Ver todas las publicaciones



thumbnail image

Investigate Data Breaches (English)
McAfee enables enterprises to collect, analyze, and preserve security forensic information. With a solution that includes content- and context-aware SIEM, McAfee provides alerts to security events, as well analysis on how the attacked occurred, affected users, and compromised data — so you can better understand the severity of a security breach.
Temas: Arquitectura de referencia

thumbnail image

Assess Your Vulnerabilities (English)
McAfee integrates data and processes to make vulnerability management more effective and efficient. Our approach combines asset discovery and management, comprehensive vulnerability scanning, flexible reporting, and remediation workflows into a single vulnerability assessment solution.
Temas: Arquitectura de referencia

thumbnail image

Continuous Diagnostics and Mitigation (English)
McAfee offers a comprehensive security portfolio that maps directly to the Continuous Asset Evaluation, Situational Awareness, and Risk Scoring (CAESARS) reference architecture. Learn how McAfee solutions encompass support for all subsystems, including sensor, database, presentation/reporting, and analysis/risk scoring.
Temas: Arquitectura de referencia

thumbnail image

Optimize Log Management (English)
Deployment of McAfee Enterprise Security Manager and Enterprise Log Manager addresses the need for secure log collection, transport, handling, and storage, permitting your organization to prove non-repudiation and chain of custody of log records. Adding in McAfee Integrity Control ensures that the native log files being generated are a true and accurate record, preventing malicious users from interfering with the log generation process.
Temas: Arquitectura de referencia

thumbnail image

Succeed at Data Readiness (English)
McAfee works closely with a partner, TITUS, to provide resilient data governance solutions that enable government customers to meet regulatory requirements, prevent sensitive data leakage, monitor user compliance, and respond quickly to security incidents.
Temas: Arquitectura de referencia, Protección de datos

thumbnail image

Find, Freeze, and Fix Advanced Threats (English)
Your organization is asking for an advanced malware detection and response strategy that’s sophisticated and adaptive against hacker attacks. Several design trends in advanced malware security affect the performance, efficacy, cost, and management complexity of an overall solution. What’s your next step?
Temas: Arquitectura de referencia, Seguridad de redes

thumbnail image

Counter Stealthy Malware (English)
The most menacing type of cyberattack is invisible. Using sophisticated techniques to hide its presence, stealthy malware may operate outside of the OS or move dynamically across endpoints to conceal the attackers’ actions. The risk to enterprises is real, with high-profile attacks such as Operation High Roller impacting companies around the globe. Traditional antivirus or intrusion prevention systems are no match for this new breed of stealthy malware; instead, enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Temas: Arquitectura de referencia

thumbnail image

Neutralize Advanced Threats (English)
Each month brings new media coverage of a targeted attack against a business, government, or critical infrastructure operator previously considered “invulnerable.” As more organizations encounter advance malware issues - the cost, disruption, and public humiliation of data breaches and targeted attacks become an executive-level discussion. Comprehensive threat protection requires coordination of anti-malware technologies deployed with sensitivity to performance and risk.
Temas: Arquitectura de referencia

thumbnail image

Neutralize Advanced Threats (English)
Each month brings new media coverage of a targeted attack against a business, government, or critical infrastructure operator previously considered “invulnerable.” As more organizations encounter advance malware issues - the cost, disruption, and public humiliation of data breaches and targeted attacks become an executive-level discussion. Comprehensive threat protection requires coordination of anti-malware technologies deployed with sensitivity to performance and risk.
Temas: Arquitectura de referencia

thumbnail image

Securing Removable Media (English)
McAfee helps organizations understand and monitor how employees are using USB sticks and other portable storage devices. Our solutions to secure removable media include antivirus and antimalware protection, data loss prevention, data encryption, and controls that help implement effective policies to protect critical information.
Temas: Arquitectura de referencia