McAfee Total Protection for Internet Gateways

McAfee Total Protection for Internet Gateways

Comprehensive security for web, email, and data loss prevention

Next Steps:

Overview

McAfee Total Protection for Internet Gateways bundles the software licenses for McAfee Web Gateway, McAfee Email Gateway, and McAfee Network DLP Prevent into a one suite purchase. This unified approach offers the right security to protect your users and data from today’s inbound and outbound threats.

  • Protection against Web 2.0 blended and targeted malware attacks
  • Email free of spam, malware, phishing attacks, or other email-borne threats
  • Reduced bandwidth and malware cleanup costs while increasing employee productivity
  • Safe web surfing without fear of phishing, spyware, and other attacks
  • Safety for both structured (e.g., credit card numbers) and unstructured data (e.g., financial records or blueprints) throughout the entire enterprise
  • Assist in achieving industry and regulatory compliance

Total Protection for Internet Gateways includes unique licensing arrangements that allow you to have the best protection at the lowest possible total cost of ownership. Because McAfee can combine leading technologies into one packaged solution, Total Protection for Internet Gateways is easy on today’s tight budgets.

Features & Benefits

Get strong, proven malware protection

Reduce your exposure to blended threats and targeted attacks with the top-ranked, industry-leading anti-malware solution.

Realize effective spam detection

Eliminate virtually all spam with better than 99% detection and protect your users, storage, and servers.

Protect structured and unstructured data

Leverage our highly-accurate, detailed classification engine to quickly and easily identify both known and unknown sensitive data.

Maximize administrative efficiencies

Reduce your administrative overhead with simplified footprints, rapid deployment, and enterprise-wide compliance reporting.

Use global intelligence services

Leverage the security expertise of McAfee Labs to protect your business-critical web and email applications.

Automatically enforce industry and regulatory controls

Apply policies consistently to stop sensitive and protected data from leaving the enterprise through email and web traffic.

Get the industry’s best web protection

Fight Web 2.0 threats with the #1-rated malware protection; McAfee Web Gateway uses proactive intent analysis to filter out objectionable content from web traffic in real time, defending against both known and unknown threats.

Protect your webmail application

Extend integrated security to Outlook Web Access, iNotes, and other common webmail applications.

Gain backscatter protection

Identify and block false non-delivery notices forged by viruses and spammers.

Filter on category

Take advantage of comprehensive and granular category coverage; the McAfee TrustedSource Web Database provides a proven repository of more than 25 million websites that can be blocked across more than 90 categories.

Use powerful reporting tools and customizable dashboards

Learn how your organization uses the web, identifies usage trends, isolates problems, documents inappropriate web activity, complies with regulations, and uses this information to tailor your filtering settings to best enforce your web-usage policies.

Integrate with Web Proxies and MTAs

Use X-Headers for the required action and eliminate unauthorized transactions at the application layer rather than simply dropping the TCP session.

Use comprehensive data classification

Identify and protect more than 300 different content types, in 12 spoken languages, including complex intellectual property.

Community

Blogs

  • Detection Effectiveness: the Beat Goes On
    McAfee Labs - August 27, 2014

    In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made this critical point: Stopping attacks before they breach and narrowing the breach discovery gap require the ability to detect threats at […]

    The post Detection Effectiveness: the Beat Goes On appeared first on McAfee.

  • 10 Tips to Stay Safe Online
    Robert Siciliano - July 28, 2014

    Hang ten, dude! It’s summertime and surfers are taking to the ocean to go catch some gnarly waves. Experienced surfers know that there are dangers out in the water and are trained to look out for them. These dangers include rip currents, shallow water, and of course, sharks. Just like there are dangers in the […]

    The post 10 Tips to Stay Safe Online appeared first on McAfee.

  • Embrace and Secure Shadow IT
    David Bull - July 22, 2014

    “Shadow IT” is stepping out into the light of day. Business users are eagerly embracing the cloud and especially Software-as-a-Service (SaaS) in search of cost-effective productivity tools for file sharing and storage, collaboration, social media, and anything else that makes them more effective on the job. But the problem is these well-intentioned, hardworking employees are […]

    The post Embrace and Secure Shadow IT appeared first on McAfee.

  • July #SecChat – Targeted Attacks Set Sights on Vital Systems
    Rees Johnson - July 18, 2014

    Targeted attacks can take on many different forms and are flexible enough to adopt a variety of tactics. Think of them as a specialized unit for cyber criminals. They are utilized for very specific missions and operate with the precision of a surgical strike, rather than the carpet-bombing techniques used in other attack strategies. Whether […]

    The post July #SecChat – Targeted Attacks Set Sights on Vital Systems appeared first on McAfee.

  • Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
    Chintan Shah - July 15, 2014

    Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often than random phishing attempts. Exploits that use patched vulnerabilities delivered via spear phishing email are one of the most successful combinations used by attackers to infiltrate targeted organizations and gain access to confidential information. During […]

    The post Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities appeared first on McAfee.

Related Solutions
Threats and Risks