Resource Library

Contact us

The State of Cloud Adoption and Security

With security and compliance more important than ever, see how IT security professionals around the world plan to secure their clouds.

Search our library

Learn how you can take full advantage of the McAfee products you already own, or discover solutions that fit your current business needs. Use the filters below to narrow your search.

Filters

Reset FiltersClear
Infographic
White Paper

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security

Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. Machine learning expands the scope of security analytics from diagnostic and descriptive to prescriptive and proactive, which leads to faster and more accurate detection and improved capabilities to act on threat intelligence today and in the future.

Report

Building Trust in a Cloudy Sky Global Views from Financial Services Organizations

In August 2016, Intel Security surveyed over 2,000 professionals for its annual Cloud Security research study. The 2,009 respondents were drawn from third-party database to represent a diverse set of countries, industries, and organization sizes. After screening out those who were not using cloud services or not directly involved in decision making for cloud security initiatives, 1,400 senior technical professionals completed the study. This executive summary shares the results of the 240 enterprise Financial Services organizations surveyed and offers a understanding of the current state of cloud adoption and security by industry

Building Trust in a Cloudy Sky - Healthcare Executive Summary

In August 2016, Intel Security surveyed over 2,000 professionals for its annual Cloud Security research study. The 2,009 respondents were drawn from third-party database to represent a diverse set of countries, industries, and organization sizes. After screening out those who were not using cloud services or not directly involved in decision making for cloud security initiatives, 1,400 senior technical professionals completed the study. This executive summary of the full cloud security report provides a brief overview of key findings, conclusions and recommendations.

Report

Building Trust in a Cloudy Sky Executive Summary

In August 2016, Intel Security surveyed over 2,000 professionals for its annual Cloud Security research study. The 2,009 respondents were drawn from third-party database to represent a diverse set of countries, industries, and organization sizes. After screening out those who were not using cloud services or not directly involved in decision making for cloud security initiatives, 1,400 senior technical professionals completed the study. This executive summary of the full cloud security report provides a brief overview of key findings, conclusions and recommendations.

Infographic

Building Trust in a Cloudy Sky Global Views from Financial Services Organizations

This infographic explains how 99% of financial organizations have adopted cloud, but not all of it is sanctioned by IT.

Report

Building Trust in a Cloudy Sky Global views from the IT C-Suite

CIOs and CISOs are leading the way to cloud adoption. Trust in public cloud outweighs their trust in private cloud and most have a adopted a Cloud First stance with their application and service deployments. This executive summary dives into the CIO/CISO perspectives as compared to IT staff gathered from the Building Trust in a Cloudy Sky report.

Infographic

Building Trust in the Cloud Global Views from Healthcare Organizations

This infographic explains how 95% of Healthcare organizations have adopted cloud services, with IT struggling to adapt.

Solution Brief

Mastering Modern Endpoint Protection Guide

This guide walks through six step to better endpoint protection drawing on research cited in the to the 2017 Forrester report, Mastering the Endpoint.

Data Sheet

McAfee Web Gateway Cloud Service

For a technical summary on the McAfee product listed above, please view the product data sheet.

White Paper

No Signature Required: The Power of Emulation in Preventing Malware

This white paper discusses the flagship McAfee Gateway Anti-Malware technology, how it adapts to new threats, and sets the stage to protect against future threats with a modular design that allows for the easy addition of components for maximum flexibility.

White Paper

Not Today Zero-Day: Block Zero-Day Threats Before They Hit Endpoints

This whitepaper provides data points on malware and stresses the importance on emulation, which reduces "firefighting" and dramatically lowers security costs and freeing up resources for more strategic initiatives such as endpoint detection and response.

White Paper

OpenDXL Idea Book

This guide provides multiple use cases for OpenDXL integrations, complete with technical details, to inspire more developers and organizations to come up with new applications for this powerful and versatile technology.

White Paper

Protecting the Private Cloud with Integrated and Automated Security

Enterprises have evolved their data centers to include private clouds, and are now challenged to secure these environments. Breaches in these highly virtualized environments are difficult to detect and can go unnoticed far too long. Advanced analysis capabilities are needed to effectively improve detection of sophisticated advanced attacks within a private cloud. This technical whitepaper explains how.

White Paper

Questions to Ask Your Cloud Service Provider

These suggested questions should help in your process of identifying, evaluating, selecting, and working with CSPs.

White Paper

SIEM Orchestration

How McAfee Enterprise Security Manager drives action, automates remediation, and optimizes incident response

White Paper

Threat Visibility and the Zero-Trust Virtual Data Center

This paper explores the benefits of zero-trust networking strategies in a VMware SDDC, and how both McAfee Network Security Platform and the Intel Security Controller can help make zero-trust networking practical.

White Paper

Unmask Evasive Threats: McAfee-Real Protect and Dynamic Application Containment Stop Zero-Day Malware in its Tracks

McAfee draws on machine learning analysis and application containment tools to help organization unmask hidden threats and stop them in their tracks—more quickly and with less effort.

Infographic

Zero-Day Malware Prevention

This infographic provides data points on malware and stresses the importance of emulation -- which reduces “firefighting” -- dramatically lowering security costs and freeing up resources for more strategic initiatives such as endpoint detection and response.

Case Study

University Fortifies Protection with Integrated Threat Defense Case Study

With tightly integrated McAfee defenses, Utrecht University in the Netherlands enhanced zero-day threat protection, shrank time from encounter to containment, and simplified security operations.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top