McAfee Cloud Single Sign On

Inicio de sesión único en la nube de McAfee

Simplifique y proteja el acceso a las aplicaciones de la nube.

Próximos pasos:

Descripción general

McAfee Cloud Single Sign On acaba con los quebraderos de cabeza que representa para los usuarios finales tener que gestionar numerosas contraseñas para las aplicaciones de Internet. McAfee Cloud Single Sign On permite aplicar los criterios empresariales al acceso a las aplicaciones web y mejora la productividad de los responsables de TI y los usuarios finales gracias a la eliminación de los requisitos de restablecimiento de contraseñas.

Conectores a Internet listos para usar: consiga una integración inmediata con las aplicaciones de la Web más populares, como Salesforce.com y Google Apps. No es necesario codificarlo ni adquirir ninguna herramienta. Todo lo que tiene que hacer es escoger, configurar y asignar usuarios a la aplicación de la nube. La implementación inmediata se traduce en una mayor rentabilidad de la inversión y menor tiempo de amortización. Admite cuatro modelos de autenticación distintos, por lo que proporciona el rango más amplio de cobertura de aplicaciones.

Elimine las preocupaciones por las contraseñas: reduzca los riesgos relacionados con las contraseñas de acceso a la nube para reforzar la seguridad corporativa y reduzca las solicitudes de restablecimiento de contraseñas para aumentar la productividad de TI y los usuarios.

Autenticación robusta incorporada: la seguridad es la mayor preocupación que mencionan los clientes acerca de la migración de los datos y las aplicaciones a la nube. Cloud Single Sign On proporciona una autenticación de dos factores incorporada, basada en la solución líder del sector McAfee One Time Password.

Recupere el control del ciclo de vida de la seguridad del acceso a la nube: McAfee Cloud Single Sign On permite a TI gestionar con eficacia el acceso a la nube gracias al inicio de sesión único, el aprovisionamiento y desaprovisionamiento de las aplicaciones de la nube con Active Directory, la autenticación robusta y la supervisión y generación de informes consolidadas.

Opción de despliegue híbrido: McAfee Cloud Single Sign On puede desplegarse in situ, en la nube o de ambas formas, todo a un precio de suscripción bajo. La posibilidad de elegir el modelo de despliegue que mejor se adapte a las necesidades de cada empresa ofrece la máxima flexibilidad sin poner en peligro la seguridad o la facilidad de administración.

Protect your Azure environment with McAfee Endpoint Security

Learn More

IoAs: Act earlier and more definitively to disrupt attacks

Learn More

Intel Security perspectives:

Get the latest insights from Mike Fey on Dark Reading

Read Now

Características y ventajas

Mejore la facilidad de uso y la productividad a partir de un inicio de sesión único (SSO)

McAfee Cloud Single Sign On mejora la experiencia de los usuarios al eliminar la necesidad de recordar varias combinaciones de identificación de usuario y contraseña. Además, refuerza los requisitos de seguridad corporativos y reduce las solicitudes de restablecimiento de contraseñas.

Compatibilidad ampliada con gran variedad de aplicaciones

Acepta cuatro métodos distintos de integración con las aplicaciones web, tales como los estándares del sector SAML, OpenID y OAuth, así como el inicio de sesión único para una amplia variedad de aplicaciones web internas y de la nube.

Refuerce la seguridad con la autenticación de dos factores.

Fortalezca la seguridad general del acceso a las aplicaciones y reduzca el riesgo de pérdida de datos y fraude con la aplicación de directivas para el uso obligado de la autenticación. McAfee Cloud Single Sign On incluye un módulo OTP (contraseña de un solo uso) que facilita todo lo necesario para implementar una autenticación rigurosa en el acceso a las aplicaciones de la nube. La aplicación Pledge flexible y fácil de usar de McAfee One Time Password —disponible en ediciones in situ y SaaS— entrega la contraseña de un solo uso utilizando cualquier smartphone (iPhone, Android, etc.) o PC (Windows o Mac). Otras opciones para entregar la contraseña de un solo uso son mensajes SMS, correo electrónico, mensajería instantánea y tokens USB. Además admite la tecnología de protección de la identidad (Intel Identity Protection Technology) de los procesadores Intel.

Mayor productividad con aprovisionamiento automático

Aumente la productividad y disminuya el tiempo de inactividad al aprovisionar y desaprovisionar cuentas de la nube de forma sincronizada con el directorio corporativo. Las reglas de negocio permiten incorporar con rapidez y facilidad a los nuevos usuarios y asignarles a aplicaciones específicas en función de sus atributos de identidad. Los cambios de los atributos de los usuarios se sincronizan de forma automática en todas las cuentas de las aplicaciones de la nube. Las cuentas de la nube se deshabilitan de forma inmediata cuando los empleados se eliminan del directorio corporativo, lo que mejora la seguridad al bloquear el acceso de exempleados a los datos confidenciales y facilita el cumplimiento de las normativas. Identifique las cuentas falsas o huérfanas para verificar que las cuentas de usuario SaaS coinciden con la directiva y garantizar que las aplicaciones solo tengan cuentas autorizadas.

Experiencias de los clientes

Beverly Hills Wealth Management (BHWM)

McAfee Cloud Single Sign On no solo puede significar una experiencia de usuario con la marca BHWM, sino que el sistema también se adapta para satisfacer las necesidades de los usuarios internos y externos, con capacidades de habilitación/deshabilitación y capacidades de inicio de sesión único basado en normativas.

Aspectos destacados
  • Más comodidad y productividad de los usuarios
  • Seguridad más sólida al eliminar las numerosas contraseñas y usar SAML para el inicio de sesión único federado.
  • Flexibilidad para agregar con rapidez y facilidad nuevas soluciones SaaS cuando las empresas crecen
  • Integración con los repositorios de identidad corporativos para el aprovisionamiento y desaprovisionamiento automáticos
  • Solución que aprovecha entornos rentables de nube, alojados, híbridos.

Lea el caso práctico completo

Messmer Catholic Schools

McAfee Cloud Single Sign On se utiliza como página y portal de inicio de sesión único de Messmer Catholic Schools y se integra de forma sencilla con Google Apps for Education.

Aspectos destacados
  • Reducción de la carga de TI para el mantenimiento de cuentas
  • Eliminación de las llamadas relacionadas con contraseñas
  • Acceso de los profesores y estudiantes a las aplicaciones SaaS de forma más conveniente y eficaz

Lea el caso práctico completo

Platinum Group

El inicio de sesión único y seguro facilita la migración a la nube

Aspectos destacados
  • Mejor aceptación de la solución SaaS por parte de los usuarios ya que solo tienen que introducir una vez sus credenciales.
  • Solución más robusta gracias al uso de los tokens SAML estándar del sector
  • Integración con los repositorios de identidad corporativos para el aprovisionamiento y desaprovisionamiento automáticos

Lea el caso práctico completo

Senior Service America, Inc.

McAfee instaló en menos de una hora un sistema con McAfee Cloud Single Sign On en el entorno de prueba, lo que permitió que Senior Service America implementara el inicio de sesión único en su portal de partners.

Aspectos destacados
  • Mejor experiencia de usuario final con la comodidad del inicio de sesión único
  • Capacidad de agregar fácilmente más soluciones SaaS al portal a lo largo del tiempo
  • Despliegues más rápidos
  • Soporte 24 horas al día, 7 días a la semana, de los proveedores de TI globales más importantes del sector
  • Aprovisonamiento y desaprovisionamiento para reducir los costes y mejorar la eficacia de TI

Lea el caso práctico completo

Requisitos del sistema

Los siguientes requisitos del sistema son los mínimos. Los requisitos reales variarán según la naturaleza de su entorno informático.

  Consola de gestión Portal de aplicaciones
Firewall para equipos de sobremesa
(On-Premise Edition)
Firefox 5, Internet Explorer 8, Chrome 16, Firefox 5,
Internet Explorer 7, Safari 5.1.2
Firewall para equipos de sobremesa
(SaaS Edition)
  IE 9 IE 10 Firefox Chrome
OS X 10.7     X X
Windows 8   X X X
Windows 7 X X X X
Windows Vista X   X X
Windows XP     X X
Navegador móvil
(On-Premise Edition)
No se admite. Android 2.0,
dispositivos iOS y navegador Safari
Servidor
(On-Premise Edition)
Windows Server 2003, 2008 o 2008 R2;
Red Hat Enterprise Linux 5.4 Server y
Advanced Platform 5.0
32 bits o 64 bits
No aplica
Hardware
(On-Premise Edition)
Cualquier procesador con varios núcleos,
2 GB de RAM

Demostraciones / Vídeos

Demostraciones

Network Security Platform is an intrusion prevention appliance that uses multiple detection engines to alert on today’s stealthy malware.

Use event correlation and progressive disclosure workflows to prioritize events, improve detection, and speed investigation.

Network Security Platform uses new advanced intrusion detection capabilities to uncover both known and unknown botnets.

Network Security Platform includes application visibility and control of over 1,100 applications and protocols.

A core element of any cloud security strategy is the enforcement of acceptable usage policies. See how McAfee Web Protection provides system and network administrators with more than 1,000 application controls to manage user’s access to specific cloud application functions, such as Facebook or YouTube.

Tutoriales

After viewing this video, you will know what action rules are and how to create them in McAfee Data Loss Prevention

Learn how to configure McAfee Network Threat Behavior Analysis through our step-by-step installation tutorial.

After viewing this video, you will know what templates are and how to create them in McAfee Data Loss Prevention.

Vídeos

McAfee Threat Intelligence Exchange integrates, automates, and simplifies to decisively reduce TCO and optimize enterprise security. It eliminates complexity, provides instantaneous speed, and illuminated knowledge that can lower operating costs while streamlining protection and response ― all while freeing valuable security team resources.

Learn how McAfee Advanced Threat Defense works with your current security from network to endpoint to protect against threats.

McAfee Application Control ensures only trusted applications run on servers and endpoints. It reduces risks from unauthorized software, boosts endpoint control, extends the viability of fixed-function systems without impacting performance, and lowers operating costs.

Outdated methods of malware detection leave crucial data at risk. Learn how McAfee solutions can prevent advanced malware attacks and protect valued assets.

Leverage this video to learn how to build consumer trust through online security

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

McAfee Cloud Single Sign On relieves the pain that end users have managing multiple passwords for cloud applications.

Ensure continuous compliance. McAfee Configuration Control prevents unauthorized changes on critical servers, boosts visibility into your environment, and streamlines internal and external IT audit processes.

McAfee Content Security Blade Server protects enterprise networks from spam, malware, and other intrusions with a single, high-performance solution. Based on next-generation blade server architecture, Content Security Blade Server reduces IT costs, cuts complexity, and easily scales by inserting additional scanning blades to address future capacity requirements.

In an age of ever-changing technology threats, McAfee helps protect critical infrastructure industries in all sectors with a cloud-to-endpoint security portfolio. Backed by the highest level of Global Threat Intelligence, McAfee delivers real-time visibility, the latest protections, and quick proof of compliance, plus optimized solutions for proprietary SCADA systems.

Learn how Beverly Hills Wealth Management maximized SaaS access to user applications.

Premios y críticas

451 Research: evaluación de analistas de McAfee Cloud Identity Manager
La empresa de analistas 451 Research examina McAfee Cloud Single Sign On (antes McAfee Cloud Identity Manager) y la estrategia de gestión de la identidad y del acceso de McAfee y llega a la conclusión de que “…las bases tienen un gran alcance, desde el hardware de los dispositivos hasta la nube.”

SC Magazine: análisis de McAfee Cloud Identity Manager
SC Magazine concede a McAfee Cloud Identity Manager 4,75 estrellas de un máximo de 5. "...hemos comprobado que McAfee Cloud Identity Manager es un buena inversión."

Noticias y acontecimientos

Recursos

Fichas técnicas

McAfee Rogue System Detection (English)

This data sheet explains how McAfee Rogue System Detection fully integrates with McAfee ePolicy Orchestrator to provide real-time discovery of rogue systems connected to the network to offer greater network visibility and protection.

McAfee ePO Cloud (English)

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

McAfee 5700 Scan Engine and .DATs (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee Next Generation Firewall Appliance Comparison (English)

Download a technical comparison of all McAfee Next Generation Firewall appliances.

McAfee Firewall/VPN

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee Next Generation Firewall Roles and Licensing Options (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall Modules (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Firewall/VPN Appliance Comparison

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee Security Management Center

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee Next Generation Firewall MIL-320

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

Additional Subscriptions for McAfee Next Generation Firewall

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee Virtual Contexts

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee Next Generation Firewall S-Model Appliance Specifications

Find detailed technical specifications for six models of the McAfee Next Generation Firewall S-series.

Identify Data Risk In Your Organization (English)

Identify the risks to your vital information that exist within your organization so that you can take appropriate measures to prevent exposure and potentially damaging consequences.

McAfee Email Gateway Hardware Appliance Specifications (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Endpoint Protection for SMB

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee SIEM Supported Devices (English)

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

SIEM Solutions from McAfee (English)

Continuously monitor, identify, investigate, and resolve threats.

Informes

When Minutes Count (English)

How experts fight advanced threats with real-time SIEM and identification of eight key indicators of attack.

Network Performance and Security (English)

This report discusses how CIOs and CISOs can avoid risky tradeoffs and boost threat defenses by deploying next-generation firewalls that are built for both security and network performance.

Network Performance and Security Executive Summary (English)

This is the executive summary to the report discussing how CIOs and CISOs can avoid risky tradeoffs and boost threat defenses by deploying next-generation firewalls that are built for both security and network performance.

What's Next: Industry Experts Speak Out on The Network Performance and Security Trade-Off (English)

Industry Experts Speak Out: The Network Performance and Security Trade-Off report is a collection of insights and opinions from network security experts discussing the common and risky tradeoff many organizations are forced to make between network performance and security.

SANS Analytics and Intelligence Survey (English)

This paper explores the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.

Security Value Map — NSS Labs (English)

McAfee NGFW 5206 appliance is compared directly with 11 competitive next-generation firewall products.  Detailed comparisons are provided across the categories of security, performance, and total cost of ownership (TCO) and presented in an aggregated graph.

Throughput and Scalability Report McAfee NGFW 5206 — Miercom (English)

Independent testing lab Miercom performed comprehensive throughput and scalability testing on the McAfee NGFW 5206 appliance. Testing was performed with application control, deep packet inspection, and antivirus enabled, and in configurations of one to four clusters.

McAfee Next Generation Firewall review by Frank Ohlhorst, Enterprise Networking Planet (English)

Threats aimed at corporate entities and enterprises are rapidly evolving, with targeted attacks becoming the norm and advanced persistent threats (APTs) increasing. What's more, APTs have been further fueled by the rise of advanced evasion techniques (AETs), which help APTs bypass firewalls, security appliances, and endpoint security products. The answer to APTs and AETs is advanced next-generation firewall software. This technology review examines the McAfee Next Generation Firewall solution that's designed to quell today's security concerns by combining a plethora of security technologies with obfuscation techniques that successfully thwart attacks.

McAfee Security vs. Network Performance Research (English)

This report explains the results of the Spiceworks Voice of IT survey, which polled more than 500 IT professionals about their organizations’ network security practices compared to performance.

McAfee Next Generation Firewall: Optimize Your Defense, Resilience, and Efficiency (English)

This eBook provides an in-depth overview of the features and benefits of the technologies within McAfee Next Generation Firewall.

NSS Labs Next Generation Firewall Product Analysis — NGF-1402 v5.7.1 (English)

McAfee Next Generation Firewall awarded NSS Labs’ “Recommended” for the third year in a row.

Magic Quadrant for Mobile Data Protection 2014 (English)

McAfee positioned as a leader in Gartner’s Magic Quadrant for Mobile Data Protection.

SANS Report: Critical Security Controls: From Adoption to Implementation (English)

A recent SANS survey provides an in-depth look at the primary industries adopting critical security controls and how they approach implementation.

What's Next: Industry Experts Speak Out on Advanced Evasion Techniques (Europe) (English)

Find out what industry experts from the US and Europe are saying about advanced evasion techniques (AETs). You’ll learn why they are growing concern, why technology alone is not enough to keep them in check, and how they will shape the future of enterprise security.

2014 AV-TEST Comparative Cloud Gateway Test (English)

AV-TEST performed a comparative review of McAfee Web Protection in the Cloud and Websense Cloud Security 2014 and tested each against a set of malicious URLs with zero-day malware to determine their performance against the latest threats on the web.

Libros blancos

SANS White Paper: Be Ready for a Breach with Intelligent Response (English)

How do we get more visibility into attacks across our environments, improve our response, and reduce response time? The solution is automating functions that should be automated and connecting the dots between detection systems and response. Connecting these dots and applying intelligence provides responders rich context into the observed behaviors for taking action. Integrating these processes improves accuracy, while reducing time, manpower, and costs involved in detecting and managing events. This white paper explores how to achieve this.

Calculating the Business Value of Next Generation Firewall — IDC (English)

This white paper articulates the business benefits derived by companies that have deployed a NGFW solution. The data is based on in–depth interviews with eight McAfee customers. These companies were mostly large organizations with an average employee base of 7,082. Interviewees came from a variety of industries — energy, financial services, manufacturing, retail, service provider, technology, and education.

Factory of the Future (English)

This paper discusses, in a question-and-answer format, insights shared by Vice President and Chief Security and Privacy Officer (CSPO) Malcolm Harkins and team members at Intel Corporation and Intel Security on the process of reshaping security for its fabrication plant infrastructure.

Direct or Transparent Proxy: Choose the right configuration for your gateway. (English)

Secure web gateways are essential in today’s connected world, but which proxy configuration should you choose: direct or transparent? This white paper guides you through the pros and cons and makes recommendations that will help you secure your company and your users more effectively.

