated its P2P Breach Protection solution with the McAfee ePolicy Orchestrator (McAfee ePO) platform, providing customers with data loss visibility beyond the corporate perimeter. Tiversa P2P Breach Protection is segmented into three offerings: Corporate Breach Protection, SMB Breach Protection, and Federal Breach Protection. All include real-time data disclosure detection and advanced P2P forensics to mitigate risk, enabling customers to proactively safeguard their sensitive data within the extended enterprise of suppliers, partners, agents, customers, and remote employees.

Read the solution brief for more details

McAfee Compatible Solution:
Tiversa Breach Protection and McAfee ePO.


Topia Technology is an innovative provider of solutions that securely move and manage data in complex distributed systems. Each solution utilizes proprietary shredding and multi-layer encryption to provide military-grade security for data at-rest and in-transit, ensuring the highest degree of: data integrity, availability, performance, and end-to-end data governance. Topia Technology solutions leverage enterprise infrastructure assets and provide secure syncing and sharing across any device and data repository; lowering total cost of ownership and maximizing workflows.

The Topia Technology Enterprise File Sync and Share Platform (EFSS), Secrata, extends the McAfee ePolicy Orchestrator (McAfee ePO) software security features by providing insight into individual files. This powerful combination of McAfee ePO software and the Secrata Platform provides event information, analysis, auditing, and reporting on file data as it is shared or synced. As files are securely shared both inside and outside the enterprise, the Secrata Platform reports the source, destination, and selected recipient information that can then be used to enforce policy through McAfee ePO software.

Read the solution brief for more details

McAfee Compatible Solution:
McAfee Enterprise Security Manager and Secrata 4.3

Toshiba Storage Device Division (SDD)

Toshiba Storage Device Division (SDD), a division of Toshiba America Information Systems, is a market leader in the development, design, and manufacturing of small form factor 2 1/2" and 1 1/8" hard disk drives for original equipment manufacturers, value-added resellers, value-added dealers, systems integrators, distributors, and retailers in the United States. Toshiba SDD also offers a line of personal storage devices that enable consumers to quickly and easily back up personal digital content and entertainment libraries.

Toshiba and McAfee will work to integrate Toshiba’s self-encrypting drive technologies with McAfee data security solutions and upon completion, Toshiba’s products will comply with the Trusted Computing Group’s trusted storage device specifications.


TrapX is a leader in the delivery of deception-based cyber security defense. Its solutions rapidly detect and defend against new zero-day and APT attacks in real time. It enables a proactive security posture, fundamentally changing the economics of cyberdefense by shifting the cost to the attacker.

DeceptionGrid automates the deployment of a network camouflaged malware traps that are intermingled with your IT resources. DeceptionGrid traps malware, signals a high confidence alert, and triggers McAfee security. DeceptionGrid’s real-time automation passes injected malware directly to McAfee Advanced Threat Defense, which then performs a complete analysis of the threat and leverages the benefits of the full McAfee product suite to defend your enterprise. McAfee Advanced Threat Defense and TrapX enable you to reduce the time to breach detection for the most sophisticated and advanced threats.

McAfee Compatible solution:
TrapX DeceptionGrid and McAfee Advanced Threat Defense


Triumfant offers a one-of-a-kind ability to discover, diagnose, and repair unwanted changes and unexpected conditions on endpoint computers and servers, and automatically corrects those changes and conditions that are problematic to the security, configuration, and performance of each machine.

The integration of Triumfant Resolution Manager (TRM) with the McAfee ePolicy Orchestrator (ePO) platform allows users to view the unwanted changes and unexpected conditions detected by TRM through the ePO console. Users can switch from ePO to TRM to view the details of the changes detected, review and execute the synthesized remediation, and execute reports. This integration provides ePO users with additional insight into the security readiness of the endpoint population through Triumfant’s ability to identify and analyze unusual changes to each machine.

Read the solution brief for more details

McAfee Compatible solution:
Triumfant Resolution Manager 4.3.3 and McAfee ePO.


As a leading provider of Security Policy Orchestration, Tufin automates and accelerates network configuration changes while maintaining security and compliance. Tufin's award-winning Orchestration Suite gives IT organizations the power and agility to enforce security policy across complex, multi-vendor enterprise networks. With more than 1,300 customers worldwide, Tufin enables IT to positively impact the entire business by reducing the time and cost to implement network changes by up to 80 percent.

Tufin SecureTrack monitors McAfee Firewall Enterprise in real time to give the firewall and security administrator control and visibility over changes made to the firewall policy. Key features include: Interactive Dashboard — Up-to-date picture of outstanding risks, the latest changes to firewall policies, and rules and objects that need clean-up or optimization.Change Management — Immediately assess all of the latest changes to any firewall policy.Risk Management — The SecureTrack risk browser gives you an up-to-the minute picture of firewall risks so you can act immediately.Optimization and Cleanup — With the SecureTrack clean-up browser, you always know about unused rules and objects.Continuous Compliance — SecureTrack continually analyzes changes for compliance with your corporate security policy and with PCI DSS.

Read the solution brief for more details

McAfee Compatible Solutions:
Tufin R13-4 and McAfee Firewall Enterprise
Tufin R13-3 and McAfee Next Generation Firewall


Validity Sensors develops a durable, flexible, and high performing biometric fingerprint sensor for information, communication, and entertainment devices. Validity’s fingerprint products enable convenient, secure, and affordable solutions for identity validation, including features such as password replacement, identity verification, centralized management for corporate network security, secure wireless transactions, protection of portable data, and physical access control. As part of the SIA program, Validity will work with McAfee to integrate its authentication solutions with McAfee Endpoint Encryption.

McAfee Compatible solution:
Validity Fingerprint Reader with McAfee Drive Encryption


VASCO Data Security is the world leader in strong authentication. The company has established a solid reputation in online banking with both authentication and e-signature solutions, and authentication in the application and enterprise security markets. Recently, VASCO launched a range of PKI-based authentication solutions, including DIGIPASS CertiID, a client-based software; and DIGIPASS Key1 and DIGIPASS 860, PKI authenticators. Vasco intends to integrate all of these solutions with McAfee Endpoint Encryption for preboot authentication and disc encryption, adding user authentication for laptop protection to McAfee’s offering.

McAfee Compatible solution:
Vasco DIGIPASS Key 101 (SafeSign Applets) and McAfee Drive Encryption


Virtustream is an enterprise-class cloud software and service provider trusted by enterprises worldwide to migrate and run mission-critical applications in the cloud. The Virtustream xStream cloud management platform (CMP) software and Infrastructure-as-a-Service (IaaS) meets the security, compliance, performance, efficiency, and consumption-based billing requirements of complex production applications in the cloud — whether private, public, or hybrid for enterprises, service providers, and government agencies. The company is headquartered in Washington D.C. with offices in San Francisco, Atlanta, London, Geneva, Dubai, and software development centers in Kaunas, Lithuania, and Pune, India. Virtustream owns and operates data centers in the U.S. and Europe with service provider partner data centers in Latin America, the Middle East, and Asia.

The Virtustream ViewTrust solution is integrated with McAfee ePolicy Orchestrator and McAfee Vulnerability Manager to enable an automated risk assessment of the technical compliance and vulnerability posture of an enterprise’s information systems and related assets. This integration enables enterprise customers to quickly identify and remediate high-impacting business or mission risks efficiently, utilizing advanced security intelligence and analytics in a continuous risk and compliance monitoring solution.


As technology standards continue to coalesce, compliance requirements are evolving in an attempt to address the increased depth, breadth, and complexity of securing and auditing the IT infrastructure to keep important information confidential. A trillion-dollar industry has been built on evolving security threats and the compliance requirements to address them, but VoIP security is an issue that has remained largely unaddressed. VoIP ostensibly is a blind spot in IT infrastructure security. VoIPshield is changing this mindset within the IT industry and providing VoIP audit and security tools that are simple to deploy and maintain, and eliminate that security blind spot.

VoIPshield VoIPaudit is the leading application for VoIP audit compliance. VoIPaudit is easy to configure and use, and runs a diagnostic on your network that provides a comprehensive report of your network security, including its adherence to leading industry standards. VoIPaudit should be run regularly as every time a system has a move, add, or change in its network it opens the system to security risk. When risks are found, VoIPaudit gives a comprehensive path to remediation, providing step-by-step instructions on how to make the network compliant. Industry experts agree that audit software is the best first defense in the cybersecurity battle, as over 99% of hacks that occurred in the previous year could have been prevented if industry standards had been followed (Bloomberg News, March 2014).

McAfee Compatible solution:
VoIPshield Systems VoIPaudit with McAfee ePolicy Orchestrator


Vormetric is the industry leader in data security solutions that span physical, virtual, and cloud environments. Vormetric helps over 1,300 customers, including 17 of the Fortune 30 and many of the world’s most security conscious government organizations, to meet compliance requirements and protect what matters — sensitive data. The company’s scalable solution protects any file, any database, and any application — within enterprise data center, cloud, and big data environments — with a high performance, market-leading Vormetric Data Security Platform that incorporates application and transparent encryption, access controls and security intelligence.

Vormetric has partnered with McAfee to extend the data-security coverage of McAfee Database Activity Monitoring (DAM) and McAfee Enterprise Security Manager (ESM). Vormetric adds another layer of security to McAfee DAM by preventing unauthorized users and processes from accessing or viewing the database files through transparent encryption, key management, and access controls. Vormetric provides granular audit logs on file-level access of sensitive data that provides valuable contextual information used by McAfee ESM for compliance reporting or alerting on suspicious and unusual behavior at the file-level.

