McAfee MVISION Cloud

1:52 min See how we can help protect your information in the cloud.

Data Security for the Cloud Era

McAfee MVISION Cloud (formerly Skyhigh Networks) protects data where it lives today, with a solution that was built natively in the cloud, for the cloud. It’s cloud-native data security.


Gain complete visibility into data, context, and user behavior across all cloud services, users, and devices.


Apply persistent protection to sensitive information wherever it goes inside or outside the cloud.


Take real-time action deep within cloud services to correct policy violations and stop security threats.

Download the

Download the McAfee MVISION Cloud datasheet for a complete list of product capabilities and deployment architecture.

Download Now

“With McAfee, we can enforce security policies like data loss prevention (DLP), rights management, data classification, threat protection and encryption through a single security platform designed in the cloud, for the cloud.”

— Mauro Loda, Chief Cloud Security Architect

“McAfee allows us to extend DLP outside the perimeter and into the cloud and the user experience is seamless.”

— Mike Benson, Chief Information Officer

“McAfee helps us understand how employees use Salesforce to identify insider threats, compromised credentials, and excessive privileged user access.”

— Mike Bartholomy, Senior Manager, Information Security

“We now have the visibility and control we need to be able to allow access to the cloud-based tools our employees need to be competitive and efficient, without compromising our security standards.”

— Rick Hopfer, Chief Information Officer

“In an environment with millions of unique events each day, McAfee does a nice job of cutting through the noise and directing us to the areas of greatest security concern.”

— Ralph Loura, Chief Information Officer

Product Features

Unified Policy Engine

Applies unified policies to all cloud services across data at rest and in transit. Leverage policy templates, import policies from existing solutions, or create new ones.

Policy Creation Wizard

Define customized policies using rules connected by Boolean logic, exceptions, and multi-tier remediation based on incident severity.

Pre-Built Policy Templates

Delivers out-of-the-box policy templates based on business requirement, compliance regulation, industry, cloud service, and third-party benchmark.

Cloud Registry

Provides the world’s largest and most accurate registry of cloud services with a 1-10 CloudTrust Rating based on a 261-point risk assessment.

Privacy Guard

Leverages an irreversible one-way process to tokenize user identifying information on premises and obfuscate enterprise identity.

AI-Driven Activity Mapper

Leverages artificial intelligence to understand apps and map user actions to a uniform set of activities, enabling standardized monitoring and controls across apps.

User Behavior Analytics

Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of user threats.

Guided Learning

Provides human input to machine learning models with real-time preview showing the impact of a sensitivity change on anomalies detected by the system.

Multi-Instance Protection

Enforces a uniform set of policies across all cloud service instances, with the ability to associate policy violations and investigate activities, anomalies, and threats at an instance level.

Content Analytics

Leverages keywords, pre-defined alphanumeric patterns, regular expressions, file metadata, document fingerprints, and database fingerprints to identify sensitive data.

Collaboration Analytics

Detects granular viewer, editor, and owner permissions on files and folders shared to individual users, everyone in the organization, or anyone with a link.

Access Analytics

Understands access context including device operating system, device management status, location, and corporate/personal accounts.

Security Configuration Audit

Discovers current cloud application or infrastructure security settings and suggests modifications to improve security based on industry best practices.

Cloud Usage Analytics

Summarizes cloud usage including cloud services in use by a user, data volumes, upload count, access count, and allowed/denied activity over time.

Cloud Activity Monitoring

Captures a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics.

Account Compromise Detection

Analyzes login attempts to identify impossible cross-region access, brute-force attacks, and untrusted locations indicative of compromised accounts.

Insider Threat Detection

Leverages machine learning to detect activity signaling negligent and malicious behavior including insiders stealing sensitive data.

Privileged User Analytics

Identifies excessive user permissions, inactive accounts, inappropriate access, and unwarranted escalation of privileges and user provisioning.

Malware Detection

Identifies known signatures, sandboxes suspicious files, and detects behavior indicative of malware exfiltrating data via cloud services and ransomware.

Multi-Tier Response

Define policies with multiple levels of severity and enforce distinct response actions based on the severity level of the incident.


Isolate files that trigger policies in a secure administrative location within the cloud service where it was found. Skyhigh never stores quarantined files.


Permanently removes data from cloud services that violate policy to comply with compliance regulations and neutralize malware.

Collaboration Control

Downgrades file and folder permissions for specified users to editor or viewer, removes permissions, and revokes shared links.

Contextual Access Control

Enforces coarse allow/block access based on service-level risk and granular activity-level controls to prevent upload and download of data.

Adaptive Authentication

Forces additional authentication steps in real-time via integration with identity management solutions based on access control policies.

Autonomous Remediation

Coaches users to correct policy incidents, and once corrected, automatically resolves incident alerts to reduce manual review of incidents.

In-App Coaching

Coaches users in real time within the native email, messaging, and collaboration application where the incident occurred.

Policy Incident Management

Offers a unified interface to review incidents, take manual action, and rollback an automatic remediation action to restore a file and its permissions.

Match Highlighting

Displays an excerpt with content that triggered a policy incident. Enterprises, not Skyhigh, store excerpts, meeting stringent privacy requirements.

Structured Data Encryption

Protects sensitive structured data with peer-reviewed, function-preserving encryption schemes using enterprise-controlled keys

Multimode Encryption

Identifies and encrypts existing data found in cloud services and transparently encrypts new data uploaded to the cloud in real time.

Encryption Key Brokering

Integrates with enterprise key management solutions to broker the management and rotation of enterprise encryption keys

Preservation of Application Functionality

Preserves end-user functions such as search, sort, and format using academia and peer-reviewed encryption schemes.


Replaces sensitive data with a token that cannot be reversed to the original clear text value, meeting strict data residency requirements.

Information Rights Management

Applies rights management protection to files uploaded to or downloaded from cloud services, ensuring sensitive data is protected anywhere.

Cloud Security That Accelerates Business

Request a Demo Request a Cloud Audit