As with all of our cloud-based security solutions, McAfee SaaS Email Encryption offers enterprise-level performance to help organizations with data loss prevention and email data protection. Designed with the business users in mind, SaaS Email Encryption is an easy-to-activate and easy-to-manage solution built on a foundation of trusted and proven standards-based encryption technologies. Together with deep content inspection capabilities, pre-built extensive compliance libraries help speed the time to demonstrating compliance, ranging from regulatory, regional, or corporate requirements. SaaS Email Encryption is available as an addition to SaaS Email Protection and Continuity.
Identify sensitive data quickly with built-in compliance templates — In addition to regular expression technology to identify keywords and phrases, SaaS Email Encryption has hundreds of pre-built data loss prevention rules that are also included in McAfee Data Loss Prevention, enabling you to leverage advanced data loss protection and compliance capabilities from our industry-leading technology. Features include the ability to fingerprint and register documents to detect and block key documents — or even select language from within those documents — from being emailed out of the organization.
Drive consistency with customizable, policy-driven encryption — As an IT administrator, you can use the unified, web-based console to set, review, and customize privacy policies (policy-driven encryption), so confidential content is automatically encrypted. You can also customize and enforce multiple policies for respective user groups, branch offices, and lines of business.
Easy-to-use translates to an elevated security posture — Technology is only as useful as its adoption, and SaaS Email Encryption was designed with that in mind. Simply send your email and the content, including over 300 attachment types, is automatically scanned and encrypted if it matches the policy set by the administrator. This occurs transparently behind the scenes. You can also tag your email to be encrypted by simply adding "[encrypt]" to the subject line or within the message body. As a recipient, you can retrieve the message from the web-based message pick-up portal (pull encryption) or read an encrypted message that was sent to your inbox through a browser reader (push encryption). When you reply, the message will also be encrypted, providing you with bidirectional protection.
Assure your customers, partners, and employees that emails tagged to contain sensitive data will not be visible to prying eyes. McAfee SaaS Email Encryption provides an easy-to-use secure communication channel to encrypt both outgoing email and replies, even if your recipient doesn’t have an encryption solution in place.
Define policies to shield sensitive company data from open Internet exposure. SaaS Email Encryption protects your sensitive email data from being transmitted outside the network. Scan and secure 300+ document types, keeping your organization protected from data loss.
Take advantage of advanced data loss protection and compliance capabilities, leveraging industry-leading technology from McAfee. Pre-built content rules for PCI-DSS, healthcare, financial data, regional privacy regulations, and more help you quickly create compliance policies.
Use McAfee’s encryption solutions while on the move. SaaS Email Encryption is easy to use from any email client for both the sender and recipient.
Get the most sophisticated features at the most attractive price point. With Security-as-a-Service (Security SaaS), there’s no hardware or software to buy or maintain, and no long-term contract commitment.
Enjoy an in-the-cloud solution that scales appropriately to fit your business needs, so you’ll never see declining performance as your encryption needs grow.
Set up user groups and customize policies. You can apply policies for the entire organization, separate lines of business, multiple domains, and individual users.
Count on our highly trained support specialists for answers to your questions and help resolving any issue, around the clock.
McAfee SaaS Email Encryption is available as an addition to SaaS Email Protection and Continuity. No additional system requirements are needed for encryption.
For the third year in a row, McAfee Email Protection earned SC Magazine’s Five-Star Rating. “Strengths: ClickProtect and Threat Detection features are great additions to an already full-featured email security platform.”
SC Magazine has named McAfee and McAfee Email Protection as an Industry Innovator.
For the second year in a row, McAfee Email Protection earned SC Magazine’s Five-Star Award and Best Buy Rating. “Strengths: Easy to configure and manage, and loaded with predefined templates for security and compliance. Weaknesses: None that we found.”
Leading analyst firm Gartner, Inc. has named McAfee a leader in its "Magic Quadrant for Secure Email Gateways" as published on July 2, 2013.
Established security player McAfee has embraced cloud security that includes protection for email, web, and identity authentication traffic.
