Learn about McAfee's agile security development lifecycle (SDL).
User and entity behavior analytics from Interset consumes the contextual data and rich security events collected in real time by McAfee Enterprise Security Manager.
Leveraging the power of SAS Cybersecurity with the integrative capabilities of DXL from McAfee, organizations gain a new security perspective on the devices connecting to their networks and stay one step ahead of emerging threats.
This spec sheet provides technical specifications for two McAfee Advanced Threat Defense appliances: ATD-3100 and ATD-6100.
This data sheet contains detailed specifications for McAfee Data Loss Prevention (DLP) 6600.
Enterprises have evolved their data centers to include private clouds, and are now challenged to secure these environments. Breaches in these highly virtualized environments are difficult to detect and can go unnoticed far too long. Advanced analysis capabilities are needed to effectively improve detection of sophisticated advanced attacks within a private cloud. This technical whitepaper explains how.
These suggested questions should help in your process of identifying, evaluating, selecting, and working with CSPs.
CryptoAuditor from SSH Communications Security, when coupled with McAfee Web Gateway, stops both accidental and malicious data loss over encrypted channels in real time.
McAfee Virtual Network Security Platform provides a unique combination of deep visibility into software-defined data center traffic flows with automated security management.
IBM is leaving the network intrusion prevention arena effective December 31, 2017. This table will guide IBM XGS and IBM GX customers to an improved solution leveraging McAfee Network Security Platform technology.
As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new GDPR enforcement? Here are the concerns and strategies of 800+ senior executives from industries around the world.
McAfee surveyed 800 senior business professionals across eight countries from a range of industry sectors to better understand the factors driving data decision-making and how organizations currently approach data management, protection and residency.
Market studies say automate first, then orchestrate. In lab tests, IDC validated that 50-100% of actions taken during integrated threat defense solution scenarios were fully automated.
McAfee Labs researchers examine the WannaCry and Petya malware attacks, offer advice to threat hunters searching for indicators of compromise, and dig into script-based malware.
See a visual representation of our researchers’ key findings from the September 2017 report.
Read our recommended policies and procedures and how our products can protect against script-based code in malware attacks.
Read our recommended policies and procedures and how McAfee products can protect systems and networks from WannaCry and Petya.
Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. Machine learning expands the scope of security analytics from diagnostic and descriptive to prescriptive and proactive, which leads to faster and more accurate detection and improved capabilities to act on threat intelligence today and in the future.
In August 2016, Intel Security surveyed over 2,000 professionals for its annual Cloud Security research study. The 2,009 respondents were drawn from third-party database to represent a diverse set of countries, industries, and organization sizes. After screening out those who were not using cloud services or not directly involved in decision making for cloud security initiatives, 1,400 senior technical professionals completed the study. This executive summary of the full cloud security report provides a brief overview of key findings, conclusions and recommendations.
CIOs and CISOs are leading the way to cloud adoption. Trust in public cloud outweighs their trust in private cloud and most have a adopted a Cloud First stance with their application and service deployments. This executive summary dives into the CIO/CISO perspectives as compared to IT staff gathered from the Building Trust in a Cloudy Sky report.