McAfee Cloud Single Sign On

McAfee Cloud Single Sign On

Simplify and secure cloud application access

Next Steps:

Overview

McAfee Cloud Single Sign On relieves the pain that end users have managing multiple passwords for cloud applications. McAfee Cloud Single Sign On allows you to enforce corporate standards for cloud application access and improves productivity for IT and end users by eliminating password reset requests.

Plug-and-play cloud single sign-on connectors — Get out-of-the-box integration with hundreds of popular cloud applications, such as Salesforce.com and Google Apps. No coding or separate tool kit purchase required. Simply pick, configure, and assign users to your cloud application and you are ready to go. Quick implementation means a better return on your investment and a faster time to value. Support for four different authentication models provides the broadest range of application coverage.

Eliminate password headaches — Enhance corporate security by reducing password-related risks of cloud access, while improving IT and end-user productivity by significantly reducing password reset requests.

Built-in strong authentication — Security is the biggest concern customers express about moving data and applications to the cloud. Cloud Single Sign On provides built-in two-factor authentication, based on the industry-leading McAfee One Time Password solution.

Regain control of the cloud access security lifecycle — McAfee Cloud Single Sign On allows IT to effectively manage cloud access with single sign-on, provisioning, and deprovisioning of cloud applications synchronized with Active Directory, strong authentication, and consolidated monitoring and reporting.

Hybrid deployment option — McAfee Cloud Single Sign On offers unique on-premises, cloud, or mixed deployment options, all for one low subscription price. The ability to pick and choose the deployment model that best meets your distinctive business needs provides maximum flexibility without compromising security or manageability.

Protect your servers, from physical to virtual to cloud.
AV-Test Signature-less IPS Report
Free VPN Cost Calculator

Features & Benefits

Improve usability and productivity from a single sign-on (SSO)

McAfee Cloud Single Sign On improves the user experience by eliminating the need to remember multiple user ID/password combinations, while enforcing corporate security requirements and reducing password reset requests.

Extend support for a wide variety of applications

Support for four different methods of integrating with your web applications, including industry standards like SAML, OpenID, and OAuth, enables SSO support for a wide variety of cloud and internal web applications.

Enhance security with two-factor authentication

Strengthen overall application access security and reduce the risk of data loss and fraud through policy-based authentication enforcement. McAfee Cloud Single Sign On includes a one-time password (OTP) module that provides everything you need to implement strong authentication for your sensitive web applications. The flexible and easy-to-use McAfee One Time Password Pledge app — available with both the on-premises or SaaS editions — delivers an OTP using any smartphone (iPhone, Android, etc.) or PC (Windows or Mac). Other OTP delivery options include SMS text message, email, instant message, and USB tokens, and support for Intel Identity Protection Technology (IPT) on Intel processors.

Improve productivity with automated provisioning

Enhance productivity and reduce downtime by automatically provisioning and deprovisioning cloud accounts synchronized with your enterprise directory. Business rules enable you to quickly and easily onboard new users and assign them to specific applications, based on individual identity attributes. Changes in user attributes are automatically synchronized across cloud application accounts. Cloud accounts are automatically disabled when employees are removed from the corporate directory, enhancing security by blocking former users’ access to sensitive data and facilitating regulatory compliance. Identify rogue or orphan accounts to verify that SaaS user accounts match with policy to ensure that only authorized accounts exist in the application.

Customer Stories

Beverly Hills Wealth Management (BHWM)

Not only can McAfee Cloud Single Sign On deliver a BHWM-branded experience to users, but the system can be tailored to meet the needs of both internal and external users — with both provisioning/deprovisioning and standards-based SSO capabilities.

Highlights
  • Increased end-user convenience and productivity
  • Stronger security through elimination of multiple passwords and use of SAML for federated SSO
  • Flexibility to add new SaaS solutions quickly and easily as company grows
  • Integration with enterprise identity repositories for automatic provisioning and deprovisioning
  • Solution that leverages a cost-effective, hosted hybrid cloud environment

Read Full Case Study

Messmer Catholic Schools

McAfee Cloud Single Sign On serves as Messmer Catholic Schools’ SSO login page and portal, delivering seamless integration with Google Apps for Education.

