McAfee Security Connections — Webcast Series

Learn how to lower the cost of ownership through smart integrations

McAfee Security Connections

The McAfee Security Connections Webcast series showcases the power of McAfee-tested partner integrations. To learn more about these integrations and request an onsite demo or evaluation, please visit the McAfee Compatible Solutions Center.

Companies that use standalone products and consoles in today’s heterogeneous IT environment face higher risk and operational costs. McAfee is leading the way not just in integrating its own portfolio, but also integrating its management platform with over 100 partners in more than a dozen security markets.

In this webcast series, end users will learn how McAfee works with other security vendors to lower the cost of ownership and operation through smart integrations. In each webcast, McAfee and a McAfee Security Innovation Alliance Partner will highlight one key aspect of the IT security puzzle. Using a conversational format, each webcast will also discuss innovative solutions followed by a Q&A session. All webcasts will be archived for later viewing.

Register today for these FREE live webcasts.


Title Description Date Live/On Demand*

Target and Eliminate Privileged Account Security Threats
McAfee and Lieberman Software

Learn how McAfee ePO and Lieberman Software provide a model in which sensitive logins are controlled and passwords automatically revoked immediately after delegated IT personnel complete their work. Tuesday 6th August, 2013
10:00 AM PDT
Register

Do you know how to Secure the Other Half of Your Network?
McAfee and AirPatrol Corp

Learn how McAfee and AirPatrol Corporation can secure the other half of your network, the mobile devices, through detection, monitoring and endpoint security. Tuesday 23rd July, 2013
10:00 AM PDT
Register

Better Business Decisions Through Streamlined Risk Prioritization
McAfee and LockPath

Join us for a look into how LockPath's Keylight platform and McAfee Vulnerability Manager will help you tame your complex data challenges and spotlight the most critical risks to your environment. Thursday 11th July, 2013
10:00 AM PDT
Register

McAfee Deep Defender and Invincea — Stopping the User Targeted Threat
McAfee and Invincea

Learn about the industry’s most secure endpoint that uses Invincea’s Secure Virtual Container technology and McAfee’s sub-OS anti-rootkit security, Deep Defender. Wednesday 19th June, 2013
10:00 AM PDT
Register

Managing Mobility Costs in Real Time
McAfee and Tangoe

Learn how McAfee and Tangoe have partnered to help companies eliminate wireless bill shock. Tuesday 4th June, 2013
10:00 AM PDT
Register

Next-Gen Security Management – A Risk-Based Approach to Mitigating Cyberattacks
McAfee and Skybox Security

Learn how Skybox leverages McAfee Firewall Enterprise and Vulnerability Management solutions, adding a layer of network visibility, continuous monitoring, and security analytics. Tuesday 14th May, 2013
10:00 AM PDT
Register

Protecting Against IP Theft –- Fighting an Effective Battle
McAfee and Securonix

Learn how using data loss prevention technologies and a powerful layer of in-context intelligence provide real-time detection of theft by leveraging behavioral profiling and accurate comparative algorithms. Tuesday 30th April, 2013
10:00 AM PDT
Register

Defending Against Persistent Attackers: The Need for Incident Response 360°
McAfee and HBGary

Discover why motivated attackers’ persistence to gain access – and retain access – in the network requires continuous detection, incident validation, and response. Tuesday 9th April, 2013
10:00 AM PDT
Register

Security Intelligence Meets Vulnerability Management
McAfee and Core Security

Learn how McAfee and Core Security are working together to transform security intelligence and vulnerability management to tackle today’s evolving threat landscape. Tuesday 26th March, 2013
10:00 AM PDT
Register

Privileged Identity Management: Combine McAfee Security with Privileged User Access Control and Activity Monitoring
McAfee and Cyber-Ark

Learn how McAfee and Cyber-Ark work together to manage and continuously monitor privileged account usage across IT environments. Thursday 26th Feb, 2013
7:00 AM PT
Register

Understand the Business Impact of Endpoint Risk
McAfee and WCK

Learn how McAfee and WCK can help you gain business visibility into your risk and compliance and prioritize remediation efforts based on business criticality.

