McAfee Cloud Single Sign On

McAfee Cloud Single Sign On

Einfacher, sicherer Zugang zu Cloud-Anwendungen

Nächste Schritte:
  • Chat mit McAfee
    Planen Sie eine Neuanschaffung, oder haben Sie vor dem Kauf noch Fragen? Chatten Sie mit einem Experten von McAfee. Die Experten stehen Montag bis Freitag zur Verfügung. Nur in englischer Sprache.
  • Fachhändler suchen
  • Kontakt
  • Rufen: 00800 122 55624

Überblick

McAfee Cloud Single Sign On erspart Benutzern den Aufwand, der mit der Verwaltung der verschiedenen Kennwörter für Cloud-Anwendungen verbunden ist. Mit McAfee Cloud Single Sign On können Sie Unternehmensregeln für den Zugang zu Cloud-Anwendungen durchsetzen. Zudem macht die Lösung Anfragen zum Zurücksetzen von Kennwörtern überflüssig und steigert so die Produktivität von IT-Personal und Anwendern.

Plug-and-Play-Connectoren für Cloud Single Sign On: Nutzen Sie die vorkonfigurierte Integration in hunderte gängige Cloud-Anwendungen, darunter Salesforce.com und Google Apps. Es ist keine Programmierung und kein Kauf zusätzlicher Toolkits erforderlich. Sie müssen nur noch Benutzer auswählen, konfigurieren und Ihrer Cloud-Anwendung zuweisen, und schon können Sie loslegen. Schnelle Implementierung heißt bessere Rendite Ihres Kapitals und schnellere Amortisation. Unterstützt 4 unterschiedliche Authentifizierungsmodelle für maximale Anwendungskompatibilität.

Keine Probleme mit Kennwörtern mehr: Verbessern Sie die Sicherheit im Unternehmen durch Senkung von kennwortbezogenen Risiken beim Cloud-Zugriff, während Sie die Produktivität der IT-Abteilung sowie der Endbenutzer steigern, indem Anfragen zur Kennwortzurücksetzung reduziert werden.

Integrierte starke Authentifizierung: Kunden, die ihre Daten und Anwendungen in die Cloud verlagern möchten, sorgen sich am meisten um die Sicherheit. Cloud Single Sign On bietet mit der branchenweit führenden Lösung McAfee One Time Password eine integrierte Zwei-Faktor-Authentifizierung.

Vollständige Kontrolle über die Nutzung der Cloud-Zugangssicherung: McAfee Cloud Single Sign On gibt der IT-Abteilung die Möglichkeit, den Cloud-Zugang mit Single Sign-On effektiv zu verwalten, Cloud-Anwendungen mithilfe von Active Directory automatisch bereitzustellen und zu deaktivieren, starke Authentifizierung durchzusetzen sowie die Überwachung und Berichterstellung zu konsolidieren.

Hybrid-Bereitstellung: McAfee Cloud Single Sign On kann vor Ort, in der Cloud oder als Hybrid-Variante bereitgestellt werden – zu einem einzigen günstigen Abonnementpreis. Sie können das Bereitstellungsmodell auswählen, das den Anforderungen Ihres Unternehmens am besten entspricht. Dadurch erreichen Sie maximale Flexibilität, ohne die Sicherheit oder Verwaltbarkeit zu gefährden.

NSS Labs Ranks McAfee as a Leader in Security and Value
Take an Integrated Approach to Advanced Threats
Infographic: Real-time Security

Funktionen und Vorteile

Verbessern Sie die Nutzbarkeit und Produktivität über ein Single Sign-on (SSO)

Dank McAfee Cloud Single Sign On ist es nicht mehr nötig, sich mehrere Kombinationen aus Benutzerkennung und Kennwort zu merken. Dabei werden die Sicherheitsvorschriften des Unternehmens durchgesetzt und Anfragen zum Zurücksetzen von Kennwörtern verringert. Dies verbessert die Benutzererfahrung erheblich.

Erweitern Sie den Support für verschiedenste Anwendungen

Die McAfee-Lösung bietet vier unterschiedliche Methoden zur Integration in Ihre Web-Anwendungen und unterstützt Branchenstandards wie SAML, OpenID sowie OAuth. Dadurch wird SSO für zahlreiche unterschiedliche Cloud-Anwendungen und interne Web-Anwendungen ermöglicht.

