Managing the New Perimeter

Protect your data wherever it exists

Next Steps:

Overview

Building the impenetrable IT environment was always a challenge, even when there were predefined boundaries. Welcome to the new world of computing without boundaries, including a complete mix of personal and business data on company systems. How do you delineate between what is valuable and needs to be protected? McAfee Risk Management solutions focus on the applications and data that must be protected. Customize the security of your personal digital assistants (PDAs) and removable media, secure unstructured data, and handle the complexity and scale that comes with this new generation of computing.

Key Benefits

  • Protect against all inbound threats
    Identify and block incoming spam with over 99% accuracy while protecting against viruses, malware, phishing, directory harvest, denial of service, bounce-back attacks, zero-hour threats, and spam surges. TrustedSource, our global threat correlation and intelligence technology, helps make it happen.
  • Stop outbound data loss
    Prevent data loss with the most extensive on-box email data loss prevention in the industry, featuring fingerprinting.
  • Enable productive use of Web 2.0
    Use Web 2.0 with confidence within your organization by leveraging strong inbound and outbound filtering of multiple web protocols, including deep inspection of encrypted traffic.
  • Simplify and improve protection
    Automatically protect data, identify and control critical data, safeguard information sent to third parties, secure your enterprise from the risk of data loss, and prove compliance with less effort, while saving time and money with centralized deployment, management, and reporting.
  • Protect a broad range of data on all devices
    Provide consistent protection for data on desktops, laptops, mobile devices, removable media and portable storage devices. Secure a broad range of information, including customer data, intellectual property, legal and financial records, and employee records.
  • Streamline firewall management
    Put firewall rules in the proper business context to greatly reduce troubleshooting efforts. Simplify rule optimization, policy configuration, and compliance auditing with centralized management and reporting.
  • Reduce your attack surface area
    Stop the latest threats and eliminate unwanted traffic with reputation-based Global Threat Intelligence.
  • Get reliable, real-time protection
    Block unwanted and risky applications; use real-time, protocol-based rate limiting to apply application, protocol-type, and port-based bandwidth controls; and prioritize business-critical traffic. Rely on dynamic threat and vulnerability updates for complete, uninterrupted protection.

Products

Data Protection

McAfee Complete Data Protection — Advanced
McAfee Complete Data Protection — Advanced

McAfee Complete Data Protection — Advanced offers strong encryption, authentication, data loss prevention, and policy-driven security controls to help block unauthorized access to your sensitive information — anytime, anywhere.

Email & Web Security

McAfee Email Gateway
McAfee Email Gateway

McAfee Email Gateway delivers total email protection for enterprises. It integrates inbound and outbound defenses, streamlines compliance, simplifies administration, and lowers operating costs.

McAfee Web Gateway
McAfee Web Gateway

McAfee Web Gateway offers powerful, proactive protection against zero-day threats, spyware, and targeted attacks.

Endpoint Protection

McAfee Host IPS for desktop
McAfee Host Intrusion Prevention for Desktop

McAfee Host Intrusion Prevention for Desktop helps keep your business safe and productive by monitoring and blocking unwanted activity with a comprehensive three-part threat defense — signature analysis, behavioral analysis, and system firewall — all easily managed from one central console, the McAfee ePolicy Orchestrator (ePO) platform.

Network Security

McAfee Firewall Enterprise
McAfee Firewall Enterprise

McAfee Firewall Enterprise is a next-generation firewall that restores control and protection to your network.

McAfee Network Security Platform
McAfee Network Security Platform

McAfee Network Security Platform is the industry’s most secure network intrusion prevention system (IPS). Backed by McAfee Labs, it protects customers on average 80 days ahead of the threat. It blocks attacks in real time, before they can cause damage, and protects every network-connected device. With Network Security Platform, you can automatically manage risk and enforce compliance — while improving operational efficiency and reducing IT efforts.

Security Management

McAfee ePolicy Orchestrator (ePO)
McAfee ePolicy Orchestrator (ePO)

McAfee ePolicy Orchestrator (ePO) is a key component of the McAfee Security Management Platform, and the only enterprise-class software, to provide unified management of endpoint, network, and data security. With end-to-end visibility and powerful automations that slash incident response times, McAfee ePO software dramatically strengthens protection and drives down the cost and complexity of managing risk and security.

Services

Data Loss Prevention Assessment

Detect and prevent the unauthorized transmission or disclosure of sensitive information. McAfee Foundstone reduces your risk of exposure by identifying sensitive data copied or currently in transit from its original intended container.

Incident Management Check

Build a better, more effective incident response and management program. McAfee Foundstone analyzes the gaps in your incident management program and offers recommendations to improve your emergency response protocol.

Vulnerability Management Check

Assess your vulnerability management program. McAfee Foundstone analyzes the gaps in your program to ensure you have the right balance of people, process, and technology.

Community

Blogs

  • Shedding light on ‘Shadow IT’
    David Small - January 9, 2014

    BYOD, BYOA, BYOx. The IT industry is full of acronyms depicting its constant evolution and relationship with the professional world. First came the devices; employees saw the power of personal devices and insisted on using them in the workplace. And so the consumerisation of IT was born. After the devices came the apps. Companies reported […]

    The post Shedding light on ‘Shadow IT’ appeared first on McAfee.

  • Walking the Talk on Public-Private Partnerships
    Tom Gann - August 16, 2013

    There’s been a lot of talk about the value of public-private partnerships in moving the U.S. toward a more robust cyber security posture. And let’s be honest:  there’s also been a lot of private sector skepticism about how much the Administration really believed in the concept or how much they would do to make it […]

    The post Walking the Talk on Public-Private Partnerships appeared first on McAfee.

  • Five Factors That Make D.C. Region a Cybersecurity Hub
    Tom Gann - May 29, 2013

    McAfee is based in Silicon Valley, but we know there’s more to tech than California. We recently joined the National Institute of Standards and Technology to launch the National Cybersecurity Center of Excellence, a joint effort among high-tech business, federal, state and local government and local universities located in Rockville, Md. The goal of the […]

    The post Five Factors That Make D.C. Region a Cybersecurity Hub appeared first on McAfee.

  • Getting Assurance in a Time Constrained World
    McAfee - May 20, 2013

    Nothing is as frustrating as when something goes wrong, especially when you have time constraints.  NIST has just released Special Publication 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations where a few notable items have been added to increase the confidence that security, practices, procedures and architectures of information systems […]

    The post Getting Assurance in a Time Constrained World appeared first on McAfee.

  • Response Now as Important as Prevention
    Leon Erlanger - February 24, 2012

    The National Institute of Standards and Technology (NIST) has updated its Computer Security Incident Handling Guide to take into account the increasingly dire state of cyber security. As anyone who has followed the rush of high-profile incursions over the past year knows, it’s looking less and less possible to prevent the inevitable attack, no matter […]

    The post Response Now as Important as Prevention appeared first on McAfee.