Alle Veröffentlichungen anzeigen

Hide English Publications

Securosis: Leveraging Threat Intelligence In Incident Response/Management (English)
To contain an advanced attack you need to respond faster and smarter. Focusing on shortening the window between attack and detection, coupled with a solid plan to contain and remediate an attack provides the best chance to overcome the attack. This is one of the key pieces of knowledge for security experts.
Themen: SIEM

McAfee Labs Threats Report: February 2015 (English)
McAfee Labs’ quarterly analysis of key threat topics and trends.
Themen: McAfee Labs

Der Hack des menschlichen Betriebssystems — Kurzfassung
This executive summary provides an overview of social engineering as an attack vector. It lists the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
Themen: McAfee Labs

Hacking the Human Operating System (English)
This in-depth report examines social engineering as an attack vector. It details the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
Themen: McAfee Labs

The Business Value of Using McAfee IPS — IDC (English)
In this white paper, leading market intelligence firm IDC provides a compelling view of the business value and benefits gained from using McAfee Network Security Platform. Derived from in-depth interviews with existing McAfee IPS customers, the report data shows how an IPS can provide cost and time savings across an organization.

McAfee Threat Intelligence Exchange and Endpoint Protection (English)
McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threats response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

Signature-less IPS: Secure Beyond the Signature (English)
Learn how the McAfee signature-less intrusion prevention system (IPS) technology is changing the way malware is detected and blocked. Signature-based detection provides an important foundation for intrusion inspection, but a layered signature-less architecture greatly enhances malware detection and reduces the risk. Read about the seven signature-less detection methods McAfee offers and how they are transforming IPS.

A Well-Connected Sandbox (English)
A well-connected sandbox that is integrated from the network edge to endpoints is one of the most effective defenses against today’s constantly morphing and evasive advanced threats. This brief explains how McAfee Advanced Threat Defense, when integrated with other Intel Security solutions, provides an effective defense against zero-day threats.

Beyond Layer-7 Visibility: A Simpler Path to Endpoint Intelligence (English)
Security products with layer-7 visibility are great. But in order to dramatically improve your understanding of security events, you need to extend your vision to the specific application processes responsible for initiating a connection. It’s something we call Beyond Layer-7 Visibility.
Themen: Endgeräteschutz

McAfee Next Generation Firewall Advanced Malware Protection (English)
McAfee Next Generation Firewall provides superior network protection through intelligence aware security controls that leverage information from global sources as well as other solutions, including McAfee Global Threat Intelligence, McAfee Advanced Threat Defense, McAfee ePolicy Orchestrator, and McAfee Enterprise Security Manager.

McAfee Next Generation Firewall Built-in SSL VPN (English)
McAfee Next Generation Firewall includes McAfee SSL VPN, providing users with lightweight, fine-grained connectivity to remote and mobile enterprise network resources. Client-based and clientless SSL VPN alternatives enable enterprises to secure traffic across a wide variety of use cases.

McAfee Next Generation Firewall — Botnet Prevention (English)
Enterprises can bolster their defenses against botnets with McAfee Next Generation Firewall, which has built-in capabilities specifically for detecting and blocking botnet malware.

McAfee NGFW — Flexible and Scalable Security for Educational Institutions (English)
McAfee Next Generation Firewall helps educational institutions to safeguard sensitive information and meet regulatory compliance while controlling IT costs. Advanced intelligence aware security controls leverage the latest threat information to guard against zero-day attacks and block persistent data breach attempts.

Microsoft Office 365 for the Enterprise: How to Strengthen Security, Compliance and Control - Osterman Research (English)
Despite the range of functionality offered in Office 365, like any cloud-based offering, it cannot be all things to all customers. There are some missing features in Office 365 that will prompt some customers to consider the use of third-party, cloud-based, or on-premise tools to enhance Office 365’s native capabilities. In this white paper, Osterman Research dives into the current limitations of Office 365 with recommendations on how organizations can strengthen security, compliance, and control in their environment.
Themen: E-Mail- und Web-Sicherheit

Secure the Data Center: Applying Next Generation Firewalls at the Edge and Core (English)
Built to address challenges unique to virtualized and hybrid data center environments, McAfee Next Generation Firewall provides future-proof security, scalability, and performance to solve your most demanding problems. Advanced technologies secure access to mission critical applications, as well as lateral "east-west” traffic between servers.

Securing the Internet of Things (English)
The Internet of Things (IoT, or Internet-connected smart devices) is rapidly changing the way we live and the way we do business. McAfee is working closely with OEMs to address the expanding security requirements of IoT devices for every layer—devices, connections, the cloud, and data centers.

Should IT Vendor Consolidation Extend to Endpoint Security? (English)
As IT organizations try to simplify vendor management, many are asking if consolidating on a single endpoint security vendor makes sense. It could hinge on the existence of an overall security framework. This white paper examines the questions IT executives should ask themselves and their security technology partners.
Themen: Endgeräteschutz

Gartner Report: Avoid These Dirty Dozen Network Security Worst Practices (English)
This report identifies 12 commonly observed network security practices that reduce network availability, increase expenditure or risks, and alienate end users.

Healthcare-Friendly Security (English)
This white paper addresses the need for healthcare-friendly security as a means of minimizing the potential for data breaches while enabling its safe, transit, and storage of patient information in a clinical setting. McAfee, a part of Intel Security, provides solutions that integrate security software with hardware to empower healthcare practitioners with flexible technology options that enable them to deliver the best possible care.