McAfee SiteAdvisor Enterprise

McAfee SiteAdvisor Enterprise

Worry-free web browsing and risky website blocking

Overview

When it comes to web surfing, McAfee SiteAdvisor Enterprise is an indispensable ally, keeping you safe without limiting your access to the Internet. With SiteAdvisor Enterprise, you don't need to impose restrictive policies that keep your employees from using the web for research and business projects.

Easily identify threats — Featuring an intuitive color-coded rating system, SiteAdvisor Enterprise gives you an extra layer of protection at the desktop. For specific information about the rated site, just click on the SiteAdvisor Enterprise button in your browser, or on the message that pops up when you mouse over a search result. You'll learn about email tests, download tests, links and affiliations, and annoyances.

Perpetual Internet analysis — SiteAdvisor Enterprise relies on McAfee Global Threat Intelligence — our cloud-based rating service that continually scans the Internet with intelligent bots or virtual computers, downloads sites, and scans them for malware. The bots even fill out registration forms to determine whether signing up triggers spam. If the site contains malicious code or other suspicious activity, SiteAdvisor Enterprise marks the site “red” for risky.

Customized authorization — SiteAdvisor Enterprise also allows you to customize the authorization or blocking of website access, control messaging, assign actions based on safety ratings, and implement additional protection for remote users — all to ensure policy compliance.

Advanced web filtering — McAfee Web Filtering for Endpoint is an optional add-on to SiteAdvisor Enterprise and allows you to filter websites based on content categories and run detailed reports on web usage in your organization.

Enhanced security powered by McAfee Global Threat Intelligence — McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. SiteAdvisor Enterprise uses the McAfee GTI web reputation and web categorization services to identify sites that are hosting malware, infected by malware, and hosting inappropriate content.

Features & Benefits

Gain an extra measure of protection

Guard your employees and your organization against web-based malware like adware, spyware, viruses, and phishing scams.

Deploy and manage with ease

Use McAfee ePolicy Orchestrator (ePO) software to deploy, manage, and report on McAfee SiteAdvisor Enterprise solutions across your entire organization.

Search without worry

Research on the web without unintentionally wandering into dangerous territory. When you search with Google, Yahoo, MSN, AOL, Bing, or a variety of other search engines, you get a safety rating next to each search result.

Support multiple browsers and search engines

Use SiteAdvisor as a plug-in for Microsoft Internet Explorer, Mozilla Firefox, or Google Chrome.

Browse safely with advanced warnings

Identify sites that are safe, and those that are not, with our color-coded rating system.

Increase productivity

Prohibit access to undesirable websites by using SiteAdvisor Enterprise. You can also customize SiteAdvisor Enterprise to permit access to whatever risky sites you deem necessary.

Protect remote users

Strengthen your web security and ensure around-the-clock Internet protection for remote employees. McAfee Web Filtering for Endpoint is an add-on module to SiteAdvisor Enterprise that provides secured web access for anyone using the Internet for work-related or personal business — in or out of network.

System Requirements

These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.

SiteAdvisor Enterprise & SiteAdvisor Enterprise Plus

  • Operating Systems
    • Windows 7 (32-bit and 64-bit) with Service Pack 1 (SP1) RTM
    • Windows XP Professional with SP2 and SP3
    • Windows Vista (32-bit and 64-bit) with SP2 all editions
    • Windows Server 2008 (32-bit and 64-bit) with SP2
    • Windows Server 2008 R2 (64-bit) with SP1 RTM
    • Windows Server 2003 Enterprise with SP2
    • Windows Server 2003 Standard with SP2
    • Windows Server 2003 Web with SP2
  • Web Browsers
    • Microsoft Internet Explorer 6.0 with SP3 or later (32-bit and 64-bit)
    • Mozilla Firefox 3.5, 3.6, and 4.0
    • Google Chrome v13 and v14
  • Minimum Hardware
    • 500 MHz processor
    • 512 MB RAM
    • 20 MB free disk space
    • Internet connection
  • Virtualization Environments
    • VMware ESX
    • VMware Workstation
    • Citrix XenServer
    • Microsoft Hyper-V

SiteAdvisor Enterprise browser plug-ins are less than 800 KB for all supported browsers.

Demos / Tutorials

Tutorials

For guidance on how to use this McAfee product, watch the Quick Tips video listed above.

Resources

Data Sheets

McAfee SiteAdvisor Enterprise

For a technical summary on the McAfee product listed above, please view the product data sheet.

Solution Briefs

Abuse of Trust

Attackers prey upon the institution of trust in many ways, with exploiting unsuspecting victims the primary pursuit. Learn how McAfee security technology can help protect against attacks seeking to abuse the trust your company has in its day-to-day operations.

Community

Blogs

  • Franchising Ransomware
    Vincent Weafer - July 2, 2015

    Got a great business idea? Want to expand with less risk? Build a good product, develop some training, put them together into a repeatable formula, and collect the royalties from your franchisees. This model, used successfully for everything from fast food to hair salons to tax preparation, is now available for criminal ransomware. Cybercriminals have […]

    The post Franchising Ransomware appeared first on McAfee.

  • Beat the Ticking Clock Against Emerging Threats
    Paul Zimski - July 1, 2015

    In order to beat todays advanced threats, your security defense system relies on good communication. However, when your security posture is dependent on a slew of different products from a spread of vendors, communication can break down. This breakdown in communication means you’re losing valuable time in detecting cyberthreats. To address this communication breakdown, there […]

    The post Beat the Ticking Clock Against Emerging Threats appeared first on McAfee.

  • Securing Critical Infrastructure
    Lorie Wigle - July 1, 2015

    Protecting the Industrial Internet of Things from cyberthreats is a national priority.  Industrial automation and control systems are increasingly online, sending out information and receiving commands from local and remote control centers and corporate data systems. Technologies in this Industrial Internet of Things (IIoT) have tremendous potential to improve operations, reduce costs, enhance safety, increase […]

    The post Securing Critical Infrastructure appeared first on McAfee.

  • Cyber Resilience And Spear Phishing
    Mo Cashman - June 29, 2015

    Balanced security capability, defense in depth, integrated countermeasures, and a threat-intelligence strategy are critical to defending your business from spear-phishing attacks. Spear phishing continues to be the most successful means of gaining entry to an enterprise network and to valuable business or personal data. According to the latest Verizon Data Breach Investigations Report, two-thirds of […]

    The post Cyber Resilience And Spear Phishing appeared first on McAfee.

  • Government Agencies Should Turn to CDM During 30-Day Sprint
    Tom Gann - June 29, 2015

    The fallout from the OPM breach continues with news that clearance information may have been stolen and that more than 10 million federal employee records may have been breached. In response, the White House has ordered every agency to engage in a “30 day sprint” to shore up and bolster their defensive cybersecurity capabilities. During […]

    The post Government Agencies Should Turn to CDM During 30-Day Sprint appeared first on McAfee.

Related Solutions
Threats and Risks