Email is your most critical business application and one of the most challenging to protect, but simply blocking spam and viruses is not enough. Comprehensive email security requires defending against sophisticated new attacks, preventing loss of sensitive business data, and protecting your own corporate email reputation.
Going beyond spam and malware filtering, McAfee Email and Web Security Appliance combines market-leading email protection with data loss prevention, policy-based controls, and advanced reporting. Powered by McAfee Global Threat Intelligence, Email and Web Security Appliance is armed with the latest proactive defenses against both known and unknown threats. Highly scalable to meet the needs of the most demanding enterprises, yet easily managed, Email and Web Security Appliance provides the highest level of email security with complex features and functionality built in to a simple, user-friendly interface.
Email and Web Security Appliance delivers:
Comprehensive inbound security against all email-borne threats — With its extremely low rate of false positives, Email and Web Security Appliance keeps spam out while accurately delivering legitimate email.
Outbound inspection against reputation-damaging email — Block messages that could negatively impact your corporate email reputation. Infected systems within your network can cause your domain to be blacklisted as an origin of spam and your corporate email to be automatically rejected by your business partners and customers.
Integrated data loss prevention for compliance and policy enforcement — Built-in McAfee Data Loss Prevention (DLP) technology includes dictionaries, document fingerprinting, compliance, and validation tools.
Enhanced security powered by McAfee Global Threat Intelligence — McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based service integrated into McAfee security products. It works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Email and Web Security Appliance uses file reputation, web reputation, message reputation, and network connection reputation services to identify suspicious files, sites hosting undesirable content, infected domains and IP addresses, and email messages carrying malicious payloads.
Keep spam out while accurately allowing legitimate email. With McAfee Email and Web Security Appliance, you don’t need to choose between effective spam blocking and low false-positive rates because you get both.
Inspect outbound traffic, identifying and stopping messages that could negatively impact your corporate email reputation.
Working with McAfee Quarantine Manager, Email and Web Security Appliance allows administrators to easily consolidate and manage email quarantines. Quarantine Manager is a highly scalable, centralized, off-box server that delivers role-based administration, granular quarantines, and a customizable user interface.
Centralize appliance configuration, policy management, and reporting through McAfee ePO software, the first and only platform to manage systems, networks, data, and compliance solutions across any size organization. The integration of Email and Web Security Appliance with McAfee ePO software enables administrators to automatically push out and implement configuration and policy changes across all appliances in the enterprise.
Get real-time visibility into important system activities such as detection rates, scanning policies, and system health. Chose from predefined reports or customize your own. View reports immediately or schedule email delivery of the reports you want.
Leverage network, file, and message reputational analysis to apply threat intelligence from McAfee security devices around the globe for quicker, more accurate identification of spam, malware, malicious embedded URLs, and other threats.
Understand, filter, control, and monitor Internet usage. Group-based policies are simple to configure; more than 95 filter categories are included as a standard feature.
Increase capacity as your needs grow. Built-in clustering and load-balancing capabilities provide easy scalability options; simply add appliances to grow capacity. Available deployment options range from units designed for small and mid-sized businesses to appliances that meet the needs of the most demanding enterprises.
McAfee Email and Web Security Appliance is available as a standard or virtual appliance. These are minimum hardware requirements for the virtual appliance. Actual requirements will vary depending on the nature of your environment.
With five stars across the board in every product rating category, McAfee Email Protection was awarded the top 5-Star Rating by SC Magazine – measured on its features, ease of use, performance, documentation, support and value for the money.
McAfee spam filter helps Berendsen improve IT department performance.
Cardnet eliminates malware infections with comprehensive network, email, and endpoint security from McAfee.
McAfee secures Cassling with smart, simple solutions.
McAfee bolsters security for the City of St. Paul, Minnesota.
Comprehensive and easy-to-manage security from McAfee protects Dawnay Day's network and endpoints from attacks.
Ellis Hospital simplifies security risk management with McAfee.
Cancer research group stays on task with McAfee.
McAfee simplifies security management for French city’s local government.
Manteca Unified School District protects students with McAfee solutions.
Smith College strengthens Internet and email security with McAfee.
For technical specifications on the McAfee product listed above, please view the product data sheet.
For a technical summary on the McAfee product listed above, please view the product data sheet.
This paper characterizes new web threats, explains why most security solutions in place today are ineffective, and then proposes three key organizational principles for assessing and enhancing web security—security, control, and flexibility—and nine functional requirements that enable these principles.
In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made this critical point: Stopping attacks before they breach and narrowing the breach discovery gap require the ability to detect threats at […]
Hang ten, dude! It’s summertime and surfers are taking to the ocean to go catch some gnarly waves. Experienced surfers know that there are dangers out in the water and are trained to look out for them. These dangers include rip currents, shallow water, and of course, sharks. Just like there are dangers in the […]
“Shadow IT” is stepping out into the light of day. Business users are eagerly embracing the cloud and especially Software-as-a-Service (SaaS) in search of cost-effective productivity tools for file sharing and storage, collaboration, social media, and anything else that makes them more effective on the job. But the problem is these well-intentioned, hardworking employees are […]
Targeted attacks can take on many different forms and are flexible enough to adopt a variety of tactics. Think of them as a specialized unit for cyber criminals. They are utilized for very specific missions and operate with the precision of a surgical strike, rather than the carpet-bombing techniques used in other attack strategies. Whether […]
The post July #SecChat – Targeted Attacks Set Sights on Vital Systems appeared first on McAfee.
Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often than random phishing attempts. Exploits that use patched vulnerabilities delivered via spear phishing email are one of the most successful combinations used by attackers to infiltrate targeted organizations and gain access to confidential information. During […]
The post Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities appeared first on McAfee.