McAfee Security for Email Servers provides comprehensive content security for Microsoft Exchange and Lotus Domino servers.
Industry-leading protection — Uses award-winning McAfee in-memory and incremental on-demand scanning to remove viruses, worms, Trojans, and other threats from incoming and outgoing email.
Strong internal safeguards — Detects threats that may have either slipped past your perimeter defenses or entered your network via infected laptops and internal email. It also blocks spam with the anti-spam module.
Powerful filtering — Enforces corporate policies for email use by filtering offensive content and plugging leaks of sensitive data.
Single console management — Use the McAfee ePolicy Orchestrator (ePO) platform to manage security and view detailed graphical reports from a centralized web-based console.
Check email subject, body, and attachments of incoming and outgoing email messages for viruses, worms, Trojans, and other malware. Real-time, cloud-based file reputation and sender reputation from McAfee Global Threat Intelligence (GTI) protect against both known and emerging malware-based threats. Automatic updates keep you current with the latest security intelligence from McAfee Labs, the world’s top threat research center.
Filter messages based on size, message content, or attachment content. Block or quarantine messages that contain specific words or phrases in the subject line, message body, or attachments.
Use prebuilt dictionaries that cover most enterprise- and country-specific compliance rules or customize content filters to keep sensitive data from leaking out of your organization. Create rules on a global basis, with exceptions as needed for individuals and departments. Manage via the built-in HTML interface or the McAfee ePolicy Orchestrator (McAfee ePO) platform.
Catch spam and phishing emails using the antispam module with IP reputation, helping to maintain employee productivity and reduce wasted email server storage. Users may create their own whitelists and blacklists.
Automatically download the latest virus definitions (.DAT files) via HTTP, FTP, network file share, or the McAfee ePO centralized management console. As a result, your IT staff won’t need to spend valuable time on manual updates.
Ensure protection for your email servers on major operating systems, including Windows and Linux, on 32-bit and 64-bit platforms.
These are minimum system requirements only. Recommended requirements are in parentheses, where applicable. Actual requirements will vary depending on the nature of your environment.
For guidance on how to use this McAfee product, watch the Quick Tips video listed above.
Brelje & Race Makes a Wise Investment
CSTISA uses McAfee ePolicy Orchestrator (ePO) software as a primary sales tool to sell McAfee Endpoint Protection solutions.
Informa used McAfee to centralize and standardize its security infrastructure to better protect against viruses, spyware, spam, pop-ups, and more.
For a technical summary on the McAfee product listed above, please view the product data sheet.
McAfee is a leader in the email security market, delivering optimal email security solutions for any enterprise.
One question I often hear is “When will Intel Security (McAfee) publish a report on the latest threat?” It seems to be a hot trend today for security companies to offer reports with topics such as “Operation X” or “Malware Y,” or to trumpet how many zero-day vulnerabilities they have found. Do we now measure […]
The post At Intel Security, Protecting Customers Takes Precedence Over Seeking Headlines appeared first on McAfee.
During the last couple of months, we’ve observed several RTF exploits that target Indian organizations. The first RTF exploit was found by McAfee researchers on August 21. Subsequently, we saw multiple variants of the same exploit through October. The contents of the decoy documents are politically themed, targeted at several local and overseas Indian establishments. […]
The post Operation Mangal: Win32/Syndicasec Used In Targeted Attacks Against Indian Organizations appeared first on McAfee.
This is the second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out the first part here. Microsoft’s Patch From our previous analysis we’ve learned that the core of this threat is its ability to effectively right-click a file. Now, let’s see what Microsoft did in its patch […]
The post Bypassing Microsoft’s Patch for the Sandworm Zero Day: Even ‘Editing’ Can Cause Harm appeared first on McAfee.
On October 21, we warned the public that a new exploitation method could bypass Microsoft’s official patch (MS14-060, KB3000869) for the infamous Sandworm zero-day vulnerability. As Microsoft has finally fixed the problem today via Security Bulletin MS14-064, it’s time to uncover our findings and address some confusion. This is the first of two posts on […]
The post Bypassing Microsoft’s Patch for the Sandworm Zero Day: a Detailed Look at the Root Cause appeared first on McAfee.
“Distrust and caution are the parents of security”–Benjamin Franklin A recent threat targeting Chinese users of Mac OS X and iPhone came to light yesterday. The malware, called WireLurker, is distributed by the Chinese third-party app store Maiyadi. Since the threat’s discovery, more than 400 applications containing the Trojan were identified at the store. Two […]