McAfee Total Protection for Internet Gateways

McAfee Total Protection for Internet Gateways

Comprehensive security for web, email, and data loss prevention

Next Steps:

Overview

McAfee Total Protection for Internet Gateways bundles the software licenses for McAfee Web Gateway, McAfee Email Gateway, and McAfee Network DLP Prevent into a one suite purchase. This unified approach offers the right security to protect your users and data from today’s inbound and outbound threats.

  • Protection against Web 2.0 blended and targeted malware attacks
  • Email free of spam, malware, phishing attacks, or other email-borne threats
  • Reduced bandwidth and malware cleanup costs while increasing employee productivity
  • Safe web surfing without fear of phishing, spyware, and other attacks
  • Safety for both structured (e.g., credit card numbers) and unstructured data (e.g., financial records or blueprints) throughout the entire enterprise
  • Assist in achieving industry and regulatory compliance

Total Protection for Internet Gateways includes unique licensing arrangements that allow you to have the best protection at the lowest possible total cost of ownership. Because McAfee can combine leading technologies into one packaged solution, Total Protection for Internet Gateways is easy on today’s tight budgets.

Features & Benefits

Get strong, proven malware protection

Reduce your exposure to blended threats and targeted attacks with the top-ranked, industry-leading anti-malware solution.

Realize effective spam detection

Eliminate virtually all spam with better than 99% detection and protect your users, storage, and servers.

Protect structured and unstructured data

Leverage our highly-accurate, detailed classification engine to quickly and easily identify both known and unknown sensitive data.

Maximize administrative efficiencies

Reduce your administrative overhead with simplified footprints, rapid deployment, and enterprise-wide compliance reporting.

Use global intelligence services

Leverage the security expertise of McAfee Labs to protect your business-critical web and email applications.

Automatically enforce industry and regulatory controls

Apply policies consistently to stop sensitive and protected data from leaving the enterprise through email and web traffic.

Get the industry’s best web protection

Fight Web 2.0 threats with the #1-rated malware protection; McAfee Web Gateway uses proactive intent analysis to filter out objectionable content from web traffic in real time, defending against both known and unknown threats.

Protect your webmail application

Extend integrated security to Outlook Web Access, iNotes, and other common webmail applications.

Gain backscatter protection

Identify and block false non-delivery notices forged by viruses and spammers.

Filter on category

Take advantage of comprehensive and granular category coverage; the McAfee TrustedSource Web Database provides a proven repository of more than 25 million websites that can be blocked across more than 90 categories.

Use powerful reporting tools and customizable dashboards

Learn how your organization uses the web, identifies usage trends, isolates problems, documents inappropriate web activity, complies with regulations, and uses this information to tailor your filtering settings to best enforce your web-usage policies.

Integrate with Web Proxies and MTAs

Use X-Headers for the required action and eliminate unauthorized transactions at the application layer rather than simply dropping the TCP session.

Use comprehensive data classification

Identify and protect more than 300 different content types, in 12 spoken languages, including complex intellectual property.

Community

Blogs

  • Top 3 Phishing Attacks Use Similar Tricks
    Mohammed Mohsin Dalla - September 16, 2014

    Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing scams that attempt to steal your web mail credentials. Web Mail Scam This scam starts with an email that appears to come from Administrator or Helpdesk and requests that you validate or update your account. […]

    The post Top 3 Phishing Attacks Use Similar Tricks appeared first on McAfee.

  • Network Security Perspective: One Phish, Two Phish
    Ruby Williams - September 9, 2014

    It’s hard to believe we’re already past the half way mark for the year, but I suppose that’s what happens when we live in a world with so much action and activity all around us.  As I’ve said before, the pace of business today is overwhelming.  We’re inundated with content and data coming at us […]

    The post Network Security Perspective: One Phish, Two Phish appeared first on McAfee.

  • 6 Ways to Secure Your Email Account
    Robert Siciliano - September 8, 2014

    On August 30th, 1982, a copyright for a Computer Program for Electronic Mail System was issued to Shiva Ayvadurai. Thus, email was born. 32 years later, email has become an essential part of our lives. Emails are a must-have item, allowing us to connect and share information with friends, teachers, and co-workers. To celebrate email’s […]

    The post 6 Ways to Secure Your Email Account appeared first on McAfee.

  • Email Phishing – The Most Dangerous Threat You Can’t Avoid
    Rees Johnson - September 3, 2014

    The threat of infiltration by a cybercriminal is a concern every business should be assessing carefully. Where do I deploy protection? How robust do my defenses need to be? What about my employees and their actions? These are all questions valid in the discussion of protecting businesses and their critical data. When we evaluate the […]

    The post Email Phishing – The Most Dangerous Threat You Can’t Avoid appeared first on McAfee.

  • Detection Effectiveness: the Beat Goes On
    McAfee Labs - August 27, 2014

    In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made this critical point: Stopping attacks before they breach and narrowing the breach discovery gap require the ability to detect threats at […]

    The post Detection Effectiveness: the Beat Goes On appeared first on McAfee.

Related Solutions
Threats and Risks