Enterprise Español

Nuevas defensas dinámicas para puntos terminales: seguridad de próxima generación

This blog was written by Victor Vásquez Cruz. * En algún lugar de la World Wide Web alguien ha colocado una trampa que aparentemente es un software para mejorar el desempeño de tu computadora o tu teléfono o tu tableta. ¡Es gratis, lo único que debes hacer —dice el anuncio ...

Enterprise Executive Perspectives

Dynamic Endpoint – some things are simply better together!

This blog was written by Candace Worley, McAfee’s former Vice President and Chief Technical Strategist. I like chocolate but I don’t seek it out. Peanut butter – I can take it or leave it. But put them together and now you’ve got my attention. Some things are better together. That ...

Español

¿Cómo proteger los puntos terminales?

This blog was written by Victor Vásquez Cruz. Sabemos que en ocasiones es difícil entender por qué el área responsable de las tecnologías de la información (TI) insiste tanto a los usuarios de computadoras y dispositivos que deben respetar las reglas y cuidar la seguridad digital, por eso explicaremos los ...

Enterprise Español

La seguridad de los endpoints, la fortaleza en su empresa

This blog was written by Victor Vásquez Cruz. Si comparamos a un país con su empresa y a quienes resguardan la frontera con los endpoints de su red, tendremos una primera aproximación a la importancia de esta capa de seguridad, ya que éstos son los primeros en detectar y enfrentar ...

Enterprise

MOVE Your Way: Choosing Between Agentless and Multiplatform Deployment

This blog post was written by Teresa Wingfield. The use of traditional security practices in virtualized environments causes everyone headaches. What works for older architectures may not apply for newer ones. Can you imagine pouring gasoline into the engine of an electric car? In our first blog, we explained why ...

Enterprise

To MOVE…or not to MOVE

This blog post was written by Teresa Wingfield. In today’s business landscape, virtualization is a flexible, affordable and capable solution worth adopting. However, for IT departments, this can be a strain. Support for more end users, more workloads and more security standards and requirements can test even the most organized ...

Enterprise

Beyond Endpoint Security – Protect against ANY Attack at ANY Stage

You heard it at McAfee’s 2015 FOCUS event, and you’ll hear it at the 2016 RSA Conference: it’s time to change the game in security. With the rising volume of complex attacks, 2016 is the year for infosec pros to evolve their approach, taking a more proactive method to identifying, ...

Executive Perspectives

Cyber Resilience And Spear Phishing

Balanced security capability, defense in depth, integrated countermeasures, and a threat-intelligence strategy are critical to defending your business from spear-phishing attacks. Spear phishing continues to be the most successful means of gaining entry to an enterprise network and to valuable business or personal data. According to the latest Verizon Data ...

Enterprise

Endpoint Security Questions Every Leader Should Ask

There’s no doubt the threat landscape is a complex one. Each month brings a new example of a targeted attack against an organization that was previously considered “invulnerable.” This begs the question, “What went wrong?” With today’s targeted attacks, there’s more importance than ever before to review your infrastructure to ...

Enterprise

Defending Against the Dark Arts Isn’t Just for Wizards

This blog was written by Candace Worley, McAfee’s former Vice President and Chief Technical Strategist. Expelliarmus!  Wouldn’t it be nice if that worked in the real world? Unfortunately, there’s no magic charm that can be used as ‘Defense Against the Dark Arts’ against cyberthreats and malware. Every minute there are ...

Subscribe to McAfee Securing Tomorrow Blogs