Search

View All Publications



thumbnail image

Neutralize Advanced Threats
Each month brings new media coverage of a targeted attack against a business, government, or critical infrastructure operator previously considered “invulnerable.” As more organizations encounter advance malware issues - the cost, disruption, and public humiliation of data breaches and targeted attacks become an executive-level discussion. Comprehensive threat protection requires coordination of anti-malware technologies deployed with sensitivity to performance and risk.
Topics: Reference Architecture

thumbnail image

Protect Critical Infrastructure
Securing critical infrastructure requires protecting multiple zones, including enterprise IT, SCADA, and industrial control systems (ICS), to meet compliance regulations and ensure continuous system availability. The Security Connected framework from McAfee enables you to establish a robust security posture with integrated solutions that protect endpoint, network, and data across IT, SCADA, and ICS — without impacting system availability.
Topics: Reference Architecture

thumbnail image

Manage Risk & Security
This solution guide addresses the importance of implementing a strategic security and risk management program focused on prevention and protection, reducing incidents and risks across the enterprise, across every device, and across the entire IT infrastructure.
Topics: Reference Architecture

thumbnail image

Operationalize Intelligence-Driven Response
Learn about the three frameworks required for intelligence-driven response to be effective — decision, detection, and analysis.
Topics: Reference Architecture

thumbnail image

Protecting Information
There are several solutions for protecting information that offer the added benefit of reducing costs and complexity.
Topics: Reference Architecture

thumbnail image

Protecting the Data Center
The data center operations team is being tasked with responsibilities from building solutions for continuous compliance and virtualization to consolidation and leveraging the cloud.
Topics: Reference Architecture

thumbnail image

Securely Enabling Social Media
There are a number of user-centric tactics such as employee awareness and policy setting that can be utilized to mitigate risks related to social media.
Topics: Reference Architecture

thumbnail image

Securing Mobile Devices
Securing mobile devices means securing the whole device, including the device itself and the data it contains.
Topics: Reference Architecture