McAfee Cloud Single Sign On

McAfee Cloud Single Sign On

Simplify and secure cloud application access

Next Steps:

Overview

McAfee Cloud Single Sign On relieves the pain that end users have managing multiple passwords for cloud applications. McAfee Cloud Single Sign On allows you to enforce corporate standards for cloud application access and improves productivity for IT and end users by eliminating password reset requests.

Plug-and-play cloud single sign-on connectors — Get out-of-the-box integration with hundreds of popular cloud applications, such as Salesforce.com and Google Apps. No coding or separate tool kit purchase required. Simply pick, configure, and assign users to your cloud application and you are ready to go. Quick implementation means a better return on your investment and a faster time to value. Support for four different authentication models provides the broadest range of application coverage.

Eliminate password headaches — Enhance corporate security by reducing password-related risks of cloud access, while improving IT and end-user productivity by significantly reducing password reset requests.

Built-in strong authentication — Security is the biggest concern customers express about moving data and applications to the cloud. Cloud Single Sign On provides built-in two-factor authentication, based on the industry-leading McAfee One Time Password solution.

Regain control of the cloud access security lifecycle — McAfee Cloud Single Sign On allows IT to effectively manage cloud access with single sign-on, provisioning, and deprovisioning of cloud applications synchronized with Active Directory, strong authentication, and consolidated monitoring and reporting.

Hybrid deployment option — McAfee Cloud Single Sign On offers unique on-premises, cloud, or mixed deployment options, all for one low subscription price. The ability to pick and choose the deployment model that best meets your distinctive business needs provides maximum flexibility without compromising security or manageability.

IoAs: Act earlier and more definitively to disrupt attacks

Learn More

Intel Security perspectives:

Get the latest insights from Mike Fey on Dark Reading

Read Now

Protect your servers — from physical to virtual to cloud

View Infographic

Features & Benefits

Improve usability and productivity from a single sign-on (SSO)

McAfee Cloud Single Sign On improves the user experience by eliminating the need to remember multiple user ID/password combinations, while enforcing corporate security requirements and reducing password reset requests.

Extend support for a wide variety of applications

Support for four different methods of integrating with your web applications, including industry standards like SAML, OpenID, and OAuth, enables SSO support for a wide variety of cloud and internal web applications.

Enhance security with two-factor authentication

Strengthen overall application access security and reduce the risk of data loss and fraud through policy-based authentication enforcement. McAfee Cloud Single Sign On includes a one-time password (OTP) module that provides everything you need to implement strong authentication for your sensitive web applications. The flexible and easy-to-use McAfee One Time Password Pledge app — available with both the on-premises or SaaS editions — delivers an OTP using any smartphone (iPhone, Android, etc.) or PC (Windows or Mac). Other OTP delivery options include SMS text message, email, instant message, and USB tokens, and support for Intel Identity Protection Technology (IPT) on Intel processors.

Improve productivity with automated provisioning

Enhance productivity and reduce downtime by automatically provisioning and deprovisioning cloud accounts synchronized with your enterprise directory. Business rules enable you to quickly and easily onboard new users and assign them to specific applications, based on individual identity attributes. Changes in user attributes are automatically synchronized across cloud application accounts. Cloud accounts are automatically disabled when employees are removed from the corporate directory, enhancing security by blocking former users’ access to sensitive data and facilitating regulatory compliance. Identify rogue or orphan accounts to verify that SaaS user accounts match with policy to ensure that only authorized accounts exist in the application.

Customer Stories

Beverly Hills Wealth Management (BHWM)

Not only can McAfee Cloud Single Sign On deliver a BHWM-branded experience to users, but the system can be tailored to meet the needs of both internal and external users — with both provisioning/deprovisioning and standards-based SSO capabilities.

Highlights
  • Increased end-user convenience and productivity
  • Stronger security through elimination of multiple passwords and use of SAML for federated SSO
  • Flexibility to add new SaaS solutions quickly and easily as company grows
  • Integration with enterprise identity repositories for automatic provisioning and deprovisioning
  • Solution that leverages a cost-effective, hosted hybrid cloud environment

Read Full Case Study

Messmer Catholic Schools

McAfee Cloud Single Sign On serves as Messmer Catholic Schools’ SSO login page and portal, delivering seamless integration with Google Apps for Education.

