McAfee Enterprise Named a Worldwide Leader in IDC MarketScape for Cloud Security Gateways

McAfee Enterprise | November 25, 2021

McAfee Enterprise and FireEye today announced that the company has been named as a leader in the IDC MarketScape: Worldwide Cloud Security Gateways 2021 Vendor Assessment (doc #US48334521, November 2021) for its MVISION Cloud technology, which is part of its MVISION Unified Cloud Edge (UCE) portfolio. McAfee Enterprise received this distinction based on its robust cloud registry and analytics, data loss prevention (DLP) and threat detection capabilities.

The IDC MarketScape defines a cloud security gateway (CSG) as a security enforcement point that monitors cloud application usage by organizations to provide discovery, monitoring, and protection. CSGs incorporate multiple security controls, including policy enforcement, threat detection, data loss prevention and user behavior analysis. Typical use cases for CSGs are data protection, shadow IT discovery, visibility and control of unmanaged devices, threat protection, compliance and security operations in infrastructure as-a-service (IaaS) environments.

According to the report, “McAfee Enterprise has a strong ecosystem of security solutions, including Secure Web Gateway, CSG and endpoint security that it can integrate to enable customers in their data loss prevention, User Behavior Analytics, XDR and threat prevention goals. McAfee has focused on providing robust protection and DLP, with the scale and speed necessary to support large user bases."

“We believe this recognition is yet another validation of McAfee Enterprise’s cloud-native approach to helping businesses overcome the security challenges of adopting a multi-cloud or hybrid-cloud environment,MVISION Cloud aims to transform the way IT security is deployed and managed. Together with McAfee Enterprise’s next-generation secure web gateway and MVISION Private Access products, it delivers the industry's most comprehensive security services edge solution—the security element of the Secure Access Service Edge framework.”

Anand Ramanathan, Senior Vice President of Product Management, McAfee Enterprise and FireEye

Additional resources:
  • MVISION Unified Cloud Edge
  • McAfee Enterprise and FireEye blog

About IDC MarketScape

IDC MarketScape vendor assessment model (idc.com) is designed to provide an overview of the competitive fitness of ICT (information and communications technology) suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each vendor’s position within a given market. IDC MarketScape provides a clear framework in which the product and service offerings, capabilities and strategies, and current and future market success factors of IT and telecommunications vendors can be meaningfully compared. The framework also provides technology buyers with a 360-degree assessment of the strengths and weaknesses of current and prospective vendors.

About McAfee Enterprise and FireEye

McAfee Enterprise and FireEye combined in October 2021, bringing together their portfolios and expert teams to create a market-leading security company. With proven technology and unrivaled experience, the company serves more than 40,000 enterprise, commercial, and government customers worldwide. The new company blends innovative technology, intelligence, and automation to help solve the most complex cybersecurity problems for its customers.


Ransomware is today’s number one security threat. The U.S. is still the country most affected by ransomware, followed by Japan, Italy, India, Germany, Netherlands, UK, Australia, Russia, and Canada. And now each version seems to be more powerful, destructive, and difficult to detect and eliminate than the last. The number of ransomware attacks on businesses tripled during 2016, jumping from one attack every two minutes in the first quarter to one every 40 seconds by the third quarter.


Ransomware is today’s number one security threat. The U.S. is still the country most affected by ransomware, followed by Japan, Italy, India, Germany, Netherlands, UK, Australia, Russia, and Canada. And now each version seems to be more powerful, destructive, and difficult to detect and eliminate than the last. The number of ransomware attacks on businesses tripled during 2016, jumping from one attack every two minutes in the first quarter to one every 40 seconds by the third quarter.

