Afficher toutes les publications



Hide English Publications

Intel Security Positioned as a Leader by Gartner in MQ for SIEM Based on Completeness of Vision and Ability to Execute (English)
The security information and event management (SIEM) market is defined by the customer's need to apply security analytics to event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze and report on log data for incident response, forensics and regulatory compliance. The vendors included in the Magic Quadrant analysis have technologies that have been designed for this purpose, and they actively market and sell these technologies to the security buying center.

[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]
Sujets : SIEM

Magic Quadrant for Secure Email Gateways (English)
Gartner recognizes Intel Security as a visionary in the Gartner Magic Quadrant for Secure Email Gateways, as published on June 29, 2015.

[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]
Sujets : Sécurisation des applications, Sécurisation e-mail et web

Analyse des cinq principaux mécanismes d'attaque du réseau — point de vue d'un voleur
This report offers forensic insight into five of the most common network attack methods that data thieves love to use. It also provides practical guidance on how criminals view your network, how to use that information to maintain a dynamic security profile, and ways to minimize the likelihood of a breach and its injurious repercussions.
Sujets : Sécurisation des réseaux

Critical Infrastructure Readiness Report: Holding the Line Against Cyberthreats (English)
Technology and security professionals in North America and Europe profess a great deal of confidence in their cyberdefenses despite the current spate of high-profile breaches worldwide, according to a new survey made possible by the Aspen Institute Homeland Security Program and Intel Security.

The Top Five Network Attack Methods (English)
This report offers insight into five of the most common network attack methods cybercriminals love to use. It provides valuable insight on how attackers target sensitive data and steal intellectual property, as well as guidance on what you can do to minimize the likelihood of a breach and its repercussions.
Sujets : Sécurisation des réseaux

Create a Least Risk Microsoft Windows Desktop (English)
Avecto Privilege Guard and McAfee ePolicy Orchestrator (ePO) software enable organizations worldwide to deploy secure and compliant desktops—without compromising a user's ability to perform their day to day tasks.

McAfee Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection (English)
This white paper discusses the flagship McAfee Gateway Anti-Malware technology, how it adapts to new threats, and sets the stage to protect against future threats with a modular design that allows for the easy addition of components for maximum flexibility.
Sujets : Sécurisation des applications

Secure Network-Attached Storage (English)
McAfee offers cost-effective solutions for securing your data, files, and peace of mind, no matter how large or how diverse your storage environment.
Sujets : Sécurisation des réseaux

Keep Your Data Safe for Office 365 (English)
McAfee DLP offers expansive, yet flexible, polices and templates that can help address risky employee behavior by protecting sensitive data from day-today user actions.

Protocol-Based IPS Architecture (English)
This brief discusses the Intel Security approach to protocol-based Intrusion Prevention System inspection and how it differs from other security vendors. Intel Security uses protocol inspection as the foundation of IPS solutions and builds advanced intelligence on top of this architecture to provide superior protection and IPS performance.

Rapport de McAfee Labs sur le paysage des menaces: Mai 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Sujets : McAfee Labs

McAfee Network Security Platform for the Data Center (English)
McAfee Network Security Platform combines extraordinary performance, advanced signature-less inspection, deep integration with other security systems, intelligent central management, and scalability to secure the very largest environments, making it the IPS of choice for the world’s most demanding data centers.

Protecting Against Firmware and BIOS Manipulation (English)
Policies, procedures, and products that can protect against firmware attacks.
Sujets : McAfee Labs

Protection contre la manipulation du BIOS et des micrologiciels
Policies, procedures, and products that can protect against firmware attacks.
Sujets : McAfee Labs

Defeat Ransomware: Ensure Your Data Is Not Taken Hostage (English)
Learn how to stop ransomware before it strikes.
Sujets : McAfee Labs

Échec et mat aux logiciels de demande de rançon : ne laissez pas vos données se faire prendre en otage
Learn how to stop ransomware before it strikes.
Sujets : McAfee Labs

Phishing Deceives the Masses: Lessons Learned from a Global Assessment (English)
This report reviews the lessons learned from the McAfee Phishing Quiz. At the time of this report, over 50,000 business users in 49 countries have completed the quiz and the results are enlightening.

Protecting Against Adobe Flash Exploits (English)
A practical approach to detect and protect against Adobe Flash exploits.
Sujets : McAfee Labs

Protection contre les exploits Adobe Flash
A practical approach to detect and protect against Adobe Flash exploits.
Sujets : McAfee Labs

The Realities of Cyber Parenting: What Pre-teens and Teens Are Up To Online (English)
To help ensure kids are growing up to be responsible digital citizens, parents must closely monitor their actions on the Internet, particularly on social media, and have frequent and open talks about what type of behavior is acceptable and what will not be tolerated.