McAfee Total Protection for Internet Gateways bundles the software licenses for McAfee Web Gateway, McAfee Email Gateway, and McAfee Network DLP Prevent into a one suite purchase. This unified approach offers the right security to protect your users and data from today’s inbound and outbound threats.
Total Protection for Internet Gateways includes unique licensing arrangements that allow you to have the best protection at the lowest possible total cost of ownership. Because McAfee can combine leading technologies into one packaged solution, Total Protection for Internet Gateways is easy on today’s tight budgets.
Reduce your exposure to blended threats and targeted attacks with the top-ranked, industry-leading anti-malware solution.
Eliminate virtually all spam with better than 99% detection and protect your users, storage, and servers.
Leverage our highly-accurate, detailed classification engine to quickly and easily identify both known and unknown sensitive data.
Reduce your administrative overhead with simplified footprints, rapid deployment, and enterprise-wide compliance reporting.
Leverage the security expertise of McAfee Labs to protect your business-critical web and email applications.
Apply policies consistently to stop sensitive and protected data from leaving the enterprise through email and web traffic.
Fight Web 2.0 threats with the #1-rated malware protection; McAfee Web Gateway uses proactive intent analysis to filter out objectionable content from web traffic in real time, defending against both known and unknown threats.
Extend integrated security to Outlook Web Access, iNotes, and other common webmail applications.
Identify and block false non-delivery notices forged by viruses and spammers.
Take advantage of comprehensive and granular category coverage; the McAfee TrustedSource Web Database provides a proven repository of more than 25 million websites that can be blocked across more than 90 categories.
Learn how your organization uses the web, identifies usage trends, isolates problems, documents inappropriate web activity, complies with regulations, and uses this information to tailor your filtering settings to best enforce your web-usage policies.
Use X-Headers for the required action and eliminate unauthorized transactions at the application layer rather than simply dropping the TCP session.
Identify and protect more than 300 different content types, in 12 spoken languages, including complex intellectual property.
Please see individual web pages for system requirements.
I’m sure you’ve heard the news about Heartbleed by now (unless you’re in vacation wonderland and have taken a tech break). This is a serious vulnerability in the core of the Internet and is something we all should be concerned about. Heartbleed is a kink in encryption software, discovered by security researchers. It is a […]
The post Heartbleed: Free Tool To Check if That Site is Safe appeared first on McAfee.
Gmail users beware: a very convincing, very deceitful, phishing scam has been making its way around the Internet. The scam targets Google Doc and Google Drive users with a lookalike login page designed to steal your username and password. With 425 million active monthly Gmail users, these “phishermen” have cast quite a large net. Before […]
The post Google Docs Phishing Campaign is Frighteningly Accurate appeared first on McAfee.
From McAfee’s first Cyber Defense Center (CDC) in Dubai, we closely monitor threats and activities in Europe and the Middle East. Since the Center’s official launch in September 2013, we have seen quite a few interesting trends, especially in the Persian Gulf region. Many of the activities spotted are related to hacktivism, cybercrime, or regional […]
The post McAfee Cyber Defense Center Zooms In on Middle East appeared first on McAfee.
Unfortunately in today’s world, scammers are coming at us from all angles to try and trick us to get us to part with our hard earned money. We all need to be vigilant in protecting ourselves online. If you aren’t paying attention—even if you know what to look for—they can get you. There are numerous […]
While analyzing a recent Internet Explorer zero-day vulnerability, CVE-2014-0322 (containing the Flash sample hash b9c9dab0fd30418884800afebbaba4d99f4526ef0c9a47972a20ab20fed0a06d), we noticed the exploit makes an unorthodox call to ZwProtectVirtualMemory to bypass data execution prevention. What is different about this call? The argument(s) of ZwProtectVirtualMemory are placed in an unusual manner. Typically arguments that are pointer variables belonging to the […]
The post Internet Explorer Zero Day Offers Unusual Case Study appeared first on McAfee.