Market Quadrant: McAfee Advanced Threat Defense is Top Player (English)
This edition of Radicati Market Quadrants reviews products that offer protection from advanced persistent threats.
Protect Critical Assets with Virtual Patching (English)
This white paper discusses virtual patching and how using predictive threat coverage, automated vulnerability scanning, and risk visualization is a scalable and cost-effective approach to protecting critical assets.
KIOSK and Intel Security Offer the Enhanced Security Suite (English)
Kiosks offer consumers convenience and drive lower costs for deployers, but they are also on the frontline of a new cyberattack environment outside the perimeter of corporate networks. With Enhanced Security Suite, Intel Security and KIOSK Information Systems have joined forces to provide advanced security and compliance protection to self-services devices. Now you can secure and differentiate your self-service platform while addressing today’s most pressing customer issues.
McAfee Enterprise Security Manager, Services Solutions for Managed Service Providers (MSPs) (English)
McAfee Enterprise Security Manager offers the advanced scalability, flexibility, and control you need to protect your customers’ business, and grow yours.
The 1-2-3- Security Approach for Windows Server 2003 EOS (English)
End of Support for Windows Server 2003 is approaching, but that doesn’t mean your business has to lack security. Learn about the three migration paths available to remain compliant and secure.
Throughput and Scalability Report McAfee NGFW 5206 — Miercom (English)
Independent testing lab Miercom performed comprehensive throughput and scalability testing on the McAfee NGFW 5206 appliance. Testing was performed with application control, deep packet inspection, antivirus enabled, and in configurations of one to four clusters.
Embrace Public Clouds with Confidence (English)
Gain all of the benefits of public cloud services without compromising security. Learn how to secure your servers wherever they are with McAfee Public Cloud Server Security Suite.
ESG Lab Validation Report: McAfee Next Generation SIEM (English)
ESG Lab focused on the McAfee Enterprise Security Manager (ESM), the core product of McAfee’s end-to-end solution for addressing comprehensive threat detection and remediation. Testing was designed to explore how the solution accurately detects advanced threats using a layered approach, the speed and effectiveness of responding to an attack, and the operational efficiencies of this integrated solution.
ESG Report: Tackling Attack Detection and Incident Response (English)
This report examines organizations’ security strategies, cyber-attack environments, incident response challenges and needs. A survey found that security professionals are inundated with security incidents and struggle with timely identification and resolution of targeted attacks. A lack of visibility into user and network activity, shortage of investigative skills and experience, and poor security analytics capabilities are key factors in slowing organizations’ response to incidents.
Best Practices for Dealing with Phishing and Next-Generation Malware (English)
To combat phishing attempts and next-generation malware, organizations of all sizes should consider a variety of issues related to security. This Osterman white paper shows trends in how malware infiltrates organizations, efficacy of security technology and user training, and a variety of actions that organizations should undertake.
Best Practices for Migrating to Office 365 (English)
This white paper is intended to help decision makers understand the implications of migrating to Microsoft Office 365 and offers practical advice for doing so. It also provides data from a survey of current and prospective Office 365-enabled organizations conducted specifically for this white paper in March 2015.
McAfee SaaS Web Protection Service Solution Guide (English)
Learn how the McAfee SaaS Web Protection service can help any business tap into the power and efficiency of the Internet while keeping threats—from inside and outside of the business—in check.
McAfee Web Reporter (English)
McAfee Web Reporter provides a real-time view of web traffic, allowing enterprises to refine and enforce Internet use policies and ensure compliance.
Real-World Data Breach Protection Techniques
This white paper explains the strategies and techniques used by McAfee Network Data Loss Prevention to protect data-in-motion. Understand the importance of both the content and context of sensitive data when detecting and preventing data exfiltration.
Securosis: Applied Threat Intelligence (English)
One of the most compelling uses for threat intelligence is helping to detect attacks earlier. Examining for attack patterns identified via threat intelligence in your security monitoring and analytics processes shortens the window between compromise and detection. This Securosis white paper focuses on how to use threat intelligence to improve your ability to detect, prevent, and investigate attacks.
Atrápame si puedes: Las travesuras de una red de bots polimórfica
This in-depth report discusses the polymorphic worm W/32Worm-AAEH, the control infrastructure behind it, and what it took to take it down.
Temas: McAfee Labs
McAfee Next Generation Firewall — Securing global healthcare networks (English)
Learn how McAfee Next Generation Firewall secures global healthcare networks with the highest level of network defense while enabling greater efficiency and cost savings.
McAfee Next Generation Firewall — Securing global retail networks (English)
Discover how McAfee Next Generation Firewall provides a high level of network protection for global retail environments across multiple geographic locations.
Protecting Mobile Devices from Malware Attack — An Osterman Research White Paper (English)
How can you protect your employees’ computers against malware attack regardless of their location? How can you enforce acceptable usage policies for employees located remotely or mobile? The best way to protect against web threats is to redirect all web traffic through a proxy or web gateway that can block blacklisted or unsuitable sites, filter malware downloads, and enforce rules preventing sensitive data from being lost. In this white paper, Osterman Research describes the four ways to reroute web traffic from a mobile device or remote computer through a gateway, and highlights the strengths and weaknesses of each approach.
SANS Data Center Server Security Survey 2014 (English)
Learn how organizations are tackling the difficult problem of data center security, as well as the best practices for meeting data center compliance demands while reducing overall risk and management complexity.