McAfee Cloud Single Sign On

McAfee Cloud Single Sign On

Simplification et sécurisation de l'accès aux applications dans le cloud

Etapes suivantes :

Présentation

McAfee Cloud Single Sign On simplifie le problème de gestion de mots de passe multiples auquel les utilisateurs sont confrontés lors de leur accès aux applications dans le cloud. McAfee Cloud Single Sign On vous permet de mettre en œuvre des normes d'entreprise en matière d'accès aux applications dans le cloud. De plus, il améliore la productivité de l'équipe informatique et des utilisateurs en éliminant les demandes de réinitialisation des mots de passe.

Connecteurs Plug-and-Play pour une authentification unique au cloud — Bénéficiez instantanément d'une intégration avec des centaines d'applications de cloud parmi les plus courantes, telles que Salesforce.com et Google Apps. Tout codage ou achat d'outils supplémentaires est superflu. Il suffit de sélectionner votre application de cloud, de la configurer et d'y affecter des utilisateurs. Une implémentation rapide contribue à un meilleur retour sur investissement et à une rentabilité plus rapide. La prise en charge de quatre modèles d'authentification différents offre la couverture d'applications la plus vaste possible.

Elimination des problèmes de mots de passe — Renforcez la sécurité de l'entreprise en réduisant les risques d'accès au cloud liés aux mots de passe, tout en améliorant la productivité de l'équipe informatique et des utilisateurs en limitant considérablement le nombre de demandes de réinitialisation de mots de passe.

Authentification forte intégrée — La sécurité représente la principale source d'inquiétude exprimée par les clients lorsqu'il s'agit de transférer les données et les applications vers le cloud. McAfee Cloud Single Sign On offre une authentification à deux niveaux intégrée qui repose sur la solution de pointe McAfee One Time Password.

Contrôle complet sur le cycle de sécurisation de l'accès au cloud — McAfee Cloud Single Sign On permet à l'équipe informatique de gérer efficacement l'accès au cloud grâce à une procédure d'authentification unique, à la synchronisation avec Active Directory pour l'activation/désactivation des applications de cloud, à une authentification forte et à des fonctionnalités consolidées de surveillance et de génération de rapports.

Option de déploiement hybride — McAfee Cloud Single Sign On peut être déployé sur site, dans le cloud ou sous forme de solution mixte, dans tous les cas moyennant un abonnement à tarif modéré. La possibilité de sélectionner le modèle de déploiement le mieux adapté aux besoins spécifiques de votre entreprise vous offre une flexibilité maximale sans compromettre la sécurité ou la facilité de gestion.

Fonctions et avantages

Amélioration de la convivialité et de la productivité grâce à une fonction d'authentification unique

McAfee Cloud Single Sign On permet d'appliquer les consignes de l'entreprise et de réduire les demandes de réinitialisation de mots de passe tout en offrant un grand confort d'utilisation à l'internaute, qui ne doit plus mémoriser une multitude de combinaisons ID utilisateur/mot de passe.

Prise en charge étendue à un large éventail d'applications

La prise en charge de quatre méthodes différentes d'intégration avec vos applications web, notamment des standards SAML, OpenID et OAuth, permet la prise en charge de l'authentification unique pour un large éventail d'applications web internes et d'applications de cloud.

Sécurité renforcée grâce à l'authentification à deux niveaux

Renforcez la sécurité globale de l'accès aux applications et limitez le risque de fuites de données et de fraudes grâce à la mise en œuvre de stratégies d'authentification. McAfee Cloud Single Sign On comprend un module OTP (One-Time Password, mot de passe à usage unique) qui vous offre tout ce dont vous avez besoin afin d'implémenter une authentification forte pour vos applications web sensibles. L'application flexible et conviviale McAfee One Time Password Pledge, disponible avec les éditions sur site et SaaS, délivre un mot de passe unique sur smartphone (iPhone, Android, etc.) ou sur ordinateur (Windows ou Mac). La solution offre d'autres options de transmission de mot de passe unique telles que SMS, e-mail, message instantané ou jetons USB, ainsi que la prise en charge de la technologie IPT (Identity Protection Technology) sur les processeurs Intel.