Verbessern Sie Ihre Sicherheit durch Zwei-Faktor-Authentifizierung

Stärken Sie die Gesamtsicherheit des Anwendungszugangs, und verringern Sie das Risiko von Datenverlust sowie Betrug, indem Sie richtlinienbasierte Authentifizierung erzwingen. McAfee Cloud Single Sign On enthält ein so genanntes One-time Password (OTP)-Modul, mit dem einmalig verwendbare Kennwörter erzeugt werden. Es stellt alles bereit, was Sie zur Umsetzung starker Authentifizierung für Ihre vertraulichen Web-Anwendungen benötigen. Die flexible und benutzerfreundliche McAfee One Time Password Pledge-App – verfügbar in den Varianten für SaaS und Vor-Ort-Einsatz – bietet OTP-Funktionen für beliebige Smartphones (z. B. iPhone oder Android) oder PC (Windows oder Mac). Zu den weiteren OTP-Bereitstellungsoptionen gehören Token per SMS-Textnachricht, E-Mail, Sofortnachricht und USB sowie Unterstützung für Intel Identity Protection Technology (IPT) von Intel-Prozessoren.

Erhöhen Sie die Produktivität durch automatisierte Bereitstellung

Verbessern Sie die Produktivität, und verringern Sie die Ausfallzeiten durch automatische Bereitstellung und Deaktivierung von Cloud-Konten, die mit Ihrem Unternehmensverzeichnis synchronisiert sind. Geschäftsregeln bieten Ihnen die Möglichkeit, neue Benutzer anhand individueller Identitätsattribute schnell und einfach hinzuzufügen und sie bestimmten Anwendungen zuzuweisen. Änderungen an Benutzerattributen werden automatisch mit Cloud-Anwendungskonten synchronisiert. Cloud-Konten werden automatisch deaktiviert, wenn Benutzer aus dem Unternehmensverzeichnis entfernt werden. Dies dient der Sicherheit, da frühere Benutzer nicht mehr auf sensible Daten zugreifen können. Zudem werden dadurch Compliance-Vorschriften erfüllt. Durch die Erkennung nicht autorisierter oder verwaister Konten kann sichergestellt werden, dass SaaS-Benutzerkonten mit den Regeln übereinstimmen und die Anwendung nur zulässige Konten enthält.

Anwenderberichte von Kunden

Beverly Hills Wealth Management (BHWM)

McAfee Cloud Single Sign On ist speziell an die Anforderungen von BHWM angepasst. Zudem erfüllt das System die Bedürfnisse interner sowie externer Benutzer und bietet Optionen zur Bereitstellung/Deaktivierung sowie Funktionen für standardbasiertes SSO.

Kernpunkte
  • Verbesserung der Bedienbarkeit für Endbenutzer sowie von deren Produktivität
  • Stärkere Sicherheit durch Beschränkung auf ein einzelnes Kennwort sowie Nutzung von SAML für zentralisiertes SSO
  • Flexibilität durch einfache und schnelle Bereitstellung neuer SaaS-Lösungen je nach Unternehmenswachstum
  • Integration in Unternehmensidentitäts-Repositories für automatische Bereitstellung/Deaktivierung
  • Lösung für eine kostengünstige, gehostete Hybrid-Cloud-Umgebung

Vollständigen Anwenderbericht lesen

Messmer Catholic Schools

McAfee Cloud Single Sign On dient als SSO-Anmeldeseite und Portal für Messmer Catholic Schools und ermöglicht die nahtlose Integration in Google Apps for Education.

Kernpunkte
  • Verringerter Aufwand für die IT bei der Kontenverwaltung
  • Weniger kennwortbezogene Anrufe beim Helpdesk
  • Effizienterer und benutzerfreundlicher Zugriff auf SaaS-Anwendungen für Mitarbeiter und Schüler

Vollständigen Anwenderbericht lesen

Platinum Group

Sicheres Single Sign-On ermöglicht die Migration in die Cloud

Kernpunkte
  • Sehr gute Benutzerakzeptanz der SaaS-Lösung, da die Benutzer nur einmal Anmeldeinformationen eingeben müssen
  • Stärkere Sicherheit durch Nutzung von SAML-Token nach Branchenstandard
  • Integration in Unternehmensidentitäts-Repositories für automatische Bereitstellung/Deaktivierung

Vollständigen Anwenderbericht lesen

Senior Service America, Inc.

McAfee konnte in weniger als einer Stunde in der Testumgebung ein McAfee Cloud Single Sign On-System einrichten. Dadurch war es Senior Service America möglich, SSO für das eigene Partnerportal einzurichten.

