McAfee Content Security Blade Server

McAfee Content Security Blade Server

The ultimate in email and web security performance

Next Steps:

Overview

McAfee Content Security Blade Server defends enterprise networks against spam, malware, and other intrusions with a single high-performance solution. It enables safe employee access to Web 2.0 applications and email, while maintaining complete control of security. Content Security Blade Server has an easily expandable architecture and flexible management that lowers IT costs.

Unmatched security — Content Security Blade Server takes protection to a new level with advanced zero-day and targeted attack exploit detection. Detect Web 2.0 malicious mobile code in real time, and stop spyware, inappropriate web content, phishing, viruses, worms, Trojans, spam, and other malware threats, both known and unknown, from entering the network.

Scalable and cost-effective protection — Need more performance? You can just add blades. Content Security Blade Server instantly recognizes and configures new blades, and adds them to the pool of shared resources. There's no need to rearchitect your network or worry about balancing the load — the system does it all for you.

A single powerful solution — Content Security Blade Server integrates server, storage, networking, and power management into a single solution you can manage as a unified environment. It automatically responds to fluctuating traffic demand and incorporates wire speed load balancing for traffic distribution.

Flexible management — Protect your email or web infrastructure separately or take full advantage of Content Security Blade Server's flexibility to cover both with a single system. Easily add features and capacity without costly downtime, simplify multi-appliance or server deployments, and streamline ongoing maintenance with a single enclosure.

Features & Benefits

Secure your network

Take advantage of the industry's best anti-malware protection to proactively filter out objectionable content from web traffic in real time and get true context-based threat detection. Enhanced behavioral detection finds Web 2.0 malicious mobile code, while advanced zero-day and targeted attack exploit detection works without a signature, regardless of media or content type.

Regain control

Block 99% of spam with McAfee Content Security Blade Server's powerful combination of detection technologies and streaming updates.

Get instant insight

Monitor overall system status easily with a convenient, at-a-glance system dashboard and status indicators.

Gain complete security & extensibility on demand

Turn on different features when you need them. Email protection includes anti-spam, virus removal, anti-phishing, and content filtering. Web protection includes URL filtering, anti-malware, anti-virus, anti-spyware, SSL scanning, and content inspection.

Go green & reduce costs

Use up to 40% less power and 40% less space when compared to equivalent 1U rack-mounted servers.

System Requirements

The McAfee Content Security Blade Server is a self-contained device. For additional product specifications, see the Content Security Blade Server data sheet.

Demos / Tutorials

Demos

Learn how McAfee Content Security Blade Server solves the complex problems of infrastructure security by using a single appliance from a single vendor.

Tutorials

For guidance on how to use Content Security Blade Server, watch this Quick Tips video.

Resources

Data Sheets

McAfee Content Security Blade Server

For a technical summary on the McAfee product listed above, please view the product data sheet.

Community

Blogs

  • Heartbleed: Free Tool To Check if That Site is Safe
    Robert Siciliano - April 11, 2014

    I’m sure you’ve heard the news about Heartbleed by now (unless you’re in vacation wonderland and have taken a tech break). This is a serious vulnerability in the core of the Internet and is something we all should be concerned about. Heartbleed is a kink in encryption software, discovered by security researchers. It is a […]

    The post Heartbleed: Free Tool To Check if That Site is Safe appeared first on McAfee.

  • Google Docs Phishing Campaign is Frighteningly Accurate
    Gary Davis - March 21, 2014

    Gmail users beware: a very convincing, very deceitful, phishing scam has been making its way around the Internet. The scam targets Google Doc and Google Drive users with a lookalike login page designed to steal your username and password. With 425 million active monthly Gmail users, these “phishermen” have cast quite a large net. Before […]

    The post Google Docs Phishing Campaign is Frighteningly Accurate appeared first on McAfee.

  • McAfee Cyber Defense Center Zooms In on Middle East
    Christiaan Beek - March 5, 2014

    From McAfee’s first Cyber Defense Center (CDC) in Dubai, we closely monitor threats and activities in Europe and the Middle East. Since the Center’s official launch in September 2013, we have seen  quite a few interesting trends, especially in the Persian Gulf region. Many of the activities spotted are related to hacktivism, cybercrime, or regional […]

    The post McAfee Cyber Defense Center Zooms In on Middle East appeared first on McAfee.

  • 7 Ways to Tell If It’s a Fake
    Robert Siciliano - March 4, 2014

    Unfortunately in today’s world, scammers are coming at us from all angles to try and trick us to get us to part with our hard earned money. We all need to be vigilant in protecting ourselves online. If you aren’t paying attention—even if you know what to look for—they can get you. There are numerous […]

    The post 7 Ways to Tell If It’s a Fake appeared first on McAfee.

  • Internet Explorer Zero Day Offers Unusual Case Study
    Vinay Karecha - February 26, 2014

    While analyzing a recent Internet Explorer zero-day vulnerability, CVE-2014-0322 (containing the Flash sample hash b9c9dab0fd30418884800afebbaba4d99f4526ef0c9a47972a20ab20fed0a06d), we noticed the exploit makes an unorthodox call to ZwProtectVirtualMemory to bypass data execution prevention. What is different about this call? The argument(s) of ZwProtectVirtualMemory are placed in an unusual manner. Typically arguments that are pointer variables belonging to the […]

    The post Internet Explorer Zero Day Offers Unusual Case Study appeared first on McAfee.