Specifications/Technical Information
- McAfee Network Security Platform Technical Information - High Performance Intrusion Prevention IPS
- McAfee Network Security Platform Specifications - High Performance Intrusion Prevention IPS
- McAfee Advanced Threat Defense Technical Information - Malware Detection
- McAfee Advanced Threat Defense Specification - Malware Detection
- McAfee SIEM Knowledge Base - Threat Visibility with Log Analysis

McAfee
McAfee
McAfee MVISION Cloud (formerly McAfee Skyhigh Security Cloud)
Solutions provided by McAfee MVISION Cloud

"McAfee MVISION Cloud" provided by McAfee realizes cloud visualization and control from two approaches: shadow IT countermeasures and Sanctioned IT countermeasures. Companies that have been hesitant to introduce cloud services due to concerns about cloud security can now use the cloud with peace of mind.
- Shadow IT measures
Based on Proxy/FireWall access logs, we match them with MVISION Cloud's cloud risk DB to visualize and evaluate cloud access. - Sanctioned IT measures
Acquire the logs of regular cloud services with API and visualize the usage status. You can define common policies across multiple cloud services, and control uploading of confidential information to cloud services and external file sharing.
Role of each license in MVISION Cloud
Shadow IT | Sanctioned IT | |
definition |
Cloud services that employees use without realizing it *Including safe/dangerous services |
Cloud services contracted and used as a company *Confirmed safety |
Task |
The administrator cannot grasp the usage status of the cloud service | The default administrative functions of the service are not secure enough |
Response by CASB |
||
Visualization |
|
|
control |
|
|
For Shadow IT
What is Shadow IT
- Shadow IT refers to cloud applications that are used by employees without permission from the company.
- Enterprises use more cloud services than IT admins realize
Risks of not knowing shadow IT
Information leak from domestic cloud storage
problem
- I didn't understand the security of the service (data was stored unencrypted)
- Didn't realize employees were using cloud storage services for business
McAfee MVISION Cloud for Shadow IT configuration image
Determine the risk of cloud services based on CSA
- Cloud service risks are quantified using approximately 50 items based on CSA (Cloud Security Alliance) guidelines
Reduces man-hours for responding to questionnaires and confirming agreements related to cloud service risk assessment
MVISION Cloud risk assessment screen
Evaluate similar cloud services side by side
- View risk assessment items for each service side by side
You can use it to consider introducing services to your company and to guide users who have applied for use of alternative services.
For Sanctioned IT
Sanctioned IT and risk
- What is Sanctioned Sanctioned IT?
Cloud services contracted and used by companies, authorized cloud services (Office365, Box, Slack, etc.)
Although the service is safe, not all security is guaranteed by the service provider.
Users must take measures against the following risks:


User abuse


account takeover


Data sharing with external parties
Shared Responsibility Model and CASB (Sanctioned IT) Visibility and Control Range
Support for IaaS
- Check logs and configuration information using API to detect account compromise and vulnerable settings
MVISION Cloud makes direct API calls to the target SaaS and provides visibility into user activity and file sharing status.
No network changes or agent installations are required.
Activity Monitoring
- Collect logs via API and detect suspicious events using machine learning
UEBA
- Detect unusual and suspicious events as anomalies and classify their severities
Collaboration Control
- Visibility of internal and external collaborators within the managed tenant
- Analysis of external collaborators' access to critical information
MVISION Cloud for Sanctioned IT configuration image
- Check logs and configuration information using API to detect account compromise and vulnerable settings
You can reduce the man-hours required to create configuration audit policies and the operational load during log audits.
AWS vulnerable configuration example
- It is possible to check and correct vulnerable settings that lead to information leakage in AWS and Azure
license
License lineup list
License type |
Required license |
||
Shadow IT |
|
Shadow IT |
Number of Employees |
Sanctioned IT |
O365 |
OneDrive/Sharepoint |
Number of SaaS contract users |
|
|||
Teams |
|||
Mail/SharePoint and OneDrive |
|||
Shadow IT / Office 365 Mail / SharePoint and OneDrive |
|||
Mail / SharePoint and OneDrive / Teams |
|||
Shadow IT / Office 365 Mail / SharePoint and OneDrive / Teams |
|||
BOX |
BOX |
||
Salesforce |
Sales Cloud |
||
Service cloud |
|||
AWS |
Amazon Web Services |
AWS account unit |
|
Azure |
Azure |
per Azure subscription |
- Shadow IT
- The log retention period on the GUI is 1 year.
- Sanctioned IT
- The standard log retention period on the GUI is 100 days.
As an option, it is possible to extend the storage period to 1 year (365 days) for each regular price license + 10% fee.
- The standard log retention period on the GUI is 100 days.
remarks
- Only major services are listed for Sanctioned IT licenses. Please inquire about each optional license separately.
- Please inquire separately about other supported services.
Contact information
Macnica
McAfee product manager
- TEL:045-476-2010
- E-mail:Mcafee-mcloud-sales-i@macnica.co.jp