Security Operations

Learn the latest SecOps threats and how McAfee enables SecOps teams to collect, enrich, and share data and turn that data into insights.

Security Operations

McAfee Network Security Platform:  Five Times a Winner

NSS Labs Recommends McAfee NSP NS9100 for Data Center Security That’s the takeaway from NSS Labs’ just-released test report on high-throughput intrusion prevention systems (IPS) for the data center, in which the McAfee Network Security Platform (NSP) NS9100 appliance won a hard-earned “Recommended” rating.  This is the fifth time that ...

Endpoint Security Security Operations

Comprehensive and Integrated Security at a Regional Commercial Bank

Isn’t it time to invest in a security solution that doesn’t break the bank? One bank offers a textbook case study in corporate data security, since by definition it’s required to safeguard clients’ highly sensitive personal and financial data. This U.S.-based regional commercial bank has undergone a sea of change ...

Security Operations Español

Ciclo de vida de protección contra amenazas

This blog was written by Victor Vásquez Cruz. En materia de seguridad digital el único factor que se mantiene invariable es el cambio, nuestra área de trabajo se transforma de acuerdo con varios elementos: la permanente evolución de la tecnología (el Internet de la Cosas es una nueva tendencia); el ...

Cloud Security Security Operations

5 Things You Need to Know About Integrated Security in the Cloud

Whatever the specific configuration of your cloud, be it public, private, or a mix of both, there are security risks that aren’t immediately apparent, ranging from the technical to organizational to issues of governance. Here are five things you need to know about integrating security across your multiple cloud deployments ...

Security Operations Español

Códigos Zero-Day, multiplataforma creciente para 2016

This blog was written by Victor Vásquez Cruz. Actualizar la aplicación utilizada diariamente en una empresa es una actividad que un usuario —o tal vez el administrador— de la red empresarial decide realizar en algún momento para aprovechar las nuevas funcionalidades de la versión reciente de algún programa que seguramente ...

Endpoint Security Security Operations

When You’re Overwhelmed With Alerts, It’s Time to Automate

In a number of recently publicized breaches, and probably many other attacks, information that could have enabled the security team to catch and contain the attack were lost in the sheer volume of alerts. Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential ...

Security Operations

Threat Intelligence-Based Approaches & Strategies, Application Control 7.0

This blog post was written by Teresa Wingfield. Security experts have long debated the merits of whitelisting versus blacklisting. While the first intuitively seems more secure, the reality is that whitelisting is also more difficult to implement and manage. Strategic decisions are driven by organizational needs, which seems to recast ...

Endpoint Security Security Operations

A Brand New McAfee Threat Intelligence Exchange 1.2!

In their recent 2015 Global Business Technographics® Security Survey, Forrester reports that improving threat intelligence capabilities is a top priority for 71% of enterprises. But enterprises don’t need to improve their ability to gather threat intelligence—the abundance of shared intelligence and threat inputs is already overwhelming for security teams. Operationalizing ...

Security Operations

Fastpass to SIEM ROI via Pre-built content for analysts and responders

In our previous Blog, we covered how customizing SIEM for threat management requires both resources and expertise.  As a result, McAfee created “ready to go” content packs based on Gartner’s Top Use cases.  targeting aspiring users to expand their SIEM detection and response use cases without spending countless hours and ...

Security Operations

Is Your SIEM ‘Ready To Go?’

The massive amount of log, event and flow data within the SIEM offers security analysts answers to essential security questions such as “who is accessing critical business systems,” or, more importantly, “was there any anomalous activity before, during or after the connection?” To get all these answers, though, users need ...

Subscribe to McAfee Securing Tomorrow Blogs