Security Connected

Optimized Threat Intelligence from Encounter to Containment in Milliseconds


Learn More

Top 10 Security Topics for Executives


Learn More

Riches, Ruins & Regulations. Protect Your Company from Cybercrime.


Making the Grade

McAfee is a leader in malware and threat detection

Download Infographic

Overview

The Security Connected platform from McAfee provides a unified framework for hundreds of products, services, and partners. Any organization can improve its security posture and minimize operational costs through the platform’s innovative concepts, optimized processes, and practical savings.

  • Innovative — The platform leverages a real-time data exchange framework, collective threat intelligence, high-performance analytics, and open security management to make endpoint, network, and cloud countermeasures protect as one.
  • Optimized — Actionable intelligence and situational awareness enable the optimal balance of risk mitigation, prioritized resources, and operational value.
  • Practical — The Security Connected Reference Architecture helps you adapt the Security Connected vision to your unique risks, infrastructure, and business objectives.

 


Trending Topics

  • Detection effectiveness: Third party testing organizations periodically test McAfee products to determine how well they identify and block threats. In the first half of 2014, McAfee products posted an impressive array of third party detection effectiveness test results. Learn more.
  • Technology: 74% of network IT pros think sandboxing is not enough to fight advanced malware. Learn more.
  • New attack methods: Advanced evasion techniques (AETs) are a weapon in advanced persistent threats. Learn more about how AETs work.
  • Reference Architecture: Adapt Security Connected concepts to your unique risks, infrastructure, and business objectives. Reference Architecture includes both Solution Guides that outline broad security challenges and best practice considerations, and Technology Blueprints that dive deep into McAfee solutions — laying out a concrete path to security implementation. Learn more.

 


Case Studies

Texas Tech University

Texas Tech University
With patients in over 100 counties, and an IT environment with nearly 10,000 endpoints, the Texas Tech University Health Sciences Center needed solutions to stay secure and compliant. Texas Tech uses 11 McAfee products to achieve both connected, streamlined security and meet compliance and regulations. Read the case study.

State of Colorado

State of Colorado
The State of Colorado Office of Information Technology selected 15 McAfee products to address the Council on CyberSecurity's Top 20 Critical Security Controls as its new structure for 90% of the state's IT security, starting with the first five controls. Read the case study.

McAfee Blog Central

Join the Conversation Next Page

  • Black Hat 2014 Advanced Malware Survey Results
    Barbara Kay - August 21, 2014

    Where certain flamboyant IPOs and mergers might lead one to think advanced malware was a solved problem, Black Hat demonstrated just the opposite. This year, we uncovered that security experts are still spending days and weeks of each month dealing with advanced malware. In response to this realization, they acknowledge they need more than a […]

    The post Black Hat 2014 Advanced Malware Survey Results appeared first on McAfee.