Biblioteca de multimídia

Assistir. Escuta. Aprenda. Esteja sempre a par dos mais recentes anúncios de produtos, avanços tecnológicos e iniciativas de segurança da McAfee. Nossa coleção de vídeos, tutoriais e podcasts demonstra as soluções e tecnologias de segurança líderes do setor da McAfee, indo desde visões gerais sobre recursos e produtos e vídeos detalhados de dicas rápidas até entrevistas exclusivas com líderes do setor e comentários dos especialistas em segurança da McAfee.

Destaques em multimídia

Um dia na vida da McAfee Security: depoimentos de clientes Veja por que nossos clientes confiam na McAfee para proteger redes e sistemas.

Consumerização de TI: proteja e gerencie as plataformas e os dispositivos mais recentes para promover a produtividade corporativa.

Tutorial: McAfee Web Gateway: como criar categorias personalizadas de filtragem de URL e listas de exceções adequadas às necessidades das políticas da organização.

Segurança incorporada para dispositivos médicos: conheça a abordagem e a estratégia de implementação de segurança incorporada da McAfee em dispositivos médicos. As tecnologias envolvidas incluem: Embedded Control e McAfee Deep Command.

Exibir todo o conteúdo multimídia



  • Advanced Threat Defense in 60 Seconds
    Novembro 13, 2014
    Learn how McAfee Advanced Threat Defense works with your current security from network to endpoint to protect against threats.
  • Unleash the Power of Hybrid Web Protection
    Novembro 13, 2014
    Only McAfee provides customers with state-of-the-art web security on-premises, in the cloud, or using a hybrid mix. This gives customers the ability to configure their Web Protection solution in a way that best meets their business needs, with the flexibility to quickly and easily adapt as business needs change.
  • McAfee Network Security Platform: What can you do in 60 seconds?
    Novembro 10, 2014
    Learn how McAfee Network Security Platform supercharges your security to avoid zero-day threats.
  • McAfee Server Security Suites
    Outubro 21, 2014
    Learn how visibility, protection, and security management can be maintained across physical, virtual, and cloud environments through McAfee’s comprehensive server security.
  • Adapt on the Fly. McAfee Threat Intelligence Exchange
    Outubro 15, 2014
    McAfee Threat Intelligence Exchange integrates, automates, and simplifies to decisively reduce TCO and optimize enterprise security. It eliminates complexity, provides instantaneous speed, and illuminated knowledge that can lower operating costs while streamlining protection and response ― all while freeing valuable security team resources.
  • Trusted Security for SMBs
    Setembro 1, 2014
    Small and medium-sized business (SMB) owners are looking for a smart, simple, and secure endpoint security solution. They have low budgets and lack security expertise, but require a reliable solution for business security. McAfee Endpoint Protection for SMB addresses the core needs of SMB owners providing them peace of mind and allowing them to focus on growing their business.
  • DLP Classification Scan
    Agosto 28, 2014
    Classification is an important precursor to establishing effective policies to protect data from leaving the organization. You will learn the importance of classification and how to do a classification scan with McAfee Discover appliance.
  • DLP Inventory Scan
    Agosto 28, 2014
    Inventory scan is the first step in the workflow for discovery and classification of sensitive content. In this quick tip video, you will learn what is an inventory scan and how to do an inventory scan with McAfee DLP Discover appliance.
  • DLP Role-Based Access Control
    Agosto 28, 2014
    Role-Based Access Control is also known as Separation of Duties. It provides granular control over users who view DLP Incident Manager and Operational Events data.
  • Web Gateway: Flexible Hybrid Options
    Julho 7, 2014
    McAfee Web Protection is the industry’s most flexible secure web gateway solution. Customers can deploy any way they want – on-premises, in the cloud, or both – with the flexibility to adapt as business circumstances change. All it takes is one mouse click to synchronize security policy rules, enabling you to protect all users against web-based threats, regardless of location or device.