Related News


On QingCloud Marketplace, Aurora Mobile Launched JG Verification Service

Aurora Mobile | February 21, 2022

Aurora Mobile Limited, a prominent mobile developer service provider in China, said that it had formed a relationship with QingCloud Technologies Corp. ("QingCloud"). As a result, the Company will make its verification service ("JVerification") available on the QingCloud Marketplace, a one-stop trading platform for cloud-based apps and services. JVerification will provide encrypted user registration and login, 2-step security verification, and other multi-factor authentication and identity verification services and will be securely integrated into QingCloud's hybrid ecosystem. "third-party registration and login," "Verification code registration and login," and "account password registration and login" are now the most popular methods for app registration and login. Unfortunately, these procedures are time-consuming since they require users to continually enter one-time verification codes given to their mobile phones or navigate between different interfaces to log in. At the same time, these verification methods are frequently vulnerable to cybersecurity flaws, hacking, and data leaks. As a result, developers must secure apps for both Android and iOS platforms using various verification techniques, resulting in a poor user experience. JVerification has integrated its gateway certification with China's three major telecom carriers to address this issue, covering up to 99.9% of mobile consumers. JVerification-enabled apps allow users to log in with a single click without inputting their phone numbers, passwords, or verification codes. Instead, users need to complete the registration and login process, which begins with launching the app, selecting registration and login, and then selecting one-click login using their local phone numbers. To enable the one-click registration and login feature in their apps, developers need to incorporate the JVerification SDK. Furthermore, because the one-click registration and login function is based on local phone numbers, the verification procedure is secured and conducted directly through local telecom carriers. This system reduces the hazards of SMS hijacking and data leaks and ensures user and developer information security. JVerification has become the top choice of more and more users in the 5G era as an efficient, convenient, and secure one-click verification service. In addition, it continues to allow apps to improve user conversion and traffic value. JVerification will be formally launched on the QingCloud Marketplace due to this partnership and will benefit from QingCloud's solid reputation, powerful ecosystem resources, and extensive operating systems. QingCloud Marketplace, as part of QingCloud's open ecosystem, has collaborated with ecosystem partners to provide customers with a wide range of high-quality vertical apps and has grown to become one of the most critical enterprise platforms for customers in industries such as finance, energy, transportation, education, medical care, and other Internet services. Aurora Mobile will continue to promote close collaboration with QingCloud in the future, leveraging its technological advantages to extend its product offerings, empowering developers and organizations to undertake high-quality operations, long-term development, and effective monetization. Furthermore, with more proactive partners in China, the company gradually establishes a complete and innovative ecosystem.

Read More


The latest Capcom multinational to be hit by cyber-attack disruption

silicon | November 09, 2020

Occupant Evil and Street Fighter creator Capcom hit by assault that upsets inside frameworks, while scientists state Ragnar Locker ransomware bunch is to be faulted Japanese game creator Capcom has been hit by a security break that has disturbed its inner frameworks. Industry watchers said the assault may likewise have prompted the burglary of touchy corporate information, with Capcom apparently having been focused by the Ragnar Locker ransomware gathering. Capcom creates a portion of the gaming business' most popular titles, including Resident Evil and Street Fighter. The organization said it got mindful of the assault on Monday, 2 November, when it started encountering disturbance to interior frameworks including email and record workers. Disruption “Beginning in the early morning hours of November 2, 2020 some of the Capcom Group networks experienced issues that affected access to certain systems, including email and file servers,” the company said in an official statement. It said it had confirmed the disruption was due to “unauthorised access carried out by a third party”. Capcom said it handicapped parts of its organization to stop the assault's advancement. Toward the week's end the organization said it was proceeding to encounter email and web structure correspondences issues because of the assault's impacts on its workers. Capcom additionally said it was incidentally unfit to react to archive demands. The organization said there was no sign "as of now" that client data had been taken, and said internet ongoing interaction was not influenced. The game creator added that it is doing an examination with law requirement, while taking measures to reestablish its frameworks. Ragnar Locker A few security scientists said the assault was crafted by the Ragnar Locker ransomware pack. In a payment note distributed by Bleeping Computer, the pack professed to have taken 1TB of decoded inward information from workers in Canada, Japan and the US, and said it would delivery or sell the information if Capcom didn't pay a payment. The payoff note was apparently joined by screen captures of documents including representative end arrangements, Japanese international IDs, bank and temporary worker explanations and Active Directory clients. The note connected to a 24MB chronicle with additional archives including NDAs, pay bookkeeping pages, corporate interchanges and sovereignty reports. The information in the report was taken from a ransomware test recouped by analyst Pancak3, who affirmed the contribution of Ragnar Locker by means of Twitter. As indicated by Pancak3, the pack professes to have encoded 2,000 gadgets on Capcom's organizations and is requesting $11 million (£8.3m) in Bitcoin to unscramble them. Information robbery In the payoff note, Ragnar Locker claims it will erase the taken information on installment of a payment. Nonetheless, law implementation specialists prompt associations not to pay such payments as there is no assurance the hoodlums will hold to their promise. This year Ragnar Locker has completed significant hacks on Portuguese energy monster Energias de Portugal (EDP), requesting a $10.9m payment, and French coordinations organization CMA CGM, which prompted critical disturbance of the organization's activities. Analysts have noticed an expanding pattern toward joining ransomware assaults with the burglary of delicate corporate records. In April the DoppelPaymer posse delivered archives taken from contractual workers to SpaceX, Tesla, Boeing, Lockheed-Martin and the US Navy after their objectives wouldn't pay ransoms.

Read More

Odix releases filewall for microsoft 365 mail attachments (firewall for files)

prnewswire | September 14, 2020

odix, an Israel-based cybersecurity leader in enterprise CDR (Content Disarm and Reconstruction) technology, has officially launched FileWall for small and medium-sized businesses (SMBs).  FileWall provides effective malware-disarming capabilities against file-based attacks, leveraging cutting-edge technology previously available only for enterprises. With 62 percent of cyberattacks targeting SMBs resulting in 60 percent of them going out of business within six months, a new cybersecurity solution had to come to the market and at an attractive price point for SMBs.

Read More