Email is your most critical business application and one of the most challenging to protect, but simply blocking spam and viruses is not enough. Comprehensive email security requires defending against sophisticated new attacks, preventing loss of sensitive business data, and protecting your own corporate email reputation.
Going beyond spam and malware filtering, McAfee Email and Web Security Appliance combines market-leading email protection with data loss prevention, policy-based controls, and advanced reporting. Powered by McAfee Global Threat Intelligence, Email and Web Security Appliance is armed with the latest proactive defenses against both known and unknown threats. Highly scalable to meet the needs of the most demanding enterprises, yet easily managed, Email and Web Security Appliance provides the highest level of email security with complex features and functionality built in to a simple, user-friendly interface.
Email and Web Security Appliance delivers:
Comprehensive inbound security against all email-borne threats — With its extremely low rate of false positives, Email and Web Security Appliance keeps spam out while accurately delivering legitimate email.
Outbound inspection against reputation-damaging email — Block messages that could negatively impact your corporate email reputation. Infected systems within your network can cause your domain to be blacklisted as an origin of spam and your corporate email to be automatically rejected by your business partners and customers.
Integrated data loss prevention for compliance and policy enforcement — Built-in McAfee Data Loss Prevention (DLP) technology includes dictionaries, document fingerprinting, compliance, and validation tools.
Enhanced security powered by McAfee Global Threat Intelligence — McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based service integrated into McAfee security products. It works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Email and Web Security Appliance uses file reputation, web reputation, message reputation, and network connection reputation services to identify suspicious files, sites hosting undesirable content, infected domains and IP addresses, and email messages carrying malicious payloads.
Keep spam out while accurately allowing legitimate email. With McAfee Email and Web Security Appliance, you don’t need to choose between effective spam blocking and low false-positive rates because you get both.
Inspect outbound traffic, identifying and stopping messages that could negatively impact your corporate email reputation.
Working with McAfee Quarantine Manager, Email and Web Security Appliance allows administrators to easily consolidate and manage email quarantines. Quarantine Manager is a highly scalable, centralized, off-box server that delivers role-based administration, granular quarantines, and a customizable user interface.
Centralize appliance configuration, policy management, and reporting through McAfee ePO software, the first and only platform to manage systems, networks, data, and compliance solutions across any size organization. The integration of Email and Web Security Appliance with McAfee ePO software enables administrators to automatically push out and implement configuration and policy changes across all appliances in the enterprise.
Get real-time visibility into important system activities such as detection rates, scanning policies, and system health. Chose from predefined reports or customize your own. View reports immediately or schedule email delivery of the reports you want.
Leverage network, file, and message reputational analysis to apply threat intelligence from McAfee security devices around the globe for quicker, more accurate identification of spam, malware, malicious embedded URLs, and other threats.
Understand, filter, control, and monitor Internet usage. Group-based policies are simple to configure; more than 95 filter categories are included as a standard feature.
Increase capacity as your needs grow. Built-in clustering and load-balancing capabilities provide easy scalability options; simply add appliances to grow capacity. Available deployment options range from units designed for small and mid-sized businesses to appliances that meet the needs of the most demanding enterprises.
McAfee Email and Web Security Appliance is available as a standard or virtual appliance. These are minimum hardware requirements for the virtual appliance. Actual requirements will vary depending on the nature of your environment.
With five stars across the board in every product rating category, McAfee Email Protection was awarded the top 5-Star Rating by SC Magazine – measured on its features, ease of use, performance, documentation, support and value for the money.
McAfee spam filter helps Berendsen improve IT department performance.
Cardnet eliminates malware infections with comprehensive network, email, and endpoint security from McAfee.
McAfee secures Cassling with smart, simple solutions.
McAfee bolsters security for the City of St. Paul, Minnesota.
Comprehensive and easy-to-manage security from McAfee protects Dawnay Day's network and endpoints from attacks.
Ellis Hospital simplifies security risk management with McAfee.
Cancer research group stays on task with McAfee.
McAfee simplifies security management for French city’s local government.
Manteca Unified School District protects students with McAfee solutions.
Smith College strengthens Internet and email security with McAfee.
For technical specifications on the McAfee product listed above, please view the product data sheet.
For a technical summary on the McAfee product listed above, please view the product data sheet.
This paper characterizes new web threats, explains why most security solutions in place today are ineffective, and then proposes three key organizational principles for assessing and enhancing web security—security, control, and flexibility—and nine functional requirements that enable these principles.
I’m sure you’ve heard the news about Heartbleed by now (unless you’re in vacation wonderland and have taken a tech break). This is a serious vulnerability in the core of the Internet and is something we all should be concerned about. Heartbleed is a kink in encryption software, discovered by security researchers. It is a […]
The post Heartbleed: Free Tool To Check if That Site is Safe appeared first on McAfee.
Gmail users beware: a very convincing, very deceitful, phishing scam has been making its way around the Internet. The scam targets Google Doc and Google Drive users with a lookalike login page designed to steal your username and password. With 425 million active monthly Gmail users, these “phishermen” have cast quite a large net. Before […]
The post Google Docs Phishing Campaign is Frighteningly Accurate appeared first on McAfee.
From McAfee’s first Cyber Defense Center (CDC) in Dubai, we closely monitor threats and activities in Europe and the Middle East. Since the Center’s official launch in September 2013, we have seen quite a few interesting trends, especially in the Persian Gulf region. Many of the activities spotted are related to hacktivism, cybercrime, or regional […]
The post McAfee Cyber Defense Center Zooms In on Middle East appeared first on McAfee.
Unfortunately in today’s world, scammers are coming at us from all angles to try and trick us to get us to part with our hard earned money. We all need to be vigilant in protecting ourselves online. If you aren’t paying attention—even if you know what to look for—they can get you. There are numerous […]
While analyzing a recent Internet Explorer zero-day vulnerability, CVE-2014-0322 (containing the Flash sample hash b9c9dab0fd30418884800afebbaba4d99f4526ef0c9a47972a20ab20fed0a06d), we noticed the exploit makes an unorthodox call to ZwProtectVirtualMemory to bypass data execution prevention. What is different about this call? The argument(s) of ZwProtectVirtualMemory are placed in an unusual manner. Typically arguments that are pointer variables belonging to the […]
The post Internet Explorer Zero Day Offers Unusual Case Study appeared first on McAfee.