McAfee Cloud Single Sign On

McAfee Cloud Single Sign On

Einfacher, sicherer Zugang zu Cloud-Anwendungen

Nächste Schritte:
  • Chat mit McAfee
    Planen Sie eine Neuanschaffung, oder haben Sie vor dem Kauf noch Fragen? Chatten Sie mit einem Experten von McAfee. Die Experten stehen Montag bis Freitag zur Verfügung. Nur in englischer Sprache.
  • Fachhändler suchen
  • Kontakt
  • Rufen: 00800 122 55624

Überblick

McAfee Cloud Single Sign On erspart Benutzern den Aufwand, der mit der Verwaltung der verschiedenen Kennwörter für Cloud-Anwendungen verbunden ist. Mit McAfee Cloud Single Sign On können Sie Unternehmensregeln für den Zugang zu Cloud-Anwendungen durchsetzen. Zudem macht die Lösung Anfragen zum Zurücksetzen von Kennwörtern überflüssig und steigert so die Produktivität von IT-Personal und Anwendern.

Plug-and-Play-Connectoren für Cloud Single Sign On: Nutzen Sie die vorkonfigurierte Integration in hunderte gängige Cloud-Anwendungen, darunter Salesforce.com und Google Apps. Es ist keine Programmierung und kein Kauf zusätzlicher Toolkits erforderlich. Sie müssen nur noch Benutzer auswählen, konfigurieren und Ihrer Cloud-Anwendung zuweisen, und schon können Sie loslegen. Schnelle Implementierung heißt bessere Rendite Ihres Kapitals und schnellere Amortisation. Unterstützt 4 unterschiedliche Authentifizierungsmodelle für maximale Anwendungskompatibilität.

Keine Probleme mit Kennwörtern mehr: Verbessern Sie die Sicherheit im Unternehmen durch Senkung von kennwortbezogenen Risiken beim Cloud-Zugriff, während Sie die Produktivität der IT-Abteilung sowie der Endbenutzer steigern, indem Anfragen zur Kennwortzurücksetzung reduziert werden.

Integrierte starke Authentifizierung: Kunden, die ihre Daten und Anwendungen in die Cloud verlagern möchten, sorgen sich am meisten um die Sicherheit. Cloud Single Sign On bietet mit der branchenweit führenden Lösung McAfee One Time Password eine integrierte Zwei-Faktor-Authentifizierung.

Vollständige Kontrolle über die Nutzung der Cloud-Zugangssicherung: McAfee Cloud Single Sign On gibt der IT-Abteilung die Möglichkeit, den Cloud-Zugang mit Single Sign-On effektiv zu verwalten, Cloud-Anwendungen mithilfe von Active Directory automatisch bereitzustellen und zu deaktivieren, starke Authentifizierung durchzusetzen sowie die Überwachung und Berichterstellung zu konsolidieren.

Hybrid-Bereitstellung: McAfee Cloud Single Sign On kann vor Ort, in der Cloud oder als Hybrid-Variante bereitgestellt werden – zu einem einzigen günstigen Abonnementpreis. Sie können das Bereitstellungsmodell auswählen, das den Anforderungen Ihres Unternehmens am besten entspricht. Dadurch erreichen Sie maximale Flexibilität, ohne die Sicherheit oder Verwaltbarkeit zu gefährden.

IoAs: Act earlier and more definitively to disrupt attacks

Learn More

Intel Security perspectives:

Get the latest insights from Mike Fey on Dark Reading

Read Now

Protect your servers — from physical to virtual to cloud

View Infographic

Funktionen und Vorteile

Verbessern Sie die Nutzbarkeit und Produktivität über ein Single Sign-on (SSO)

Dank McAfee Cloud Single Sign On ist es nicht mehr nötig, sich mehrere Kombinationen aus Benutzerkennung und Kennwort zu merken. Dabei werden die Sicherheitsvorschriften des Unternehmens durchgesetzt und Anfragen zum Zurücksetzen von Kennwörtern verringert. Dies verbessert die Benutzererfahrung erheblich.

Erweitern Sie den Support für verschiedenste Anwendungen

Die McAfee-Lösung bietet vier unterschiedliche Methoden zur Integration in Ihre Web-Anwendungen und unterstützt Branchenstandards wie SAML, OpenID sowie OAuth. Dadurch wird SSO für zahlreiche unterschiedliche Cloud-Anwendungen und interne Web-Anwendungen ermöglicht.