Thursday 14th Feb, 2013
7:00 AM PT
Register

Controlling Privileged User Access: Six Practical Best Practices
McAfee and Fox Technologies

Discover the latest best practices for enforcing privileged user access across diverse systems and how McAfee and Fox Technologies can help you solve this security challenge. Thursday 12th Feb, 2013
10:00 AM PT
Register

Virtualize More While Improving Your Risk Posture from Bare Metal to Endpoint
McAfee and HyTrust

Gain insights into the virtualization security landscape, and understand how McAfee, Intel, and HyTrust can help you scale your VMware infrastructure while staying compliant and secure. Tuesday 18th Dec, 2012
10:00 AM PT
Register

Securing the Public Sector with Least Privilege
McAfee and Avecto

Learn about the hidden internal dangers of users with admin rights and how McAfee and Avecto can help you with an integrated approach to solving the security concerns. Friday 14th Dec, 2012
11:00 AM UK Time
Register

Making the GRC Grade – How to Realize Continuous Compliance
McAfee and ForeScout

Learn how McAfee and ForeScout can help you achieve real-time visibility, dynamically find and fix endpoint compliance gaps, and reduce incident-response lag time. Tuesday 11th Dec, 2012
10:00 AM PT
Register

SIEM with Integrated Identity Intelligence
McAfee and Securonix

Learn how McAfee and Securonix work together to increase attack detection accuracy, combat advanced persistent threats, and identify suspicious insider behavior in real-time Tuesday 29th Nov, 2012
11:00 AM PT
Register

Complete Vulnerability Management
McAfee and RedSeal

Learn why prioritizing remediation efforts based on risk is essential to effective vulnerability management and how McAfee and RedSeal are solving this together. Tuesday 6th Nov, 2012
10:00 AM PT
Register

How to Regain Control of the Network Perimeter – A Comprehensive Solution
McAfee and AlgoSec

Learn how McAfee and AlgoSec help organizations improve the efficiency of network operations and the security of critical assets by combining advanced firewall capabilities and policy management automation. Tuesday 16th Oct, 2012
10:00 AM PDT
Register

Defending Against Data Leakage Through Covert Channels
McAfee and Allen Corporation

Learn how McAfee and Allen Corporation help prevent insiders from using unauthorized applications and tools to compromise critical systems and leak sensitive information. Tuesday 25th Sep, 2012
10:00 AM PDT
Register

Emerging Industrial Control Vulnerabilities – A Proactive Solution
McAfee and Wurldtech

Learn how McAfee and Wurldtech reduce vulnerabilities for Critical Infrastructure Industrial Control Systems (ICS) without the need for patching or the shutdown of operations. Thursday 6th Sep, 2012
10:00 AM PDT
Register

Uncontrolled Privilege Creep – The Danger Within
McAfee and Avecto

Learn how McAfee and Avecto empower users with the privileges they need while ensuring security, compliance, and operational effectiveness. Tuesday 14th Aug, 2012
10:00 AM PDT
Register

Detecting Insider Threats -
A Case Study
McAfee and Securonix

Learn how McAfee and Securonix worked together to investigate and identify a data breach at a manufacturing company. Tuesday 31st July, 2012
10:00 AM PDT
Register

SSL Traffic - The Achilles Heel of Your Network
McAfee and Netronome

Learn how McAfee and Netronome allow network security applications to gain visibility into SSL traffic to make decisions on the content within. Tuesday 10 July, 2012
10:00 AM PDT
Register
Are you monitoring your mainframe (z/OS) platform 24x7?
McAfee and DG Technology
Learn how to monitor your mainframes 24x7 and collect, store, report, and analyze data through your existing security management and SIEM platforms. Tuesday June 26, 2012
10:00 AM PDT
Register

Ring the Alarm: Raise Your Network's Visibility and Prepare for Any Attack
McAfee and Solera Networks

Learn how McAfee and Solera Networks allow network security professionals to “see” attacks, uncover their root cause, prevent recurrence, and mitigate risk. Tuesday June 12, 2012
10:00 AM PDT
Register

Prevent Spear-Phishing - Put Your Users in a Bubble
McAfee and Invincea

Learn how McAfee and Invincea can help protect your users from spear-phishing attacks by putting every user in a secure bubble. Tuesday May 15, 2012
10:00 AM PDT
Register
Confront Your Most Critical Threats with Business Risk Analytics
McAfee and Rev2

Learn how McAfee and the Rev2 RiskView application work in concert to prioritize your risk mitigation resources and lower your overall risk profile.

Tuesday May 01, 2012
10:00 AM PDT
Register
How to Tame Your Security Risk
McAfee and Brinqa
Learn how to develop a metrics-based approach to identify all those needles in the haystack that can help you lower your security risk. Tuesday April 17, 2012
10:00 AM PDT
Register
Detecting – and Defeating – Advanced Persistent Threats in the Enterprise
McAfee and HBGary
Learn how to actively defend your enterprise against Advanced Persistent Threats and successfully remove them from your network. Tuesday April 10, 2012
10:00 AM PDT
Register
How to Turn Your Security Technician into a Risk Strategist
McAfee and Agiliance
Learn how to set up a near real time business view of your organization’s security posture and make highly informed security decisions. Tuesday March 27, 2012
10:00 AM PDT
Register

Leveraging Peer-to-Peer Intelligence in the Age of High-Profile Hacking
McAfee and Tiversa

Learn how information from your enterprise may be getting exposed, harvested, and distributed across multiple P2P networks and what you can do about it.

Tuesday, March 06, 2012
10:00 AM PDT
Register
Building Security Metrics That Matter
McAfee and RedSeal Networks

Learn how to assess and strengthen your cyber-defenses by identifying holes in your infrastructure, and what security metrics are right for an ongoing defensive strategy.

Tuesday, February 22, 2012
10:00 AM PDT
Register
At Last … Integrated Patch and Security Management
McAfee and Autonomic Software
Learn why it’s important to combine patch management with endpoint security, policy, configuration, and compliance management. Tuesday, February 14, 2012
10:00 AM PDT
Register
Got Privilege? A Risk-based Approach to Managing Account Access
McAfee and Cyber-Ark

Learn how to deliver a complete solution for securing, controlling, auditing and continuously monitoring all privileged access across your network.

Tuesday, January 24, 2012
10:00 AM PDT
Register
How to Green Your Network PC’s and Save Big
McAfee and AVOB
Learn how to monitor and save up to 75 percent of your Network PCs energy cost using a power management solution integrated with McAfee ePO. Tuesday, December 13, 2011
10:00 AM PDT
Register

How Smart is Your Enterprise Mobile Security?
McAfee and AirPatrol

Learn how to develop an enterprise security policy framework to protect your mobile assets and enhance employee productivity. Tuesday, November 29, 2011
10:00 AM PDT
Register
Get Your Virtual Security House in Order
McAfee and Reflex Systems
Learn how to secure virtual environments using the same tools, policies, logic, and services you’ve learned to trust in your physical environments. Tuesday, November 8, 2011
10:00 AM PDT
Register
Data Loss Prevention Strategies: The User, Friend or Foe?
McAfee and TITUS
Learn how to leverage your users as part of your overall Data Loss Prevention (DLP) strategy to keep your organization's sensitive information safe. Tuesday, October 25, 2011
10:00 AM PDT
Register
Do You Really Know What’s on Your Network?
McAfee and BDNA
Learn how to detect all invisible devices and applications on your network and to bring them under a policy driven security umbrella Tuesday, October 11, 2011
10:00 AM PDT
Register
Who Owns Your Network? The Future of Cyber Intelligence and Response
McAfee and AccessData
Learn how integrating host analysis, network analysis, and data auditing will empower organizations to handle advanced persistent threats and other exploits faster and with greater efficacy. Tuesday, September 20, 2011
10:00 AM PDT
Register
How Vulnerable are You to Cyber Security Attacks?
McAfee and Agiliance
Learn how the implementation of a holistic security risk management strategy can help prevent and/or minimize data breaches. Tuesday, September 13, 2011
10:00 AM PDT
Register
Breaking Down Barriers to Achieve Security, Visibility, and Velocity
McAfee and SenSage
Learn how to go beyond traditional SIEM technologies to address very sophisticated use cases by collecting, retaining, and analyzing large amounts of security event data. Tuesday, August 23, 2011
10:00 AM PDT
Register
Are Smartphones Outsmarting Your Network Security Perimeter?
McAfee and AirTight
Learn how to manage unauthorized smartphone access on your network and gain full visibility and automated remediation of wireless threats and data leakage. Tuesday, August 9, 2011
10:00 AM PDT
Register
New Applications, New Networks, New Security Challenges
McAfee and Sipera
Learn how to tackle the security challenges posed by new real-time applications, including Voice-Over-IP (VoIP), videoconferencing, collaboration, SIP trunks, instant messaging, and others. Tuesday, July 26, 2011
10:00 AM PDT
Register
Green-light Your Virtualized Data Center
McAfee and Catbird
Learn how to virtualize mission-critical systems safely with McAfee and Catbird, the pioneers in virtualization security. Tuesday, July 12, 2011
10:00 AM PDT
Register

*All webcasts will be available on demand after the live event.