Kernpunkte
  • Verbesserung der Bedienbarkeit für Endbenutzer durch den Komfort von SSO
  • Möglichkeit zum einfachen Hinzufügen weiterer SaaS-Lösungen zum Portal zu einem späteren Zeitpunkt
  • Funktionen zur schnellen Bereitstellung
  • Unterstützung rund um die Uhr durch branchenweit führende IT-Anbieter auf der ganzen Welt
  • Bereitstellung und Deaktivierung für Kostensenkung und Verbesserung der IT-Effizienz

Vollständigen Anwenderbericht lesen

Systemanforderungen

Die folgenden Angaben sind die Mindestanforderungen an die Systeme. Die tatsächlichen Anforderungen können je nach Art der Umgebung abweichen.

  Management-Konsole Anwendungsportal
Desktop-Browser
(On-Premise Edition)
Firefox 5, Internet Explorer 8 Chrome 16, Firefox 5,
Internet Explorer 7, Safari 5.1.2
Desktop-Browser
(SaaS Edition)
  IE 9 IE 10 Firefox Chrome
OS X 10.7     X X
Windows 8   X X X
Windows 7 X X X X
Windows Vista X   X X
Windows XP     X X
Mobilgeräte-Browser
(On-Premise Edition)
Nicht unterstützt Android 2.0,
iOS-Geräte und Safari-Browser
Server
(On-Premise Edition)
Windows Server 2003, 2008 oder 2008 R2;
Red Hat Enterprise Linux Server und
Advanced Platform 5.0
32-Bit- oder 64-Bit-Version
Hardware
(On-Premise Edition)
Jeder Intel-Mehrkern-Server-Prozessor
2 GB Arbeitsspeicher

Demos und Videos

Demos

Network Security Platform uses multiple detection engines to alert on today’s stealthy malware.

Use event correlation and progressive disclosure workflows to prioritize events, improve detection, and speed investigation.

Network Security Platform uses new advanced detection capabilities to uncover both known and unknown botnets.

Network Security Platform includes application visibility and control of over 1,100 applications and protocols.

Learn how McAfee Data Loss Prevention solution aligns data discovery, classification, policy management, and security controls with business requirements and processes.

To learn more about the McAfee product listed above, please view the demonstration.

This demo offers a step-by-step guide to setting up, defining, and publishing policies in McAfee EMM.

Tutorials

Learn how to configure McAfee Network Threat Behavior Analysis through our step-by-step installation tutorial.

After viewing this video, you will know what templates are and how to create them in McAfee Data Loss Prevention.

In this tutorial, you will learn about the challenges faced by data growth and an approach to effective data classification. After viewing this video, you will know how to perform data classification with McAfee Data Loss Prevention.

Videos

McAfee Application Control ensures only trusted applications run on servers and endpoints. It reduces risks from unauthorized software, boosts endpoint control, extends the viability of fixed-function systems without impacting performance, and lowers operating costs.

Outdated methods of malware detection leave crucial data at risk. Learn how McAfee solutions can prevent advanced malware attacks and protect valued assets.

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

McAfee Cloud Single Sign On relieves the pain that end users have managing multiple passwords for cloud applications.

Ensure continuous compliance. McAfee Configuration Control prevents unauthorized changes on critical servers, boosts visibility into your environment, and streamlines internal and external IT audit processes.

McAfee Content Security Blade Server protects enterprise networks from spam, malware, and other intrusions with a single, high-performance solution. Based on next-generation blade server architecture, Content Security Blade Server reduces IT costs, cuts complexity, and easily scales by inserting additional scanning blades to address future capacity requirements.

In an age of ever-changing technology threats, McAfee helps protect critical infrastructure industries in all sectors with a cloud-to-endpoint security portfolio. Backed by the highest level of Global Threat Intelligence, McAfee delivers real-time visibility, the latest protections, and quick proof of compliance, plus optimized solutions for proprietary SCADA systems.

Learn how Beverly Hills Wealth Management maximized SaaS access to user applications.

Learn why Riverside Healthcare chose McAfee Enterprise Mobility Management (McAfee EMM) to manage the influx of mobile phones and tablets on its network.

Auszeichnungen und Berichte

451 Research: Analysten-Bewertung von McAfee Cloud Identity Manager
Das Marktforschungsunternehmen 451 Research untersuchte McAfee Cloud Single Sign On (früher McAfee Cloud Identity Manager) sowie die McAfee-Strategie für Identitäts- und Zugangsverwaltung genauer und kam dabei zu dem Schluss, dass "…die Lösung – von der Geräte-Hardware bis zur Cloud – auf einer soliden Grundlage beruht."