Verbessern Sie Ihre Sicherheit durch Zwei-Faktor-Authentifizierung

Stärken Sie die Gesamtsicherheit des Anwendungszugangs, und verringern Sie das Risiko von Datenverlust sowie Betrug, indem Sie richtlinienbasierte Authentifizierung erzwingen. McAfee Cloud Single Sign On enthält ein so genanntes One-time Password (OTP)-Modul, mit dem einmalig verwendbare Kennwörter erzeugt werden. Es stellt alles bereit, was Sie zur Umsetzung starker Authentifizierung für Ihre vertraulichen Web-Anwendungen benötigen. Die flexible und benutzerfreundliche McAfee One Time Password Pledge-App – verfügbar in den Varianten für SaaS und Vor-Ort-Einsatz – bietet OTP-Funktionen für beliebige Smartphones (z. B. iPhone oder Android) oder PC (Windows oder Mac). Zu den weiteren OTP-Bereitstellungsoptionen gehören Token per SMS-Textnachricht, E-Mail, Sofortnachricht und USB sowie Unterstützung für Intel Identity Protection Technology (IPT) von Intel-Prozessoren.

Erhöhen Sie die Produktivität durch automatisierte Bereitstellung

Verbessern Sie die Produktivität, und verringern Sie die Ausfallzeiten durch automatische Bereitstellung und Deaktivierung von Cloud-Konten, die mit Ihrem Unternehmensverzeichnis synchronisiert sind. Geschäftsregeln bieten Ihnen die Möglichkeit, neue Benutzer anhand individueller Identitätsattribute schnell und einfach hinzuzufügen und sie bestimmten Anwendungen zuzuweisen. Änderungen an Benutzerattributen werden automatisch mit Cloud-Anwendungskonten synchronisiert. Cloud-Konten werden automatisch deaktiviert, wenn Benutzer aus dem Unternehmensverzeichnis entfernt werden. Dies dient der Sicherheit, da frühere Benutzer nicht mehr auf sensible Daten zugreifen können. Zudem werden dadurch Compliance-Vorschriften erfüllt. Durch die Erkennung nicht autorisierter oder verwaister Konten kann sichergestellt werden, dass SaaS-Benutzerkonten mit den Regeln übereinstimmen und die Anwendung nur zulässige Konten enthält.

Anwenderberichte von Kunden

Beverly Hills Wealth Management (BHWM)

McAfee Cloud Single Sign On ist speziell an die Anforderungen von BHWM angepasst. Zudem erfüllt das System die Bedürfnisse interner sowie externer Benutzer und bietet Optionen zur Bereitstellung/Deaktivierung sowie Funktionen für standardbasiertes SSO.

Kernpunkte
  • Verbesserung der Bedienbarkeit für Endbenutzer sowie von deren Produktivität
  • Stärkere Sicherheit durch Beschränkung auf ein einzelnes Kennwort sowie Nutzung von SAML für zentralisiertes SSO
  • Flexibilität durch einfache und schnelle Bereitstellung neuer SaaS-Lösungen je nach Unternehmenswachstum
  • Integration in Unternehmensidentitäts-Repositories für automatische Bereitstellung/Deaktivierung
  • Lösung für eine kostengünstige, gehostete Hybrid-Cloud-Umgebung

Vollständigen Anwenderbericht lesen

Messmer Catholic Schools

McAfee Cloud Single Sign On dient als SSO-Anmeldeseite und Portal für Messmer Catholic Schools und ermöglicht die nahtlose Integration in Google Apps for Education.

Kernpunkte
  • Verringerter Aufwand für die IT bei der Kontenverwaltung
  • Weniger kennwortbezogene Anrufe beim Helpdesk
  • Effizienterer und benutzerfreundlicher Zugriff auf SaaS-Anwendungen für Mitarbeiter und Schüler

Vollständigen Anwenderbericht lesen

Platinum Group

Sicheres Single Sign-On ermöglicht die Migration in die Cloud

Kernpunkte
  • Sehr gute Benutzerakzeptanz der SaaS-Lösung, da die Benutzer nur einmal Anmeldeinformationen eingeben müssen
  • Stärkere Sicherheit durch Nutzung von SAML-Token nach Branchenstandard
  • Integration in Unternehmensidentitäts-Repositories für automatische Bereitstellung/Deaktivierung

Vollständigen Anwenderbericht lesen

Senior Service America, Inc.