Highlights
  • Reduced IT load for maintaining accounts
  • Elimination of password-related calls
  • More efficient and convenient access to SaaS applications for staff and students

Read Full Case Study

Platinum Group

Secure Single Sign-On Enables Migration to the Cloud

Highlights
  • High user acceptance of SaaS solution since users only have to enter credentials once
  • Stronger security through use of industry-standard SAML tokens
  • Integration with enterprise identity repositories for automatic provisioning and deprovisioning

Read Full Case Study

Senior Service America, Inc.

McAfee was able to set up a McAfee Cloud Single Sign On system in the test environment in less than an hour, allowing Senior Service America to implement SSO for their partner portal.

Highlights
  • Improved end-user experience with convenience of SSO
  • Ability to easily add more SaaS solutions to the portal over time
  • Rapid deployment capabilities
  • 24/7 support from the industry’s leading global IT vendors
  • Provisioning and deprovisioning to reduce costs, improve IT efficiency

Read Full Case Study

System Requirements

These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.

  Management Console Application Portal
Desktop browser
(On-Premise Edition)
Firefox 5, Internet Explorer 8 Chrome 16, Firefox 5,
Internet Explorer 7, Safari 5.1.2
Desktop browser
(SaaS Edition)
  IE 9 IE 10 Firefox Chrome
OS X 10.7     X X
Windows 8   X X X
Windows 7 X X X X
Windows Vista X   X X
Windows XP     X X
Mobile browser
(On-Premise Edition)
Not supported Android 2.0,
iOS devices & Safari browser
Server
(On-Premise Edition)
Windows Server 2003, 2008, or 2008 R2;
Red Hat Enterprise Linux Server and
Advanced Platform 5.0
32- or 64-bit
Not applicable
Hardware
(On-Premise Edition)
Any Intel multi-core server processor,
2 GB RAM

Demos / Videos

Demos

Network Security Platform uses multiple detection engines to alert on today’s stealthy malware.

Use event correlation and progressive disclosure workflows to prioritize events, improve detection, and speed investigation.

Network Security Platform uses new advanced detection capabilities to uncover both known and unknown botnets.

Network Security Platform includes application visibility and control of over 1,100 applications and protocols.

A core element of any cloud security strategy is the enforcement of acceptable usage policies. See how McAfee Web Protection provides system and network administrators with more than 1,000 application controls to manage user’s access to specific cloud application functions, such as Facebook or YouTube.

Tutorials

After viewing this video, you will know what action rules are and how to create them in McAfee Data Loss Prevention

Learn how to configure McAfee Network Threat Behavior Analysis through our step-by-step installation tutorial.

After viewing this video, you will know what templates are and how to create them in McAfee Data Loss Prevention.

Videos

McAfee Threat Intelligence Exchange integrates, automates, and simplifies to decisively reduce TCO and optimize enterprise security. It eliminates complexity, provides instantaneous speed, and illuminated knowledge that can lower operating costs while streamlining protection and response ― all while freeing valuable security team resources.

McAfee Application Control ensures only trusted applications run on servers and endpoints. It reduces risks from unauthorized software, boosts endpoint control, extends the viability of fixed-function systems without impacting performance, and lowers operating costs.

Outdated methods of malware detection leave crucial data at risk. Learn how McAfee solutions can prevent advanced malware attacks and protect valued assets.

Leverage this video to learn how to build consumer trust through online security

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

McAfee Cloud Single Sign On relieves the pain that end users have managing multiple passwords for cloud applications.

Ensure continuous compliance. McAfee Configuration Control prevents unauthorized changes on critical servers, boosts visibility into your environment, and streamlines internal and external IT audit processes.

McAfee Content Security Blade Server protects enterprise networks from spam, malware, and other intrusions with a single, high-performance solution. Based on next-generation blade server architecture, Content Security Blade Server reduces IT costs, cuts complexity, and easily scales by inserting additional scanning blades to address future capacity requirements.

In an age of ever-changing technology threats, McAfee helps protect critical infrastructure industries in all sectors with a cloud-to-endpoint security portfolio. Backed by the highest level of Global Threat Intelligence, McAfee delivers real-time visibility, the latest protections, and quick proof of compliance, plus optimized solutions for proprietary SCADA systems.

Learn how Beverly Hills Wealth Management maximized SaaS access to user applications.

Learn why Riverside Healthcare chose McAfee Enterprise Mobility Management (McAfee EMM) to manage the influx of mobile phones and tablets on its network.

Awards / Reviews

451 Research: Analyst Evaluation of McAfee Cloud Identity Manager
Analyst firm 451 Research takes a closer look at McAfee Cloud Single Sign On (formerly McAfee Cloud Identity Manager) and McAfee’s identity and access management strategy and concludes that “…the foundation being laid has a solid reach – from the device hardware to the cloud.”

