View All Publications



Hybrid Email Security: Maintain privacy while gaining benefits of the cloud
Information confidentiality and reduced configuration flexibility are often cited as reasons for not taking advantage of cloud-based email security. This brief discusses how hybrid security can enable organizations with these concerns to enjoy the benefits of the cloud without sacrifice.

Advanced Threat Defense for Next-Generation Firewalls
Next-generation firewalls certainly offer expanded network security for branch offices and remote locations, but they can’t find and block stealthy, advanced malware. Through the Security Connected approach from McAfee, Advanced Threat Defense and McAfee Next Generation Firewall work hand-in-hand to find and freeze today’s evasive and targeted cyberattacks.

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange
There’s no doubt that organizations face significant challenges protecting their intellectual property and critical assets from the emerging threats that target their environments. This solutions brief highlights how McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight today’s advanced threats.

McAfee Threat Intelligence Exchange and Endpoint Protection
McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threats response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

SANS Analytics and Intelligence Survey
This paper explores the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.
Topics: SIEM

Security in Unison
McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threat response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

Calculating the Business Value of Next Generation Firewall — IDC
This white paper articulates the business benefits derived by companies that have deployed a NGFW solution. The data is based on in–depth interviews with eight McAfee customers. These companies were mostly large organizations with an average employee base of 7,082. Interviewees came from a variety of industries — energy, financial services, manufacturing, retail, service provider, technology, and education.

Security Value Map — NSS Labs
McAfee NGFW 5206 appliance is compared directly with 11 competitive next-generation firewall products.  Detailed comparisons are provided across the categories of security, performance, and total cost of ownership (TCO) and presented in an aggregated graph.

Throughput and Scalability Report McAfee NGFW 5206 — Miercom
Independent testing lab Miercom performed comprehensive throughput and scalability testing on the McAfee NGFW 5206 appliance. Testing was performed with application control, deep packet inspection, and antivirus enabled, and in configurations of one to four clusters.

"Why Can't I Vote on my Phone?"
This document considers the future for cyber security in civil governments around the world. As governments seek to develop their digital services, what security issues could this present? Here, we consider the trends affecting contemporary governments and look at how these may project forward to create ‘Next-Gen Government’. It then looks to see what the major security issues could be and the implications of these for governments globally. It takes a closer view on the reasons mobile e-voting has not yet been widely accepted, using this to illustrate the issues raised throughout.