Biblioteca multimedia

Ver. Escuchar. Aprender. Manténgase al día de los anuncios más recientes de los productos, avances tecnológicos e iniciativas de seguridad de McAfee. Nuestra colección de vídeos, tutoriales y podcasts muestran las soluciones y tecnologías de seguridad de McAfee líderes del mercado. Encontrará información general de funciones de productos, vídeos detallados con consejos rápidos, entrevistas exclusivas con líderes del sector y comentarios de expertos en seguridad de McAfee.

Archivos multimedia destacados

A Day in the Life of McAfee Security, testimonios de clientes Sepa por qué nuestros clientes confían en McAfee para proteger los sistemas y las redes.

Consumerización de TI: proteja y administre las plataformas y dispositivos más recientes para impulsar la productividad de su empresa.

Tutorial de McAfee Web Gateway: cómo crear categorías personalizadas de filtrado de URL y listas de excepciones que se adapten a las directivas organizativas.

Seguridad integrada para aparatos médicos: conozca el planteamiento de McAfee y la estrategia de implementación de la seguridad integrada para aparatos médicos. Entre otras tecnologías, se presentan McAfee Embedded Control y McAfee Deep Command.

Ver todo multimedia

  • Advanced Threat Defense in 60 Seconds
    noviembre 13, 2014
    Learn how McAfee Advanced Threat Defense works with your current security from network to endpoint to protect against threats.
  • Unleash the Power of Hybrid Web Protection
    noviembre 13, 2014
    Only McAfee provides customers with state-of-the-art web security on-premises, in the cloud, or using a hybrid mix. This gives customers the ability to configure their Web Protection solution in a way that best meets their business needs, with the flexibility to quickly and easily adapt as business needs change.
  • McAfee Network Security Platform: What can you do in 60 seconds?
    noviembre 10, 2014
    Learn how McAfee Network Security Platform supercharges your security to avoid zero-day threats.
  • McAfee Server Security Suites
    octubre 21, 2014
    Learn how visibility, protection, and security management can be maintained across physical, virtual, and cloud environments through McAfee’s comprehensive server security.
  • Adapt on the Fly. McAfee Threat Intelligence Exchange
    octubre 15, 2014
    McAfee Threat Intelligence Exchange integrates, automates, and simplifies to decisively reduce TCO and optimize enterprise security. It eliminates complexity, provides instantaneous speed, and illuminated knowledge that can lower operating costs while streamlining protection and response ― all while freeing valuable security team resources.
  • Trusted Security for SMBs
    septiembre 1, 2014
    Small and medium-sized business (SMB) owners are looking for a smart, simple, and secure endpoint security solution. They have low budgets and lack security expertise, but require a reliable solution for business security. McAfee Endpoint Protection for SMB addresses the core needs of SMB owners providing them peace of mind and allowing them to focus on growing their business.
  • DLP Classification Scan
    agosto 28, 2014
    Classification is an important precursor to establishing effective policies to protect data from leaving the organization. You will learn the importance of classification and how to do a classification scan with McAfee Discover appliance.
  • DLP Inventory Scan
    agosto 28, 2014
    Inventory scan is the first step in the workflow for discovery and classification of sensitive content. In this quick tip video, you will learn what is an inventory scan and how to do an inventory scan with McAfee DLP Discover appliance.
  • DLP Role-Based Access Control
    agosto 28, 2014
    Role-Based Access Control is also known as Separation of Duties. It provides granular control over users who view DLP Incident Manager and Operational Events data.
  • Web Gateway: Flexible Hybrid Options
    julio 7, 2014
    McAfee Web Protection is the industry’s most flexible secure web gateway solution. Customers can deploy any way they want – on-premises, in the cloud, or both – with the flexibility to adapt as business circumstances change. All it takes is one mouse click to synchronize security policy rules, enabling you to protect all users against web-based threats, regardless of location or device.