McAfee Security for Email Servers provides comprehensive content security for Microsoft Exchange and Lotus Domino servers.
Industry-leading protection — Uses award-winning McAfee in-memory and incremental on-demand scanning to remove viruses, worms, Trojans, and other threats from incoming and outgoing email.
Strong internal safeguards — Detects threats that may have either slipped past your perimeter defenses or entered your network via infected laptops and internal email. It also blocks spam with the anti-spam module.
Powerful filtering — Enforces corporate policies for email use by filtering offensive content and plugging leaks of sensitive data.
Single console management — Use the McAfee ePolicy Orchestrator (ePO) platform to manage security and view detailed graphical reports from a centralized web-based console.
Check email subject, body, and attachments of incoming and outgoing email messages for viruses, worms, Trojans, and other malware. Real-time, cloud-based file reputation and sender reputation from McAfee Global Threat Intelligence (GTI) protect against both known and emerging malware-based threats. Automatic updates keep you current with the latest security intelligence from McAfee Labs, the world’s top threat research center.
Filter messages based on size, message content, or attachment content. Block or quarantine messages that contain specific words or phrases in the subject line, message body, or attachments.
Use prebuilt dictionaries that cover most enterprise- and country-specific compliance rules or customize content filters to keep sensitive data from leaking out of your organization. Create rules on a global basis, with exceptions as needed for individuals and departments. Manage via the built-in HTML interface or the McAfee ePolicy Orchestrator (McAfee ePO) platform.
Catch spam and phishing emails using the antispam module with IP reputation, helping to maintain employee productivity and reduce wasted email server storage. Users may create their own whitelists and blacklists.
Automatically download the latest virus definitions (.DAT files) via HTTP, FTP, network file share, or the McAfee ePO centralized management console. As a result, your IT staff won’t need to spend valuable time on manual updates.
Ensure protection for your email servers on major operating systems, including Windows and Linux, on 32-bit and 64-bit platforms.
These are minimum system requirements only. Recommended requirements are in parentheses, where applicable. Actual requirements will vary depending on the nature of your environment.
For guidance on how to use this McAfee product, watch the Quick Tips video listed above.
Brelje & Race Makes a Wise Investment
McAfee secures Cassling with smart, simple solutions.
CSTISA uses McAfee ePolicy Orchestrator (ePO) software as a primary sales tool to sell McAfee Endpoint Protection solutions.
Informa used McAfee to centralize and standardize its security infrastructure to better protect against viruses, spyware, spam, pop-ups, and more.
For a technical summary on the McAfee product listed above, please view the product data sheet.
McAfee is a leader in the email security market, delivering optimal email security solutions for any enterprise.
In 2012, my colleagues Deepak Gupta and Xiaoning Li explained in a white paper how some malware can operate at the kernel level to bypass Microsoft’s security for 64-bit Windows systems. Today a small utility program named KPP-Destroyer can be found online. Previous versions of KPP-Destroyer had some bugs on a Windows 8.1 computer, but […]
Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often than random phishing attempts. Exploits that use patched vulnerabilities delivered via spear phishing email are one of the most successful combinations used by attackers to infiltrate targeted organizations and gain access to confidential information. During […]
The post Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities appeared first on McAfee.
The Dofoil downloader (found in the wild since 2011) occasionally updates itself with new features and encryption techniques to hide communications with its control servers. The latest iteration uses a variation of XOR and RC4 algorithms similar to previous variants to encrypt the list of control servers within the binary and encrypt all traffic with […]
The post Dofoil Downloader Update Adds XOR-, RC4-Based Encryption appeared first on McAfee.
McAfee product coverage and mitigations for malware or indicators associated with the recent attacks (a.k.a. Dragonfly, Energetic Bear, Havex/SYSMain) on industrial control systems (ICS’s) are listed below. The Havex remote access tool is common across these associated attacks or campaigns–including Dragonfly. We have seen Havex in ICS-specific targeted campaigns. It can detect and affect ICS- […]
The post Product Coverage and Mitigation for ICSA-14-178-01 (Havex/ICS-Focused Malware) appeared first on McAfee.
Every organization has deployed anti-virus/anti-malware solutions, but how much you have actually reduced your risk? To recap what we’ve covered in this 5-part blog series, Aberdeen’s analysis and Monte Carlo modeling: Confirms the high risk of unprotected endpoints Demonstrates that endpoint protection really does reduce risk Confirms that “free” endpoint protection (e.g., Microsoft) is better […]
The post Endpoint Security, Part 5 of 5: A/V Alone is Not Enough appeared first on McAfee.