Exibir todas as publicações



Hide English Publications

Disrupt Targeted Attacks (English)
Intel Security recommends that you unify the protect, detect, and correct stages of managing threats so you can build a comprehensive security model to combat targeted attacks. While each stage has its own unique set of tactics, they all work together to provide context and leverage insights. This concept—an adaptive security model—applies learning immediately throughout a collaborative architecture and provides the overall cyber-resilience required to outmaneuver adversaries, contain intrusions quickly, and avoid excessive financial damage.

Combatting Advanced Targeted Attacks: PROTECT (English)
Intel Security recommends a three-pronged approach for disrupting advanced targeted attacks, starting with enhanced protection, described in this guide. The goal of this Protect stage is two-part: to stop the most pervasive attack vectors while disrupting never-before-seen techniques and payloads, and to derive insights that can strengthen countermeasures and inform investigators of unfolding activities.

Combatting Advanced Targeted Attacks: DETECT (English)
This guide covers advanced monitoring to identify anomalous, outlier behavior to perceive low-threshold attacks that would otherwise go unnoticed. As you uncover evidence, your system should share findings to enrich decision-making throughout your security infrastructure.

SANS Survey: Maturing and Specializing: Incident Response Capabilities Needed (English)
SANS released the 2015 findings from their Incident Response survey. The good news is results show that incident response (IR) and even detection are maturing. The shrinking window of response time, along with more automated tools and the specialized job titles to support the IR function are all indicators of this maturation. Now for the bad news: Organizations are short on the skills and technologies they need for full visibility and integrated response.

Combatting Advanced Targeted Attacks: CORRECT (English)
This guide describes ways to facilitate triage and prioritization for fluid investigation and rapid remediation. As you learn, your solution should apply insights immediately throughout a collaborative infrastructure.

Securing Hybrid Networks for Dummies (English)
Hybrid networks and data centers combine traditional network infrastructure with virtualized infrastructure to improve efficiency and flexibility. Learn how to keep your networks and data centers secure when transitioning to these new, next generation architectures.

Don’t Jeopardize Security When Moving to Office 365 (English)
This paper provides an overview of some of the issues facing enterprises as they move to Office 365 and other cloud-based applications, and suggests how comprehensive solutions from Intel Security can help address those issues.

Miercom: Threat Detection Test Results (English)
Miercom Threat Detection Testing – Testing shows that Advanced Threat Defense detection performance was notably above industry average.

Gartner Magic Quadrant for SIEM (English)
The security information and event management (SIEM) market is defined by the customer's need to apply security analytics to event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze and report on log data for incident response, forensics and regulatory compliance. The vendors included in the Magic Quadrant analysis have technologies that have been designed for this purpose, and they actively market and sell these technologies to the security buying center.

[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]
Tópicos: SIEM

Magic Quadrant for Secure Email Gateways (English)
Gartner recognizes Intel Security as a visionary in the Gartner Magic Quadrant for Secure Email Gateways, as published on June 29, 2015.

[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]
Tópicos: Segurança de aplicativos, Segurança de e-mail e da Web

Análise dos cinco principais métodos de ataques de rede: o ponto de vista do ladrão
This report offers forensic insight into five of the most common network attack methods that data thieves love to use. It also provides practical guidance on how criminals view your network, how to use that information to maintain a dynamic security profile, and ways to minimize the likelihood of a breach and its injurious repercussions.
Tópicos: Segurança de rede

Critical Infrastructure Readiness Report: Holding the Line Against Cyberthreats (English)
Technology and security professionals in North America and Europe profess a great deal of confidence in their cyberdefenses despite the current spate of high-profile breaches worldwide, according to a new survey made possible by the Aspen Institute Homeland Security Program and Intel Security.

The Top Five Network Attack Methods (English)
This report offers insight into five of the most common network attack methods cybercriminals love to use. It provides valuable insight on how attackers target sensitive data and steal intellectual property, as well as guidance on what you can do to minimize the likelihood of a breach and its repercussions.
Tópicos: Segurança de rede

Create a Least Risk Microsoft Windows Desktop (English)
Avecto Privilege Guard and McAfee ePolicy Orchestrator (ePO) software enable organizations worldwide to deploy secure and compliant desktops—without compromising a user's ability to perform their day to day tasks.

McAfee Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection (English)
This white paper discusses the flagship McAfee Gateway Anti-Malware technology, how it adapts to new threats, and sets the stage to protect against future threats with a modular design that allows for the easy addition of components for maximum flexibility.
Tópicos: Segurança de aplicativos

Secure Network-Attached Storage (English)
McAfee offers cost-effective solutions for securing your data, files, and peace of mind, no matter how large or how diverse your storage environment.
Tópicos: Segurança de rede

Keep Your Data Safe for Office 365 (English)
McAfee DLP offers expansive, yet flexible, polices and templates that can help address risky employee behavior by protecting sensitive data from day-today user actions.

Protocol-Based IPS Architecture (English)
This brief discusses the Intel Security approach to protocol-based Intrusion Prevention System inspection and how it differs from other security vendors. Intel Security uses protocol inspection as the foundation of IPS solutions and builds advanced intelligence on top of this architecture to provide superior protection and IPS performance.

Relatório do McAfee Labs sobre ameaças: Maio de 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Tópicos: McAfee Labs

McAfee Network Security Platform for the Data Center (English)
McAfee Network Security Platform combines extraordinary performance, advanced signature-less inspection, deep integration with other security systems, intelligent central management, and scalability to secure the very largest environments, making it the IPS of choice for the world’s most demanding data centers.