Content

Network Access Control and User Monitoring

Control network access while gaining real-time visibility into network health and user behavior

Mobile and remote users can put your network infrastructure at risk, introducing malware, disrupting operations, and losing sensitive data. Fortunately, McAfee solutions help protect you by automatically ensuring all users are authorized and compliant. Our network access controls verify policy compliance before allowing network access. They inspect and quarantine managed laptops to keep them compliant with patches and security updates. Instead of limiting network access for unmanaged systems such as visitor and contractor laptops, you can monitor user behavior and enforce compliance to ensure users do not disable security tools, install malicious applications, or use outdated security configurations. Our integrated approach delivers operational efficiency, higher accuracy, and more value from existing security tools.

Tab Navigation

Overview:

Key Benefits

  • Grant secure, efficient access to guests, contractors, and employees—Match granular access controls to the risk in each situation: from CEO to visitors to employees working from home or from hotels, you can ensure users get appropriate access while you maintain the safety of your network.
  • Ensure continuous compliance—Verify policy compliance before allowing network access. Gain audit readiness and audit confidence by verifying business and security policy in real time.
  • Provide safe access for remote and branch sites—Deploy a single network security appliance to give your distributed workforce safe, reliable access to resources at corporate headquarters.
  • Block threats 24/7 automatically—Identify and block security threats automatically - both pre- and post-admission - using McAfee's up-to-the-minute Global Threat Intelligence. We even deliver automatic inspection, quarantine, patching, and updating of managed laptops.
  • Enjoy real-time visibility and efficiency—Monitor your insiders in real time to gain insight into user and system behavior without the after-the-fact limits and inefficiencies of manual log analysis.
  • Manage expanding workloads with scalable protection—Support demanding enterprise workloads, geographically distributed network architectures, and multiple IT groups.
  • Save time and money with a centralized management platform—Streamline security deployment and maintenance with McAfee ePolicy Orchestrator, the centralized platform that enables you to implement and audit your organization's security policies and all of its components from an easy-to-use, web-based console.
  • Make easy enhancements to existing systems—Leverage your investments in McAfee and Microsoft products with painless upgrades - and by reusing agents, consoles, and reports. McAfee solutions also integrate easily with Microsoft NAP, network flow data, Active Directory, and many other products.

Products and Solutions:

Products

McAfee NAC Appliance—Total protection from noncompliant or infected systems

McAfee NAC Module for Network Security Platform—Faster time to protection. Faster time to resolution. Faster time to confidence.

McAfee Network Access Control—Protect your network from noncompliant or infected systems

McAfee Network User Behavior Analysis (Securify)—Find out who's doing what and from where on your network

McAfee Total Protection for Endpoint—Advanced—Strong security with lower costs and improved compliance

Services

McAfee Unified Secure Access Architectural Review
Let our experts analyze your infrastructure and recommend the optimal system designs, policies, and implementation to protect your network.

Take the Next Step

Learn more about how McAfee mobile security solutions can help keep your mobile workforce agile, and your portable data secure.