Biblioteca de recursos

Contate-nos

O quadro atual da adoção e da segurança da nuvem

Segurança e conformidade nunca foram tão importantes; veja como profissionais de segurança de TI em todo o mundo planejam proteger suas nuvens.

Pesquise nossa biblioteca

Obtenha informações de segurança e aproveite ao máximo os produtos da McAfee que você já possui, ou descubra soluções adequadas às suas necessidades de negócio atuais. Use os filtros abaixo para refinar sua pesquisa.

Filters

Reset FiltersClear
Resumo de solução

Achieve Advanced Security for your Microsoft Windows 10 Platforms with McAfee Endpoint Security — Solution Brief

McAfee Endpoint Protection software will keep your security aligned and your business fully protected during Windows 10 updates as a result of Microsoft’s newly established operating system release schedule.

Estudo de caso

California Department of Water Resources

State Agency bolsters Endpoint Protection, accelerates response time, and mitigates risk with McAfee Endpoint Security.

White paper

Não existe “bala de prata” contra o malware

Este white paper desconstrói o mito da bala de prata contra o malware. Como alternativa, a Intel combina várias camadas de tecnologias avançadas de proteção, detecção e neutralização de malware em uma única malha de defesa para endpoints.

Resumo de solução

Defend Against the Unknown with McAfee Endpoint Threat Defense Solutions

Learn how McAfee Endpoint Threat Defense solutions help organizations stay ahead of the savviest adversaries.

Resumo de solução

Integrate and Accelerate Endpoint Threat Defense

McAfee Dynamic Endpoint Threat Defense integrates endpoint defenses into a unified, adaptive defense fabric, with tools that share information and coordinate threat response in near real time.

Data sheet

McAfee Data Exchange Layer

Para um resumo técnico do produto McAfee listado acima, consulte o data sheet do produto.

White paper

McAfee Dynamic Endpoint Threat Defense

McAfee Dynamic Endpoint Threat Defense offers a new kind of endpoint protection built for a new generation of threats.

Data sheet

McAfee Endpoint Threat Defense and Response Family

McAfee Endpoint Threat Defense uses behavioral analysis, shared threat intelligence, and simplified workflows to prevent threats from infecting endpoints.

Resumo de solução

Overcome the Attacker Advantage with McAfee Endpoint Security

McAfee Endpoint Security provides what today's security practitioners need to overcome the attackers' advantages: intelligent, collaborative defenses and a framework that simplifies complex environments.

Resumo de solução

Redefining Next-Generation Endpoint Security Solutions

In this technology brief, research firm Enterprise Strategy Group (ESG) shares their perspective on the increasing importance of next-generation endpoint security solutions, like McAfee Dynamic Endpoint Threat Defense, to improve security efficacy while streamlining security operations.

White paper

Revele ameaças evasivas: O Real Protect e a contenção dinâmica de aplicativos bloqueiam o malware de dia zero.

McAfee draws on machine learning analysis and application containment tools to help organization unmask hidden threats and stop them in their tracks—more quickly and with less effort.

Relatório

How Collaboration Can Optimize Security Operations

The new secret weapon against advanced threats

Data sheet

McAfee Threat Intelligence Exchange

Para um resumo técnico do produto McAfee listado acima, consulte o data sheet do produto.

White paper

Security that Plays Well with Others

Organizations need a way to orchestrate security components so that they to work together and present a unified coordinated defense. McAfee’s open, integrated architecture can help legacy point products play well together, optimize the effectiveness of your entire security infrastructure, and simplify, unify, and advance the threat defense lifecycle.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs