McAfee Web Protection

McAfee Web Protection

Advanced web security, controls, and deployment flexibility

Overview

From web filtering and anti-malware scanning to deep content inspection and granular control over how websites and applications are used, McAfee Web Protection provides the security, control, and deployment flexibility you need. McAfee Web Protection offers all the features of McAfee Web Gateway and McAfee SaaS Web Protection.

Unique hybrid deployment flexibility — Deploy on premises with a scalable family of dedicated appliances, on a cost-effective virtual platform, in the cloud, or combine options for enterprise-class flexibility, scalability, and availability. Automatically manage and synchronize rules and policies between on-premises and cloud platforms with a single mouse click.

Advanced security — McAfee Web Protection layers multiple threat detection technologies to provide the most in-depth web security available. From opening content and scanning active elements in real time with the McAfee Gateway Anti-Malware Engine, to comprehensive signature-based coverage and web reputation powered by McAfee Global Threat Intelligence, to available McAfee Advanced Threat Defense integration for in-depth static code and dynamic malware analysis (sandboxing), the McAfee Web Protection layered approach optimizes several technologies for the best combination of security and performance.

Advanced application discovery and control — McAfee Web Protection provides web application discovery and management tools that enable system administrators to identify and manage access to rogue or unknown applications — also known as shadow IT — to reduce or eliminate the threat of potentially insecure applications. Granular controls for more than 1,000 popular cloud applications and web sites enable consistent enforcement of an enterprise’s acceptable usage policy.

Web identity management — McAfee Web Protection includes single sign-on (SSO) connectors for more than 500 popular SaaS applications, which improves end-user convenience, enhances security, and reduces expensive password-related help desk calls.

Unified reporting — Advanced reporting aggregates data, regardless of delivery platform. It provides the information to illuminate how organizations use the web, helping to comply with regulations, identify trends, isolate problems, document inappropriate web activity, and tailor filtering settings to best enforce web usage policies.

Gartner: McAfee in leaders quadrant for secure web gateways

Read Report

Spotlight on shadow IT. The dark side of evading IT policies.

Learn More

Demos / Videos

Demos

A core element of any cloud security strategy is the enforcement of acceptable usage policies. See how McAfee Web Protection provides system and network administrators with more than 1,000 application controls to manage user’s access to specific cloud application functions, such as Facebook or YouTube.

Gain the upper hand on Internet threats in today's Web 2.0 world with the multilayered protection of award-winning McAfee Web Gateway.

In order to share sensitive or proprietary information on the web without compromising security, you need to prevent bad actors from being able to download or read files. See how the built-in encryption technology of McAfee Web Protection automatically protects files uploaded to popular cloud-based collaboration sites.

Videos

Learn how McAfee solutions will help IT departments keep threats out of the office network.

Security, access, and deployment flexibility

Only McAfee provides customers with state-of-the-art web security on-premises, in the cloud, or using a hybrid mix. This gives customers the ability to configure their Web Protection solution in a way that best meets their business needs, with the flexibility to quickly and easily adapt as business needs change.

McAfee Web Protection is the industry’s most flexible secure web gateway solution. Customers can deploy any way they want – on-premises, in the cloud, or both – with the flexibility to adapt as business circumstances change. All it takes is one mouse click to synchronize security policy rules, enabling you to protect all users against web-based threats, regardless of location or device.

Awards / Reviews

2014 AV-TEST Comparative Cloud Gateway Test
2014 AV-TEST Comparative Cloud Gateway Test

AV-TEST performed a comparative review of McAfee Web Protection in the Cloud and Websense Cloud Security 2014 and tested each against a set of malicious URLs with zero-day malware to determine their performance against the latest threats on the web.

CRN Ranks McAfee in their 2013 Top 25 Best Companies to Partner With
CRN Ranks McAfee in their 2013 Top 25 Best Companies to Partner With

Ranked by IT solution providers (SPs), CRN Research ranks the Top 25 must-have technology suppliers from a list of nearly 230 companies in 12 product categories that SPs need to consider when formalizing their partnerships today and for the future. 1,000 unique SPs of all types and sizes were surveyed.

CRN
McAfee Named One of the 20 Coolest Cloud Security Vendors by CRN, 2012

The Intel-owned security company has been preaching cloud security measures since before the cloud truly formed. McAfee’s central cloud piece is the Cloud Security Platform, which secures content and data—e-mail, Web and identity—as it moves to and from the cloud.

SC Magazine for IT Security Professional
McAfee Web Protection Named a Finalist (Best Web Content Management 2012) from SC Magazine

Products in this category provide web content filtering for laptops, desktops, and optionally servers. They may block or filter objectionable websites and content, and enlist blacklist, whitelist, or both to update the vendor-provided data upon which the solution is based.

SC Magazine for IT Security Professional
McAfee Web Protection Named a Finalist (Best Anti-Malware Gateway 2012) from SC Magazine

Products in this category generally are appliances. Their purpose is to act as gateways, usually at the perimeter of the enterprise, protecting against various types of malware attempting to enter the enterprise from outside.

Customer Stories

A.T.U

A.T.U safeguards employee web and email communications with centrally managed McAfee security solutions.

Highlights
  • Reduced influx of spam by 99% and maximized employee time and productivity
  • Proactively protected against malicious emails, viruses, and malware
  • Enabled smooth, easy-to-manage implementation and testing process

Ademino & Associates

McAfee SaaS Web Protection helps Ademino & Associates

Highlights
  • Eliminated web-based threats
  • IT staff can now devote time to strategic initiatives and employees can focus on doing their jobs
  • Improved computer speed and performance

City of Kenosha

The City of Kenosha Embraces Cloud‑Based Security

Highlights
  • Comprehensive protection from the latest email- and Internet-borne malware
  • Low cost through cloud-based, subscription services
  • IT team is freed from burden of installing, updating, and maintaining hardware and software

County of Orange, California

Comprehensive McAfee web and email security solutions help County of Orange dramatically reduce spam levels and lower email administration costs.

Highlights
  • Provided unified threat management and integration between all security products, enabling an end-to-end solution with enterprise-class security
  • Correctly identified 97% of email as spam and dropped it at the edge of the network

NYC Department of IT and Telecommunications

NYC Department of IT and Telecommunications uses McAfee for for vulnerability management, endpoint encryption, and other areas of security functionality.

Highlights
  • Increased protection with a savings of $18 million
  • Provided centralized control across highly distributed IT environment

Technologyville

Technologyville improves cloud services for small and mid‑sized businesses with McAfee SaaS solutions.

Highlights
  • Increases productivity and saves time for both Technologyville and end user clients
  • Minimizes risk to business reputation, operations, and productivity from cyberattacks or email server outages
  • Reduces total cost of ownership and provides flexibility to easily add and subtract users
  • Facilitates compliance with automatic email archiving and encryption options

Modules

McAfee Web Gateway
McAfee Web Gateway

McAfee Web Gateway, deployed on-premises with appliances or in a virtual environment, offers powerful, proactive protection against zero-day threats, spyware, and targeted attacks. Web Gateway combines this advanced security with flexible, granular control, enabling your business to take maximum advantage of the web without compromise.

McAfee SaaS Web Protection
McAfee SaaS Web Protection

McAfee SaaS Web Protection is a convenient service that maximizes threat protection by leveraging McAfee security professionals and Security-as-a-Service management. It protects against malware, malicious web infiltration, lost productivity, and corporate risk while enabling effective and economical control over threats, and freeing your business to take maximum advantage of Web 2.0.

News / Events

Resources

Data Sheets

McAfee Web Gateway Reverse Proxy and ICAP Deployment Options

Web-based malware can be downloaded from external sites by users, or uploaded to internal systems if you provide access to external users, such as partners or contractors. This data sheet explains how the reverse proxy and Internet Content Adaptation Protocol (ICAP) features in McAfee Web Gateway enhance network security and block malware targeted at internal websites.

McAfee SaaS Web Protection

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Web Protection

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Content Security Reporter

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Reporting Product Matrix

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Content Security Suite

For a technical summary on the McAfee product listed above, please view the product data sheet.

Reports

2014 AV-TEST Comparative Cloud Gateway Test

AV-TEST performed a comparative review of McAfee Web Protection in the Cloud and Websense Cloud Security 2014 and tested each against a set of malicious URLs with zero-day malware to determine their performance against the latest threats on the web.

McAfee Positioned in the Leaders Quadrant for 2014 Magic Quadrant for Secure Web Gateways

Leading analyst firm Gartner has placed McAfee as a Leader in the Magic Quadrant for Secure Web Gateways.

Secure Web Gateways (SWGs) utilize an advanced array of techniques, such as URL filtering, malware detection and application control technology, to protect organizations and enforce Internet policy compliance. The evolving threat landscape has forced SWG vendors to respond by adding technologies to defend against advanced threats and in this Magic Quadrant Gartner analyzes each vendor’s approach to advanced threat defense.

The Hidden Truth Behind Shadow IT: Six trends impacting your security posture

McAfee and industry analyst firm Frost & Sullivan to conduct a global research study exploring the prevalence of shadow IT and its impact on the security posture of businesses experiencing this growing trend. The report examines the prevalence of shadow IT worldwide, why employees go around IT to deploy their own applications, the types of security events businesses are experiencing with shadow IT applications, and how to address this problem.

2013 AV-TEST Comparative Web Gateway Security Appliance Test

AV-TEST performed a review of McAfee’s web gateway security solution for the enterprise to determine their malware detection and blocking capabilities.

