open

McAfee Cloud Visibility—Community Edition

A free service for McAfee DLP, encryption, and Web Protection customers that brings visibility to cloud application usage and risk

Activate Now

Identify, monitor, and track your cloud application use

Tired of paying for cloud application visibility? Overwhelmed with shadow IT, sensitive data tracking, and endpoint health checks? Frustrated with disparate management consoles and disconnected solutions?

Available to McAfee DLP, encryption, or Web Protection customers, McAfee Cloud Visibility—Community Edition is a free service that provides insight into cloud applications being used at your enterprise.

  • Identify cloud applications in use and the associated risks.
  • Monitor sensitive data flowing between users and cloud applications.
  • Track endpoint health around threats, data leakage, and theft.

Activate Now Data Sheet

Identify cloud applications

Discover cloud applications being used across your organization from our extensive database of more than 5,000 cloud services. Analyze risk categories* for cloud application usage by leveraging our common risk database for web and data protection. Understand, evaluate, and assess the complex technical services of your cloud applications.

Monitor your sensitive data

Monitor where sensitive is data flowing and determine which users are accessing that data. Find sanctioned and unsanctioned applications, and investigate cloud application usage via McAfee ePolicy Orchestrator, our easy-to-use management console that gives you a 360-degree view of user activity and defines your cloud usage policies.

Track endpoint health

Find out if your endpoints are protected against threats. Review endpoint encryption status—a critical step to securing data in the case of endpoint theft—and check whether endpoint data loss prevention is configured. Built-in endpoint health check reports help you create a comprehensive threat defense plan across your anti-malware, encryption, and data loss prevention security solutions.

Learn More About Cloud Application Visibility

Gartner Predicts 2017: Cloud Security

With the security implications of cloud computing still not fully understood, security and risk management leaders must carefully guide their organizations through evolving areas of implementation and purchasing best practices.

Report: McAfee Labs 2017 Threats Predictions

McAfee Labs 2017 Threat Predictions covers cloud threats and breaches, as well as how geopolitical issues, legislation, and regulatory actions affect the cloud environment.

Managing Security Risk in a Cloud Computing Era: Security Concerns for Adopting Cloud Services

Watch Rich Mogull, CEO and analyst at Securosis, and Ben Cody, general manager–SaaS Security at McAfee share their perspectives on cloud security challenges and why elastic and agile security solutions are needed to monitor today’s cloud activity.

Legal Notice: Customer data transferred to any McAfee Cloud Services may be stored outside the country of origin and is subject to the McAfee Cloud Terms of Service Agreements. McAfee Cloud Visibility—Community Edition will follow McAfee Cloud Terms of Service Agreements. McAfee has sole discretion and may discontinue or modify McAfee Cloud Visibility—Community Edition at any time. For any help please refer to www.community.mcafee.com. McAfee has no obligation to retain any customer data or other customer information. Refer McAfee Cloud Terms of Service Agreements “Free Services” section for the complete set of terms.
Available to McAfee DLP, encryption, or Web Protection customers, McAfee Cloud Visibility—Community Edition can consume log files from McAfee Web Gateway Cloud Service, McAfee Web Gateway, and Blue Coat ProxySG.
*Risk defined is based on 1) cloud application company profile, 2) legal considerations such as EULA, terms of service, and privacy policies, 3) compliance - does the cloud application comply with national or international data requirements, 4) McAfee measurements, 5) authentication and access control, 6) service reliability and security, and 7) user activity.