Highlights
  • Reduced IT load for maintaining accounts
  • Elimination of password-related calls
  • More efficient and convenient access to SaaS applications for staff and students

Read Full Case Study

Platinum Group

Secure Single Sign-On Enables Migration to the Cloud

Highlights
  • High user acceptance of SaaS solution since users only have to enter credentials once
  • Stronger security through use of industry-standard SAML tokens
  • Integration with enterprise identity repositories for automatic provisioning and deprovisioning

Read Full Case Study

Senior Service America, Inc.

McAfee was able to set up a McAfee Cloud Single Sign On system in the test environment in less than an hour, allowing Senior Service America to implement SSO for their partner portal.

Highlights
  • Improved end-user experience with convenience of SSO
  • Ability to easily add more SaaS solutions to the portal over time
  • Rapid deployment capabilities
  • 24/7 support from the industry’s leading global IT vendors
  • Provisioning and deprovisioning to reduce costs, improve IT efficiency

Read Full Case Study

System Requirements

These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.

  Management Console Application Portal
Desktop browser
(On-Premise Edition)
Firefox 5, Internet Explorer 8 Chrome 16, Firefox 5,
Internet Explorer 7, Safari 5.1.2
Desktop browser
(SaaS Edition)
  IE 9 IE 10 Firefox Chrome
OS X 10.7     X X
Windows 8   X X X
Windows 7 X X X X
Windows Vista X   X X
Windows XP     X X
Mobile browser
(On-Premise Edition)
Not supported Android 2.0,
iOS devices & Safari browser
Server
(On-Premise Edition)
Windows Server 2003, 2008, or 2008 R2;
Red Hat Enterprise Linux Server and
Advanced Platform 5.0
32- or 64-bit
Not applicable
Hardware
(On-Premise Edition)
Any Intel multi-core server processor,
2 GB RAM

Demos / Videos

Demos

Network Security Platform uses multiple detection engines to alert on today’s stealthy malware.

Use event correlation and progressive disclosure workflows to prioritize events, improve detection, and speed investigation.

Network Security Platform uses new advanced detection capabilities to uncover both known and unknown botnets.

Network Security Platform includes application visibility and control of over 1,100 applications and protocols.

A core element of any cloud security strategy is the enforcement of acceptable usage policies. See how McAfee Web Protection provides system and network administrators with more than 1,000 application controls to manage user’s access to specific cloud application functions, such as Facebook or YouTube.

Learn how McAfee Data Loss Prevention solution aligns data discovery, classification, policy management, and security controls with business requirements and processes.

Tutorials

After viewing this video, you will know what action rules are and how to create them in McAfee Data Loss Prevention

Learn how to configure McAfee Network Threat Behavior Analysis through our step-by-step installation tutorial.

After viewing this video, you will know what templates are and how to create them in McAfee Data Loss Prevention.

Videos

McAfee Application Control ensures only trusted applications run on servers and endpoints. It reduces risks from unauthorized software, boosts endpoint control, extends the viability of fixed-function systems without impacting performance, and lowers operating costs.

Outdated methods of malware detection leave crucial data at risk. Learn how McAfee solutions can prevent advanced malware attacks and protect valued assets.

Leverage this video to learn how to build consumer trust through online security

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

McAfee Cloud Single Sign On relieves the pain that end users have managing multiple passwords for cloud applications.

Ensure continuous compliance. McAfee Configuration Control prevents unauthorized changes on critical servers, boosts visibility into your environment, and streamlines internal and external IT audit processes.

McAfee Content Security Blade Server protects enterprise networks from spam, malware, and other intrusions with a single, high-performance solution. Based on next-generation blade server architecture, Content Security Blade Server reduces IT costs, cuts complexity, and easily scales by inserting additional scanning blades to address future capacity requirements.

In an age of ever-changing technology threats, McAfee helps protect critical infrastructure industries in all sectors with a cloud-to-endpoint security portfolio. Backed by the highest level of Global Threat Intelligence, McAfee delivers real-time visibility, the latest protections, and quick proof of compliance, plus optimized solutions for proprietary SCADA systems.

Learn how Beverly Hills Wealth Management maximized SaaS access to user applications.