Amélioration de la productivité grâce à la fourniture de services automatisée

Améliorez la productivité et réduisez les temps d'indisponibilité en fournissant ou arrêtant automatiquement les services des comptes de cloud synchronisés avec l'annuaire de l'entreprise. Les règles définies par l'entreprise vous permettent d'intégrer rapidement des nouveaux utilisateurs et de les affecter à des applications spécifiques en fonction des attributs d'identité individuels. Les modifications apportées aux attributs sont automatiquement synchronisées dans tous les comptes des applications dans le cloud. Les comptes de cloud sont automatiquement désactivés lorsque les employés sont supprimés de l'annuaire d'entreprise. La solution améliore ainsi la sécurité en bloquant l'accès des anciens utilisateurs aux données sensibles et en facilitant la mise en conformité réglementaire. Identifiez les comptes orphelins ou non approuvés pour contrôler que les comptes d'utilisateur des services SaaS sont conformes aux stratégies, afin de garantir l'existence des seuls comptes autorisés dans l'application.

Témoignages de clients

Beverly Hills Wealth Management (BHWM)

Non seulement McAfee Cloud Single Sign On offre une expérience personnalisée aux couleurs de BHWM à ses utilisateurs, mais le système peut être adapté aux besoins des utilisateurs internes et externes à l'aide de fonctionnalités d'activation/désactivation de services et d'authentification unique basées sur des standards reconnus.

Points forts
  • Confort et productivité des utilisateurs finaux accrus
  • Sécurité renforcée grâce à l'élimination des mots de passe multiples et à l'utilisation de la norme SAML pour l'authentification unique fédérée
  • Possibilité d'ajouter de nouvelles solutions SaaS de façon simple et rapide pour s'adapter à la croissance de l'entreprise
  • Intégration avec les référentiels d'identités d'entreprise pour l'activation et la désactivation automatisées des privilèges d'accès
  • Solution tirant parti d'un environnement de cloud hybride, hébergé et économique

Lire l'étude de cas complète

Messmer Catholic Schools

McAfee Cloud Single Sign On sert de page et de portail d'authentification unique pour Messmer Catholic Schools, offrant ainsi une intégration transparente avec Google Apps for Education.

Points forts
  • Charge informatique réduite pour la maintenance des comptes
  • Elimination des appels d'assistance technique liés aux mots de passe
  • Accès plus efficace et pratique aux applications SaaS pour le personnel et les étudiants

Lire l'étude de cas complète

Platinum Group

L'authentification unique sécurisée permet la migration vers le cloud

Points forts
  • Haut niveau d'acceptation de la solution SaaS par les utilisateurs car ils ne doivent entrer leurs informations d'authentification qu'une seule fois
  • Sécurité renforcée grâce à l'utilisation de jetons SAML standard
  • Intégration avec les référentiels d'identités d'entreprise pour l'activation et la désactivation automatisées des privilèges d'accès

Lire l'étude de cas complète

Senior Service America, Inc.

McAfee a pu installer un système McAfee Cloud Single Sign On dans l'environnement de test en moins d'une heure, permettant ainsi à Senior Service America de mettre en œuvre l'authentification unique sur son portail Partenaires.

Points forts
  • Confort des utilisateurs finaux accru grâce à la commodité de l'authentification unique
  • Possibilité d'ajouter facilement de nouvelles solutions SaaS au portail au fil du temps
  • Déploiement rapide
  • Support assuré 7 jours sur 7 et 24 heures sur 24 par les meilleurs fournisseurs de services informatiques au monde
  • Activation/désactivation automatique des privilèges d'accès pour des coûts réduits et une efficacité accrue de l'équipe informatique

Lire l'étude de cas complète

Configuration système requise

La configuration système minimale est décrite ci-dessous. La configuration nécessaire dans votre cas varie en fonction de la nature de votre environnement.

  Console de gestion Portail d'applications
Navigateur de bureau
(Edition sur site)
Firefox 5, Internet Explorer 8 Chrome 16, Firefox 5,
Internet Explorer 7, Safari 5.1.2
Navigateur de bureau
(Edition SaaS)
  Internet Explorer 9 Internet Explorer 10 Firefox Chrome
OS X 10.7     X X
Windows 8   X X X
Windows 7 X X X X
Windows Vista X   X X
Windows XP     X X
Navigateur mobile
(Edition sur site)
Non pris en charge Android 2.0,
équipements iOS et navigateur Safari
Serveur
(Edition sur site)
Windows Server 2003, 2008 ou 2008 R2 ;
Red Hat Enterprise Linux Server et
Advanced Platform 5.0
32 ou 64 bits
Non applicable
Matériel
(Edition sur site)
Tout processeur serveur Intel multicœur,
2 Go de RAM

Démonstrations et vidéos

Démonstrations

Network Security Platform uses multiple detection engines to alert on today’s stealthy malware.

