McAfee Security for Email Servers provides comprehensive content security for Microsoft Exchange and Lotus Domino servers.
Industry-leading protection — Uses award-winning McAfee in-memory and incremental on-demand scanning to remove viruses, worms, Trojans, and other threats from incoming and outgoing email.
Strong internal safeguards — Detects threats that may have either slipped past your perimeter defenses or entered your network via infected laptops and internal email. It also blocks spam with the anti-spam module.
Powerful filtering — Enforces corporate policies for email use by filtering offensive content and plugging leaks of sensitive data.
Single console management — Use the McAfee ePolicy Orchestrator (ePO) platform to manage security and view detailed graphical reports from a centralized web-based console.
Check email subject, body, and attachments of incoming and outgoing email messages for viruses, worms, Trojans, and other malware. Real-time, cloud-based file reputation and sender reputation from McAfee Global Threat Intelligence (GTI) protect against both known and emerging malware-based threats. Automatic updates keep you current with the latest security intelligence from McAfee Labs, the world’s top threat research center.
Filter messages based on size, message content, or attachment content. Block or quarantine messages that contain specific words or phrases in the subject line, message body, or attachments.
Use prebuilt dictionaries that cover most enterprise- and country-specific compliance rules or customize content filters to keep sensitive data from leaking out of your organization. Create rules on a global basis, with exceptions as needed for individuals and departments. Manage via the built-in HTML interface or the McAfee ePolicy Orchestrator (McAfee ePO) platform.
Catch spam and phishing emails using the antispam module with IP reputation, helping to maintain employee productivity and reduce wasted email server storage. Users may create their own whitelists and blacklists.
Automatically download the latest virus definitions (.DAT files) via HTTP, FTP, network file share, or the McAfee ePO centralized management console. As a result, your IT staff won’t need to spend valuable time on manual updates.
Ensure protection for your email servers on major operating systems, including Windows and Linux, on 32-bit and 64-bit platforms.
These are minimum system requirements only. Recommended requirements are in parentheses, where applicable. Actual requirements will vary depending on the nature of your environment.
For guidance on how to use this McAfee product, watch the Quick Tips video listed above.
Brelje & Race Makes a Wise Investment
McAfee secures Cassling with smart, simple solutions.
CSTISA uses McAfee ePolicy Orchestrator (ePO) software as a primary sales tool to sell McAfee Endpoint Protection solutions.
Informa used McAfee to centralize and standardize its security infrastructure to better protect against viruses, spyware, spam, pop-ups, and more.
For a technical summary on the McAfee product listed above, please view the product data sheet.
McAfee is a leader in the email security market, delivering optimal email security solutions for any enterprise.
As the largest dedicated security vendor, McAfee’s goal is to help customers and consumers feel secure in the digital world. It’s certainly not simple, and it’s challenging to keep up with the bad guys. One way to do that is to match our adversaries’ aggressive drive to innovate with our own deeper commitment to collaborate […]
The post McAfee Founds Cyber Threat Alliance With Industry Partners appeared first on McAfee.
Although VMworld wrapped a few weeks ago, we’re still spinning over the excitement and buzz that was generated around the event. VMworld 2014 was a special benchmark for both McAfee and Intel, as we presented the first Intel Security product (the Intel Security Controller), and also showcased Intel Security’s capabilities with a united booth presence […]
The post Comprehensive Server Security: The Star of VMworld 2014 appeared first on McAfee.
I’m delighted to announce that McAfee is working with Amazon Web Services (AWS) to offer our Host-Based Security Solution (HBSS) to AWS Cloud customers. As HBSS is so critical to DoD’s security posture, it’s the first of several Software as a Service (SaaS) offerings we’ll do with AWS. Military and civilian government agencies are increasingly […]
The post McAfee offers government security for Amazon cloud customers appeared first on McAfee.
I recently wrote a piece in Dark Reading around the notion that Endpoint security is not dead, but instead facing a steadily mounting series of obstacles with relation to the new universe of Internet-connected devices. While there are certainly more challenges to securing corporate networks today, claiming that enforcing Endpoint security policies is basically fighting […]
The post Endpoint Security and the Reality of Ubiquitous Computing appeared first on McAfee.
In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made this critical point: Stopping attacks before they breach and narrowing the breach discovery gap require the ability to detect threats at […]