Learn why Riverside Healthcare chose McAfee Enterprise Mobility Management (McAfee EMM) to manage the influx of mobile phones and tablets on its network.

Awards / Reviews

451 Research: Analyst Evaluation of McAfee Cloud Identity Manager
Analyst firm 451 Research takes a closer look at McAfee Cloud Single Sign On (formerly McAfee Cloud Identity Manager) and McAfee’s identity and access management strategy and concludes that “…the foundation being laid has a solid reach – from the device hardware to the cloud.”

SC Magazine: McAfee Cloud Identity Manager Product Review
SC Magazine gives McAfee Cloud Identity Manager 4.75 stars out of a possible 5 stars. "...we found the McAfee Cloud Identity Manager to be a good value for the money."

News / Events

Resources

Data Sheets

McAfee Device Control

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Email Gateway Hardware Appliance Specifications

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Web Gateway Reverse Proxy and ICAP Deployment Options Data Sheet

Web-based malware can be downloaded from external sites by users, or uploaded to internal systems if you provide access to external users, such as partners or contractors. This data sheet explains how the reverse proxy and Internet Content Adaptation Protocol (ICAP) features in McAfee Web Gateway enhance network security and block malware targeted at internal websites.

FISMA Security Control Assessments

Advanced Correlation Engine

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Application Control

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Data Center Security Suite for Databases

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Data Center Security Suites

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee MOVE AV

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall Modules

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Security Suite for Virtual Desktop Infrastructure

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Server Security Suite Advanced

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Server Security Suite Essentials

For a technical summary on the McAfee product listed above, please view the product data sheet.

Intel Solid State Drive Management with McAfee Real Time Command

McAfee Real Time Command revolutionizes security systems management with immediate visibility into system data and prompt interventions. Using McAfee Real Time Command and the Intel SSD Pro dynamic link library (DLL), IT professionals can more effectively track the health of Intel SSD Pro 1500 Series Opal-compliant drives and take proactive measures to reduce customer downtime.

McAfee Next Generation Firewall Roles and Licensing Options

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee ePO Deep Command

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Network Threat Response on CloudShield CS-4000

For a technical summary of the CloudShield product listed above, please view the product data sheet and learn how McAfee Network Threat Response on the CloudShield CS-4000 platform complements your existing network defenses.

McAfee SIEM Supported Devices

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

McAfee Firewall/VPN Appliance Comparison

Download a technical comparison of all McAfee Firewall/VPN appliances.

Reports

SANS Report – Advanced Network Protection with McAfee Next Generation Firewall

Evaluating next generation firewalls? See what the SANS Institute says about the management features and advanced security capabilities of the McAfee Next Generation Firewall.

McAfee Advanced Threat Defense Test Results

AV-TEST performed a test of the McAfee Advanced Threat Defense appliance to determine its malware detection capabilities.

What's Next: Industry Experts Speak Out on Advanced Evasion Techniques

Get our experts' opinions on Advanced Evasion Techniques (AETs)- delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected.

McAfee Positioned in Leaders Quadrant of the Magic Quadrant for SIEM

Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Leading analyst firm Gartner has placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.

[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]

McAfee Positioned in the Leaders Quadrant for 2014 Magic Quadrant for Secure Web Gateways

Leading analyst firm Gartner has placed McAfee as a Leader in the Magic Quadrant for Secure Web Gateways.

Secure Web Gateways (SWGs) utilize an advanced array of techniques, such as URL filtering, malware detection and application control technology, to protect organizations and enforce Internet policy compliance. The evolving threat landscape has forced SWG vendors to respond by adding technologies to defend against advanced threats and in this Magic Quadrant Gartner analyzes each vendor’s approach to advanced threat defense.

Data Center IPS Comparative Analysis: Total Cost of Ownership

By using total cost of ownership (TCO) instead of purchase price, t is possible to factor in management of the device via labor costs associated with product installation, maintenance, upkeep, and tuning.

ESG Lab Validation Report: McAfee Advanced Threat Defense

This ESG Lab Validation report documents hands-on testing of McAfee Advanced Threat Defense, a key component of McAfee’s end-to-end solution for addressing advanced malware. Testing was designed to explore how the solution accurately detects advanced malware using a layered approach, the speed and effectiveness of responding to an attack, and the operational efficiencies of this integrated solution.

