Biblioteca de recursos

Contate-nos

O quadro atual da adoção e da segurança da nuvem

Segurança e conformidade nunca foram tão importantes; veja como profissionais de segurança de TI em todo o mundo planejam proteger suas nuvens.

Pesquise nossa biblioteca

Obtenha informações de segurança e aproveite ao máximo os produtos da McAfee que você já possui, ou descubra soluções adequadas às suas necessidades de negócio atuais. Use os filtros abaixo para refinar sua pesquisa.

Filters

Reset FiltersClear
Relatório

Critical Capabilities for Security Information and Event Management

If you are looking for a SIEM solution, leverage this research from Gartner to help evaluate use cases, requirements, and vendor offerings.

[Gartner Critical Capabilities for Security Information and Event Management, Toby Bussa, Kelly M. Kavanagh, 6 December 2017. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]


Relatório

Market Guide for Endpoint Detection and Response Solutions

The EDR market is rapidly converging with the endpoint protection platform market; however, both areas will continue to coexist for the next three years. Security and risk management leaders need platform-based solutions that provide all aspects of adaptive security architecture.

Data sheet

McAfee Enterprise Security Manager for Engineers-II Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Engineers to understand, communicate, and use the solution’s features.

Data sheet

McAfee SIEM Supported Device List

McAfee Enterprise Security Manager can integrate with a wide range of third-party security tools to provide a powerful security information and event management (SIEM) platform. This data sheet provides details about McAfee ESM third-party support.

Data sheet

McAfee Enterprise Security Manager for Analysts-I Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Analysts to understand, communicate, and use the solution’s features.

Data sheet

McAfee Enterprise Security Manager for Engineers-I Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Engineers to understand, communicate, and use the solution’s features.

Estudo de caso

Berkshire Health Systems

Making the Job of Security Operations Easier at Berkshire Health Systems.

Estudo de caso

Regional Commercial Bank

After attempting to rely on unintegrated point solutions, a CISO at Regional Commercial Bank found a more efficient way to tackle the ever-morphing advanced threat landscape through McAfee solutions.

Estudo de caso

Cut-e GmbH

This company achieved transparent security status with McAfee Enterprise Security Manager.

Estudo de caso

Universidad de Las Américas Puebla (UDLAP)

Leading Latin American university, UDLAP, fortified security for its assets and for those of its students.

Estudo de caso

China Pacific Insurance Group

China Pacific Insurance protects its business and customers with our security management system.

Estudo de caso

Government Statistics Agency

Large South American government agency embraces enterprise integrated security approach.

Estudo de caso

Thwarting Ransomware and Easing Security Administration by Migrating to McAfee Endpoint Security (Norrköpings Kommun) Case Study

The small IT team for this Swedish town of 90,000 has reduced its security administration burden with more robust protection and more streamlined management, thanks to McAfee Endpoint Security and McAfee ePolicy Orchestrator® (McAfee ePO) software.

Estudo de caso

Vidant Health

Vidant Health shifted from security alert overload to automated detection and correction.

Data sheet

McAfee Solution Services for SIEM

Essential Services for McAfee SIEM Solutions

Data sheet

SIEM Solutions Overview

Continuously monitor, identify, investigate, and resolve threats.

White paper

10 Ways to Accelerate Time to Detection and Response

Malware dwell times a top concern for IT executives and practitioners at every level. This white paper shows you 10 ways to add speed and intelligence to your incident detection and response and regain time.

White paper

Dez maneiras de acelerar a detecção e a resposta

Os tempos de permanência de malware são uma grande preocupação para executivos de TI e profissionais de todos os níveis. Este white paper mostra dez maneiras de poupar tempo e aumentar a velocidade e a inteligência da sua detecção e resposta a incidentes.

White paper

Integração do SIEM na sua estratégia de caça a ameaças

O uso consciente de um SIEM inteligente é a chave do gerenciamento dos aspectos estratégico, tático e operacional da caça a ameaças. No atual cenário de ameaças, não podemos ignorar nenhum desses aspectos. Uma integração efetiva, tendo o SIEM como elemento central e, emanando dele, um arsenal de ferramentas de investigação de ameaças, é fundamental para se obter uma visibilidade aprimorada dos perigos à frente.

Data sheet

McAfee Database Activity Monitoring

For a technical summary on the McAfee product listed above, please view the product data sheet.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs