Afficher toutes les publications



Hide English Publications

Rapport de McAfee Labs sur le paysage des menaces: Août 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Sujets : McAfee Labs

Halte à l'exfiltration de données
Data exfiltration tactics and techniques used by cyber thieves and how to combat data theft.
Sujets : McAfee Labs

Stop Data Exfiltration (English)
Data exfiltration tactics and techniques used by cyber thieves and how to combat data theft.
Sujets : McAfee Labs

Protecting Against GPU Malware (English)
Policies, procedures, and products that can protect against GPU attacks.
Sujets : McAfee Labs

Protection contre les logiciels malveillants ciblant le GPU
Policies, procedures, and products that can protect against GPU attacks.
Sujets : McAfee Labs

Disrupt Targeted Attacks (English)
Intel Security recommends that you unify the protect, detect, and correct stages of managing threats so you can build a comprehensive security model to combat targeted attacks. While each stage has its own unique set of tactics, they all work together to provide context and leverage insights. This concept—an adaptive security model—applies learning immediately throughout a collaborative architecture and provides the overall cyber-resilience required to outmaneuver adversaries, contain intrusions quickly, and avoid excessive financial damage.

Combatting Advanced Targeted Attacks: PROTECT (English)
Intel Security recommends a three-pronged approach for disrupting advanced targeted attacks, starting with enhanced protection, described in this guide. The goal of this Protect stage is two-part: to stop the most pervasive attack vectors while disrupting never-before-seen techniques and payloads, and to derive insights that can strengthen countermeasures and inform investigators of unfolding activities.

Combatting Advanced Targeted Attacks: DETECT (English)
This guide covers advanced monitoring to identify anomalous, outlier behavior to perceive low-threshold attacks that would otherwise go unnoticed. As you uncover evidence, your system should share findings to enrich decision-making throughout your security infrastructure.

SANS Survey: Maturing and Specializing: Incident Response Capabilities Needed (English)
SANS released the 2015 findings from their Incident Response survey. The good news is results show that incident response (IR) and even detection are maturing. The shrinking window of response time, along with more automated tools and the specialized job titles to support the IR function are all indicators of this maturation. Now for the bad news: Organizations are short on the skills and technologies they need for full visibility and integrated response.

Combatting Advanced Targeted Attacks: CORRECT (English)
This guide describes ways to facilitate triage and prioritization for fluid investigation and rapid remediation. As you learn, your solution should apply insights immediately throughout a collaborative infrastructure.

Securing Hybrid Networks for Dummies (English)
Hybrid networks and data centers combine traditional network infrastructure with virtualized infrastructure to improve efficiency and flexibility. Learn how to keep your networks and data centers secure when transitioning to these new, next generation architectures.

Don’t Jeopardize Security When Moving to Office 365 (English)
This paper provides an overview of some of the issues facing enterprises as they move to Office 365 and other cloud-based applications, and suggests how comprehensive solutions from Intel Security can help address those issues.

Miercom: Threat Detection Test Results (English)
Miercom Threat Detection Testing – Testing shows that Advanced Threat Defense detection performance was notably above industry average.

Gartner Magic Quadrant for SIEM (English)
The security information and event management (SIEM) market is defined by the customer's need to apply security analytics to event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze and report on log data for incident response, forensics and regulatory compliance. The vendors included in the Magic Quadrant analysis have technologies that have been designed for this purpose, and they actively market and sell these technologies to the security buying center.

[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]
Sujets : SIEM

Magic Quadrant for Secure Email Gateways (English)
Gartner recognizes Intel Security as a visionary in the Gartner Magic Quadrant for Secure Email Gateways, as published on June 29, 2015.

[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]
Sujets : Sécurisation des applications, Sécurisation e-mail et web

Analyse des cinq principaux mécanismes d'attaque du réseau — point de vue d'un voleur
This report offers forensic insight into five of the most common network attack methods that data thieves love to use. It also provides practical guidance on how criminals view your network, how to use that information to maintain a dynamic security profile, and ways to minimize the likelihood of a breach and its injurious repercussions.
Sujets : Sécurisation des réseaux

Critical Infrastructure Readiness Report: Holding the Line Against Cyberthreats (English)
Technology and security professionals in North America and Europe profess a great deal of confidence in their cyberdefenses despite the current spate of high-profile breaches worldwide, according to a new survey made possible by the Aspen Institute Homeland Security Program and Intel Security.

The Top Five Network Attack Methods (English)
This report offers insight into five of the most common network attack methods cybercriminals love to use. It provides valuable insight on how attackers target sensitive data and steal intellectual property, as well as guidance on what you can do to minimize the likelihood of a breach and its repercussions.
Sujets : Sécurisation des réseaux

Create a Least Risk Microsoft Windows Desktop (English)
Avecto Privilege Guard and McAfee ePolicy Orchestrator (ePO) software enable organizations worldwide to deploy secure and compliant desktops—without compromising a user's ability to perform their day to day tasks.

McAfee Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection (English)
This white paper discusses the flagship McAfee Gateway Anti-Malware technology, how it adapts to new threats, and sets the stage to protect against future threats with a modular design that allows for the easy addition of components for maximum flexibility.
Sujets : Sécurisation des applications