Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

McAfee Announces New Cloud Security Platform

McAfee has announced a new platform designed to help organizations take advantage of cloud computing in a safe, secure and efficient way.

The McAfee Cloud Security Platform operates by securing all content and data traffic – including email, web and identity traffic – moving between an organization and cloud infrastructure.

McAfee has announced a new platform designed to help organizations take advantage of cloud computing in a safe, secure and efficient way.

The McAfee Cloud Security Platform operates by securing all content and data traffic – including email, web and identity traffic – moving between an organization and cloud infrastructure.

McAfee Cloud Security PlatformThe platform delivers security through integrated, modular solutions that protect both inbound and outbound traffic moving between the enterprise and the public cloud. Today, the McAfee Cloud Security Platform offers the following modules:

Web Security– McAfee Web Security provides bi-directional protection for both incoming and outgoing web traffic through proactive reputation- and intent-based protection.

Mobile Security– Web traffic generated by smart phones and tablets can be directed through the McAfee Web Gateway using standard device management. This ensures that mobile devices are secured with advanced anti-malware protection and corporate web filtering policies.

Cloud Access Control– TheIntel® Expressway Cloud Access 360 helps enable an enterprise or cloud provider to provide access control for cloud applications using enterprise identities.

Email Security– McAfee Email Security delivers email protection, integrating inbound threat protection with outbound data loss prevention.

Web Services Security– The Intel Expressway Service Gateway offloads application-level API security, data transformation, REST to SOAP mediation, and identity token exchange to a high speed gateway at the network edge or in the cloud.

McAfee is also helping its customers prevent moving sensitive data outside the organization and identify data that should or should not be moved to the cloud. Using McAfee’s Data Loss Prevention solution, organizations can first understand where its data resides, classify that data in terms of importance or sensitivity, build policies to protect that data, and then enforce those policies while data travels within or outside the organization to the cloud.

McAfee Data Loss Prevention discovers data in different formats and residing in different locations on a network, giving the enterprise data mining tools to deliver effective protection and the creation of more effective policies that work quickly. Centralized management and reporting is also provided through integration with the McAfee ePolicy Orchestrator platform.

The security modules can be deployed as an on-premises appliance, a Software-as-a-Service solution or a hybrid combination of both. This provides organizations the flexibility and coverage to protect their headquarters, regional offices and even remote workers using mobile devices.

The solutions can be centrally managed through the ePolicy Orchestrator platform or the McAfee SaaS Control Console. Additionally, the platform and modules are powered by McAfee Global Threat Intelligence, which leverages the cloud with millions of sensors and hundreds of threat researchers worldwide to deliver real-time – and even predictive – threat intelligence against all known and emerging threats.

Using a built-in Application Programming Interface (API), McAfee says it will deploy additional security modules in the coming months to provide even greater and deeper cloud protection. This may include a variety of solutions, such as tools that can provide greater granular control over popular social media sites.

Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cloud Security

Orca Security published details on four server-side request forgery (SSRF) vulnerabilities impacting different Azure services.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Cloud Security

Cloud Disaster Recovery - Ingredients for a Recipe that Saves Money and Offers a Safe, More Secure Situation with Greater Accessibility