SANS Survey: Incident Response – How to Fight Back (English)

SANS recently surveyed incident response (IR) teams to get a clearer picture of what they're up against today. The results are in; most organizations lack formalized IR plans, they expressed a need to collect and correlate threat intelligence and SIEM tools are their focus for improving IR capabilities.

Planes detallados de tecnología

Investigate Data Breaches (English)

McAfee enables enterprises to collect, analyze, and preserve security forensic information. With a solution that includes content- and context-aware SIEM, McAfee provides alerts to security events, as well analysis on how the attacked occurred, affected users, and compromised data — so you can better understand the severity of a security breach.

Resúmenes de soluciones

Advanced Threat Defense for Network IPS (English)

Many of today’s unknown, zero-day threats evade traditional signature-based defenses. The addition of third-party sandbox appliances can help, but they have several limitations: high cost of deployment, reliance on a generic virtualized environments, and limited analysis techniques, making the sandbox vulnerable to crafty malware designed to bypass analysis. McAfee Network Security Platform IPS and McAfee Advanced Threat Defense work together to find sophisticated threats, freeze them so they cannot infiltrate, and fix the damage done.

Hybrid Email Security: Maintain privacy while gaining benefits of the cloud (English)

Information confidentiality and reduced configuration flexibility are often cited as reasons for not taking advantage of cloud-based email security. This brief discusses how hybrid security can enable organizations with these concerns to enjoy the benefits of the cloud without sacrifice.

Advanced Threat Defense for Next-Generation Firewalls (English)

Next-generation firewalls certainly offer expanded network security for branch offices and remote locations, but they can’t find and block stealthy, advanced malware. Through the Security Connected approach from McAfee, Advanced Threat Defense and McAfee Next Generation Firewall work hand-in-hand to find and freeze today’s evasive and targeted cyberattacks.

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange (English)

There’s no doubt that organizations face significant challenges protecting their intellectual property and critical assets from the emerging threats that target their environments. This solutions brief highlights how McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight today’s advanced threats.

McAfee Threat Intelligence Exchange and Endpoint Protection (English)

McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threats response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

Security in Unison (English)

McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threat response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange (English)

Deliver Context-Aware, Prioritized Threat Intelligence Across Your Enterprise.

McAfee Threat Intelligence Exchange and Endpoint Protection (English)

Get cutting-edge endpoint visibility, control, and protection.

A Case for the Value of SIEM: The Security Evolution (English)

With the advent of big data, traditional SIEM solutions that focus only on logging and compliance reporting fall short of the demands of today’s enterprises for threat intelligence, correlation, and remediation. McAfee Enterprise Security Manager, the core of the McAfee SIEM solution, is both smart and fast. Its proprietary information management back end, purpose-built for managing big data, offers the critical combination of intelligence and speed.

McAfee Enterprise Security Manager, Services Solutions for Managed Service Providers (MSPs) (English)

McAfee Enterprise Security Manager offers the advanced scalability, flexibility, and control you need to protect your customers’ business, and grow yours.

Comunidad

Blogs

  • The Security Impact of Shadow IT: December #SecChat
    McAfee Enterprise - diciembre 5, 2013
    Is something dangerous lurking in the shadows of your organization? That’s the question we sought to answer by commissioning Stratecast to research the use of unauthorized Software-as-a-Service (SaaS) applications in the workplace. The findings revealed that widespread risk for companies is originating from the use of unauthorized apps within the workplace. According to the study, […]
  • Taking Shadow IT Out of the Shadows
    Lynda Statdtmueller - diciembre 4, 2013
    Look around your office. Flip through your business contact list. Chances are that four out of five of your colleagues are violating company IT rules. This startling revelation comes from a recent Software-as-a-Service (SaaS) survey conducted by Stratecast and sponsored by McAfee. The survey set out to examine “shadow IT,” defined as employees’ use of […]
  • Is There Something Phishy In Your Inbox?
    David Bull - noviembre 20, 2013
    Phishing is a widespread problem. According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. Can you tell if this email is legitimate or not? Think about this: How many packages does your company receive in a typical day? Likely […]
  • How Much Are Your Assets Worth?
    Cybermum Australia - septiembre 26, 2013
    Now, if your tax returns are up to date and you have a healthy relationship with a financial planner, I have no doubt you could answer this question in an instant. But what about your other assets? And I am not referring to your children because clearly they are priceless – most of the time!! […]
  • Hackers are Cashing in on Instagram Likes
    Gary Davis - septiembre 9, 2013
    They say popularity has its price. This saying holds a new weight when it comes to the growing influence of social media. In fact, your “Likes” may be worth more to hackers than your credit card number. As counterintuitive as it may seem, your social clout has become the new target of hackers. And they’re […]