Needle in a Datastack: The Rise of Big Security Data

Big data is changing the face of the global business landscape with few technologies left untouched by the opportunities it presents and information security is no different.

eBook: Securing the Evolving Datacenter

This report highlights ways security technologies and services are evolving to provide the visibility and control needed to deploy workloads flexibly in the evolving datacenter, which spans both private and public clouds.

Solution Briefs

Manage Risk and Security

This solution guide addresses the importance of implementing a strategic security and risk management program focused on prevention and protection, reducing incidents and risks across the enterprise, across every device, and across the entire IT infrastructure.

McAfee Enterprise Security Manager, Services Solutions for Managed Service Providers (MSPs)

McAfee Enterprise Security Manager offers the advanced scalability, flexibility, and control you need to protect your customers’ business, and grow yours.

McAfee Next Generation Firewall: Complete IPS Technology

McAfee Next Generation Firewall provides comprehensive IPS capabilities, including a flexible deployment options (hardware, software, or virtual appliances), evasion-proof detection against today’s most advanced attacks, broad inspection coverage, and much more.

Data Center Server Security Suites

McAfee Data Center Server Security Suites deliver the industry’s first comprehensive solution for securing mission-critical services in today’s mixed physical and virtual environments.

Expand Virtualization, Maintain Security

McAfee Management for Optimized Virtual Environments AntiVirus (McAfee MOVE AntiVirus) tailors security systems to the special technical and management requirements of virtualization.

Seven Myths About Advanced Malware

Advanced Malware — you know you don’t want it to infiltrate your systems, but do you know how to prevent it? This solution guide debunks the seven most common advanced malware myths to ensure you properly secure your systems from even the most evasive threats.

SIEM Compliance Made Easy

The McAfee SIEM solution, Enterprise Security Manager, addresses today’s complex compliance challenges by combining an established unified compliance framework with superior abilities to collect, retrieve, and protect the data required to assess and demonstrate compliance in real time. It’s tightly integrated log collection, management, analysis, and reporting improves an organization’s ability to meet compliance requirements through frameworks, streamlined workflow, and automation.

Securing the Internet of Things

The Internet of Things (IoT, or Internet-connected smart devices) is rapidly changing the way we live and the way we do business. McAfee is working closely with OEMs to address the expanding security requirements of IoT devices for every layer—devices, connections, the cloud, and data centers.

McAfee Delivers Comprehensive Threat Protection for the Financial Services Industry

This solution brief explains how the McAfee Security Connected approach provides advanced threat protection for the financial services industry and prevents targeted attacks.

Advanced Threat Defense for Network IPS

Many of today’s unknown, zero-day threats evade traditional defenses like intrusion prevention systems (IPS). The addition of third-party sandbox appliances can help, but they have several limitations: high cost of deployment, reliance on a generic virtual execution environment that may overlook target-specific attacks, and reliance solely on dynamic analysis, making the sandbox vulnerable to malware can detect secure environments and delay execution. McAfee Network Security Platform IPS and McAfee Advanced Threat Defense work together to find sophisticated threats, freeze them so they cannot infiltrate, and fix the damage done.

Advanced Threat Defense for the Email Gateway

Email is a vital communication vehicle for just about every business these days—and it is also a key threat vector for cybercrooks who are looking to steal valuable data or execute inbound attacks. As part of our unified, integrated Security Connected framework, McAfee Email Gateway and McAfee Advanced Threat Defense work together to find and freeze new, unknown, and stealthy advanced threats. For a complete end-to-end solution, add McAfee Real Time to the mix to quickly identify and fix systems impacted by advanced malware.

McAfee Advanced Threat Defense for McAfee Web Gateway

Social networks, cloud applications, and content-sharing sites have become essential business tools and IT organizations are struggling to make them safely accessible from inside and outside the corporate environment. Read this Solution Brief and see how McAfee Threat Defense for McAfee Web Gateway helps overcome the obstacles.

SIEM: Five Requirements that Solve the Bigger Business Issues

McAfee spoke with SIEM users and asked them to tell us about their primary issues with SIEM. This brief lists the top five issues along with corresponding customer case studies and use cases.

