When it comes to web surfing, McAfee SiteAdvisor Enterprise is an indispensable ally, keeping you safe without limiting your access to the Internet. With SiteAdvisor Enterprise, you don't need to impose restrictive policies that keep your employees from using the web for research and business projects.
Easily identify threats — Featuring an intuitive color-coded rating system, SiteAdvisor Enterprise gives you an extra layer of protection at the desktop. For specific information about the rated site, just click on the SiteAdvisor Enterprise button in your browser, or on the message that pops up when you mouse over a search result. You'll learn about email tests, download tests, links and affiliations, and annoyances.
Perpetual Internet analysis — SiteAdvisor Enterprise relies on McAfee Global Threat Intelligence — our cloud-based rating service that continually scans the Internet with intelligent bots or virtual computers, downloads sites, and scans them for malware. The bots even fill out registration forms to determine whether signing up triggers spam. If the site contains malicious code or other suspicious activity, SiteAdvisor Enterprise marks the site “red” for risky.
Customized authorization — SiteAdvisor Enterprise also allows you to customize the authorization or blocking of website access, control messaging, assign actions based on safety ratings, and implement additional protection for remote users — all to ensure policy compliance.
Advanced web filtering — McAfee Web Filtering for Endpoint is an optional add-on to SiteAdvisor Enterprise and allows you to filter websites based on content categories and run detailed reports on web usage in your organization.
Enhanced security powered by McAfee Global Threat Intelligence — McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. SiteAdvisor Enterprise uses the McAfee GTI web reputation and web categorization services to identify sites that are hosting malware, infected by malware, and hosting inappropriate content.
Guard your employees and your organization against web-based malware like adware, spyware, viruses, and phishing scams.
Use McAfee ePolicy Orchestrator (ePO) software to deploy, manage, and report on McAfee SiteAdvisor Enterprise solutions across your entire organization.
Research on the web without unintentionally wandering into dangerous territory. When you search with Google, Yahoo, MSN, AOL, Bing, or a variety of other search engines, you get a safety rating next to each search result.
Use SiteAdvisor as a plug-in for Microsoft Internet Explorer, Mozilla Firefox, or Google Chrome.
Identify sites that are safe, and those that are not, with our color-coded rating system.
Prohibit access to undesirable websites by using SiteAdvisor Enterprise. You can also customize SiteAdvisor Enterprise to permit access to whatever risky sites you deem necessary.
Strengthen your web security and ensure around-the-clock Internet protection for remote employees. McAfee Web Filtering for Endpoint is an add-on module to SiteAdvisor Enterprise that provides secured web access for anyone using the Internet for work-related or personal business — in or out of network.
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
SiteAdvisor Enterprise browser plug-ins are less than 800 KB for all supported browsers.
For guidance on how to use this McAfee product, watch the Quick Tips video listed above.
Topics : Endpoint Protection
Topics : Endpoint Protection
For a technical summary on the McAfee product listed above, please view the product data sheet.
Attackers prey upon the institution of trust in many ways, with exploiting unsuspecting victims the primary pursuit. Learn how McAfee security technology can help protect against attacks seeking to abuse the trust your company has in its day-to-day operations.
Learning more about your attackers helps to improve your security profile and reduce the possibility of a breach. Sophisticated criminals using advanced techniques are behind most of the recent security breaches, targeting small network openings and user weaknesses left vulnerable by even the latest shiny new technology. The painful reality is that security operations are […]
The post Study Reveals the Most Common Attack Methods of Data Thieves appeared first on McAfee.
The good, bad, and potentially worse of critical infrastructure protection. There has been a significant post-9/11 focus on securing critical infrastructure systems – many of which pre-date the Networked Age and were potentially more vulnerable to attack that newer networked systems. Cyber-attacks on critical infrastructure systems have not yet resulted in the loss of human […]
The post Out of Aspen: State of Critical Infrastructure Cybersecurity, 2015 appeared first on McAfee.
Governments globally need to focus on the unintended consequences of across the board attempts to deal with deficit spending. Saving pennies is important, but we need to make certain those savings do not cause large consequences for security that will cost much more in the long run. Cyber data breaches are a prominent topic this […]
The post Out of Aspen, Part 2: Sequestration is Penny Wise, but Pound Foolish for Cyber Security appeared first on McAfee.
Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Cyber-criminals are the Hyenas of the Digital Ecosystem (my sincerest apologies to hyenas). Cyber-criminals […]
The post A Thief’s Perspective #5: Network and Resource Abuse Methods appeared first on McAfee.
Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Coffee, Cocaine, and SSL Attacks. Today’s cybercriminals have borrowed a tried and true technique […]