Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

McAfee Announces New Cloud Security Platform

McAfee has announced a new platform designed to help organizations take advantage of cloud computing in a safe, secure and efficient way.

The McAfee Cloud Security Platform operates by securing all content and data traffic – including email, web and identity traffic – moving between an organization and cloud infrastructure.

McAfee has announced a new platform designed to help organizations take advantage of cloud computing in a safe, secure and efficient way.

The McAfee Cloud Security Platform operates by securing all content and data traffic – including email, web and identity traffic – moving between an organization and cloud infrastructure.

McAfee Cloud Security PlatformThe platform delivers security through integrated, modular solutions that protect both inbound and outbound traffic moving between the enterprise and the public cloud. Today, the McAfee Cloud Security Platform offers the following modules:

Web Security– McAfee Web Security provides bi-directional protection for both incoming and outgoing web traffic through proactive reputation- and intent-based protection.

Mobile Security– Web traffic generated by smart phones and tablets can be directed through the McAfee Web Gateway using standard device management. This ensures that mobile devices are secured with advanced anti-malware protection and corporate web filtering policies.

Cloud Access Control– TheIntel® Expressway Cloud Access 360 helps enable an enterprise or cloud provider to provide access control for cloud applications using enterprise identities.

Email Security– McAfee Email Security delivers email protection, integrating inbound threat protection with outbound data loss prevention.

Web Services Security– The Intel Expressway Service Gateway offloads application-level API security, data transformation, REST to SOAP mediation, and identity token exchange to a high speed gateway at the network edge or in the cloud.

McAfee is also helping its customers prevent moving sensitive data outside the organization and identify data that should or should not be moved to the cloud. Using McAfee’s Data Loss Prevention solution, organizations can first understand where its data resides, classify that data in terms of importance or sensitivity, build policies to protect that data, and then enforce those policies while data travels within or outside the organization to the cloud.

Advertisement. Scroll to continue reading.

McAfee Data Loss Prevention discovers data in different formats and residing in different locations on a network, giving the enterprise data mining tools to deliver effective protection and the creation of more effective policies that work quickly. Centralized management and reporting is also provided through integration with the McAfee ePolicy Orchestrator platform.

The security modules can be deployed as an on-premises appliance, a Software-as-a-Service solution or a hybrid combination of both. This provides organizations the flexibility and coverage to protect their headquarters, regional offices and even remote workers using mobile devices.

The solutions can be centrally managed through the ePolicy Orchestrator platform or the McAfee SaaS Control Console. Additionally, the platform and modules are powered by McAfee Global Threat Intelligence, which leverages the cloud with millions of sensors and hundreds of threat researchers worldwide to deliver real-time – and even predictive – threat intelligence against all known and emerging threats.

Using a built-in Application Programming Interface (API), McAfee says it will deploy additional security modules in the coming months to provide even greater and deeper cloud protection. This may include a variety of solutions, such as tools that can provide greater granular control over popular social media sites.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.