Resource Library

Contact us

The State of Cloud Adoption and Security

With security and compliance more important than ever, see how IT security professionals around the world plan to secure their clouds.

Search our library

Learn how you can take full advantage of the McAfee products you already own, or discover solutions that fit your current business needs. Use the filters below to narrow your search.

Filters

Reset FiltersClear
White Papers

SDDC Executive Summary

A software-defined data center (SDDC) delivers cloud-ready infrastructure and improves the security of your data center. Osterman Research, together with McAfee and VMware, provides an overview of what an SDDC is, why it’s inevitable, and how it works.

White Papers

The Why, the What and the How of the SDDC

A software-defined data center (SDDC) delivers cloud-ready infrastructure and improves the security of your data center. Osterman Research, together with McAfee and VMware, provides an overview of what an SDDC is, why it’s inevitable, and how it works.

Case Studies

Thwarting Ransomware and Easing Security Administration by Migrating to McAfee Endpoint Security (Norrköpings Kommun) Case Study

The small IT team for this Swedish town of 90,000 has reduced its security administration burden with more robust protection and more streamlined management, thanks to McAfee Endpoint Security and McAfee ePolicy Orchestrator® (McAfee ePO) software.

Reports

Market Quadrant: McAfee Advanced Threat Defense is Top Player

This edition of Radicati Market Quadrants reviews products that offer protection from advanced persistent threats.

Solution Briefs

Securing the Software-Defined Data Center Solution Brief

McAfee Virtual Network Security Platform provides a unique combination of deep visibility into software-defined data center traffic flows with automated security management.

Reports

Gartner Market Guide for User and Entity Behavior Analytics

Security and risk management leaders should leverage user and entity behavior analytics to improve their organization's threat detection capabilities across a variety of use cases.

Reports

Gartner’s Market Guide for Cloud Workload Protection Platforms

Like most global enterprises, your modern hybrid data center uses private and public cloud computing to deliver applications and workloads. This new infrastructure requires a protection strategy different from traditional server security. Elastic, cloud-native applications have unique security needs. Legacy on-premises security agents are not designed to perform at cloud scale and may have licensing models that are incompatible with elastic cloud workloads. Gartner provides their key findings and recommendations to security and risk management leaders for cloud workload protection platforms, including the use of risk-based models to prioritize evaluation criteria.

Mastering Modern Endpoint Protection Guide

This guide walks through six step to better endpoint protection drawing on research cited in the to the 2017 Forrester report, Mastering the Endpoint.

Data Sheets

McAfee Advanced Threat Defense Appliance Specifications

This spec sheet provides technical specifications for two McAfee Advanced Threat Defense appliances: ATD-3100 and ATD-6100.

Data Sheets

McAfee DLP Endpoint

For a technical summary on the McAfee product listed above, please view the product data sheet.

Data Sheets

McAfee DLP Monitor

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Endpoint Security 10.5 Upgrade

Our McAfee® Endpoint Security 10.5 Upgrade course provides an in-depth introduction to the tasks crucial to set up and administer McAfee Endpoint Security. McAfee Endpoint Security combines threat prevention, firewall, and web control to take immediate action against potentially dangerous applications, downloads, websites, and files. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the McAfee Endpoint Security user interface, as well as detailed instructions for the integration of this solution.

McAfee Endpoint Security 10.5 Upgrade

Our McAfee Endpoint Security 10.5 Upgrade course provides an in-depth introduction to the tasks crucial to set up and administer McAfee Endpoint Security. McAfee Endpoint Security combines threat prevention, firewall, and web control to take immediate action against potentially dangerous applications, downloads, websites, and files.

Reports

Why Offense Beats Defense: Misaligned Incentives—a focus on the financial services sector Executive Summary

To better understand this misalignment of incentives, we surveyed 200 IT professionals from the financial services industry, and compared their responses to 600 IT professionals from other global industries.

Data Sheets

McAfee Advanced Threat Defense: Configurable operating system and application support

McAfee Advanced Threat Defense supports a broad range of operating systems and applications, making it ideal for generating relevant indicators of compromise that can be used to support investigation and threat hunting throughout the organization.

FAQ
Data Sheets

Active Response Administration

Learn essential introductory aspects of the McAfee Active Response appliance to get your solution value in no time. This course offers an in-depth look into deployment, configuration, operation, and policy management.

Reports

Busting the Myth of the Malware “Silver Bullet” Executive Summary

Malware threats continue to evolve, and no single “silver bullet” solution can protect you against all of them. Juggling multiple solutions that operate in silos means more time, resources, and complexity for already-strained security teams. It’s time for a smarter approach.

Reports

Security Operations in Public Cloud Services: Going with Your Strengths

Aberdeen Group discusses the move to the public cloud and the security shared responsibility model that leverages the strengths of both the public cloud service providers (architecture and infrastructure at scale) and enterprises (applications and data) to provide the enterprise with stronger capabilities than could be achieved going at it alone.

White Papers

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top