Biblioteca de recursos

Contate-nos

O quadro atual da adoção e da segurança da nuvem

Segurança e conformidade nunca foram tão importantes; veja como profissionais de segurança de TI em todo o mundo planejam proteger suas nuvens.

Pesquise nossa biblioteca

Obtenha informações de segurança e aproveite ao máximo os produtos da McAfee que você já possui, ou descubra soluções adequadas às suas necessidades de negócio atuais. Use os filtros abaixo para refinar sua pesquisa.

Filters

Reset FiltersClear
White paper

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security

Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. Machine learning expands the scope of security analytics from diagnostic and descriptive to prescriptive and proactive, which leads to faster and more accurate detection and improved capabilities to act on threat intelligence today and in the future.

Resumo de solução

Ericom Shield and McAfee Web Gateway

The integration of Ericom Shield with McAfee Web Gateway enables web content to be proactively redirected to Ericom Shield for secure browsing outside the corporate network, adding a layer of protection for endpoints and internal assets.

Resumo de solução

Together We Can: How an Open Ecosystem Strengthens Cybersecurity

Lab-tested and certified McAfee Security Innovation Alliance partner solutions are integrated with our solutions for unified workflows and centralized management. OpenDXL allows security operations to onboard and integrate new capabilities from multiple vendors and reduce required training.

Resumo de solução

Eliminate Alert Overload and Automate Incident Response (Siemplify)

Security orchestration and automation from Siemplify helps security teams derive even more benefit from their McAfee Enterprise Security Manager investment by streamlining alerts, automating repetitive security operations processes, and speeding up incident response.

Data sheet

McAfee Cloud Workload Security Data Sheet

Cloud Workload Security data sheet outlining primary capabilities, features, benefits, and packaging.

Resumo de solução

Infoblox and McAfee for Unified Security

The integrated solution from Infoblox and McAfee provides visibility into DNS and web traffic, plugs the DNS security gap in organizations, and automates data sharing between Infoblox DNS, DHCP, IPAM, (DDI) and McAfee product suites.

Brochura

Definitive Guide to Azure Security

Learn about the current state of Azure adoption, Microsoft’s model for Azure security, security challenges and threats to applications and data in Azure, and Azure infrastructure security best practices.

Estudo de caso

Embedded Whitelisting Maximizes Productivity and Minimizes Risk AMADA Group

By using McAfee Embedded Control in its factory automation tools and other offerings, AMADA helps its customers protect their IoT manufacturing environments and operational technology networks with minimal overhead or performance impact.

Resumo de solução

Gaining Advanced Analytic Insights into Your Network Solution Brief

Leveraging the power of SAS Cybersecurity with the integrative capabilities of DXL from McAfee, organizations gain a new security perspective on the devices connecting to their networks and stay one step ahead of emerging threats.

Data sheet

McAfee Enhanced Success Plan

The McAfee Enhanced Success Plan helps growing enterprises achieve their security objectives with a set of integrated services that help them plan and maintain their McAfee solutions, reduce security risk, and derive full value from their investments.

Data sheet

McAfee Identity Theft Protection

McAfee Identity Theft Protection

Data sheet

McAfee Network Security Platform (NS series) Specifications Sheet

Technical specifications of the McAfee Network Security Platform.

White paper

Data Loss Prevention Best Practices for Healthcare

Sound DLP strategies and the right mix of security technology capabilities can go a long way toward ensuring the secure handling of patient data and enabling organizations to pass rigorous Office of Civil Rights audits easily and reliably.

Data sheet
Relatório

Beyond GDPR: Financial Services Executive Summary

This executive summary examines the survey responses from the 200 respondents in the financial services sector to better understand the factors driving their data decision-making and how they currently approach data management, protection, and residency.

Relatório

Beyond GDPR: Healthcare Executive Summary

This executive summary examines the survey responses from the 200 respondents in the private healthcare sector to better understand the factors driving their data decision-making and how they currently approach data management, protection, and residency.

Infográfico

Relatório do McAfee Labs sobre ameaças: março de 2018

O Relatório do McAfee Labs sobre ameaças: março de 2018 destaca notícias e estatísticas reunidas pelas equipes do McAfee® Advanced Threat Research e do McAfee Labs no quarto trimestre de 2017. Nesse trimestre, enfatizamos o malware PowerShell, a mineração de criptomoedas e o aumento nos ataques contra o setor de saúde.

Relatório

Navigating a Cloudy Sky

Report: 97% of organizations around the world use cloud technology. McAfee conducted an annual study surveying 1,400 IT decision makers across 11 countries to uncover the how the cloud is being used today and what security challenges organization’s face.

Relatório

Navigating a Cloudy Sky: Practical Guidance and the State of Cloud Security

This report covers the survey results of 1,400 IT decision makers who use public and private cloud services, representing a broad range of industries and 11 countries.

Estudo de caso

Williams

Williams, a Fortune 500 energy infrastructure company, leverages McAfee CASB technology to ensure enterprise-wide compliance, reduce risk, and rein in Shadow IT.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs