McAfee FWE-S4016-UPG FWES4016UPGL Datenbogen
Produktcode
FWES4016UPGL
Data Sheet
McAfee Firewall Enterprise Appliance
Characterize and contain every new threat and vulnerability
Sprawling enterprise applications and the broad, fast-changing attack surface of Web
2.0 call for a new approach to firewall security. First-generation firewalls were limited
to port, protocol, and IP addresses. Today, McAfee
®
high assurance firewalls let you
confidently see and control new and existing applications for efficient, effective rules.
And to detect complex threats within these applications, we integrate proactive
threat intelligence with multiple inspection technologies in one cost-effective, easy-
to-manage appliance.
to-manage appliance.
McAfee Firewall Enterprise Features
McAfee AppPrism
™
application
visibility and control including:
•
Packet, stateful, and full
application filtering
application filtering
•
Full application visibility and control
•
Multiple delivery options, including
multi-firewall (one appliance
managing up to 32 virtual firewalls),
McAfee Firewall Enterprise for
Crossbeam, and a virtual firewall
appliance
multi-firewall (one appliance
managing up to 32 virtual firewalls),
McAfee Firewall Enterprise for
Crossbeam, and a virtual firewall
appliance
•
Network address translation (NAT)
McAfee AppPrism categories
•
Anonymizers/proxies
•
Authentication services
•
Business web applications
•
Content management
•
Commercial monitoring
•
Database
•
Directory services
•
Email
•
Encrypted tunnels
•
Enterprise resource planning (ERP)/
customer relationship management
(CRM)
customer relationship management
(CRM)
•
File sharing
•
Gaming
•
Instant messaging
•
Infrastructure services
•
IT utilities
•
Mobile software
•
Peer-to-peer (P2P)
•
Photo/video sharing
•
Remote administration
•
Remote desktop/terminal services
•
Social networking
•
Software/system updates
•
Storage
•
Streaming media
•
Toolbars and PC utilities
•
Voice over IP (VoIP)
•
VPN
•
Webmail
•
Web browsing
•
Web conferencing
Firewalls are traditionally only as strong or as weak
as the policies you define. But effective security
policies for today’s complex Web 2.0 traffic
depend on fine-grained understanding that can
be hard to come by. You need rapid insight that
goes far beyond port and protocol to encompass
different web applications and users and the
sophisticated threats that target them.
as the policies you define. But effective security
policies for today’s complex Web 2.0 traffic
depend on fine-grained understanding that can
be hard to come by. You need rapid insight that
goes far beyond port and protocol to encompass
different web applications and users and the
sophisticated threats that target them.
Where in the past you could await signatures,
the breakneck pace of threat evolution today
the breakneck pace of threat evolution today
demands proactive, predictive diagnosis of risk.
Multiple attributes, such as source reputation,
content, and behavior should be assessed to
reveal malicious intent before a new threat
is confirmed.
Multiple attributes, such as source reputation,
content, and behavior should be assessed to
reveal malicious intent before a new threat
is confirmed.
It’s not enough to predict the threat. Accurate,
timely blocking demands concerted action
that crosses conventional product silos. These
that crosses conventional product silos. These
demands—plus the call to prove compliance—
increase the operational burden on the network
increase the operational burden on the network
team. Yet budgets remain under pressure.
Something has to change.
Something has to change.
The Biggest Firewall Innovation in 15 Years
With version 8 of the McAfee Firewall Enterprise,
McAfee reinvents the firewall. Three innovations
McAfee reinvents the firewall. Three innovations
deliver unprecedented protection at an affordable
price. We combine full application visibility and
control, reputation-aware threat intelligence, and
multivector attack protection to improve network
security while shaving effort and expense.
price. We combine full application visibility and
control, reputation-aware threat intelligence, and
multivector attack protection to improve network
security while shaving effort and expense.
The firewall solution includes the McAfee Firewall
Enterprise appliances and McAfee Firewall
Enterprise Control Center centralized management.
Enterprise Control Center centralized management.
Today, the weakest link in network security is
the application layer. We have taken our proven,
high-assurance firewall—trusted by ultra-
secure environments all over the world—and
have added broad application discovery and
control. You can now protect new and existing
Web 2.0 applications from the risks of data
high-assurance firewall—trusted by ultra-
secure environments all over the world—and
have added broad application discovery and
control. You can now protect new and existing
Web 2.0 applications from the risks of data
leakage, network abuse, and malicious attacks.
With McAfee technology, you can ensure
the applications using your network benefit
your business.
the applications using your network benefit
your business.
Application visibility
McAfee AppPrism technology allows you to
identify all traffic and reveal the applications
that are really in use, with helpful context such
as source, bandwidth, and destination. By
inspecting encrypted application-level traffic, you
can eliminate loopholes favored by cyberthieves
and attackers.
identify all traffic and reveal the applications
that are really in use, with helpful context such
as source, bandwidth, and destination. By
inspecting encrypted application-level traffic, you
can eliminate loopholes favored by cyberthieves
and attackers.
Application control
Fine-grained control allows comprehensive
enforcement of policy based on business needs.
Instead of policies matched just to IP address, port,
or protocol, you can now place a user name with
a role and a set of applications.
enforcement of policy based on business needs.
Instead of policies matched just to IP address, port,
or protocol, you can now place a user name with
a role and a set of applications.