Enterprise

At MPOWER, New Tools Give Partners a Defensive Edge

October is always one of the busiest months of my year with the beginning of Q4 in full swing and the MPOWER Cybersecurity Summit & Americas Partner Summit events in Las Vegas. This is a prime opportunity to engage with the great partners that carry our brand and our products ...

Enterprise

MPOWER 2017 Highlights: A Cybersecurity Conference On-Demand

Conference organizers waited with anticipation. In a sleek, high-tech conference hall glowing with McAfee’s deep signature red, a colossal scoreboard flashed the results of a real-time vote for who would take the stage and speak next. The results were a virtual dead heat. The thousands in the audience had just ...

Endpoint Security

Migrate to the New McAfee Endpoint Security (ENS)

The traditional IT model of waiting for early adopters to work through any bugs before you install new software makes sense in many cases. In cybersecurity, however, each day’s delay extends the window of opportunity for zero-day malware to wreak havoc on your endpoints. During the recent Wannacry ransomware attack, ...

Enterprise

An Unmatched Customer Experience

I’ve been in this industry for over twenty years, and the advancements in cybersecurity over the last few years are unmatched. As an industry, we went from believing in a best-in-breed, siloed approach and now we understand our customers need a connected security architecture that can protect, detect, and correct. ...

Enterprise

With McAfee ENS, Swedish Town Gains More Secure Environment Requiring Less Work

For Jens Lindström, who oversees security operations for Norrköpings Kommun, a Swedish town of 140,000 inhabitants, ransomware was becoming his nemesis. “With the increasing pace of ransomware attacks, I was beginning to imagine a day in the not-too-far-off future when all my time would be dedicated to dealing with ransomware ...

Endpoint Security

Become a Modern Endpoint Security Master

A new wave of advanced, targeted malware is seeking out the gaps in conventional endpoint defenses and finding novel ways to exploit them. These attacks use packing, encryption, and polymorphism to mask their true intent, hammering away at your organization with previously unseen “zero-day” attacks that signature-based mechanisms are too ...

Enterprise

Let the Great McAfee ENS 10.5 Migration Begin!

Since I started writing blogs last year, I’ve experienced some great interaction from the partner community – your perspectives, comments, questions, etc. It’s been a great way to connect with many of you. Over the next few weeks, starting today, I have some pretty big things on my mind that ...

Enterprise

Disclosures, Updates, and Patches: the Cycle of Life in Cybersecurity

This week saw a public disclosure of a flaw in a cybersecurity company’s software (ESET), that would allow remote code execution and privilege isolation on Apple macOS computers running ESET Endpoint Antivirus 6 software. Whenever I see something like this, there are a number of things that I think about. ...

Enterprise Executive Perspectives

Dynamic Endpoint – some things are simply better together!

I like chocolate but I don’t seek it out. Peanut butter – I can take it or leave it. But put them together and now you’ve got my attention. Some things are better together. That doesn’t mean they aren’t perfectly good by themselves. It just means that combined, they provide ...

Enterprise

MOVE Your Way: Choosing Between Agentless and Multiplatform Deployment

This blog post was written by Teresa Wingfield. The use of traditional security practices in virtualized environments causes everyone headaches. What works for older architectures may not apply for newer ones. Can you imagine pouring gasoline into the engine of an electric car? In our first blog, we explained why ...

Subscribe to McAfee Securing Tomorrow Blogs