Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

McAfee Enhances Its Cloud Security Platform

McAfee today announced new enhancements to its Cloud Security Platform that bring enhanced security for cloud-based interactions through better product integration, context-based policy support and web protection for mobile workers.

The McAfee Cloud Security Platform is designed to help organizations extend their security and policy enforcement into the Cloud by securing the three primary channels of traffic – email, web and identity.

McAfee today announced new enhancements to its Cloud Security Platform that bring enhanced security for cloud-based interactions through better product integration, context-based policy support and web protection for mobile workers.

The McAfee Cloud Security Platform is designed to help organizations extend their security and policy enforcement into the Cloud by securing the three primary channels of traffic – email, web and identity.

McAfeeAlong with its McAfee Global Threat Intelligence, the McAfee Cloud Security Platform provides real time protection and correlates data across multiple threat vectors—file, web, email and network, in order to provide proactive protection for customers.

The updates to the McAfee Cloud Security Platform Include:

Integration: Enhanced protection and simplified management

Data Loss Prevention (DLP) everywhere: Integrated DLP capabilities are now available in McAfee Email Protection and McAfee Web Gateway – minimizing security gaps and data leakage across the different traffic channels.

New Web reporting for McAfee ePolicy Orchestrator platform: Fully integrated into McAfee’s ePolicy Orchestrator platform, McAfee Content Security Reporter provides detailed web reporting capabilities. Web reporting through McAfee ePO software streamlines security management by providing greater visibility into security protections and incidents across the enterprise.

Hybrid Web Protection deployment support: Common policy across on-premise and SaaS deployments from a single console simplifies management while ensuring consistent policy enforcement for all web traffic including HTTP and HTTPS. Unified reporting across on-premise and SaaS deployments provides a consolidated view into web traffic patterns, trends and issues.

Web Protection for mobile workers: McAfee Client Proxy simplifies authentication and redirection of web traffic from off-network user laptops to a McAfee Web Protection solution – either McAfee SaaS Web Protection or McAfee Web Gateway –ensuring consistent, tamper-resistant security policy enforcement regardless of location

Context- aware policy management

Web Gateway: Query and apply data from external sources to Web Gateway policies for expanded web access control. For example, Web Gateway can now query the Google API for YouTube video content categorization and apply to access policies in real-time.

Identity Manager: Factor in network, mobile device or other client hardware attributes into a Cloud access control policy decision – enabling granular, context-based control.

“Identity, Web and email security components are critical as enterprise IT customers deploy both on-premise and off-premise Cloud-based solutions over the next several years,” adds Phil Hochmuth from IDC Research. “Customers will expect to build on existing security investments while transitioning appropriate business functions to the Cloud to save on resources and time. IDC believes an appropriately configured Cloud model must guarantee more streamlined business processes, greater business agility, increased security and stronger access management.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Cloud Security

Orca Security published details on four server-side request forgery (SSRF) vulnerabilities impacting different Azure services.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Cloud Security

Cloud Disaster Recovery - Ingredients for a Recipe that Saves Money and Offers a Safe, More Secure Situation with Greater Accessibility