Read the solution brief for more details (DAM)
Read the solution brief for more details (ESM)

McAfee Compatible solutions:
Vormetric Data Security Manager 5.2.1, Vormetric Transparent Encryption 5.2.1, Vormetric Application Encryption 5.2.1, and McAfee Database Activity Monitor
Vormetric Data Security Manager 5.2.1, Vormetric Transparent Encryption 5.2.1, Vormetric Application Encryption 5.2.1, and McAfee Enterprise Security Manager

Waterfall Security

Waterfall Security Solutions Ltd. is the leading provider of Unidirectional Security Gateways™ and data diodes for industrial networks, SCADA systems, remote monitoring systems and isolated networks. Waterfall Gateways secure industrial networks from network attacks originating on external networks. Waterfall’s security solutions make it straightforward for utilities and critical infrastructures to achieve compliance with NERC-CIP, NRC, NIST and other regulations as well as with cyber-security best practices. Waterfall’s offerings include support for leading industrial applications, such as: OSIsoft PI™ Historian, GE Proficy™ iHistorian, the Siemens SIMATIC™ and the GE OSM™ remote monitoring platforms, and leading industrial protocols, such as: OPC, Modbus, DNP3 and ICCP.

Waterfall Unidirectional Gateways provide McAfee NitroView SIEM installations with visibility into security events and other information in segregated critical-infrastructure networks. In addition, McAfee and Waterfall have cooperated to test, validate and support Waterfall for NitroView, a Waterfall solution which replicates McAfee NitroView data out of Waterfall-isolated networks. The solution permits the industry-leading NitroView SIEM and other NitroView components inside of security-isolated networks to secure and manage those isolated networks, while still providing visibility into those networks for enterprise-wide NitroView SIEM installations.

McAfee Compatible solution:
Waterfall Unidirectional Gateway and McAfee Enterprise Security Manager (formerly NitroView).


WCK (White Cyber Knight) provides a Governance, Risk and Compliance (GRC) solution which brings clear visibility into the organization’s cyber & IT security risks and their impact on the business. Organizations can use the WCK Business Security Risk Managenent (bSRM) system and decision support tools to prioritize security improvements based on their business needs and security strategy. WCK-bSRM can combine risk management for IT, physical security, and control systems security, providing a unique value for critical infrastructure and manufacturing firms. The solution is simple to implement and use, and enables short time to value – customers can gain insight into their risk posture from existing data within a week from installation.

The integration of WCK-bSRM with the McAfee ePO platform adds the business context to the elements managed by ePO, providing management insight into the business relevance of these elements. By analyzing the dependencies between IT components, systems, business processes and organizational units, WCK-bSRM improves the visibility of the organization’s security risk for assets managed by the ePO platform.

Read the solution brief for more details

McAfee Compatible solution:
WCK-bSRM V 2.10 and McAfee ePO.

Whitebox Security

Whitebox Security is a leader in the identity and access governance fields. The company pioneered Intelligent Access Governance, which combines the best of Identity Intelligence, and Identity and Access Governance in the WhiteOPS- Access Governance solution. The award winning WhiteOPS solution enables customers to face data governance and security challenges and identify who accessed data, what was done with it, and what was approved.

When integrated into McAfee's DLP suite, WhiteOPS will automatically import data classification results to enable business and IT to get further visibility on their most valuable assets, understand who is using their files and folders, perform permissions reviews, and validate that only the right employees can actually access their sensitive data, as discovered by McAfee's DLP.


WizNucleus is an innovative provider of NERC CIP compliance process automation products for the energy sector. The company is supported by a strong technology platform and industry partnerships. With origins in the nuclear power plant sector, WizNucleus products have built-in and proprietary technology for automating the entire compliance process, which drastically reduces overall compliance costs. The products are specifically designed for the latest regulatory standards.

NERC-Wiz comprehensively addresses all aspects of NERC CIP 002-009 compliance process automation, including cyberassets and evidence management, ESP/PSP definition, network diagramming, personnel risk assessment, change control, documentation, and TFE management. The reporting and audit preparation aspects of the product makes a NERC audit painless. The integration of NERC-Wiz with McAfee Enterprise Security Manager will provide a dynamic and automated compliance management platform that will receive correlated events and alerts based on preconfigured rules.


Xerox Corporation is a leading provider of business process and document management. Its technology, expertise, and services enable workplaces – from small businesses to large global enterprises – to simplify the way work gets done so they operate more effectively. The company also provides extensive leading-edge document technology, services, software and genuine Xerox supplies for graphic communication and office printing environments of any size.