Use event correlation and progressive disclosure workflows to prioritize events, improve detection, and speed investigation.

Network Security Platform uses new advanced detection capabilities to uncover both known and unknown botnets.

Network Security Platform includes application visibility and control of over 1,100 applications and protocols.

A core element of any cloud security strategy is the enforcement of acceptable usage policies. See how McAfee Web Protection provides system and network administrators with more than 1,000 application controls to manage user’s access to specific cloud application functions, such as Facebook or YouTube.

Learn how McAfee Data Loss Prevention solution aligns data discovery, classification, policy management, and security controls with business requirements and processes.

Didacticiels

After viewing this video, you will know what action rules are and how to create them in McAfee Data Loss Prevention

Learn how to configure McAfee Network Threat Behavior Analysis through our step-by-step installation tutorial.

After viewing this video, you will know what templates are and how to create them in McAfee Data Loss Prevention.

In this tutorial, you will learn about the challenges faced by data growth and an approach to effective data classification. After viewing this video, you will know how to perform data classification with McAfee Data Loss Prevention.

Vidéos

McAfee Application Control ensures only trusted applications run on servers and endpoints. It reduces risks from unauthorized software, boosts endpoint control, extends the viability of fixed-function systems without impacting performance, and lowers operating costs.

Outdated methods of malware detection leave crucial data at risk. Learn how McAfee solutions can prevent advanced malware attacks and protect valued assets.

Leverage this video to learn how to build consumer trust through online security

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

McAfee Cloud Single Sign On relieves the pain that end users have managing multiple passwords for cloud applications.

Ensure continuous compliance. McAfee Configuration Control prevents unauthorized changes on critical servers, boosts visibility into your environment, and streamlines internal and external IT audit processes.

McAfee Content Security Blade Server protects enterprise networks from spam, malware, and other intrusions with a single, high-performance solution. Based on next-generation blade server architecture, Content Security Blade Server reduces IT costs, cuts complexity, and easily scales by inserting additional scanning blades to address future capacity requirements.

Learn how Beverly Hills Wealth Management maximized SaaS access to user applications.

Learn why Riverside Healthcare chose McAfee Enterprise Mobility Management (McAfee EMM) to manage the influx of mobile phones and tablets on its network.

Distinctions et évaluations

451 Research : Evaluation de McAfee Cloud Identity Manager par un bureau d'études
Le bureau d'études 451 Research s'est penché sur la solution McAfee Cloud Single Sign On (anciennement McAfee Cloud Identity Manager) et sur la stratégie de McAfee en matière de gestion des identités et des accès. Il en a conclu que « la solution repose sur des assises solides à tous les niveaux, des composants matériels jusqu'au cloud. »

SC Magazine : McAfee Cloud Identity Manager — Analyse de produit
SC Magazine octroie 4,75 étoiles sur 5 à McAfee Cloud Identity Manager. « ...selon nous, McAfee Cloud Identity Manager présente un excellent rapport qualité-prix. »

Actualités et événements

Ressources

Brochures

Seriously Powerful Solutions: Security Connected for Critical Infrastructure (English)

The Security Connected framework from McAfee integrates multiple products, services, and partnerships to provide centralized, efficient, and effective risk mitigation. Across IT, SCADA, and ICS, Security Connected addresses endpoint, data, and network security.

Fiches techniques

McAfee Security Suite for Virtual Desktop Infrastructure (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

FISMA Security Control Assessments (English)

Intel Solid State Drive Management with McAfee Real Time Command (English)

McAfee Real Time Command revolutionizes security systems management with immediate visibility into system data and prompt interventions. Using McAfee Real Time Command and the Intel SSD Pro dynamic link library (DLL), IT professionals can more effectively track the health of Intel SSD Pro 1500 Series Opal-compliant drives and take proactive measures to reduce customer downtime.

McAfee Next Generation Firewall Roles and Licensing Options (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Network Threat Response on CloudShield CS-4000 (English)

For a technical summary of the CloudShield product listed above, please view the product data sheet and learn how McAfee Network Threat Response on the CloudShield CS-4000 platform complements your existing network defenses.

McAfee SIEM Supported Devices (English)

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

McAfee Firewall/VPN Appliance Comparison (English)

Download a technical comparison of all McAfee Firewall/VPN appliances.