McAfee konnte in weniger als einer Stunde in der Testumgebung ein McAfee Cloud Single Sign On-System einrichten. Dadurch war es Senior Service America möglich, SSO für das eigene Partnerportal einzurichten.

Kernpunkte
  • Verbesserung der Bedienbarkeit für Endbenutzer durch den Komfort von SSO
  • Möglichkeit zum einfachen Hinzufügen weiterer SaaS-Lösungen zum Portal zu einem späteren Zeitpunkt
  • Funktionen zur schnellen Bereitstellung
  • Unterstützung rund um die Uhr durch branchenweit führende IT-Anbieter auf der ganzen Welt
  • Bereitstellung und Deaktivierung für Kostensenkung und Verbesserung der IT-Effizienz

Vollständigen Anwenderbericht lesen

Systemanforderungen

Die folgenden Angaben sind die Mindestanforderungen an die Systeme. Die tatsächlichen Anforderungen können je nach Art der Umgebung abweichen.

  Management-Konsole Anwendungsportal
Desktop-Browser
(On-Premise Edition)
Firefox 5, Internet Explorer 8 Chrome 16, Firefox 5,
Internet Explorer 7, Safari 5.1.2
Desktop-Browser
(SaaS Edition)
  IE 9 IE 10 Firefox Chrome
OS X 10.7     X X
Windows 8   X X X
Windows 7 X X X X
Windows Vista X   X X
Windows XP     X X
Mobilgeräte-Browser
(On-Premise Edition)
Nicht unterstützt Android 2.0,
iOS-Geräte und Safari-Browser
Server
(On-Premise Edition)
Windows Server 2003, 2008 oder 2008 R2;
Red Hat Enterprise Linux Server und
Advanced Platform 5.0
32-Bit- oder 64-Bit-Version
Hardware
(On-Premise Edition)
Jeder Intel-Mehrkern-Server-Prozessor
2 GB Arbeitsspeicher

Demos und Videos

Demos

Network Security Platform uses multiple detection engines to alert on today’s stealthy malware.

Use event correlation and progressive disclosure workflows to prioritize events, improve detection, and speed investigation.

Network Security Platform uses new advanced detection capabilities to uncover both known and unknown botnets.

Network Security Platform includes application visibility and control of over 1,100 applications and protocols.

A core element of any cloud security strategy is the enforcement of acceptable usage policies. See how McAfee Web Protection provides system and network administrators with more than 1,000 application controls to manage user’s access to specific cloud application functions, such as Facebook or YouTube.

Tutorials

After viewing this video, you will know what action rules are and how to create them in McAfee Data Loss Prevention

Learn how to configure McAfee Network Threat Behavior Analysis through our step-by-step installation tutorial.

After viewing this video, you will know what templates are and how to create them in McAfee Data Loss Prevention.

Videos

McAfee Threat Intelligence Exchange integrates, automates, and simplifies to decisively reduce TCO and optimize enterprise security. It eliminates complexity, provides instantaneous speed, and illuminated knowledge that can lower operating costs while streamlining protection and response ― all while freeing valuable security team resources.

McAfee Application Control ensures only trusted applications run on servers and endpoints. It reduces risks from unauthorized software, boosts endpoint control, extends the viability of fixed-function systems without impacting performance, and lowers operating costs.

Outdated methods of malware detection leave crucial data at risk. Learn how McAfee solutions can prevent advanced malware attacks and protect valued assets.

Leverage this video to learn how to build consumer trust through online security

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

This demo video introduces ClickProtect, a feature of McAfee Email Protection that helps you eliminate the threats from embedded URLs within an email message.

McAfee Cloud Single Sign On relieves the pain that end users have managing multiple passwords for cloud applications.

Ensure continuous compliance. McAfee Configuration Control prevents unauthorized changes on critical servers, boosts visibility into your environment, and streamlines internal and external IT audit processes.

McAfee Content Security Blade Server protects enterprise networks from spam, malware, and other intrusions with a single, high-performance solution. Based on next-generation blade server architecture, Content Security Blade Server reduces IT costs, cuts complexity, and easily scales by inserting additional scanning blades to address future capacity requirements.

