Prevent unauthorized data from being shared externally
McAfee summarizes all collaboration activities with internal users, external partners, and personal emails along with sharing via anonymous links. Real-time policy enforcement ensures files in Office 365 are shared according to corporate policy. Layer in content rules and enforce remediation actions to remove permissions, downgrade permissions, and revoke links.
Unified DLP reporting and remediation
McAfee reports on DLP violations in all Office 365 applications and other cloud services in a unified interface with highlighted excerpts revealing the exact content that triggered the DLP policy. During review, if a file does not violate a policy, the reviewer can rollback the remediation action to restore the file and/or its sharing permissions. Quarantined files are stored in a secure account within Office 365, not in McAfee’s platform, for added security.
Deep integration with on-premises DLP solutions
With McAfee you have the option of leveraging our best-in-class DLP engine or the policies in your existing on-premises solution such as Symantec DLP, Intel McAfee DLP, Forcepoint DLP, and more. McAfee optionally performs a first-pass content inspection, brokers inspection by the on-premises solution, acts as an enforcement point to apply policies to data in the cloud, and registers enforcement in the on-premises solution that maintains the policy.
Detect internal and external threats
McAfee captures a complete record of all user activity in Office 365 and leverages machine learning to analyze activity across multiple heuristics and accurately detect threats. As a comprehensive cloud security platform, McAfee can detect cross-cloud threats that involve usage across Office 365 and other cloud services. As threats are resolved, McAfee automatically incorporates this data into its behavioral models to improve detection accuracy.
Secure BYOD access to Office 365
McAfee enforces fine-grained access policies, such as allowing document preview on unmanaged devices but preventing downloads to devices without appropriate endpoint security. McAfee can also integrate with rights management solutions and apply IRM protection to files downloaded from Office 365 so that data is protected anywhere.
“Using McAfee along with Microsoft Graph, companies can leverage the massive productivity gains enabled by Office 365 while meeting their various compliance, threat protection and data security requirements.”
“McAfee helps us securely enable high-impact cloud services like Office 365 while ensuring data security and compliance with HIPAA and HITECH.”
“McAfee allows us to extend DLP outside the perimeter and into the cloud, and the user experience is seamless.”
“Our users never see McAfee even though it is a key part of our IT security strategy, allowing us to keep our users and data safe so they can have global access from any device.”
Make Office 365 your corporate standard
McAfee identifies all file sharing and collaboration solutions that employees use in place of the corporate standard, Office 365, and provides a risk rating for each service. Using McAfee, you can enforce risk-based governance controls and coach users to Office 365 to improve collaboration while also reducing cost and risk.
Cloud Data Loss Prevention
Enforces DLP policies based on data identifiers, keywords, and structured/unstructured fingerprints across data at rest and uploaded or shared in real time.
Enforces real-time external sharing policies based on domain whitelist/blacklist and content and educates users on acceptable collaboration policies.
Pre-Built DLP Templates
Provides out-of-the-box DLP templates and a broad range of international data identifiers to help identify sensitive content such as PII, PHI, or IP.
Structured Data Fingerprinting
Fingerprints billions of unique values stored in enterprise databases and systems of record and supports exact match detection of each value.
Unstructured Data Fingerprinting
Fingerprints sensitive files and detects exact match and partial or derivative matches with a policy-defined threshold for percentage similarity to the original.
Provides coach user, notify administrator, block, apply rights management, quarantine, tombstone, and delete options and enables tiered response based on severity.
Policy Violation Management
Offers a unified interface to review DLP violations, take manual action, and rollback an automatic remediation action to restore a file.
Displays an excerpt with content that triggered a DLP violation. Enterprises, not Skyhigh, store excerpts, meeting stringent privacy requirements.
Closed-Loop Policy Enforcement
Optionally leverages policies in on-premises DLP systems, enforces policies, and registers enforcement actions in the DLP system where the policy is managed.
Shadow IT Discovery
Discovers all shadow IT cloud services employees are using in place of the corporate standard, OneDrive, Yammer, and SharePoint.
Coaching and Enforcement
Displays just-in-time coaching messages guiding users from unapproved services to Office 365 and enforces granular policies such as read-only access.
On-Demand Data Scan
Identifies sensitive data stored at rest in Office 365 with the ability to target scans based on date range, user, sharing status, and file size.
Visually summarizes sharing with third-party business partners, personal emails, and internal users and reports on policy exceptions.
Office 365 SOC
Delivers a threat dashboard and incident-response workflow for insider threats, privileged user threats, and compromised accounts.
Cloud Activity Monitoring
Provides a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics.
User Behavior Analytics
Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of a malicious or negligent insider threat.
Account Compromise Analytics
Analyzes login attempts to identify impossible cross-region
access, brute-force attacks, and untrusted locations indicative of compromised accounts.
Privileged User Analytics
Identifies excessive user permissions, inactive accounts,
inappropriate access, and unwarranted escalation of privileges and user provisioning.
Identifies and blocks known signatures, sandboxes suspicious files, and detects behavior indicative of malware exfiltrating data via cloud services and ransomware.
Provides human input to machine learning models with real-time preview showing the impact of a sensitivity change on anomalies detected by the system.
Contextual Access Control
Enforces policies based on user, managed/unmanaged
device, personal/corporate account, and geography with coarse and activity-level enforcement.
Forces additional authentication steps in real-time via integration with identity management solutions based on
pre-defined access control policies.
Encryption and Tokenization
Delivers peer-reviewed, function-preserving encryption schemes using enterprise-controlled keys, and tokenization for data at rest and in transit.
Information Rights Management
Applies rights management protection to files uploaded to or downloaded from Office 365, ensuring sensitive data is protected anywhere.
Enforces policies with an inline proxy and steers traffic via device agent, proxy chaining, DNS, and identity providers to cover all access scenarios.
Skyhigh Cloud Connector
Connects to cloud services via cloud provider APIs to provide visibility and enforce security and compliance policies for all users and cloud-to-cloud activity.
Skyhigh Enterprise Connector
Facilitates integration with firewalls, proxies, SIEMs, directory services via LDAP, on-premises DLP, HSMs, and EMM/MDM solutions and tokenizes sensitive data.
Integration with On-Premises DLP
Provides integration and closed-loop remediation with existing on-premises DLP solutions such as Symantec, Intel McAfee, and Forcepoint.
Integration with SIEMs
Collects log files from SIEMs and provides the ability to report on incidents and events from Skyhigh in SIEM solutions via syslog and API integration.
Integration with IDM
Leverages identity management (IDM) solutions for pervasive and seamless traffic steering through Skyhigh’s proxy and contextual authentication.
Integration with IRM
Integrates with leading information rights management systems to enforce existing policies across sensitive data.
Integration with EMM/MDM
Integrates with enterprise mobility management solutions to enforce access control policies based on whitelisted devices and EMM/MDM certificates.