SC Magazine: McAfee Cloud Identity Manager Product Review
SC Magazine gives McAfee Cloud Identity Manager 4.75 stars out of a possible 5 stars. "...we found the McAfee Cloud Identity Manager to be a good value for the money."

News / Events

Resources

Data Sheets

McAfee Rogue System Detection

This data sheet explains how McAfee Rogue System Detection fully integrates with McAfee ePolicy Orchestrator to provide real-time discovery of rogue systems connected to the network to offer greater network visibility and protection.

McAfee ePO Cloud

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

McAfee 5700 Scan Engine and .DATs

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

McAfee Security Management Center

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

Security for Email Servers

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Firewall/VPN Appliance Comparison

Download a technical comparison of all McAfee Firewall/VPN appliances.

McAfee Next Generation Firewall Appliance Comparison

Download a technical comparison of all McAfee Next Generation Firewall appliances.

McAfee Firewall/VPN

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

McAfee Next Generation Firewall Roles and Licensing Options

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall Modules

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall MIL-320

For technical specifications on the McAfee product listed above, please view the product data sheet.

Additional Subscriptions for McAfee Next Generation Firewall

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Virtual Contexts

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall S-Model Appliance Specifications

Find detailed technical specifications for six models of the McAfee Next Generation Firewall S-series.

Application Data Monitor

For a technical summary on the McAfee product listed above, please view the product data sheet.

Database Event Monitor for SIEM

For a technical summary on the McAfee product listed above, please view the product data sheet.

Enterprise Log Manager

For a technical summary on the McAfee product listed above, please view the product data sheet.

Enterprise Security Manager

For a technical summary on the McAfee product listed above, please view the product data sheet.

Global Threat Intelligence for Enterprise Security Manager

For a technical summary on the McAfee product listed above, please view the product data sheet.

Identify Data Risk In Your Organization

Identify the risks to your vital information that exist within your organization so that you can take appropriate measures to prevent exposure and potentially damaging consequences.

McAfee Application Control

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Application Control for Desktops

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Complete Endpoint Protection—Business

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Complete Endpoint Protection—Enterprise

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Email Gateway Hardware Appliance Specifications

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Endpoint Protection for SMB

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee SIEM Supported Devices

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

Reports

Network Performance and Security

This report discusses how CIOs and CISOs can avoid risky tradeoffs and boost threat defenses by deploying next-generation firewalls that are built for both security and network performance.

Network Performance and Security Executive Summary

This is the executive summary to the report discussing how CIOs and CISOs can avoid risky tradeoffs and boost threat defenses by deploying next-generation firewalls that are built for both security and network performance.

What's Next: Industry Experts Speak Out on The Network Performance and Security Trade-Off

Industry Experts Speak Out: The Network Performance and Security Trade-Off report is a collection of insights and opinions from network security experts discussing the common and risky tradeoff many organizations are forced to make between network performance and security.

SANS Analytics and Intelligence Survey

This paper explores the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.

Security Value Map — NSS Labs

McAfee NGFW 5206 appliance is compared directly with 11 competitive next-generation firewall products.  Detailed comparisons are provided across the categories of security, performance, and total cost of ownership (TCO) and presented in an aggregated graph.

Throughput and Scalability Report McAfee NGFW 5206 — Miercom

Independent testing lab Miercom performed comprehensive throughput and scalability testing on the McAfee NGFW 5206 appliance. Testing was performed with application control, deep packet inspection, and antivirus enabled, and in configurations of one to four clusters.

McAfee Next Generation Firewall review by Frank Ohlhorst, Enterprise Networking Planet

Threats aimed at corporate entities and enterprises are rapidly evolving, with targeted attacks becoming the norm and advanced persistent threats (APTs) increasing. What's more, APTs have been further fueled by the rise of advanced evasion techniques (AETs), which help APTs bypass firewalls, security appliances, and endpoint security products. The answer to APTs and AETs is advanced next-generation firewall software. This technology review examines the McAfee Next Generation Firewall solution that's designed to quell today's security concerns by combining a plethora of security technologies with obfuscation techniques that successfully thwart attacks.

McAfee Next Generation Firewall: Optimize Your Defense, Resilience, and Efficiency

This eBook provides an in-depth overview of the features and benefits of the technologies within McAfee Next Generation Firewall.

NSS Labs Next Generation Firewall Product Analysis — NGF-1402 v5.7.1

McAfee Next Generation Firewall awarded NSS Labs’ “Recommended” for the third year in a row.

Magic Quadrant for Mobile Data Protection 2014

McAfee positioned as a leader in Gartner’s Magic Quadrant for Mobile Data Protection.

Solution Briefs

Hybrid Email Security: Maintain privacy while gaining benefits of the cloud

Information confidentiality and reduced configuration flexibility are often cited as reasons for not taking advantage of cloud-based email security. This brief discusses how hybrid security can enable organizations with these concerns to enjoy the benefits of the cloud without sacrifice.

Advanced Threat Defense for Next-Generation Firewalls

Next-generation firewalls certainly offer expanded network security for branch offices and remote locations, but they can’t find and block stealthy, advanced malware. Through the Security Connected approach from McAfee, Advanced Threat Defense and McAfee Next Generation Firewall work hand-in-hand to find and freeze today’s evasive and targeted cyberattacks.

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange

There’s no doubt that organizations face significant challenges protecting their intellectual property and critical assets from the emerging threats that target their environments. This solutions brief highlights how McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight today’s advanced threats.

McAfee Threat Intelligence Exchange and Endpoint Protection

McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threats response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

Security in Unison

McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threat response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange

Deliver Context-Aware, Prioritized Threat Intelligence Across Your Enterprise.

McAfee Threat Intelligence Exchange and Endpoint Protection

Get cutting-edge endpoint visibility, control, and protection.

A Case for the Value of SIEM: The Security Evolution

With the advent of big data, traditional SIEM solutions that focus only on logging and compliance reporting fall short of the demands of today’s enterprises for threat intelligence, correlation, and remediation. McAfee Enterprise Security Manager, the core of the McAfee SIEM solution, is both smart and fast. Its proprietary information management back end, purpose-built for managing big data, offers the critical combination of intelligence and speed.

White Papers

Calculating the Business Value of Next Generation Firewall — IDC

This white paper articulates the business benefits derived by companies that have deployed a NGFW solution. The data is based on in–depth interviews with eight McAfee customers. These companies were mostly large organizations with an average employee base of 7,082. Interviewees came from a variety of industries — energy, financial services, manufacturing, retail, service provider, technology, and education.

Factory of the Future

This paper discusses, in a question-and-answer format, insights shared by Vice President and Chief Security and Privacy Officer (CSPO) Malcolm Harkins and team members at Intel Corporation and Intel Security on the process of reshaping security for its fabrication plant infrastructure.

Direct or Transparent Proxy: Choose the right configuration for your gateway.

Secure web gateways are essential in today’s connected world, but which proxy configuration should you choose: direct or transparent? This white paper guides you through the pros and cons and makes recommendations that will help you secure your company and your users more effectively.

Demand More of Your Next-Generation Firewall

Get intelligence-aware capabilities that encompass your entire network security infrastructure.

Community

Blogs

  • The Security Impact of Shadow IT: December #SecChat
    McAfee Enterprise - December 5, 2013
    Is something dangerous lurking in the shadows of your organization? That’s the question we sought to answer by commissioning Stratecast to research the use of unauthorized Software-as-a-Service (SaaS) applications in the workplace. The findings revealed that widespread risk for companies is originating from the use of unauthorized apps within the workplace. According to the study, […]
  • Taking Shadow IT Out of the Shadows
    Lynda Statdtmueller - December 4, 2013
    Look around your office. Flip through your business contact list. Chances are that four out of five of your colleagues are violating company IT rules. This startling revelation comes from a recent Software-as-a-Service (SaaS) survey conducted by Stratecast and sponsored by McAfee. The survey set out to examine “shadow IT,” defined as employees’ use of […]
  • Is There Something Phishy In Your Inbox?
    David Bull - November 20, 2013
    Phishing is a widespread problem. According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. Can you tell if this email is legitimate or not? Think about this: How many packages does your company receive in a typical day? Likely […]
  • How Much Are Your Assets Worth?
    Cybermum Australia - September 26, 2013
    Now, if your tax returns are up to date and you have a healthy relationship with a financial planner, I have no doubt you could answer this question in an instant. But what about your other assets? And I am not referring to your children because clearly they are priceless – most of the time!! […]
  • Hackers are Cashing in on Instagram Likes
    Gary Davis - September 9, 2013
    They say popularity has its price. This saying holds a new weight when it comes to the growing influence of social media. In fact, your “Likes” may be worth more to hackers than your credit card number. As counterintuitive as it may seem, your social clout has become the new target of hackers. And they’re […]
Threats and Risks