In an age of ever-changing technology threats, McAfee helps protect critical infrastructure industries in all sectors with a cloud-to-endpoint security portfolio. Backed by the highest level of Global Threat Intelligence, McAfee delivers real-time visibility, the latest protections, and quick proof of compliance, plus optimized solutions for proprietary SCADA systems.

In an age of ever-changing technology threats, McAfee helps protect critical infrastructure industries in all sectors with a cloud-to-endpoint security portfolio. Backed by the highest level of Global Threat Intelligence, McAfee delivers real-time visibility, the latest protections, and quick proof of compliance, plus optimized solutions for proprietary SCADA systems.

Learn how Beverly Hills Wealth Management maximized SaaS access to user applications.

Auszeichnungen und Berichte

451 Research: Analysten-Bewertung von McAfee Cloud Identity Manager
Das Marktforschungsunternehmen 451 Research untersuchte McAfee Cloud Single Sign On (früher McAfee Cloud Identity Manager) sowie die McAfee-Strategie für Identitäts- und Zugangsverwaltung genauer und kam dabei zu dem Schluss, dass "…die Lösung – von der Geräte-Hardware bis zur Cloud – auf einer soliden Grundlage beruht."

SC Magazine: Produktanalyse zu McAfee Cloud Identity Manager
Das SC Magazine bewertet McAfee Cloud Identity Manager mit 4,75 von 5 Sternen. "...wir haben festgestellt, dass McAfee Cloud Identity Manager das Geld wert ist."

News und Veranstaltungen

Ressourcen

Berichte

Network Performance and Security (English)

This report discusses how CIOs and CISOs can avoid risky tradeoffs and boost threat defenses by deploying next-generation firewalls that are built for both security and network performance.

Network Performance and Security Executive Summary (English)

This is the executive summary to the report discussing how CIOs and CISOs can avoid risky tradeoffs and boost threat defenses by deploying next-generation firewalls that are built for both security and network performance.

What's Next: Industry Experts Speak Out on The Network Performance and Security Trade-Off (English)

Industry Experts Speak Out: The Network Performance and Security Trade-Off report is a collection of insights and opinions from network security experts discussing the common and risky tradeoff many organizations are forced to make between network performance and security.

SANS Analytics and Intelligence Survey (English)

This paper explores the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.

Security Value Map — NSS Labs (English)

McAfee NGFW 5206 appliance is compared directly with 11 competitive next-generation firewall products.  Detailed comparisons are provided across the categories of security, performance, and total cost of ownership (TCO) and presented in an aggregated graph.

Throughput and Scalability Report McAfee NGFW 5206 — Miercom (English)

Independent testing lab Miercom performed comprehensive throughput and scalability testing on the McAfee NGFW 5206 appliance. Testing was performed with application control, deep packet inspection, and antivirus enabled, and in configurations of one to four clusters.

McAfee Next Generation Firewall review by Frank Ohlhorst, Enterprise Networking Planet (English)

Threats aimed at corporate entities and enterprises are rapidly evolving, with targeted attacks becoming the norm and advanced persistent threats (APTs) increasing. What's more, APTs have been further fueled by the rise of advanced evasion techniques (AETs), which help APTs bypass firewalls, security appliances, and endpoint security products. The answer to APTs and AETs is advanced next-generation firewall software. This technology review examines the McAfee Next Generation Firewall solution that's designed to quell today's security concerns by combining a plethora of security technologies with obfuscation techniques that successfully thwart attacks.

McAfee Next Generation Firewall: Optimize Your Defense, Resilience, and Efficiency (English)

This eBook provides an in-depth overview of the features and benefits of the technologies within McAfee Next Generation Firewall.

NSS Labs Next Generation Firewall Product Analysis — NGF-1402 v5.7.1 (English)

McAfee Next Generation Firewall awarded NSS Labs’ “Recommended” for the third year in a row.

Magic Quadrant for Mobile Data Protection 2014 (English)

McAfee positioned as a leader in Gartner’s Magic Quadrant for Mobile Data Protection.

What's Next: Industry Experts Speak Out on Advanced Evasion Techniques (Europe) (English)

Find out what industry experts from the US and Europe are saying about advanced evasion techniques (AETs). You’ll learn why they are growing concern, why technology alone is not enough to keep them in check, and how they will shape the future of enterprise security.

2014 AV-TEST Comparative Cloud Gateway Test (English)

AV-TEST performed a comparative review of McAfee Web Protection in the Cloud and Websense Cloud Security 2014 and tested each against a set of malicious URLs with zero-day malware to determine their performance against the latest threats on the web.

