View All Publications

Counter Stealth Malware
Detecting the presence and actions of stealthy malware and attackers requires investment in tools that provide broad and deep visibility integrated with protection and response systems.

Healthcare-Friendly Security
This white paper addresses the need for healthcare-friendly security as a means of minimizing the potential for data breaches while enabling its safe, transit, and storage of patient information in a clinical setting. McAfee, a part of Intel Security, provides solutions that integrate security software with hardware to empower healthcare practitioners with flexible technology options that enable them to deliver the best possible care.

HP Endpoint Protection Services
HP and McAfee have seamlessly integrated advanced technologies for securing laptops, desktops, and mobile devices. We offer the best of HP’s outsourcing, enterprise, and security knowledge built on the rich endpoint security, unmatched threat research, and integrated management offered by McAfee.

Gartner Magic Quadrant for Enterprise Data Loss Prevention
Leading analyst firm Gartner has positioned Intel Security as a Leader in the Gartner Magic Quadrant for Enterprise Data Loss Prevention for the seventh consecutive year.

Endpoint Encryption Keeps Your Data Safe
McAfee endpoint encryption solutions protect valuable corporate data on end-user devices and shared servers with comprehensive encryption and integrated, centralized management, consistent policies, robust reporting, and proof-of-protection.

Gartner Report: Magic Quadrant for Endpoint Protection Platforms
Intel Security named a Leader in 2016 Gartner Magic Quadrant for Endpoint Protection Platforms.
Topics: Endpoint Protection

Management of Native Encryption
With the rapid increase of PCs, tablets, and other devices in the enterprise environment, it’s critical to ensure that sensitive data is secure, and one of the best ways to achieve it is with encryption. Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.

When Evolution Turns Dark
Learn how to protect against polymorphic worms like W/32Worm-AAEH.
Topics: McAfee Labs

thumbnail image

Continuous Diagnostics and Mitigation
McAfee offers a comprehensive security portfolio that maps directly to the Continuous Asset Evaluation, Situational Awareness, and Risk Scoring (CAESARS) reference architecture. Learn how McAfee solutions encompass support for all subsystems, including sensor, database, presentation/reporting, and analysis/risk scoring.

Future-Focused Security
Life after Microsoft Windows Server 2003 EOS

McAfee Labs Threats Report: November 2015
McAfee Labs’ quarterly analysis of key threat topics and trends.
Topics: McAfee Labs

Protecting Against Fileless Malware
This solution brief discusses the three types of fileless malware that evade detection by reducing the storage of binaries on disk and operate on the memory of the compromised host.
Topics: McAfee Labs

Safeguarding Against Macro Malware
Get an in-depth look at macro malware and understand its resurgence in appearance since the 1990s.
Topics: McAfee Labs

How McAfee Endpoint Security 10’s Next Generation Technologies Protect and Perform
McAfee Endpoint Security 10 provides customers with an intelligent, collaborative framework, enabling endpoint defenses to communicate, share intelligence, and take action against advanced threats.

The Hidden Data Economy
The marketplace for stolen digital information
Topics: McAfee Labs

Security that Plays Well with Others
Organizations need a way to orchestrate security components so that they to work together and present a unified coordinated defense. Intel Security’s open, integrated architecture can help legacy point products play well together, optimize the effectiveness of your entire security infrastructure, and simplify, unify, and advance the threat defense lifecycle.

McAfee Application Control Extends the Life of Legacy Microsoft Windows XP Systems
McAfee Application Control provides an effective way to block unauthorized applications from running and will continue to support Windows XP systems even after Microsoft’s phase-out of support has taken effect.
Topics: Server & Storage Security

McAfee Labs 2016 Threats Predictions
This report includes two distinct views of the future: First, we look forward five years and predict how the cyber threat landscape will change and the security industry’s likely response. Then, we look tactically at 2016 and make specific predictions about expected threat activity.
Topics: McAfee Labs

Operationalizing Threat Intelligence
Behind just about every legitimate alert your IT security receives is an adversary using multiple attack techniques to penetrate your infrastructure and compromise your vital data assets or systems. Today’s targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.

Monitor Continuously. Respond Swiftly.
McAfee Active Response enhances ATA detection and remediation.