McAfee MVISION Cloud for Salesforce

Prevent data loss due to insider threats and compromised accounts and protect data to meet stringent regulatory compliance and data privacy requirements

Download Datasheet

Detect internal and external threats to data in Salesforce

McAfee analyzes user activity in Salesforce across multiple heuristics, detects threats, and automatically takes risk-mitigating action. The built-in threat resolution workflow provides a complete audit trail of all user activity to support forensic investigations. As threats are resolved, McAfee automatically incorporates this data into its behavioral models to improve detection accuracy.

Insider and privileged user threats

McAfee’s machine learning algorithms model typical behavior for a user, group, and time period to detect negligent and malicious behavior, such as an employee downloading sales contacts before leaving for a competitor. The solution also identifies privileged users viewing data outside of their role, degrading security settings, and creating dummy accounts for third-party access.


Compromised accounts

McAfee identifies compromised accounts based on consecutive login attempts from two locations in a time period implying impossible travel, login attempts from untrusted locations, and brute force login attempts. The solution also identifies user credentials for sale on the Darknet, revealing accounts at high-risk of compromise to support targeted password update reminders.

Download the Datasheet

Download the McAfee MVISION Cloud for Salesforce datasheet for a complete list of product capabilities.

Download Now

Protect structured and unstructured data with encryption and tokenization

McAfee enables enterprises to protect structured and unstructured data leveraging Salesforce’s native 256-bit AES encryption. McAfee integrates with KMIP-compliant key management solutions, on-premises or in the cloud, to broker the use of enterprise-controlled encryption keys across multiple Salesforce instances.

Secure BYOD access to Salesforce

McAfee enforces fine-grained access policies, such as allowing contact lookup on unmanaged devices but preventing report downloads to devices without appropriate endpoint security. McAfee can also integrate with rights management solutions and apply IRM protection to files downloaded from Salesforce so that data is protected anywhere.

Enforce data loss prevention policies

McAfee enforces DLP policies across data at rest and in motion in standard and custom fields, files, and Chatter posts. Remediation options include user coaching, block, encrypt, administrator notification, and delete. McAfee supports pre-built, industry-specific DLP templates and custom policies based on data identifiers, keywords, user groups, and regular expressions. Policy Violation Management provides a unified interface for reporting with a highlighted excerpt revealing the exact content that triggered the DLP violation.

“By leveraging the power of the Salesforce1 Platform, McAfee provides customers with the proven social, mobile, and connected cloud technologies to accelerate business success.”

Ron Huddleston, Senior Vice President, Global AppExchange and Partner Program

“McAfee helps us understand how employees use Salesforce and identify insider threats, compromised credentials, and excessive privileged user access.”

Mike Bartholomy, Senior Manager, Information Security

“McAfee allows us to extend DLP outside the perimeter and into the cloud and the user experience is seamless.”

Mike Benson, Chief Information Officer

“Our users never see McAfee even though it is a key part of our IT security strategy, allowing us to keep our users and data safe so they can have global access from any device.”

Jeff Haskill, Chief Information Security Officer

Key Features

Threat Protection

Salesforce SOC

Delivers a threat dashboard and incident-response workflow to review and remediate insider threats, privileged user threats, and compromised accounts.

Cloud Activity Monitoring

Provides a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics.

User Behavior Analytics

Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of a malicious or negligent insider threat.

Account Compromise Analytics

Analyzes login attempts to identify impossible cross-region access, brute-force attacks, and untrusted locations indicative of compromised accounts.

Privileged User Analytics

Identifies excessive user permissions, inactive accounts, inappropriate access, and unwarranted escalation of privileges and user provisioning.

Malware Protection

Identifies and blocks known signatures, sandboxes suspicious files, and detects behavior indicative of malware exfiltrating data via cloud services and ransomware.

Guided Learning

Provides an adjustable sensitivity scale for each anomaly type with real-time preview showing the impact of a change on anomalies detected by the system.


Shadow IT Discovery

Discovers all shadow IT cloud services employees are using in place of the corporate standard, Salesforce.

Coaching and Enforcement

Displays just-in-time coaching messages guiding users from unapproved services to Salesforce and enforces granular policies such as read-only access.

Usage Analytics

Identifies all users and groups accessing Salesforce and reveals which users are accessing sensitive data.

User Groups

Discovers and groups users from directory services and Salesforce. User groups can be leveraged for analytics and policy enforcement.


Cloud Data Loss Prevention

Enforces DLP policies based on data identifiers, keywords, and structured/unstructured fingerprints across standard and custom fields, files, and Chatter posts.

Multi-Tier Remediation

Provides coach user, notify administrator, block, apply rights management, quarantine, tombstone, and delete options and enables tiered response based on severity.

Policy Violation Management

Offers a unified interface to review DLP violations, including content that triggered the violation, with remediation workflow.

Match Highlighting

Displays an excerpt with content that triggered a violation. Enterprises, not MVISION Cloud, store excerpts, meeting stringent privacy requirements.

Structured Data Fingerprinting

Fingerprints billions of unique values stored in enterprise databases and systems of record and supports exact match detection of each value.

Unstructured Data Fingerprinting

Fingerprints sensitive files and detects exact match and partial or derivative matches with a policy-defined threshold for percentage similarity to the original.

Pre-Built DLP Templates

Provides out-of-the-box DLP templates and a broad range
of international data identifiers to help identify sensitive content such as PII, PHI, or IP.

Closed-Loop Policy Enforcement

Optionally leverages policies in on-premises DLP systems,
enforces policies, and registers enforcement actions in the
DLP system where the policy is managed.

Data Security

Security Configuration Audit

Discovers current Salesforce security settings and suggests modifications to improve security based on industry best practices.

Contextual Access Control

Enforces policies based on user, managed/unmanaged device, and geography with coarse and activity-level enforcement.

Contextual Authentication

Forces additional authentication steps in real time via integration with identity management solutions based on pre-defined access control policies.

Encryption and Tokenization

Delivers peer-reviewed, function-preserving encryption schemes using enterprise-controlled keys, and tokenization for structured and unstructured data.

Encryption Key Brokering

Integrates with enterprise key management solutions to broker the management and rotation of enterprise encryption keys across multiple Salesforce instances.

Information Rights Management

Applies rights management protection to files uploaded to or downloaded from Salesforce, ensuring sensitive data is protected anywhere.


MVISION Cloud Gateway

Provides a streamlined user interface and embedded workflows for four distinct personas: governance, compliance, security, and executive.

MVISION Cloud Connector

Connects to cloud services via cloud provider APIs to provide visibility and enforce security and compliance policies for all users and cloud-to-cloud activity.

MVISION Cloud Enterprise Connector

Facilitates integration with firewalls, proxies, SIEMs, directory services via LDAP, on-premises DLP, HSMs, and EMM/MDM solutions and tokenizes sensitive data.

Integration with SIEMs

Collects log files from SIEMs and provides the ability to report on incidents and events from MVISION Cloud in SIEM solutions via syslog and API integration.

Integration with Key Management Systems

Seamlessly integrates with your existing key management
systems using KMIP to encrypt data with enterprise-controlled keys.

Integration with IDM

Leverages identity management (IDM) solutions for pervasive and seamless traffic steering through MVISION Cloud's proxy and contextual authentication.

Integration with EMM/MDM

Integrates with enterprise mobility management solutions to enforce access control policies based on whitelisted devices and EMM/MDM certificates.

Let's unleash the power of the cloud

Request a Demo Request a Cloud Audit