SANS Report – Advanced Network Protection with McAfee Next Generation Firewall (English)

Evaluating next generation firewalls? See what the SANS Institute says about the management features and advanced security capabilities of the McAfee Next Generation Firewall.

McAfee Advanced Threat Defense Test Results (English)

AV-TEST performed a test of the McAfee Advanced Threat Defense appliance to determine its malware detection capabilities.

Datenblätter

McAfee Rogue System Detection (English)

This data sheet explains how McAfee Rogue System Detection fully integrates with McAfee ePolicy Orchestrator to provide real-time discovery of rogue systems connected to the network to offer greater network visibility and protection.

McAfee ePO Cloud (English)

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

McAfee 5700 Scan Engine and .DATs (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Firewall/VPN Appliance Comparison (English)

Download a technical comparison of all McAfee Firewall/VPN appliances.

McAfee Next Generation Firewall Appliance Comparison (English)

Download a technical comparison of all McAfee Next Generation Firewall appliances.

McAfee Next Generation Firewall Roles and Licensing Options (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall Modules (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall MIL-320 (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Next Generation Firewall S-Model Appliance Specifications

Find detailed technical specifications for six models of the McAfee Next Generation Firewall S-series.

Global Threat Intelligence for Enterprise Security Manager (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

Identify Data Risk In Your Organization (English)

Identify the risks to your vital information that exist within your organization so that you can take appropriate measures to prevent exposure and potentially damaging consequences.

McAfee Email Gateway Hardware Appliance Specifications (English)

For technical specifications on the McAfee product listed above, please view the product data sheet.

McAfee Endpoint Protection for SMB

Eine technische Zusammenfassung zum oben genannten McAfee-Produkt finden Sie im entsprechenden Datenblatt.

McAfee SIEM Supported Devices (English)

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

SIEM Solutions from McAfee

Continuously monitor, identify, investigate, and resolve threats.

McAfee Web Gateway Appliance Specifications (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Web Gateway Reverse Proxy and ICAP Deployment Options (English)

Web-based malware can be downloaded from external sites by users, or uploaded to internal systems if you provide access to external users, such as partners or contractors. This data sheet explains how the reverse proxy and Internet Content Adaptation Protocol (ICAP) features in McAfee Web Gateway enhance network security and block malware targeted at internal websites.

FISMA Security Control Assessments (English)

Kurzvorstellungen

Hybrid Email Security: Maintain privacy while gaining benefits of the cloud (English)

Information confidentiality and reduced configuration flexibility are often cited as reasons for not taking advantage of cloud-based email security. This brief discusses how hybrid security can enable organizations with these concerns to enjoy the benefits of the cloud without sacrifice.

Advanced Threat Defense for Next-Generation Firewalls (English)

Next-generation firewalls certainly offer expanded network security for branch offices and remote locations, but they can’t find and block stealthy, advanced malware. Through the Security Connected approach from McAfee, Advanced Threat Defense and McAfee Next Generation Firewall work hand-in-hand to find and freeze today’s evasive and targeted cyberattacks.

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange (English)

There’s no doubt that organizations face significant challenges protecting their intellectual property and critical assets from the emerging threats that target their environments. This solutions brief highlights how McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight today’s advanced threats.

McAfee Threat Intelligence Exchange and Endpoint Protection (English)

McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threats response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

Security in Unison (English)

McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threat response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange (English)

Deliver Context-Aware, Prioritized Threat Intelligence Across Your Enterprise.

McAfee Threat Intelligence Exchange and Endpoint Protection (English)

Get cutting-edge endpoint visibility, control, and protection.

A Case for the Value of SIEM: The Security Evolution

With the advent of big data, traditional SIEM solutions that focus only on logging and compliance reporting fall short of the demands of today’s enterprises for threat intelligence, correlation, and remediation. McAfee Enterprise Security Manager, the core of the McAfee SIEM solution, is both smart and fast. Its proprietary information management back end, purpose-built for managing big data, offers the critical combination of intelligence and speed.

McAfee Enterprise Security Manager, Services Solutions for Managed Service Providers (MSPs)

McAfee Enterprise Security Manager offers the advanced scalability, flexibility, and control you need to protect your customers’ business, and grow yours.

