Email is your most critical business application and one of the most challenging to protect, but simply blocking spam and viruses is not enough. Comprehensive email security requires defending against sophisticated new attacks, preventing loss of sensitive business data, and protecting your own corporate email reputation.
Going beyond spam and malware filtering, McAfee Email and Web Security Appliance combines market-leading email protection with data loss prevention, policy-based controls, and advanced reporting. Powered by McAfee Global Threat Intelligence, Email and Web Security Appliance is armed with the latest proactive defenses against both known and unknown threats. Highly scalable to meet the needs of the most demanding enterprises, yet easily managed, Email and Web Security Appliance provides the highest level of email security with complex features and functionality built in to a simple, user-friendly interface.
Email and Web Security Appliance delivers:
Comprehensive inbound security against all email-borne threats — With its extremely low rate of false positives, Email and Web Security Appliance keeps spam out while accurately delivering legitimate email.
Outbound inspection against reputation-damaging email — Block messages that could negatively impact your corporate email reputation. Infected systems within your network can cause your domain to be blacklisted as an origin of spam and your corporate email to be automatically rejected by your business partners and customers.
Integrated data loss prevention for compliance and policy enforcement — Built-in McAfee Data Loss Prevention (DLP) technology includes dictionaries, document fingerprinting, compliance, and validation tools.
Enhanced security powered by McAfee Global Threat Intelligence — McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based service integrated into McAfee security products. It works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Email and Web Security Appliance uses file reputation, web reputation, message reputation, and network connection reputation services to identify suspicious files, sites hosting undesirable content, infected domains and IP addresses, and email messages carrying malicious payloads.
Keep spam out while accurately allowing legitimate email. With McAfee Email and Web Security Appliance, you don’t need to choose between effective spam blocking and low false-positive rates because you get both.
Inspect outbound traffic, identifying and stopping messages that could negatively impact your corporate email reputation.
Working with McAfee Quarantine Manager, Email and Web Security Appliance allows administrators to easily consolidate and manage email quarantines. Quarantine Manager is a highly scalable, centralized, off-box server that delivers role-based administration, granular quarantines, and a customizable user interface.
Centralize appliance configuration, policy management, and reporting through McAfee ePO software, the first and only platform to manage systems, networks, data, and compliance solutions across any size organization. The integration of Email and Web Security Appliance with McAfee ePO software enables administrators to automatically push out and implement configuration and policy changes across all appliances in the enterprise.
Get real-time visibility into important system activities such as detection rates, scanning policies, and system health. Chose from predefined reports or customize your own. View reports immediately or schedule email delivery of the reports you want.
Leverage network, file, and message reputational analysis to apply threat intelligence from McAfee security devices around the globe for quicker, more accurate identification of spam, malware, malicious embedded URLs, and other threats.
Understand, filter, control, and monitor Internet usage. Group-based policies are simple to configure; more than 95 filter categories are included as a standard feature.
Increase capacity as your needs grow. Built-in clustering and load-balancing capabilities provide easy scalability options; simply add appliances to grow capacity. Available deployment options range from units designed for small and mid-sized businesses to appliances that meet the needs of the most demanding enterprises.
McAfee Email and Web Security Appliance is available as a standard or virtual appliance. These are minimum hardware requirements for the virtual appliance. Actual requirements will vary depending on the nature of your environment.
With five stars across the board in every product rating category, McAfee Email Protection was awarded the top 5-Star Rating by SC Magazine – measured on its features, ease of use, performance, documentation, support and value for the money.
McAfee spam filter helps Berendsen improve IT department performance.
Cardnet eliminates malware infections with comprehensive network, email, and endpoint security from McAfee.
McAfee secures Cassling with smart, simple solutions.
McAfee bolsters security for the City of St. Paul, Minnesota.
Comprehensive and easy-to-manage security from McAfee protects Dawnay Day's network and endpoints from attacks.
Ellis Hospital simplifies security risk management with McAfee.
Cancer research group stays on task with McAfee.
McAfee simplifies security management for French city’s local government.
Manteca Unified School District protects students with McAfee solutions.
Smith College strengthens Internet and email security with McAfee.
For technical specifications on the McAfee product listed above, please view the product data sheet.
For a technical summary on the McAfee product listed above, please view the product data sheet.
This paper characterizes new web threats, explains why most security solutions in place today are ineffective, and then proposes three key organizational principles for assessing and enhancing web security—security, control, and flexibility—and nine functional requirements that enable these principles.
Targeted attacks can take on many different forms and are flexible enough to adopt a variety of tactics. Think of them as a specialized unit for cyber criminals. They are utilized for very specific missions and operate with the precision of a surgical strike, rather than the carpet-bombing techniques used by other malware variants. Whether […]
The post July #SecChat – Targeted Attacks Set Sights on Vital Systems appeared first on McAfee.
Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often than random phishing attempts. Exploits that use patched vulnerabilities delivered via spear phishing email are one of the most successful combinations used by attackers to infiltrate targeted organizations and gain access to confidential information. During […]
The post Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities appeared first on McAfee.
Summertime is upon us…and that means sunshine and vacations. Most people love summertime, including scammers! Hackers can use this time to take advantage while we are planning vacations or on vacation or just enjoying fun in the sun. Here are some key scams to watch out for this summer: Family or Friend Requests Money You […]
On June 23, Gartner published its Secure Web Gateways Magic Quadrant, and positioned McAfee Web Protection in the Leaders Quadrant for the fifth year in a row. McAfee participates in eight Magic Quadrants and is a leader in six(1). In this Magic Quadrant, Gartner evaluated vendors on their completeness of vision and ability to execute […]
The post McAfee Named A Leader in Secure Web Gateways 2014 Magic Quadrant appeared first on McAfee.
Deterrence is an important part of warfare, often the most effective form of defending. Therefore, in the next couple of years we expect to see states reveal some of their offensive cyber capabilities more openly than they are doing today. The goal of deterrence is to make our opponents abstain from attacking, yet if the […]