Effective Risk Management Solutions: What You Need When You Need It
This white paper details how McAfee‘s integrated approach to risk management automates processes to discover, prioritize, and remediate vulnerabilities and policy violations.
Topics : SMB, Risk & Compliance, Security Management, Database Security
Increasing Security and Compliance with End-to-End System Monitoring and Management
Through its participation in the McAfee Security Innovation Alliance program, ArcSight has created an integration between ArcSight ESM and the McAfee ePolicy Orchestrator (ePO) software. This paper describes the integration and the value the joint solution delivers across a range of possible threats.
The Good, the Bad, and the Unknown
Reduce risk from unauthorized applications, gain stronger endpoint control, and live to tell the tale.
Topics : Risk & Compliance
Introducing a New Approach — Traditional versus future state network security
Learn how a unified network security architecture can help reduce budget and increase security.
McAfee Threats Report: Third Quarter 2013
McAfee Labs’ quarterly analysis of global email and web threats.
Topics : Threat Center
McAfee Threats Report: Third Quarter 2013 — Executive Summary
McAfee Labs‘ quarterly analysis of global email and web threats.
Topics : Threat Center
SANS White Paper: Correlating Event Data for Vulnerability Detection and Remediation
This white paper examines how the 2012 Saudi Aramco “spearphishing” attack could have been thwarted with the help of a SIEM platform that combines the power of historical data with real-time data from network data sources and security policies. Such a system provides the context around application usage, user behaviors and other operations for better, more accurate reporting.
Topics : SIEM
The Hidden Truth Behind Shadow IT: Six trends impacting your security posture
Topics : Security Management
Achieving Security through Compliance - Part 1: Policies, plans, and procedures
This is the first part of a six-part series on compliance-driven security. This paper will illustrate how a well-structured security governance program with fully developed and implemented policies, plans, and procedures will strengthen an organization’s security posture.
Topics : Foundstone
Advanced Evasion Techniques for Dummies
Welcome to Advanced Evasion Techniques For Dummies, your guide to the security evasion techniques that have become a serious preoccupation of the IT industry.
Topics : Network Security