McAfee Total Protection for Data Loss Prevention (English)

McAfee Total Protection for DLP safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on the network, in storage systems, or at the endpoint, while saving time and money with centralized deployment, management, and reporting.

Prioritize and Remediate Critical Risks Found by McAfee Vulnerability Manager (English)

McAfee Vulnerability Manager and Skybox Risk Exposure Analyzer (REA) combine to give customers an advanced solution to identify IT vulnerabilities, prioritize and evaluate security risks and attack scenarios, and mitigate critical risks before they cause harm.

McAfee Next Generation Firewall: Complete IPS Technology (English)

McAfee Next Generation Firewall provides comprehensive IPS capabilities, including a flexible deployment options (hardware, software, or virtual appliances), evasion-proof detection against today’s most advanced attacks, broad inspection coverage, and much more.

Technologie-Entwürfe

Investigate Data Breaches (English)

McAfee enables enterprises to collect, analyze, and preserve security forensic information. With a solution that includes content- and context-aware SIEM, McAfee provides alerts to security events, as well analysis on how the attacked occurred, affected users, and compromised data — so you can better understand the severity of a security breach.

Whitepaper

Calculating the Business Value of Next Generation Firewall — IDC (English)

This white paper articulates the business benefits derived by companies that have deployed a NGFW solution. The data is based on in–depth interviews with eight McAfee customers. These companies were mostly large organizations with an average employee base of 7,082. Interviewees came from a variety of industries — energy, financial services, manufacturing, retail, service provider, technology, and education.

Factory of the Future (English)

This paper discusses, in a question-and-answer format, insights shared by Vice President and Chief Security and Privacy Officer (CSPO) Malcolm Harkins and team members at Intel Corporation and Intel Security on the process of reshaping security for its fabrication plant infrastructure.

Direct or Transparent Proxy: Choose the right configuration for your gateway. (English)

Secure web gateways are essential in today’s connected world, but which proxy configuration should you choose: direct or transparent? This white paper guides you through the pros and cons and makes recommendations that will help you secure your company and your users more effectively.

SANS Survey: Incident Response – How to Fight Back (English)

SANS recently surveyed incident response (IR) teams to get a clearer picture of what they're up against today. The results are in; most organizations lack formalized IR plans, they expressed a need to collect and correlate threat intelligence and SIEM tools are their focus for improving IR capabilities.

Data Loss Prevention Best Practices for Healthcare (English)

Due to the ever-changing web of regulations that span federal, state, and local jurisdictions, healthcare organizations are being required more than ever to safeguard patient data, including electronic protected health information (ePHI). This paper explains how deploying a Data Loss Prevention system in a healthcare organization is one part of a broader data protection program.

Community

Blogs

  • The Security Impact of Shadow IT: December #SecChat
    McAfee Enterprise - Dezember 5, 2013
    Is something dangerous lurking in the shadows of your organization? That’s the question we sought to answer by commissioning Stratecast to research the use of unauthorized Software-as-a-Service (SaaS) applications in the workplace. The findings revealed that widespread risk for companies is originating from the use of unauthorized apps within the workplace. According to the study, […]
  • Taking Shadow IT Out of the Shadows
    Lynda Statdtmueller - Dezember 4, 2013
    Look around your office. Flip through your business contact list. Chances are that four out of five of your colleagues are violating company IT rules. This startling revelation comes from a recent Software-as-a-Service (SaaS) survey conducted by Stratecast and sponsored by McAfee. The survey set out to examine “shadow IT,” defined as employees’ use of […]
  • Is There Something Phishy In Your Inbox?
    David Bull - November 20, 2013
    Phishing is a widespread problem. According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. Can you tell if this email is legitimate or not? Think about this: How many packages does your company receive in a typical day? Likely […]
  • How Much Are Your Assets Worth?
    Cybermum Australia - September 26, 2013
    Now, if your tax returns are up to date and you have a healthy relationship with a financial planner, I have no doubt you could answer this question in an instant. But what about your other assets? And I am not referring to your children because clearly they are priceless – most of the time!! […]
  • Hackers are Cashing in on Instagram Likes
    Gary Davis - September 9, 2013
    They say popularity has its price. This saying holds a new weight when it comes to the growing influence of social media. In fact, your “Likes” may be worth more to hackers than your credit card number. As counterintuitive as it may seem, your social clout has become the new target of hackers. And they’re […]