McAfee Total Protection for Internet Gateways bundles the software licenses for McAfee Web Gateway, McAfee Email Gateway, and McAfee Network DLP Prevent into a one suite purchase. This unified approach offers the right security to protect your users and data from today’s inbound and outbound threats.
Total Protection for Internet Gateways includes unique licensing arrangements that allow you to have the best protection at the lowest possible total cost of ownership. Because McAfee can combine leading technologies into one packaged solution, Total Protection for Internet Gateways is easy on today’s tight budgets.
Reduce your exposure to blended threats and targeted attacks with the top-ranked, industry-leading anti-malware solution.
Eliminate virtually all spam with better than 99% detection and protect your users, storage, and servers.
Leverage our highly-accurate, detailed classification engine to quickly and easily identify both known and unknown sensitive data.
Reduce your administrative overhead with simplified footprints, rapid deployment, and enterprise-wide compliance reporting.
Leverage the security expertise of McAfee Labs to protect your business-critical web and email applications.
Apply policies consistently to stop sensitive and protected data from leaving the enterprise through email and web traffic.
Fight Web 2.0 threats with the #1-rated malware protection; McAfee Web Gateway uses proactive intent analysis to filter out objectionable content from web traffic in real time, defending against both known and unknown threats.
Extend integrated security to Outlook Web Access, iNotes, and other common webmail applications.
Identify and block false non-delivery notices forged by viruses and spammers.
Take advantage of comprehensive and granular category coverage; the McAfee TrustedSource Web Database provides a proven repository of more than 25 million websites that can be blocked across more than 90 categories.
Learn how your organization uses the web, identifies usage trends, isolates problems, documents inappropriate web activity, complies with regulations, and uses this information to tailor your filtering settings to best enforce your web-usage policies.
Use X-Headers for the required action and eliminate unauthorized transactions at the application layer rather than simply dropping the TCP session.
Identify and protect more than 300 different content types, in 12 spoken languages, including complex intellectual property.
Please see individual web pages for system requirements.
One question I often hear is “When will Intel Security (McAfee) publish a report on the latest threat?” It seems to be a hot trend today for security companies to offer reports with topics such as “Operation X” or “Malware Y,” or to trumpet how many zero-day vulnerabilities they have found. Do we now measure […]
The post At Intel Security, Protecting Customers Takes Precedence Over Seeking Headlines appeared first on McAfee.
Horrible people do horrible things to get ahead in life. Case in point: scammers are deploying phishing attacks—emails and websites that trick users into giving up sensitive information—designed to take advantage of a humanitarian disaster. To make matters worse, this phishing attack is coupled with a secondary scam—fraudulent fundraising. Earlier this month, a group of […]
The post Ebola-Related Phishing Attack Becomes Outright Fundraising Fraud appeared first on McAfee.
The Information Security™ magazine and SearchSecurity.com™ recently announced the winners of the 2014 Readers’ Choice Awards. We are honored McAfee Email Protection was named as a 2014 Reader’s Choice Award winner in the Email Security category, and excited that readers recognized the solution for its targeted phishing attack protection, ability to enhance security for hosted […]
The post McAfee Email Protection Named Email Security Readers’ Choice Award Winner appeared first on McAfee.
Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers and programs that can be accessed through browsers. The most common exploit targets are Java, Flash, PDFs, and Silverlight. Exploit kits use lots of techniques to evade detection by security products. Exploit kits use several common techniques: Code […]
Phishing attacks exploit the often weakest link in cyber defense—human behavior. Bypassing our best judgment can be as simple as creating urgency with a fake bank notice, or complex as assuming the persona of a known business partner – just to steal our information. Numerous high-profile breaches such as the theft of credit card data […]