View All Publications

Intel Security Critical Infrastructure Protection
The Intel Security Critical Infrastructure Protection solution leverages an innovative defense in-depth approach to monitor and manage the Internet of things (IoT) and industrial Internet deployments from silicon to cloud.

Solving a National Problem — Intel Security Critical Infrastructure Protection
The risk of cyberattacks on critical infrastructures is no longer theoretical. Grid operators are investing aggressively in both physical and information security systems, and there is accumulating guidance from governments worldwide on measures that should, and, in some cases, must be taken to secure the supply and delivery of electricity.

Planning a Successful Move to Office 365
This paper outlines the security concerns of Microsoft Office 365 and will not only help you understand what those concerns are and what you need to know in order to make an informed decision about moving to Office 365, but it will also help you make the migration to Office 365 as smooth as possible once you’ve made that decision.

Intel Security and Siemens Healthcare Form Healthcare Cybersecurity Partnership
Intel Security and Siemens Healthcare have partnered to design and build medical devices that protect vital healthcare data and patient information—without hindering performance. Siemens Healthcare products—such as Ultrasound System Security—now integrate Intel Security technologies creating safe and reliable medical devices. 

Security Considerations for Microsoft Windows Server 2003 EOS Migration Paths
This white paper offers three options for Windows Server 2003 migration, along with a variety of measures you can take that will help you maintain a strong security posture in the face of today’s dynamic threat landscape.

The Radicati Group: Corporate Web Security Market Quadrant 2015
This report provides market analysis for corporate web security solutions, revealing Top Players, Trail Blazers, Specialists, and Mature Players. Intel Security is positioned as a Top Player in this report. 

Automotive Security Best Practices
This white paper discusses security and privacy issues in the next-generation car and how computer attacks are now a clear and present danger for car users, dealers, manufacturers, and suppliers alike. Computer security joins reliability and safety as a cornerstone for consumer confidence and continued success in the automotive industry.

Automotive Security Best Practices - Executive Summary
Executive summary for our white paper "Automotive Security Best Practices".

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection
Key findings on data exfiltration and recommendations on data loss prevention

McAfee Labs Threats Report: August 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Topics: McAfee Labs

Stop Data Exfiltration
Data exfiltration tactics and techniques used by cyber thieves and how to combat data theft.
Topics: McAfee Labs

Protecting Against GPU Malware
Policies, procedures, and products that can protect against GPU attacks.
Topics: McAfee Labs

Disrupt Targeted Attacks
Intel Security recommends that you unify the protect, detect, and correct stages of managing threats so you can build a comprehensive security model to combat targeted attacks. While each stage has its own unique set of tactics, they all work together to provide context and leverage insights. This concept—an adaptive security model—applies learning immediately throughout a collaborative architecture and provides the overall cyber-resilience required to outmaneuver adversaries, contain intrusions quickly, and avoid excessive financial damage.

Combatting Advanced Targeted Attacks: PROTECT
Intel Security recommends a three-pronged approach for disrupting advanced targeted attacks, starting with enhanced protection, described in this guide. The goal of this Protect stage is two-part: to stop the most pervasive attack vectors while disrupting never-before-seen techniques and payloads, and to derive insights that can strengthen countermeasures and inform investigators of unfolding activities.

Combatting Advanced Targeted Attacks: DETECT
This guide covers advanced monitoring to identify anomalous, outlier behavior to perceive low-threshold attacks that would otherwise go unnoticed. As you uncover evidence, your system should share findings to enrich decision-making throughout your security infrastructure.

SANS Survey: Maturing and Specializing: Incident Response Capabilities Needed
SANS released the 2015 findings from their Incident Response survey. The good news is results show that incident response (IR) and even detection are maturing. The shrinking window of response time, along with more automated tools and the specialized job titles to support the IR function are all indicators of this maturation. Now for the bad news: Organizations are short on the skills and technologies they need for full visibility and integrated response.

Combatting Advanced Targeted Attacks: CORRECT
This guide describes ways to facilitate triage and prioritization for fluid investigation and rapid remediation. As you learn, your solution should apply insights immediately throughout a collaborative infrastructure.

Securing Hybrid Networks for Dummies
Hybrid networks and data centers combine traditional network infrastructure with virtualized infrastructure to improve efficiency and flexibility. Learn how to keep your networks and data centers secure when transitioning to these new, next generation architectures.

Don’t Jeopardize Security When Moving to Office 365
This paper provides an overview of some of the issues facing enterprises as they move to Office 365 and other cloud-based applications, and suggests how comprehensive solutions from Intel Security can help address those issues.