Blocage des logiciels malveillants furtifs

Repérez les attaques furtives avant qu'elles ne vous prennent pour cible

Les attaques furtives recourent à des techniques sophistiquées et peuvent opérer en dehors du système d'exploitation ou encore se déplacer dynamiquement d'un terminal à l'autre de façon à dissimuler les actions de leurs auteurs. Les réseaux de la plupart des entreprises sont perméables, les nombreux équipements connectés à Internet constituant autant de points d'entrée pour ces attaques. Les systèmes traditionnels antivirus ou de prévention des intrusions se retrouvent véritablement submergés.

L'approche de la sécurité McAfee Security Connected aide les entreprises à mettre en œuvre des contrôles de sécurité multiniveau qui détectent, bloquent et neutralisent les attaques furtives. Ce guide propose un aperçu des outils et des contrôles à même de bloquer les attaques furtives en temps réel, de réduire la corrélation manuelle et les temps de réponse, d'accélérer la détection des menaces, de générer des alertes pertinentes d'un point de vue contextuel de façon à garantir une réponse plus précise aux incidents, et de diminuer les coûts d'application de mesures correctives, d'analyse post-mortem et de justice.

Télécharger le guide

Projets technologiques
thumbnail image

Achieve Situational Awareness (english)
The McAfee solution has two primary components: McAfee ePolicy Orchestrator (McAfee ePO) software and McAfee Enterprise Security Manager, with additional integrations to extend visibility and control across the entire security and compliance management environment.
Sujets : Architecture de référence, Risque et conformité, SIEM

thumbnail image

Assess Your Vulnerabilities (english)
McAfee integrates data and processes to make vulnerability management more effective and efficient. Our approach combines asset discovery and management, comprehensive vulnerability scanning, flexible reporting, and remediation workflows into a single vulnerability assessment solution.
Sujets : Architecture de référence

thumbnail image

Defending Against Denial-of-Service Attacks (english)
The McAfee solution is multifaceted, integrated, and built on the real-time sharing of information.
Sujets : Architecture de référence

thumbnail image

Essential Protection for PCs (english)
McAfee endpoint security solutions provide a layered defense to protect PCs, providing antimalware and antivirus defenses, encryption, access control, and safe web browsing features.
Sujets : Architecture de référence

thumbnail image

Fighting Rootkits (english)
McAfee fights rootkits by using real-time memory and CPU protection, protecting against known and unknown attacks, and getting beneath the operating system.
Sujets : Architecture de référence, Protection des postes clients

thumbnail image

Investigate Data Breaches (english)
McAfee enables enterprises to collect, analyze, and preserve security forensic information. With a solution that includes content- and context-aware SIEM, McAfee provides alerts to security events, as well analysis on how the attacked occurred, affected users, and compromised data — so you can better understand the severity of a security breach.
Sujets : Architecture de référence

thumbnail image

Look Inside Network Traffic (english)
The McAfee solution has two primary components: McAfee Firewall Enterprise and McAfee Network Security Platform. The McAfee Firewall and the IPS appliance both have add-on features that can optimize your visibility into the network. McAfee SIEM and other optional products help extend visibility and analytics to more aspects of network traffic.
Sujets : Architecture de référence, Sécurisation des réseaux

thumbnail image

No Sleep for Security (english)
While waking systems to scan and providing remote repair capabilities seem like very different issues, they are both solved through McAfee integration with Intel® vPro® Active Management Technology (Intel AMT). Leveraging the McAfee ePolicy Orchestrator (McAfee ePO) agent and centralized management environment, McAfee ePO Deep Command runs on desktops and laptops with the second generation Intel Core™ i5 and i7 vPro technologies.
Sujets : Architecture de référence, Protection des postes clients

thumbnail image

Protect Your File Servers (english)
File servers hold sensitive data and require security controls that guard against data-stealing malware and unauthorized system changes. McAfee protects file servers with a solution that includes antimalware and antivirus protection, change monitoring and enforcement, dynamic whitelisting, network intrusion protection, and data loss prevention.
Sujets : Architecture de référence

thumbnail image

Protecting Application Servers (english)
McAfee safeguards mission-critical application servers with a security solution that protects against malware, vulnerabilities, and exploits; enforces change management processes; prevents the installation of unauthorized applications; and manages compliance.
Sujets : Architecture de référence

thumbnail image

Protecting Email Servers (english)
McAfee products provide a multi-layered email security solution managed by a single console for the visibility and control needed to effectively protect against emerging email threats.
Sujets : Architecture de référence

thumbnail image

Protecting Web Servers (english)
McAfee solutions will help you understand your web server infrastructure and protect each web server against the vulnerabilities, attacks, and threat agents that could disrupt it.
Sujets : Architecture de référence

thumbnail image

Secure DHCP Servers (english)
The McAfee solution provides real-time protection against attacks on your DHCP servers through multiple levels of protection. McAfee VirusScan Enterprise, McAfee Application Control, and McAfee Change Control are deployed directly on the DHCP servers. In addition, McAfee Policy Auditor can be used to perform regularly scheduled security audits to ensure that security policies applied to the DHCP servers are always being enforced. McAfee ePolicy Orchestrator (McAfee ePO) connects all of these elements into a single management environment, so you can view status and monitor events within one console.
Sujets : Architecture de référence, Sécurisation des réseaux

thumbnail image

Secure Your DNS Servers (english)
The McAfee solution provides real-time protection against attacks on your DNS Servers through deployment of McAfee VirusScan Enterprise, McAfee Application Control, and McAfee Change Control on your DNS Servers. In addition, McAfee Policy Auditor can perform regularly scheduled security audits to ensure that security policies applied to the DNS Servers are always being enforced.
Sujets : Architecture de référence

thumbnail image

Securing and Controlling Laptops (english)
Provide effective security for laptops. McAfee protects laptops with a solution that integrates antimalware, data loss prevention, data protection, safe web browsing features, and complete visibility and control that enables IT to deploy security updates on laptops, regardless of the Internet connection.
Sujets : Architecture de référence

Les dix grands thèmes de la sécurité que doit maîtriser tout dirigeant d'entreprise

Lire la brochure
Acheter