McAfee SaaS Web Protection (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall Appliance Comparison (English)

Download a technical comparison of all McAfee Next Generation Firewall appliances.

Evader

Pour un compte rendu technique sur le produit McAfee présenté ci-dessus, veuillez consulter la fiche technique correspondante.

McAfee Advanced Threat Defense

Pour un compte rendu technique sur le produit McAfee présenté ci-dessus, veuillez consulter la fiche technique correspondante.

McAfee Enterprise Authentication (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

Livres blancs

Preventing Targeted Attacks with McAfee's Advanced Threat Defense (English)

In this white paper, IDC outlines McAfee Advanced Threat Defense (ATD) within the context of the specialized threat analysis and protection market. Our centralized approach to malware analysis, deep integrations across the product portfolio, and three-pronged focus on "Find, Freeze, Fix" as a way of dealing with threats is unique within the market and provides a more holistic approach than other detection-oriented products.

Strengthening Security, Control, and Compliance for Retail OEMs and Their Customers (English)

This white paper provides retail OEMs and their customers with insights into the technologies that are part of the McAfee embedded security solution, along with security, management, and compliance benefits made possible by shipping retail devices with security built in. You’ll learn how this integrated solution goes beyond device protection and extends security across the entire retail environment.

Conquer the Top 20 Critical Security Controls (English)

The strength of the Critical Security Controls (CSCs) is their ability to reflect the consensus of successful experiences captured and refined over multiple revisions. The CSCs help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

Jackpot! Money Laundering Through Online Gambling (English)

This in-depth report details a common way in which cyber thieves launder money – through online gambling sites.

Jackpot! Money Laundering Through Online Gambling — Executive Summary (English)

This Executive Summary highlights a common way in which cyber thieves launder money – through online gambling sites.

Evolving HBSS to Protect and Enable the Modern Warfighter’s Mission (English)

This paper will examine the future of HBSS and make measurable, tangible recommendations to not only increase overall security and capabilities, but also to lessen the management burden, lower the overall total cost of ownership, allow for better results, particularly in D-DIL environments, and allow JIE real-time operational control over HBSS assets.

Signature-less IPS: Secure Beyond the Signature (English)

Learn how the McAfee signature-less intrusion prevention system (IPS) technology is changing the way malware is detected and blocked. Signature-based detection provides an important foundation for intrusion inspection, but a layered signature-less architecture greatly enhances malware detection and reduces the risk. Read about the seven signature-less detection methods McAfee offers and how they are transforming IPS.

Beyond Layer-7 Visibility: A Simpler Path to Endpoint Intelligence (English)

Security products with layer-7 visibility are great. But in order to dramatically improve your understanding of security events, you need to extend your vision to the specific application processes responsible for initiating a connection. It’s something we call Beyond Layer-7 Visibility.

Network Management and Operational Efficiency (English)

In this white paper, we look at how McAfee Security Management Center, which is included in McAfee Next Generation Firewall, enables IT administrators to be more efficient, especially as their networks increase in complexity. Simple, scalable, and cost effective, McAfee Security Management Center has received consistently high customer satisfaction ratings over the past 10 years.

Improving Security Management with Real-Time Queries (English)

As threats become more stealthy and persistent, understanding organizational security posture at all times and reacting quickly to potential attacks becomes paramount. In this report SANS reviews McAfee Real Time products, exploring several use cases with a focus on features and ease of use.

Microsoft Office 365 for the Enterprise: How to Strengthen Security, Compliance and Control - Osterman Research (English)

Despite the range of functionality offered in Office 365, like any cloud-based offering, it cannot be all things to all customers. There are some missing features in Office 365 that will prompt some customers to consider the use of third-party, cloud-based, or on-premise tools to enhance Office 365’s native capabilities. In this white paper, Osterman Research dives into the current limitations of Office 365 with recommendations on how organizations can strengthen security, compliance, and control in their environment.

Operational Efficiencies of Proactive Vulnerability Management (English)

Learn how automating and integrating Vulnerability Management Activities can reduce the operational cost of vulnerability management.

Présentations de solution

McAfee Next Generation Firewall: Complete IPS Technology (English)

McAfee Next Generation Firewall provides comprehensive IPS capabilities, including a flexible deployment options (hardware, software, or virtual appliances), evasion-proof detection against today’s most advanced attacks, broad inspection coverage, and much more.

SIEM Compliance Made Easy (English)

The McAfee SIEM solution, Enterprise Security Manager, addresses today’s complex compliance challenges by combining an established unified compliance framework with superior abilities to collect, retrieve, and protect the data required to assess and demonstrate compliance in real time. It’s tightly integrated log collection, management, analysis, and reporting improves an organization’s ability to meet compliance requirements through frameworks, streamlined workflow, and automation.

Securing the Internet of Things (English)

The Internet of Things (IoT, or Internet-connected smart devices) is rapidly changing the way we live and the way we do business. McAfee is working closely with OEMs to address the expanding security requirements of IoT devices for every layer—devices, connections, the cloud, and data centers.

McAfee Delivers Comprehensive Threat Protection for the Financial Services Industry (English)

This solution brief explains how the McAfee Security Connected approach provides advanced threat protection for the financial services industry and prevents targeted attacks.

Advanced Threat Defense for Network IPS (English)

Many of today’s unknown, zero-day threats evade traditional defenses like intrusion prevention systems (IPS). The addition of third-party sandbox appliances can help, but they have several limitations: high cost of deployment, reliance on a generic virtual execution environment that may overlook target-specific attacks, and reliance solely on dynamic analysis, making the sandbox vulnerable to malware can detect secure environments and delay execution. McAfee Network Security Platform IPS and McAfee Advanced Threat Defense work together to find sophisticated threats, freeze them so they cannot infiltrate, and fix the damage done.

Advanced Threat Defense for the Email Gateway (English)

Email is a vital communication vehicle for just about every business these days—and it is also a key threat vector for cybercrooks who are looking to steal valuable data or execute inbound attacks. As part of our unified, integrated Security Connected framework, McAfee Email Gateway and McAfee Advanced Threat Defense work together to find and freeze new, unknown, and stealthy advanced threats. For a complete end-to-end solution, add McAfee Real Time to the mix to quickly identify and fix systems impacted by advanced malware.

McAfee Advanced Threat Defense for McAfee Web Gateway (English)

Social networks, cloud applications, and content-sharing sites have become essential business tools and IT organizations are struggling to make them safely accessible from inside and outside the corporate environment. Read this Solution Brief and see how McAfee Threat Defense for McAfee Web Gateway helps overcome the obstacles.

Smarter BYOD (English)

As Gartner predicts, BYOD is here to stay and will soon become the rule rather than the exception. Users are eager to embrace the trend, but IT is reticent for good reason. This solution brief shows IT how to successfully get a handle on BYOD with a scalable strategy and integrated solutions that fall under the umbrella of the Security Connected framework from McAfee.

Solutions SIEM : cinq impératifs pour résoudre les grands défis des entreprises d'aujourd'hui

McAfee spoke with SIEM users and asked them to tell us about their primary issues with SIEM. This brief lists the top five issues along with corresponding customer case studies and use cases.

Real-Time Forensics Takes Network Security to the Power of Two (English)

NIKSUN's NetDetector/NetDetectorLive expands security monitoring by combining signature-based intrusion detection system (IDS) functionality with statistical anomoly detection, analytics, and deep forensics with web reconstruction and packet-level decodes.

Improve the Security of Office 365 (English)

Learn about how McAfee Email Protection solutions can be implemented with Microsoft Office 365 for a comprehensive, layered defense against threats.

Renforcer la sécurité d'Office 365

Learn about how McAfee Email Protection solutions can be implemented with Microsoft Office 365 for a comprehensive, layered defense against threats.

Intel Gateway Solutions for the Internet of Things (English)

Discover the connectivity and interoperability benefits of intelligent gateways

Improve Visibility and Control of Endpoints—Including Managed and BYOD (English)

ForeScout CounterACT integrates with McAfee ePO and ESM to provide this information in realtime for both managed and unmanaged hosts.

McAfee Advanced Threat Defense: Services solutions for Managed Service Providers (MSP) (English)

IT organizations are focused on shifting budgets from capital expenditures (CAPEX) to operational expenditures (OPEX) in an environment where in-house investments can easily get outpaced by an increasingly sophisticated cybercrime ecosystem. McAfee Advanced Threat Defense can help you to differentiate your services and protect customers against zero-day attacks by offering the industry’s most comprehensive threat protection.

Rapports

McAfee Advanced Threat Defense Test Results (English)

AV-TEST performed a test of the McAfee Advanced Threat Defense appliance to determine its malware detection capabilities.

