Intel Security

View All Publications

Filter Content:

Neutralize Advanced Threats

Each month brings new media coverage of a targeted attack against a business, government, or critical infrastructure operator previously considered “invulnerable.” As more organizations encounter advance malware issues - the cost, disruption, and public humiliation of data breaches and targeted attacks become an executive-level discussion. Comprehensive threat protection requires coordination of anti-malware technologies deployed with sensitivity to performance and risk.
Topics: Reference Architecture

Protect Critical Infrastructure

Securing critical infrastructure requires protecting multiple zones, including enterprise IT, SCADA, and industrial control systems (ICS), to meet compliance regulations and ensure continuous system availability. The Security Connected framework from McAfee enables you to establish a robust security posture with integrated solutions that protect endpoint, network, and data across IT, SCADA, and ICS — without impacting system availability.
Topics: Reference Architecture

Manage Risk & Security

This solution guide addresses the importance of implementing a strategic security and risk management program focused on prevention and protection, reducing incidents and risks across the enterprise, across every device, and across the entire IT infrastructure.
Topics: Reference Architecture

Operationalize Intelligence-Driven Response

Learn about the three frameworks required for intelligence-driven response to be effective — decision, detection, and analysis.
Topics: Reference Architecture

Protecting Information

There are several solutions for protecting information that offer the added benefit of reducing costs and complexity.
Topics: Reference Architecture

Protecting the Data Center

The data center operations team is being tasked with responsibilities from building solutions for continuous compliance and virtualization to consolidation and leveraging the cloud.
Topics: Reference Architecture

Securely Enabling Social Media

There are a number of user-centric tactics such as employee awareness and policy setting that can be utilized to mitigate risks related to social media.
Topics: Reference Architecture