Все публикации



Hide English Publications

Intel Security Positioned as a Leader by Gartner in MQ for SIEM Based on Completeness of Vision and Ability to Execute (English)
The security information and event management (SIEM) market is defined by the customer's need to apply security analytics to event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze and report on log data for incident response, forensics and regulatory compliance. The vendors included in the Magic Quadrant analysis have technologies that have been designed for this purpose, and they actively market and sell these technologies to the security buying center.

[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]
Темы: SIEM

Magic Quadrant for Secure Email Gateways (English)
Gartner recognizes Intel Security as a visionary in the Gartner Magic Quadrant for Secure Email Gateways, as published on June 29, 2015.

[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]
Темы: Безопасность электронной почты и веб-трафика, Защита приложений

Critical Infrastructure Readiness Report: Holding the Line Against Cyberthreats (English)
Technology and security professionals in North America and Europe profess a great deal of confidence in their cyberdefenses despite the current spate of high-profile breaches worldwide, according to a new survey made possible by the Aspen Institute Homeland Security Program and Intel Security.

The Top Five Network Attack Methods (English)
This report offers insight into five of the most common network attack methods cybercriminals love to use. It provides valuable insight on how attackers target sensitive data and steal intellectual property, as well as guidance on what you can do to minimize the likelihood of a breach and its repercussions.
Темы: Сетевая безопасность

Разбор пяти самых популярных методов проведения сетевых атак. Взгляд с точки зрения преступника
This report offers forensic insight into five of the most common network attack methods that data thieves love to use. It also provides practical guidance on how criminals view your network, how to use that information to maintain a dynamic security profile, and ways to minimize the likelihood of a breach and its injurious repercussions.
Темы: Сетевая безопасность

Create a Least Risk Microsoft Windows Desktop (English)
Avecto Privilege Guard and McAfee ePolicy Orchestrator (ePO) software enable organizations worldwide to deploy secure and compliant desktops—without compromising a user's ability to perform their day to day tasks.

McAfee Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection (English)
This white paper discusses the flagship McAfee Gateway Anti-Malware technology, how it adapts to new threats, and sets the stage to protect against future threats with a modular design that allows for the easy addition of components for maximum flexibility.
Темы: Защита приложений

Secure Network-Attached Storage (English)
McAfee offers cost-effective solutions for securing your data, files, and peace of mind, no matter how large or how diverse your storage environment.
Темы: Сетевая безопасность

Keep Your Data Safe for Office 365 (English)
McAfee DLP offers expansive, yet flexible, polices and templates that can help address risky employee behavior by protecting sensitive data from day-today user actions.

Protocol-Based IPS Architecture (English)
This brief discusses the Intel Security approach to protocol-based Intrusion Prevention System inspection and how it differs from other security vendors. Intel Security uses protocol inspection as the foundation of IPS solutions and builds advanced intelligence on top of this architecture to provide superior protection and IPS performance.

McAfee Labs Threats Report: May 2015 (English)
McAfee Labs’ quarterly analysis of key threat topics and trends.
Темы: McAfee Labs

McAfee Network Security Platform for the Data Center (English)
McAfee Network Security Platform combines extraordinary performance, advanced signature-less inspection, deep integration with other security systems, intelligent central management, and scalability to secure the very largest environments, making it the IPS of choice for the world’s most demanding data centers.

Protecting Against Firmware and BIOS Manipulation (English)
Policies, procedures, and products that can protect against firmware attacks.
Темы: McAfee Labs

Defeat Ransomware: Ensure Your Data Is Not Taken Hostage (English)
Learn how to stop ransomware before it strikes.
Темы: McAfee Labs

Phishing Deceives the Masses: Lessons Learned from a Global Assessment (English)
This report reviews the lessons learned from the McAfee Phishing Quiz. At the time of this report, over 50,000 business users in 49 countries have completed the quiz and the results are enlightening.

Protecting Against Adobe Flash Exploits (English)
A practical approach to detect and protect against Adobe Flash exploits.
Темы: McAfee Labs

The Realities of Cyber Parenting: What Pre-teens and Teens Are Up To Online (English)
To help ensure kids are growing up to be responsible digital citizens, parents must closely monitor their actions on the Internet, particularly on social media, and have frequent and open talks about what type of behavior is acceptable and what will not be tolerated.

Market Quadrant: McAfee Advanced Threat Defense is Top Player (English)
This edition of Radicati Market Quadrants reviews products that offer protection from advanced persistent threats.

Protect Critical Assets with Virtual Patching (English)
This white paper discusses virtual patching and how using predictive threat coverage, automated vulnerability scanning, and risk visualization is a scalable and cost-effective approach to protecting critical assets.

KIOSK and Intel Security Offer the Enhanced Security Suite (English)
Kiosks offer consumers convenience and drive lower costs for deployers, but they are also on the frontline of a new cyberattack environment outside the perimeter of corporate networks. With Enhanced Security Suite, Intel Security and KIOSK Information Systems have joined forces to provide advanced security and compliance protection to self-services devices. Now you can secure and differentiate your self-service platform while addressing today’s most pressing customer issues.