Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

McAfee Enhances Its Cloud Security Platform

McAfee today announced new enhancements to its Cloud Security Platform that bring enhanced security for cloud-based interactions through better product integration, context-based policy support and web protection for mobile workers.

The McAfee Cloud Security Platform is designed to help organizations extend their security and policy enforcement into the Cloud by securing the three primary channels of traffic – email, web and identity.

McAfee today announced new enhancements to its Cloud Security Platform that bring enhanced security for cloud-based interactions through better product integration, context-based policy support and web protection for mobile workers.

The McAfee Cloud Security Platform is designed to help organizations extend their security and policy enforcement into the Cloud by securing the three primary channels of traffic – email, web and identity.

McAfeeAlong with its McAfee Global Threat Intelligence, the McAfee Cloud Security Platform provides real time protection and correlates data across multiple threat vectors—file, web, email and network, in order to provide proactive protection for customers.

The updates to the McAfee Cloud Security Platform Include:

Integration: Enhanced protection and simplified management

Data Loss Prevention (DLP) everywhere: Integrated DLP capabilities are now available in McAfee Email Protection and McAfee Web Gateway – minimizing security gaps and data leakage across the different traffic channels.

New Web reporting for McAfee ePolicy Orchestrator platform: Fully integrated into McAfee’s ePolicy Orchestrator platform, McAfee Content Security Reporter provides detailed web reporting capabilities. Web reporting through McAfee ePO software streamlines security management by providing greater visibility into security protections and incidents across the enterprise.

Hybrid Web Protection deployment support: Common policy across on-premise and SaaS deployments from a single console simplifies management while ensuring consistent policy enforcement for all web traffic including HTTP and HTTPS. Unified reporting across on-premise and SaaS deployments provides a consolidated view into web traffic patterns, trends and issues.

Web Protection for mobile workers: McAfee Client Proxy simplifies authentication and redirection of web traffic from off-network user laptops to a McAfee Web Protection solution – either McAfee SaaS Web Protection or McAfee Web Gateway –ensuring consistent, tamper-resistant security policy enforcement regardless of location

Advertisement. Scroll to continue reading.

Context- aware policy management

Web Gateway: Query and apply data from external sources to Web Gateway policies for expanded web access control. For example, Web Gateway can now query the Google API for YouTube video content categorization and apply to access policies in real-time.

Identity Manager: Factor in network, mobile device or other client hardware attributes into a Cloud access control policy decision – enabling granular, context-based control.

“Identity, Web and email security components are critical as enterprise IT customers deploy both on-premise and off-premise Cloud-based solutions over the next several years,” adds Phil Hochmuth from IDC Research. “Customers will expect to build on existing security investments while transitioning appropriate business functions to the Cloud to save on resources and time. IDC believes an appropriately configured Cloud model must guarantee more streamlined business processes, greater business agility, increased security and stronger access management.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.