Security Connected

Optimized Threat Intelligence from Encounter to Containment in Milliseconds

Learn More

Top 10 Security Topics for Executives

Learn More

Riches, Ruins & Regulations. Protect Your Company from Cybercrime.

Incident response starts with planning. How does your organization stack up?

Read the SANS Survey


The Security Connected platform from McAfee provides a unified framework for hundreds of products, services, and partners. Any organization can improve its security posture and minimize operational costs through the platform’s innovative concepts, optimized processes, and practical savings.

  • Innovative — The platform leverages a real-time data exchange framework, collective threat intelligence, high-performance analytics, and open security management to make endpoint, network, and cloud countermeasures protect as one.
  • Optimized — Actionable intelligence and situational awareness enable the optimal balance of risk mitigation, prioritized resources, and operational value.
  • Practical — The Security Connected Reference Architecture helps you adapt the Security Connected vision to your unique risks, infrastructure, and business objectives.


Trending Topics

  • Detection effectiveness: Third party testing organizations periodically test McAfee products to determine how well they identify and block threats. In the first half of 2014, McAfee products posted an impressive array of third party detection effectiveness test results. Learn more.
  • Technology: 74% of network IT pros think sandboxing is not enough to fight advanced malware. Learn more.
  • New attack methods: Advanced evasion techniques (AETs) are a weapon in advanced persistent threats. Learn more about how AETs work.
  • Reference Architecture: Adapt Security Connected concepts to your unique risks, infrastructure, and business objectives. Reference Architecture includes both Solution Guides that outline broad security challenges and best practice considerations, and Technology Blueprints that dive deep into McAfee solutions — laying out a concrete path to security implementation. Learn more.


Case Studies

Texas Tech University

Texas Tech University
With patients in over 100 counties, and an IT environment with nearly 10,000 endpoints, the Texas Tech University Health Sciences Center needed solutions to stay secure and compliant. Texas Tech uses 11 McAfee products to achieve both connected, streamlined security and meet compliance and regulations. Read the case study.

State of Colorado

State of Colorado
The State of Colorado Office of Information Technology selected 15 McAfee products to address the Council on CyberSecurity's Top 20 Critical Security Controls as its new structure for 90% of the state's IT security, starting with the first five controls. Read the case study.

McAfee Blog Central

Join the Conversation Next Page