McAfee

McAfee

McAfee MVISION Cloud (formerly McAfee Skyhigh Security Cloud)

Solutions provided by McAfee MVISION Cloud

Solutions provided by McAfee MVISION Cloud

"McAfee MVISION Cloud" provided by McAfee realizes cloud visualization and control from two approaches: shadow IT countermeasures and Sanctioned IT countermeasures. Companies that have been hesitant to introduce cloud services due to concerns about cloud security can now use the cloud with peace of mind.

  • Shadow IT measures
    Based on Proxy/FireWall access logs, we match them with MVISION Cloud's cloud risk DB to visualize and evaluate cloud access.
  • Sanctioned IT measures
    Acquire the logs of regular cloud services with API and visualize the usage status. You can define common policies across multiple cloud services, and control uploading of confidential information to cloud services and external file sharing.

Role of each license in MVISION Cloud

  Shadow IT Sanctioned IT

definition

Cloud services that employees use without realizing it
*Including safe/dangerous services
Cloud services contracted and used as a company
*Confirmed safety

Task

The administrator cannot grasp the usage status of the cloud service The default administrative functions of the service are not secure enough

Response by CASB

Visualization

  • Continuous understanding of cloud service usage status from access logs
  • Who is accessing the cloud at what risk and how much
  • Enhanced log audit function
  • Anomaly detection
  • Know your files in the cloud

control

  • Formulation of cloud service usage standards
  • Restrict communication that does not meet usage standards
  • Recommendations for users
  • File deletion, quarantine, sharing restrictions, etc. Policy enforcement

For Shadow IT

What is Shadow IT

  • Shadow IT refers to cloud applications that are used by employees without permission from the company.
  • Enterprises use more cloud services than IT admins realize
  • What is Shadow IT

Risks of not knowing shadow IT

Information leak from domestic cloud storage

  • Risks of not knowing shadow IT

problem

  • I didn't understand the security of the service (data was stored unencrypted)
  • Didn't realize employees were using cloud storage services for business
  • Scope visualized and controlled by CASB (Shadow IT)

McAfee MVISION Cloud for Shadow IT configuration image

  • McAfee MVISION Cloud for Shadow IT configuration image

Determine the risk of cloud services based on CSA

  • Cloud service risks are quantified using approximately 50 items based on CSA (Cloud Security Alliance) guidelines
  • Determine the risk of cloud services based on CSA

Reduces man-hours for responding to questionnaires and confirming agreements related to cloud service risk assessment

MVISION Cloud risk assessment screen

  • MVISION Cloud risk assessment screen

Evaluate similar cloud services side by side

  • View risk assessment items for each service side by side
  • Evaluate similar cloud services side by side

You can use it to consider introducing services to your company and to guide users who have applied for use of alternative services.

For Sanctioned IT

Sanctioned IT and risk

  • What is Sanctioned Sanctioned IT?
    Cloud services contracted and used by companies, authorized cloud services (Office365, Box, Slack, etc.)
    Although the service is safe, not all security is guaranteed by the service provider.
    Users must take measures against the following risks:
User abuse User abuse

User abuse

account takeover account takeover

account takeover

Data sharing with external parties Data sharing with external parties

Data sharing with external parties

Shared Responsibility Model and CASB (Sanctioned IT) Visibility and Control Range

  • Shared Responsibility Model and CASB (Sanctioned IT) Visibility and Control Range

Support for IaaS

  • Check logs and configuration information using API to detect account compromise and vulnerable settings
  • MVISION Cloud for Sanctioned IT configuration image

MVISION Cloud makes direct API calls to the target SaaS and provides visibility into user activity and file sharing status.

No network changes or agent installations are required.

Activity Monitoring

  • Collect logs via API and detect suspicious events using machine learning
  • Activity Monitoring

UEBA

  • Detect unusual and suspicious events as anomalies and classify their severities
  • UEBA

Collaboration Control

  • Visibility of internal and external collaborators within the managed tenant
  • Analysis of external collaborators' access to critical information
  • Collaboration Control
  • Collaboration Control

MVISION Cloud for Sanctioned IT configuration image

  • Check logs and configuration information using API to detect account compromise and vulnerable settings
  • MVISION Cloud for Sanctioned IT configuration image

You can reduce the man-hours required to create configuration audit policies and the operational load during log audits.

AWS vulnerable configuration example

  • It is possible to check and correct vulnerable settings that lead to information leakage in AWS and Azure
  • AWS vulnerable configuration example

license

License lineup list

License type

Required license
Counting method

Shadow IT

 

Shadow IT

Number of Employees

Sanctioned IT

O365

OneDrive/Sharepoint

Number of SaaS contract users

Mail

Teams

Mail/SharePoint and OneDrive

Shadow IT / Office 365 Mail / SharePoint and OneDrive

Mail / SharePoint and OneDrive / Teams

Shadow IT / Office 365 Mail / SharePoint and OneDrive / Teams

BOX

BOX

Salesforce

Sales Cloud

Service cloud

AWS

Amazon Web Services

AWS account unit

Azure

Azure

per Azure subscription

  • Shadow IT
    • The log retention period on the GUI is 1 year.
  • Sanctioned IT
    • The standard log retention period on the GUI is 100 days.
      As an option, it is possible to extend the storage period to 1 year (365 days) for each regular price license + 10% fee.

remarks

  • Only major services are listed for Sanctioned IT licenses. Please inquire about each optional license separately.
  • Please inquire separately about other supported services.

Contact information

Macnica
McAfee product manager