Solution Briefs

McAfee Advanced Threat Defense for McAfee Web Gateway

Social networks, cloud applications, and content-sharing sites have become essential business tools and IT organizations are struggling to make them safely accessible from inside and outside the corporate environment. Read this Solution Brief and see how McAfee Threat Defense for McAfee Web Gateway helps overcome the obstacles.

Web Request Routing and Redirection: What’s the best option for your web security deployment?

This paper explores the most widely used mechanisms for routing and redirecting web traffic to a secure web gateway by taking a look at the capabilities, advantages, and limitations of each method.

The Cloud Application Explosion: A Problem You Need To Address

This Osterman Research Executive Brief summarizes a webcast that outlined issues created by the rapid adoption of cloud-based applications. The brief also includes recommendations and questions organizations should address about the use of cloud-based applications in order to maintain access control and to protect sensitive data assets.

7 Requirements for Hybrid Web Delivery

Learn how the McAfee Hybrid Service Delivery Architecture provides a blueprint for adopting any or all service delivery platforms — integrated appliances, virtual appliances, or hosted services—without scrimping on deployment flexibility, security, or savings.

White Papers

Direct or Transparent Proxy: Choose the right configuration for your gateway.

Secure web gateways are essential in today’s connected world, but which proxy configuration should you choose: direct or transparent? This white paper guides you through the pros and cons and makes recommendations that will help you secure your company and your users more effectively.

New Mcafee Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection

This white paper discusses the latest version of the flagship McAfee Gateway Anti-Malware technology and how it adapts to new threats and sets the stage to protect against future threats with a modular design that allows for the easy addition of components for maximum flexibility.

Select a Secure Web Gateway

This white paper describes a wide range of Internet-based attack methods and explains how McAfee Web Protection technology helps protect against them.

Mobile Device Web Filtering

This paper will explore ways to implement web filtering of mobile devices through McAfee Web Gateway and discuss ways that McAfee Enterprise Mobility Management (McAfee EMM) software can be leveraged in an integrated manner to assist with web filtering.

Nine Essential Requirements for Web Security

This paper characterizes new web threats, explains why most security solutions in place today are ineffective, and then proposes three key organizational principles for assessing and enhancing web security—security, control, and flexibility—and nine functional requirements that enable these principles.

Putting IT Back in Control of BYOD

Sponsored by McAfee, Osterman Research conducted a survey of 760 individuals with regard to the Bring Your Own Device (BYOD) issues they face in their organizations.

Recent Advances in Web Application Security

This paper covers some of the techniques that have been introduced by the browser developers that are designed to prevent exploitation of widespread vulnerabilities.

Community

Blogs

  • White Networks
    Tyson Macaulay - November 14, 2014

    Internet of Things (IoT) needs “white networks” to scale and deliver the assurance we require for machine-things; white as in “clean and pure”. The IoT will contain all the devices on the current internet, plus many new devices used for machine-to-machine and industrial applications and services.  In contrast to a “white network” I would assess […]

    The post White Networks appeared first on McAfee.

  • When Fingerprints Fail (Blog 1 of 4)
    Steve Grossenbacher - November 13, 2014

    We’ll be releasing four blog posts over the next week.  Each blog will contain a repeated clue word to help you solve the puzzle below.  Track all four clues to help solve the final puzzle and a chance to win a Nikon D3200 DSLR camera and 18-55mm lens!.   To enter the contest, after the […]

    The post When Fingerprints Fail (Blog 1 of 4) appeared first on McAfee.

  • Exploit Kits Improve Evasion Techniques
    Rajesh Nataraj KP - November 12, 2014

    Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers and programs that can be accessed through browsers. The most common exploit targets are Java, Flash, PDFs, and Silverlight. Exploit kits use lots of techniques to evade detection by security products. Exploit kits use several common techniques: Code […]

    The post Exploit Kits Improve Evasion Techniques appeared first on McAfee.

  • Farewell to FOCUS 14
    McAfee Enterprise - November 6, 2014

    While the dust in Las Vegas may still be settling from three jam-packed days of security discussions, demos, expert panels, and more, we‘ve brought back with us valuable takeaways and tales from FOCUS 14. During the 7th annual McAfee FOCUS conference, brought to you by Intel Security, we talked with partners about the future of […]

    The post Farewell to FOCUS 14 appeared first on McAfee.

  • The Scan: 10 Tips for Protecting Your Network
    Bradi Van Noy Hays - November 6, 2014

    Hey guys! I’m Bradi, and this is a special edition of the Scan. In honor of National Cybersecurity Awareness Month, we’re giving you ten ways to protect your home network, courtesy of Dan Tynan of Yahoo tech. One: Fortify your Wi-Fi. Change the default login name and passwords for your WiFi router and turn on […]

    The post The Scan: 10 Tips for Protecting Your Network appeared first on McAfee.