McAfee SECURE™ Technology
Simple, effective, affordable website security scanning and risk assessment.
McAfee technology helps you manage online risk. Whether you turn to McAfee for vulnerability scanning, PCI certification or trustmark validation, we deliver security solutions that are simple, effective and affordable.
When it comes to vulnerability outbreaks, the time between identification and infection is very short. Trying to keep your network up-to-date on your own is tedious, time consuming and expensive. With McAfee products, we take care of the tough stuff and give you the information you need, when you need it so you can concentrate on the work that helps your business grow.
You don't want to discover that your site is vulnerable after it is hacked. That's why McAfee solutions are so effective for you. We approach your site through the eyes of the bad guys. Our discovery and scan processes mimic the ways in which hackers search for vulnerabilities they can exploit. And because we scan daily, you get testing, verification and communication quickly.
As the largest dedicated security company in the world, McAfee has the resources to provide you with enterprise class technology at an affordable price. And our world recognized brand can help reassure your customers that you're making their site experience safer and more secure.
* As measured by A/B testing comparing sales when the McAfee SECURE trustmark was and was not displayed, from July 2008 - January 2009. Your results may vary.
|Vulnerabilities Identified||Required for Certification|
|Security Risk||McAfee SECURE||PCI||McAfee SECURE||PCI|
|Blind SQL Injection|
|SQL Database Error Disclosure|
|Local File and Remote File Includes|
|Improper Error Handling||Optional|
|Application Source Code Disclosure|
|Insufficient Session Expiration||Optional|
|Malicious CGI Scripts|
|Client Side Vulnerabilities||Optional|
|Scan Frequency||Ongoing||Not Applicable||Ongoing||Not Applicable|
|Malicious Affiliations (Links)||Ongoing||Ongoing|
|Misuse of personal information||Ongoing||Ongoing|
|Annoyances (excessive Pop-ups)||Ongoing||Ongoing|