Endpoint Security

Endpoint Security 301: When Products, Policies, and People Break Down the Lines of Communication

Security architecture is like the ocean: no one owns it, and it is constantly affected by change. New technologies are introduced, staff changes occur, and as a result, communication suffers. I often see environments where ownership is placed into silos across teams in the enterprise, meaning IT administrators preventing threats ...

Family Safety

7 Questions to Ask Your Child’s School About Cybersecurity Protocols

Just a few weeks into the new school year and, already, reports of malicious cyberattacks in schools have hit the headlines. While you’ve made digital security strides in your home, what concerns if any should you have about your child’s data being compromised at school? There’s a long and short ...

Endpoint Security

It’s Quiz Time! How Well Do You Know Endpoint Security Best Practices?

How confident are you that you have the best security practices in place across your organization? Like most, you probably have your concerns.  Ever wonder what keeps your peers up at night and how your security practices compare to others? We recently sponsored a SANS survey on endpoint protection and response ...

Enterprise Endpoint Security

McAfee Endpoint Security – Why You Don’t Have to Take Our Word for It.

It’s an unfortunate fact that evaluating security vendors today can often mean sifting through a sea of marketing hype to understand which products should be added to your short-list. Exclusive claims about what makes one product different from another may be vague, hard to find or even harder to believe. ...

Enterprise Endpoint Security

Generating Compliance History Reports

When you’re managing a large environment with thousands of endpoints, assuring consistency can be a huge challenge. Imagine that you want every endpoint to be upgraded to a specific software version, for example. In many cases, you’re forced to rely on manual tracking, where errors and omissions are commonplace. And, ...

Enterprise Endpoint Security

Optimize Software Deployments with McAfee ePolicy Orchestrator

Few engineers will tell you that software updates are their favorite part of the job, but they’re a critically important part of endpoint security. Unfortunately, they do sometimes come with hassles—in particular, dealing with traffic surges over the WAN whenever many endpoints need to download large software packages at the ...

Enterprise Endpoint Security

When it Comes to Malware, Actions Can Speak Louder than Words

This blog post was written by Raja Patel. At some point as a child, a parent likely told you, “actions speak louder than words.” It’s a good life lesson—and it can hold just as true when fighting malware. Cybercriminals have become extremely skilled at disguising the true nature of malware ...

Enterprise Endpoint Security

Use Tags to Simplify Endpoint Security Management

One thing that sets McAfee apart in endpoint security management is the ability to manage multiple security technologies for hundreds of thousands of endpoints through a single interface: McAfee ePolicy Orchestrator (ePO). But while our customers appreciate ePO, it’s even more powerful than some realize. In my next few blogs, ...

Enterprise Endpoint Security

The Clock Is Ticking: Can You Find and Kill Advanced Malware Before it Kills Your Endpoints?

Your company’s computer system has been compromised by disguised malware. There is no greater feeling of dread for a security professional. This may put your mind at ease: Through automation, McAfee’s endpoint and sandbox tools can round up the malware, detonate it in a safe place, identify any compromised areas, ...

Português

Integração de contramedidas na segurança é inevitável

Estamos acompanhando a transformação digital e assistindo cada vez mais coisas serem conectadas. Essa evolução cria ambientes bastante heterogêneos, formados por diversas tecnologias, com diversas funções desenvolvidas por diversos fabricantes. O ambiente de segurança também é bastante diversificado. Atualmente são necessários muitos consoles para gerenciar diversas funcionalidades. Esse cenário acaba ...

Subscribe to McAfee Securing Tomorrow Blogs