SC Magazine: Produktanalyse zu McAfee Cloud Identity Manager
Das SC Magazine bewertet McAfee Cloud Identity Manager mit 4,75 von 5 Sternen. "...wir haben festgestellt, dass McAfee Cloud Identity Manager das Geld wert ist."

News und Veranstaltungen

Ressourcen

Berichte

Tolly Test Report – Leveraging Peer Communications to Deliver Rapid Response to Security Threats in Large, Distributed Environments (English)

Tolly evaluated McAfee Real Time Command and verified its capability to rapidly gather endpoint management data and provide a unified management platform for problem mitigation, in a McAfee commissioned test. Tests showed that McAfee Real Time Command can quickly collect data — 95% of 500 stations were collected in as little as 9 seconds — and effectively manage problem mitigation.

ESG Lab Validation Report: McAfee Next Generation Firewall

This report presents the results of ESG Lab’s hands-on testing of McAfee Next Generation Firewall. The evaluation validates the solution’s capability to deliver scalable, highly available network security that goes beyond the basic requirements of a next-generation firewall.

NSS Labs 2014 Comparative Analysis Report for McAfee Network Security Platform NS-9300 (English)

NSS Labs Ranks McAfee as a Leader in Security and Value.

The Risk of "Free" Endpoint Security (English)

This Analyst Insight demonstrates how security professional can do a better job at communication security-related risks to business decision-makers, and at showing how investments in security controls actually reduces those risks.

McAfee Labs Threats Report: Viertes Quartal 2013

McAfee Labs’ quarterly analysis of key threat topics and trends.

NSS Labs 2013 Product Analysis Report for McAfee Network Security Platform NS-9200 (English)

NSS Labs Ranks McAfee as a Leader in Security and Value.

Report Summary: The Security Industry’s Dirty Little Secret (English)

This report is a summary on how AETs play a critical role in an APT attack is vital to protecting any organization.

The Security Industry’s Dirty Little Secret (English)

One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.

Mobile Security: McAfee Consumer Trends Report (English)

Your mobile device is a beacon, silently sending out your location, account info, device ID, networks used, and the apps and tasks running on your phone. In this third mobile security trends report, McAfee finds that privacy-invading apps dominate the landscape, some containing malware, and many leveraging ad libraries. We compare the sharing behavior of honest and malicious apps, and reveal how malware made more money during 2013. Click here for the complete story.

Advanced Attacks Demand New Defenses (English)

Security threat and response is a vicious circle of escalating (and increasingly cagey) ­attacks and sophisticated (and increasingly costly) defenses. The latest generation of ­malware includes deviously creative evasive techniques crafted to exploit ambiguities in the Internet’s underlying technology, flaws in network software stacks, and limitations of security appliances. In this report, we discuss these techniques, how IT teams can test their level of exposure, and how to detect and block attacks using advanced packet normalization.

Webtorials State-of-the Market Report: Doing Battle with Advanced Malware

While enterprises appear to be aware of advanced malware and its security challenges, the measures to defend against it need some attention and investment. This report presents survey results that gauge enterprise awareness of advanced malware and what’s measures are being taken to defend against it.

Datenblätter

McAfee Firewall/VPN Appliance Comparison (English)

Download a technical comparison of all McAfee Firewall/VPN appliances.

McAfee Next Generation Firewall Appliance Comparison (English)

Download a technical comparison of all McAfee Next Generation Firewall appliances.

McAfee Next Generation Firewall Roles and Licensing Options (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall MIL-320 (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

Additional Subscriptions for McAfee Next Generation Firewall (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee SIEM Supported Devices (English)

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

McAfee Virtual Contexts (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Cloud-Based Security for SMBs

Eine technische Zusammenfassung zum oben genannten McAfee-Produkt finden Sie im entsprechenden Datenblatt.

McAfee Database Activity Monitoring

Eine technische Zusammenfassung zum oben genannten McAfee-Produkt finden Sie im entsprechenden Datenblatt.

McAfee DLP Endpoint

Eine technische Zusammenfassung zum oben genannten McAfee-Produkt finden Sie im entsprechenden Datenblatt.

McAfee Network Security Manager

Eine technische Zusammenfassung zum oben genannten McAfee-Produkt finden Sie im entsprechenden Datenblatt.

McAfee Virtual Patching for Databases

Eine technische Zusammenfassung zum oben genannten McAfee-Produkt finden Sie im entsprechenden Datenblatt.

McAfee Threat Intelligence Exchange (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall

Eine technische Zusammenfassung zum oben genannten McAfee-Produkt finden Sie im entsprechenden Datenblatt.

McAfee Firewall/VPN

Eine technische Zusammenfassung zum oben genannten McAfee-Produkt finden Sie im entsprechenden Datenblatt.

Häufig gestellte Fragen

McAfee Enterprise Mobility Management (McAfee EMM) 12.0 (English)

Get answers to questions about McAfee Enterprise Mobility Management.

Kurzvorstellungen

McAfee Delivers Comprehensive Threat Protection for the Financial Services Industry (English)

This solution brief explains how the McAfee Security Connected approach provides advanced threat protection for the financial services industry and prevents targeted attacks.

Improve the Security of Office 365 (English)

Learn about how McAfee Email Protection solutions can be implemented with Microsoft Office 365 for a comprehensive, layered defense against threats.

Intel Gateway Solutions for the Internet of Things (English)

Discover the connectivity and interoperability benefits of intelligent gateways

Improve Visibility and Control of Endpoints—Including Managed and BYOD (English)

ForeScout CounterACT integrates with McAfee ePO and ESM to provide this information in realtime for both managed and unmanaged hosts.

McAfee Advanced Threat Defense: Services solutions for Managed Service Providers (MSP) (English)

IT organizations are focused on shifting budgets from capital expenditures (CAPEX) to operational expenditures (OPEX) in an environment where in-house investments can easily get outpaced by an increasingly sophisticated cybercrime ecosystem. McAfee Advanced Threat Defense can help you to differentiate your services and protect customers against zero-day attacks by offering the industry’s most comprehensive threat protection.

McAfee Network Security Platform: Services Solutions for Managed Service Providers (MSP) (English)

With attacks on the rise, IT budgets constrained, and experienced security personnel in short supply, businesses are looking to Managed Service Providers to help fill the gap. McAfee Network Security Platform is uniquely intelligent and purpose-built to offer unmatched protection, performance, and multitenant scale for your intrusion prevention system (IPS) services.

McAfee Next Generation Firewall: Services solutions for Managed Service Providers (MSP) (English)

With threats from cyberattacks on the rise and access to advanced skill sets in short supply, organizations are looking to Managed Service Providers to outsource and fill the gap. McAfee Next Generation Firewall offers the advanced security, flexibility, and multitenant control needed to protect businesses while growing yours.

Rapid Incident Response with McAfee Real Time Command

McAfee Real Time Command provides the precision necessary for rapid incident response to defuse risky situations, without requiring substantial knowledge of systems software or deep forensics training. Security administrators can now collect information and take action assuredly and quickly—in seconds.

Security Awareness with McAfee Real Time Command

McAfee Real Time Command provides instant visibility into the security posture and activities of hosts throughout your network. Using the simplicity of plain English, your administrators can query hosts for the current state of their security and then take action and set automated tasks to reduce risk, improve compliance, and protect against data loss.

Systems Management with McAfee Real Time Command

McAfee Real Time Command provides fast data access and automated tools to help you improve and maintain your security and compliance posture.

Whitepaper

Evolving HBSS to Protect and Enable the Modern Warfighter’s Mission (English)

This paper will examine the future of HBSS and make measurable, tangible recommendations to not only increase overall security and capabilities, but also to lessen the management burden, lower the overall total cost of ownership, allow for better results, particularly in D-DIL environments, and allow JIE real-time operational control over HBSS assets.

Signature-less IPS: Secure Beyond the Signature

Learn how the McAfee signature-less intrusion prevention system (IPS) technology is changing the way malware is detected and blocked. Signature-based detection provides an important foundation for intrusion inspection, but a layered signature-less architecture greatly enhances malware detection and reduces the risk. Read about the seven signature-less detection methods McAfee offers and how they are transforming IPS.

Beyond Layer-7 Visibility: A Simpler Path to Endpoint Intelligence (English)

Security products with layer-7 visibility are great. But in order to dramatically improve your understanding of security events, you need to extend your vision to the specific application processes responsible for initiating a connection. It’s something we call Beyond Layer-7 Visibility.

Network Management and Operational Efficiency (English)

In this white paper, we look at how McAfee Security Management Center, which is included in McAfee Next Generation Firewall, enables IT administrators to be more efficient, especially as their networks increase in complexity. Simple, scalable, and cost effective, McAfee Security Management Center has received consistently high customer satisfaction ratings over the past 10 years.