Xerox has integrated its first networked multifunction printer to use McAfee Embedded Control software, a sophisticated filtering method that allows only approved programs to get through. The Xerox and McAfee security solution simplifies processes for IT administrators with software embedded into a multifunction device’s controller (the machine’s main onboard computer) to provide an immediate alert and audit trail to track and investigate the time and origin of security threats – and take appropriate action. This eliminates the need for IT administrators to constantly stay on top of malware threats and proactively block them.

McAfee Compatible solution:
Xerox MFP extension 1.0 and McAfee ePO.


ZeroFOX, a social risk management company, is pioneering security technology that enables organizations to detect and prevent social media-based cyberthreats, including targeted malware, phishing, social engineering, impersonations, and other fraudulent or malicious activity. Its proprietary Security Analysis Engine (SAE) analyzes social networks and distills threat intelligence through ZeroFOX Enterprise — a centralized, cloud-based platform empowering users to take action on alerts and incoming threats. As the first solution to combat social media risk exposure, ZeroFOX increases an organization’s security posture, while reducing incident response and crisis communications costs.

ZeroFOX raw social media attack data is integrated with McAfee Enterprise Security Manager, parsed, and displayed. The attack data can then be correlated with existing event data to provide a new layer of context within the SIEM solution. This added layer of social media attack intelligence is critical in effectively providing a proactive defense-in-depth security posture — detecting attacks before they hit your network, correlating threats in real time to stop attacks in progress, and understanding the genesis of an attack after it has occurred.

Read the solution brief for more details

McAfee Compatible solution:
ZeroFOX Enterprise 4.5 and McAfee Enterprise Security Manager.


ZF Electronics (formerly the Cherry Corporation) operates as an independent business unit within the ZF Group. The company develops and produces computer input devices, switching systems, sensor technology, and controls. The well-known Cherry brand is now managed under ZF Electronics’ computer input devices and switches and controls product segments. ZF Electronics has 3,100 employees worldwide and generated total sales of approximately €250 million in 2009.

Most Cherry smart card readers and keyboards are interoperable with McAfee Endpoint Encryption, providing joint customers with a secure identity protection solution.

McAfee Compatible solution:
McAfee Endpoint Encryption (on Windows XP, Vista, 2003, and 2008) and Cherry smart card readers, standalone or built into keyboards, models ST-1044, ST-1210, G83-6744 and G83-6644.

Customer Testimonials

“When I can integrate the best network and security products, it opens the door for a lot of operational advantages.  As a customer of ForeScout and McAfee, their interoperability allows me to automate a number of risk management and incident response tasks, which saves resources and helps my team meet operational and compliance goals.”
– Waqas Akkawi, Director of Information Security, SIRVA Inc.

“There are many ways information can leak out of networks, but until we understand our information we cannot identify if, where and when it may leak. Sharing information with a growing coalition of partners increases the risks in this area. Using TITUS Classification in conjunction with McAfee DLP is one of the steps NATO has taken to ensure that we effectively identify and improve the security of our information.”
– John Tatman, Principal Information Assurance Engineer, NATO

“Having an integrated suite—something that would work enterprise-wide and globally—was of critical importance to us. We have changed our strategy because of McAfee and its ability to offer integrated solutions from so many different vendors. We are very, very pleased with what we have seen so far.”
– Norm Feldheim, CIO, Qualcomm

“At Citrix, we work with a number of security vendors and we are very interested in cross-product integrations that improve protection and compliance. In McAfee’s SIA program, we’ve already identified two such vendor integrations and are looking for more.”
– Tom Krawczyk, Senior Security Architect, Citrix Systems

“We use McAfee Endpoint Encryption as a critical component of our layered protection model against unauthorized access to data while increasingly relying on Imprivata OneSign for Single Sign-on to as many applications as possible. The integration between the two products was absolutely critical to increase stability and therefore lower operating costs because the two share such an important place in the foundation of distributed endpoint security system.”
– David O’Berry, Director of Information Systems and Services, South Carolina Department of Probation, Parole and Pardon Services

Partner Testimonials

“The McAfee SIA program has greatly advanced the cause of multivendor interoperability. Working with McAfee, ActivIdentity has become part of a more complete solution for encryption, authentication, and identity management.”
– Jerome Becquart, Vice President of Products and Services, ActivIdentity

“For Absolute Identification, the McAfee SIA program has been invaluable. Because of this program, we have been able to work closely with McAfee sales and management teams on numerous sales and marketing opportunities over the past year, which has brought us tremendous business benefits.”
– Don Ritzman, CEO & President, Absolute Identification

“The McAfee SIA Program has helped Gemalto provide organizations with an interoperable solution for stronger and earlier authentication that has opened the door to new business opportunities.”
– Cedric Collomb, Senior Vice President, Gemalto

“The SIA Developers Conference gave us a great foundation to accelerate our integration effort with McAfee and a deeper understanding of how to achieve success”
– Della Lowe, Sr. Director of Corporate Marketing, AirTight Networks