Aurora IT has partnered with McAfee to bring Software-as-a-Service (SaaS) Security to all of its customers. It delivers complete endpoint, email, web, and network protection through the cloud, saving your IT department time, effort, and costs. As part of our Security Connected framework that delivers comprehensive security and integrated management, McAfee Security SaaS leverages the power of the cloud to help organizations realize faster time-to-protection to secure their business.
McAfee Security for Business
McAfee Security for Business is an integrated suite that provides all the benefits from our SaaS endpoint, email, vulnerability management, and web protection solutions. Minimize your on-premise capital and operational costs, while our best-in-class SaaS solution maximizes your protection from the cloud.
McAfee SaaS Endpoint & Email Protection Suite
McAfee SaaS Endpoint & Email Protection Suite offers comprehensive endpoint protection and enhanced email, web, and network defenses. McAfee SaaS Endpoint and Email Protection Suite provides additional cloud-based email protection to ensure your inbound and outbound emails are filtered for spam, phishing attacks, and viruses before they reach your network.
McAfee SaaS Endpoint Protection Suite
McAfee SaaS Endpoint Protection Suites provides essential protection for your endpoints. McAfee SaaS Endpoint Protection Suite blocks viruses, spyware, web threats, and hacker attacks with a solution that is easily managed via the online McAfee SecurityCenter.
McAfee SaaS Email Protection & Continuity
McAfee SaaS Email Protection and Continuity blocks more than 99% of spam, viruses, and other malware in the cloud, before it reaches your network. Enforcing outgoing email policies and enabling email access during outages, it’s an easy-to-use solution that requires no additional hardware, software, or maintenance.
McAfee Host Based Intrusion Protection for Desktops and Servers
McAfee Host Intrusion Prevention for Desktops and Servers safeguards your business against complex security threats that may otherwise be unintentionally introduced or allowed by desktops and laptops. Host Intrusion Prevention is easy to deploy, configure, and manage.
Comprehensive security — Three layers of protection (signature analysis, behavioral analysis, and dynamic stateful firewall with global reputation technology) prevent intrusions, protect assets, and defend your company against known and emerging exploits, including zero-day attacks.
Advanced vulnerability shielding — Stronger protection against exploits that target new vulnerabilities means your IT staff has more time for planning, testing, and deploying patches.
Automatic updates — Security content updates are delivered automatically to target specific vulnerabilities and block emerging threats (including buffer-overflow attacks) from executing.
Customized security control — Easily apply different levels of protection based on location (corporate network, VPN, or public network). Host Intrusion Prevention travels with the laptop and can provide varying degrees of protection, depending on whether you are in the office, at home, or on the road.
Enhanced security powered by McAfee Global Threat Intelligence — McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. Host Intrusion Prevention for Desktop uses the McAfee GTI network connection reputation service to identify suspicious domains/IP addresses that are infected or hosting malware attacks, and block those attacks.
McAfee Endpoint Encryption
McAfee Endpoint Encryption provides superior encryption across a variety of endpoints such as desktops and laptops. The Endpoint Encryption solution uses strong access control with Pre-Boot Authentication (PBA) and a NIST-approved algorithm to encrypt data on endpoints. Encryption and decryption are completely transparent to the end user and performed without hindering system performance. Administrators can easily implement and enforce security policies that control how sensitive data is encrypted. These policies allow the administrators to monitor real-time events and generate reports to demonstrate compliance with internal and regulatory requirements.
Endpoint Encryption has the advantage over other competitive encryption products because it engages encryption prior to loading of the Windows or Mac operating system, while data is at rest.