Improving Security Management with Real-Time Queries (English)

As threats become more stealthy and persistent, understanding organizational security posture at all times and reacting quickly to potential attacks becomes paramount. In this report SANS reviews McAfee Real Time products, exploring several use cases with a focus on features and ease of use.

Microsoft Office 365 for the Enterprise: How to Strengthen Security, Compliance and Control - Osterman Research (English)

Despite the range of functionality offered in Office 365, like any cloud-based offering, it cannot be all things to all customers. There are some missing features in Office 365 that will prompt some customers to consider the use of third-party, cloud-based, or on-premise tools to enhance Office 365’s native capabilities. In this white paper, Osterman Research dives into the current limitations of Office 365 with recommendations on how organizations can strengthen security, compliance, and control in their environment.

Build a Better Sandbox (English)

As malware becomes more sophisticated and evasive, new technologies are emerging to uncover threats no matter how well they’re camouflaged. This white paper proposes a logical design strategy for dynamic malware analysis that optimizes detection effectiveness, efficiency, and economics.

Security Management 2.5 – Replacing Your SIEM Yet? (English)

This paper will walk you through the entire process — from soup to nuts — of evaluating, selecting, and deploying a SIEM. It offers pragmatic advice on how to get it done based on years working through this process as both consumers and vendors of SIEM technology. The process is not always painless, but we are certain it will help you avoid foundering on bad technology and inter-office politics. You owe it to yourself and your organization to ask the right questions and to get answers. It is time to slay the sacred cow of your substantial SIEM investment, and to figure out your best path forward.

New Mcafee Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection (English)

This white paper discusses the latest version of the flagship McAfee Gateway Anti-Malware technology and how it adapts to new threats and sets the stage to protect against future threats with a modular design that allows for the easy addition of components for maximum flexibility.

Select a Secure Web Gateway (English)

This white paper describes a wide range of Internet-based attack methods and explains how McAfee Web Protection technology helps protect against them.

Next-Generation Availability and Scalability (English)

In today’s dynamic economic climate, network availability and performance is more important than ever before. An enterprise’s success is dependent on a well-functioning, secure network. Instead of a bolt-on approach to network security, built-in network availability and performance solutions such as McAfee Next Generation Firewall can simplify network security while boosting performance and keeping costs down.

Advanced Targeted Attacks: It Takes a System (English)

Adaptive intelligence and real-time communications orchestrate protection in the McAfee Security Connected Platform.

Protect Against Advanced Evasion Techniques — Essential Design Principles (English)

Cybercriminals are increasingly exploiting vulnerabilities in network security systems at a greater rate than ever before. Learn how to protect against advanced evasion techniques (AETs) and avoid becoming a victim.

Community

Blogs

  • The Security Impact of Shadow IT: December #SecChat
    McAfee Enterprise - Dezember 5, 2013
    Is something dangerous lurking in the shadows of your organization? That’s the question we sought to answer by commissioning Stratecast to research the use of unauthorized Software-as-a-Service (SaaS) applications in the workplace. The findings revealed that widespread risk for companies is originating from the use of unauthorized apps within the workplace. According to the study, […]
  • Taking Shadow IT Out of the Shadows
    Lynda Statdtmueller - Dezember 4, 2013
    Look around your office. Flip through your business contact list. Chances are that four out of five of your colleagues are violating company IT rules. This startling revelation comes from a recent Software-as-a-Service (SaaS) survey conducted by Stratecast and sponsored by McAfee. The survey set out to examine “shadow IT,” defined as employees’ use of […]
  • Is There Something Phishy In Your Inbox?
    David Bull - November 20, 2013
    Phishing is a widespread problem. According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. Can you tell if this email is legitimate or not? Think about this: How many packages does your company receive in a typical day? Likely […]
  • How Much Are Your Assets Worth?
    Cybermum Australia - September 26, 2013
    Now, if your tax returns are up to date and you have a healthy relationship with a financial planner, I have no doubt you could answer this question in an instant. But what about your other assets? And I am not referring to your children because clearly they are priceless – most of the time!! […]
  • Hackers are Cashing in on Instagram Likes
    Gary Davis - September 9, 2013
    They say popularity has its price. This saying holds a new weight when it comes to the growing influence of social media. In fact, your “Likes” may be worth more to hackers than your credit card number. As counterintuitive as it may seem, your social clout has become the new target of hackers. And they’re […]