What does characterize McAfee as an Innovator is its approach to the most important aspect of innovation: how one thinks. The Network Security Business Unit — the home of McAfee Email Protection — is solidly ensconced in the type of thinking process that results in innovative solutions to difficult, and occasionally obscure, information assurance challenges.
Premier analyst firm Forrester Research, Inc. has named McAfee a leader in “The Forrester Wave™: Email Content Security, Q4 2012.” We consider this a testament to the strength, stability, flexibility, and effectiveness of McAfee’s email protection solutions.
The Holy Grail of IT products is one that is low cost, easy to use, and offers a rich feature set. McAfee Email Protection easily fits those criteria in the email security and content filtering space. Verdict: An absolutely brilliant product. We make it our Best Buy.
The Intel-owned security company has been preaching cloud security measures since before the cloud truly formed. McAfee’s central cloud piece is the Cloud Security Platform, which secures content and data—e-mail, Web and identity—as it moves to and from the cloud.
With five stars across the board in every product rating category, McAfee Email Protection was awarded the top 5-Star Rating by SC Magazine – measured on its features, ease of use, performance, documentation, support and value for the money.
Topics : Email & Web Security
Topics : Email & Web Security, Security-as-a-Service (SaaS)
Topics : Email & Web Security, Security-as-a-Service (SaaS)
This specifications sheet introduces some common considerations and its benefits and challenges for each of the leading email encryption techniques available.
For a technical summary on the McAfee product listed above, please view the product data sheet.
Learn about how McAfee Email Protection solutions can be implemented with Microsoft Office 365 for a comprehensive, layered defense against threats.
Organization-to-organization, pull delivery, and push delivery offer a range of options to satisfy most organizations’ requirements for encrypted email. All three options are nicely integrated into email security solutions from McAfee and require minimal administrative overhead to implement.
Despite the range of functionality offered in Office 365, like any cloud-based offering, it cannot be all things to all customers. There are some missing features in Office 365 that will prompt some customers to consider the use of third-party, cloud-based, or on-premise tools to enhance Office 365’s native capabilities. In this white paper, Osterman Research dives into the current limitations of Office 365 with recommendations on how organizations can strengthen security, compliance, and control in their environment.
Learn about the key issues that organizations should address in the context of cybercrime delivered through email, and practical advice on what organizations should do to protect themselves.
This white paper discusses the need to identify and manage outbound content and the steps that organizations should consider in doing so.
What does it take for a Software as a Service (SaaS) app to appear on the list of top Shadow IT offenders? According to a recent survey, not much. Stratecast and McAfee conducted a survey with over 600 IT and Line of Business employees about their use of SaaS (authorized and unauthorized) in the workplace. […]
Most people we know are fairly dedicated, hard-working employees. They understand what their companies want from them, and they take pride in delivering on—or exceeding—the expectations. And yet, as revealed in the 2013 Frost & Sullivan SaaS survey sponsored by McAfee, employees regularly flout company policies when it comes to Software as a Service (SaaS) […]
The post Why Employees Ignore the Risks of Shadow IT and What Businesses Can Do about It appeared first on McAfee.
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In this and related posts, McAfee Labs researchers offer their views of new and evolving threats we expect to see in the coming year. This article was written by Ramnath Venugopalan. We foresee three broad threat […]
The post 2014 Threats Predictions: Cloud Attacks Could Lead to Data Loss appeared first on McAfee.
The numbers don’t lie—employees are increasingly circumventing IT, using unapproved Software-as-a-Service applications (SaaS) in their daily tasks. This dangerous habit, practiced by more than 80% of employees (known as Shadow IT), might seem harmless to some, but can, in fact, put sensitive corporate data at risk. Last week, Graham Clarke, the Senior Director of Network […]
The post December #SecChat Recap – The Security Impact of Shadow IT appeared first on McAfee.
It’s no irony that the most disruptive of innovative startups are some of the most attractive targets for cyber-attacks. It is indeed an irony that an emerging venture’s rush to get IT capabilities up and running could result in a significant number of security vulnerabilities. Consider this an issue of both culture and execution. Given […]
The post Why “Shadow IT” Could Mean “Darkness at Noon” for Rising Startups appeared first on McAfee.