Smarter BYOD

As Gartner predicts, BYOD is here to stay and will soon become the rule rather than the exception. Users are eager to embrace the trend, but IT is reticent for good reason. This solution brief shows IT how to successfully get a handle on BYOD with a scalable strategy and integrated solutions that fall under the umbrella of the Security Connected framework from McAfee.

Real-Time Forensics Takes Network Security to the Power of Two

NIKSUN's NetDetector/NetDetectorLive expands security monitoring by combining signature-based intrusion detection system (IDS) functionality with statistical anomoly detection, analytics, and deep forensics with web reconstruction and packet-level decodes.

Technology Blueprints

Investigate Data Breaches

McAfee enables enterprises to collect, analyze, and preserve security forensic information. With a solution that includes content- and context-aware SIEM, McAfee provides alerts to security events, as well analysis on how the attacked occurred, affected users, and compromised data — so you can better understand the severity of a security breach.

White Papers

Data Loss Prevention Best Practices for Healthcare

Due to the ever-changing web of regulations that span federal, state, and local jurisdictions, healthcare organizations are being required more than ever to safeguard patient data, including electronic protected health information (ePHI). This paper explains how deploying a Data Loss Prevention system in a healthcare organization is one part of a broader data protection program.

Discover. Protect. Expand.

Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.

The Blended IPS: Leveraging Snort and Optimizing Malware Security

This paper is to present the satisfied Snort user and open source security proponent with an effective way to add advanced malware detection and automated threat blocking to an existing Snort-based intrusion prevention system (IPS).

Preventing Targeted Attacks with McAfee's Advanced Threat Defense

In this white paper, IDC outlines McAfee Advanced Threat Defense (ATD) within the context of the specialized threat analysis and protection market. Our centralized approach to malware analysis, deep integrations across the product portfolio, and three-pronged focus on "Find, Freeze, Fix" as a way of dealing with threats is unique within the market and provides a more holistic approach than other detection-oriented products.

Strengthening Security, Control, and Compliance for Retail OEMs and Their Customers

This white paper provides retail OEMs and their customers with insights into the technologies that are part of the McAfee embedded security solution, along with security, management, and compliance benefits made possible by shipping retail devices with security built in. You’ll learn how this integrated solution goes beyond device protection and extends security across the entire retail environment.

Conquer the Top 20 Critical Security Controls

The strength of the Critical Security Controls (CSCs) is their ability to reflect the consensus of successful experiences captured and refined over multiple revisions. The CSCs help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

Community

Blogs

  • The Security Impact of Shadow IT: December #SecChat
    McAfee Enterprise - December 5, 2013
    Is something dangerous lurking in the shadows of your organization? That’s the question we sought to answer by commissioning Stratecast to research the use of unauthorized Software-as-a-Service (SaaS) applications in the workplace. The findings revealed that widespread risk for companies is originating from the use of unauthorized apps within the workplace. According to the study, […]
  • Taking Shadow IT Out of the Shadows
    Lynda Statdtmueller - December 4, 2013
    Look around your office. Flip through your business contact list. Chances are that four out of five of your colleagues are violating company IT rules. This startling revelation comes from a recent Software-as-a-Service (SaaS) survey conducted by Stratecast and sponsored by McAfee. The survey set out to examine “shadow IT,” defined as employees’ use of […]
  • Is There Something Phishy In Your Inbox?
    David Bull - November 20, 2013
    Phishing is a widespread problem. According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. Can you tell if this email is legitimate or not? Think about this: How many packages does your company receive in a typical day? Likely […]
  • How Much Are Your Assets Worth?
    Cybermum Australia - September 26, 2013
    Now, if your tax returns are up to date and you have a healthy relationship with a financial planner, I have no doubt you could answer this question in an instant. But what about your other assets? And I am not referring to your children because clearly they are priceless – most of the time!! […]
  • Hackers are Cashing in on Instagram Likes
    Gary Davis - September 9, 2013
    They say popularity has its price. This saying holds a new weight when it comes to the growing influence of social media. In fact, your “Likes” may be worth more to hackers than your credit card number. As counterintuitive as it may seem, your social clout has become the new target of hackers. And they’re […]
Threats and Risks