McAfee Positioned in Leaders Quadrant of the Magic Quadrant for SIEM (English)

Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Leading analyst firm Gartner has placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.

[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]

McAfee Positioned in the Leaders Quadrant for 2014 Magic Quadrant for Secure Web Gateways (English)

Leading analyst firm Gartner has placed McAfee as a Leader in the Magic Quadrant for Secure Web Gateways.

Secure Web Gateways (SWGs) utilize an advanced array of techniques, such as URL filtering, malware detection and application control technology, to protect organizations and enforce Internet policy compliance. The evolving threat landscape has forced SWG vendors to respond by adding technologies to defend against advanced threats and in this Magic Quadrant Gartner analyzes each vendor’s approach to advanced threat defense.

ESG Lab Validation Report: McAfee Advanced Threat Defense (English)

This ESG Lab Validation report documents hands-on testing of McAfee Advanced Threat Defense, a key component of McAfee’s end-to-end solution for addressing advanced malware. Testing was designed to explore how the solution accurately detects advanced malware using a layered approach, the speed and effectiveness of responding to an attack, and the operational efficiencies of this integrated solution.

Rapport — Grands volumes de données, ou comment chercher une aiguille dans une botte de foin

Big data is changing the face of the global business landscape with few technologies left untouched by the opportunities it presents and information security is no different.

eBook: Securing the Evolving Datacenter (English)

This report highlights ways security technologies and services are evolving to provide the visibility and control needed to deploy workloads flexibly in the evolving datacenter, which spans both private and public clouds.

NSS Labs Enterprise EPP Comparative Analysis, Socially Engineered Malware (English)

Learn about why NSS Labs ranked McAfee as the top vendor for endpoint protection products for socially engineered malware protection, exploit protection, and phishing protection.

Tolly Test Report – Leveraging Peer Communications to Deliver Rapid Response to Security Threats in Large, Distributed Environments (English)

Tolly evaluated McAfee Real Time Command and verified its capability to rapidly gather endpoint management data and provide a unified management platform for problem mitigation, in a McAfee commissioned test. Tests showed that McAfee Real Time Command can quickly collect data — 95% of 500 stations were collected in as little as 9 seconds — and effectively manage problem mitigation.

ESG Lab Validation Report: McAfee Next Generation Firewall

This report presents the results of ESG Lab’s hands-on testing of McAfee Next Generation Firewall. The evaluation validates the solution’s capability to deliver scalable, highly available network security that goes beyond the basic requirements of a next-generation firewall.

NSS Labs 2014 Comparative Analysis Report for McAfee Network Security Platform NS-9300 (English)

NSS Labs Ranks McAfee as a Leader in Security and Value.

Communauté

Blogs

  • The Security Impact of Shadow IT: December #SecChat
    McAfee Enterprise - décembre 5, 2013
    Is something dangerous lurking in the shadows of your organization? That’s the question we sought to answer by commissioning Stratecast to research the use of unauthorized Software-as-a-Service (SaaS) applications in the workplace. The findings revealed that widespread risk for companies is originating from the use of unauthorized apps within the workplace. According to the study, […]
  • Taking Shadow IT Out of the Shadows
    Lynda Statdtmueller - décembre 4, 2013
    Look around your office. Flip through your business contact list. Chances are that four out of five of your colleagues are violating company IT rules. This startling revelation comes from a recent Software-as-a-Service (SaaS) survey conducted by Stratecast and sponsored by McAfee. The survey set out to examine “shadow IT,” defined as employees’ use of […]
  • Is There Something Phishy In Your Inbox?
    David Bull - novembre 20, 2013
    Phishing is a widespread problem. According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. Can you tell if this email is legitimate or not? Think about this: How many packages does your company receive in a typical day? Likely […]
  • How Much Are Your Assets Worth?
    Cybermum Australia - septembre 26, 2013
    Now, if your tax returns are up to date and you have a healthy relationship with a financial planner, I have no doubt you could answer this question in an instant. But what about your other assets? And I am not referring to your children because clearly they are priceless – most of the time!! […]
  • Hackers are Cashing in on Instagram Likes
    Gary Davis - septembre 9, 2013
    They say popularity has its price. This saying holds a new weight when it comes to the growing influence of social media. In fact, your “Likes” may be worth more to hackers than your credit card number. As counterintuitive as it may seem, your social clout has become the new target of hackers. And they’re […]