Cloud Security

Exploit the cloud without exposing your data

Next Steps:


Cloud computing provides tremendous benefits to organizations of all sizes. For small and mid-sized businesses, cloud computing allows time-constrained IT teams to operate more efficiently. For large enterprises, the cloud provides the ability to scale up or down to respond quickly to changing market conditions. Businesses of all sizes can leverage the cloud to increase innovation and collaboration. Yet many organizations are hesitant to fully leverage the benefits of the cloud, citing concerns regarding data loss and unauthorized access, and are reluctant to rely on cloud providers to solve these challenges.

McAfee Cloud Security helps organizations safely and confidently leverage secure cloud computing services and solutions. Rather than adopting the unique — and sometimes unknown — security practices and policies of each cloud vendor, McAfee Cloud Security allows businesses to extend and apply their own access and security policies into the cloud by securing all the data traffic moving between the enterprise and the cloud, as well as data being stored in the cloud.

To learn more about cloud security, view the Augment or Advocate? Strategic Approaches for Securing the Cloud on-demand webcast.

Protect your Azure environment with McAfee Endpoint Security

Learn More

Key Benefits

  • Compute in the cloud with more confidence
    Overcome common cloud computing security concerns and compliance obstacles by extending corporate security and policies to apply to cloud traffic.
  • Secure all your critical data
    Protect, identify, and classify all critical data while it moves between the enterprise and the cloud — email, web, and authentication traffic.
  • Operate with more efficiency and flexibility
    Reduce IT drag by combining data loss prevention, email, web, and identity and access management under a single, modular-based platform. Deploy in a variety of form-factors, including on-premise appliances, cloud, or a hybrid of both.
  • Protect the sensitive information in your databases
    Take advantage of the increased scalability, flexibility, availability, and the lower costs offered by the cloud, while carefully monitoring data to make sure it is protected. Meet the requirements of compliance regulations with McAfee Database Activity Monitoring.

Awards / Reviews

McAfee Named One of the 20 Coolest Cloud Security Vendors by CRN, 2012

The Intel-owned security company has been preaching cloud security measures since before the cloud truly formed. McAfee’s central cloud piece is the Cloud Security Platform, which secures content and data—e-mail, Web and identity—as it moves to and from the cloud.

SC Magazine for IT Security Professional
McAfee Cloud Security Platform Named a Finalist (Best Cloud Computing Security 2012) from SC Magazine

These technologies are deployed to protect data and/or applications deployed in a cloud environment. They may also protect the cloud computing infrastructure itself.

Customer Stories

Beverly Hills Wealth Management (BHWM)

Not only can McAfee Cloud Identity Manager deliver a BHWM-branded experience to users, but the system can be tailored to meet the needs of both internal and external users — with both provisioning/deprovisioning and standards-based SSO capabilities.

  • Increased end-user convenience and productivity
  • Stronger security through elimination of multiple passwords and use of SAML for federated SSO
  • Flexibility to add new SaaS solutions quickly and easily as company grows
  • Integration with enterprise identity repositories for automatic provisioning and de-provisioning
  • Solution that leverages a costeffective, hosted hybrid cloud environment

Messmer Catholic Schools

McAfee Cloud Identity Manager serves as Messmer Catholic Schools’ SSO login page and portal, delivering seamless integration with Google Apps for Education.

  • Reduced IT load for maintaining accounts
  • Elimination of passwordrelated calls
  • More efficient and convenient access to SaaS applications for staff and students

Platinum Group

Secure Single Sign-On Enables Migration to the Cloud

  • High user acceptance of SaaS solution since users only have to enter credentials once
  • Stronger security through use of industry-standard SAML tokens
  • Integration with enterprise identity repositories for automatic provisioning and deprovisioning

Senior Service America, Inc.

McAfee was able to set up a McAfee Cloud Identity Manager system in the test environment in less than an hour, allowing Senior Service America to implement SSO for their partner portal.

  • Improved end-user experience with convenience of SSO
  • Ability to easily add more SaaS solutions to the portal over time
  • Rapid deployment capabilities
  • 24/7 support from the industry’s leading global IT vendors
  • Provisioning and deprovisioning to reduce costs, improve IT efficiency


Email Security

McAfee Email Protection
McAfee Email Protection

McAfee Email Protection provides the ultimate in cloud email security and flexibility. Whether you are looking for an onsite solution with McAfee Email Security Appliance, or leveraging the cloud with McAfee SaaS Email Protection & Continuity, or a hybrid combination of the two, Email Protection empowers you to deploy email security the way that best fits your current and future needs. Cloud security is delivered from McAfee Labs, providing the most comprehensive Global Threat Intelligence.

Web Security

McAfee Web Protection
McAfee Web Protection

McAfee Web Protection combines advanced web security, controls, and deployment flexibility. Whether you are looking for the control of an onsite solution with McAfee Web Gateway, the ease of Security-as-a-Service (SaaS) management with McAfee SaaS Web Protection, or a hybrid combination of the two, McAfee Web Protection empowers you to deploy web security the way that best fits your current and future needs.

Data Loss Protection

McAfee Total Protection for Data Loss Prevention
McAfee Total Protection for Data Loss Prevention

McAfee Total Protection for Data Loss Prevention (DLP) safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives – on the network, in storage systems, or at the endpoint, while saving time and money with centralized deployment, management, and reporting.

Database Security

McAfee Database Activity Monitoring
McAfee Database Activity Monitoring

McAfee Database Activity Monitoring stops attacks in real time, delivers sophisticated audit reports to help meet compliance requirements, and eases vulnerability remediation with virtual patching technology. McAfee's memory-based Activity Sensor architecture allows for highly scalable, reliable database protection across both physical and virtual environments. Sensors can be automatically provisioned and customers can monitor managed services in-house.

Integrated Suites

McAfee Content Security Suite
McAfee Content Security Suite

McAfee Content Security Suite bundles McAfee Web Protection, McAfee Email Protection, McAfee Network DLP Prevent, and McAfee Device Control into a one-suite purchase.



Data Sheets

Cloud-Based Online Security Through McAfee SaaS Solutions

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee SaaS Web & Email Security with Archiving

For a technical summary on the McAfee product listed above, please view the product data sheet.


Security and Cloud: Augment, or Abdicate?

In this Analyst Insight, Aberdeen examines two groups of respondents with distinct strategies for addressing common concerns about security and compliance for cloud computing.

Solution Briefs

The Cloud is Changing Everything: It's Not Just for Scaling Your Business, But Protecting it Too

Editorial brief by Scott Chasin, McAfee Chief Technology Officer, SaaS, McAfee.

White Papers

Know Your Cloud

In a May 2013 survey by SC Magazine, 160 readers were asked about their Cloud security services and needs. This report outlines the results.

Federal Cloud Security Challenges and Solutions

This paper is designed to define the landscape of federal cloud security initiatives, distill relevant standards and security design patterns, and map these to commercial technologies in the market today.



  • The Security Impact of Shadow IT: December #SecChat
    McAfee Enterprise - December 5, 2013
    Is something dangerous lurking in the shadows of your organization? That’s the question we sought to answer by commissioning Stratecast to research the use of unauthorized Software-as-a-Service (SaaS) applications in the workplace. The findings revealed that widespread risk for companies is originating from the use of unauthorized apps within the workplace. According to the study, […]
  • Taking Shadow IT Out of the Shadows
    Lynda Statdtmueller - December 4, 2013
    Look around your office. Flip through your business contact list. Chances are that four out of five of your colleagues are violating company IT rules. This startling revelation comes from a recent Software-as-a-Service (SaaS) survey conducted by Stratecast and sponsored by McAfee. The survey set out to examine “shadow IT,” defined as employees’ use of […]
  • Is There Something Phishy In Your Inbox?
    David Bull - November 20, 2013
    Phishing is a widespread problem. According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. Can you tell if this email is legitimate or not? Think about this: How many packages does your company receive in a typical day? Likely […]
  • How Much Are Your Assets Worth?
    Cybermum Australia - September 26, 2013
    Now, if your tax returns are up to date and you have a healthy relationship with a financial planner, I have no doubt you could answer this question in an instant. But what about your other assets? And I am not referring to your children because clearly they are priceless – most of the time!! […]
  • Hackers are Cashing in on Instagram Likes
    Gary Davis - September 9, 2013
    They say popularity has its price. This saying holds a new weight when it comes to the growing influence of social media. In fact, your “Likes” may be worth more to hackers than your credit card number. As counterintuitive as it may seem, your social clout has become the new target of hackers. And they’re […]
Threats and Risks