Biblioteca de recursos

Contate-nos

O quadro atual da adoção e da segurança da nuvem

Segurança e conformidade nunca foram tão importantes; veja como profissionais de segurança de TI em todo o mundo planejam proteger suas nuvens.

Pesquise nossa biblioteca

Obtenha informações de segurança e aproveite ao máximo os produtos da McAfee que você já possui, ou descubra soluções adequadas às suas necessidades de negócio atuais. Use os filtros abaixo para refinar sua pesquisa.

Filters

Reset FiltersClear
Resumo de solução

Achieve Advanced Security for your Microsoft Windows 10 Platforms with McAfee Endpoint Security — Solution Brief

McAfee Endpoint Protection software will keep your security aligned and your business fully protected during Windows 10 updates as a result of Microsoft’s newly established operating system release schedule.

Estudo de caso

Accarda

Migration to McAfee Endpoint Security lets small security staff provide more robust protection, more easily.

Resumo de solução

Overcome the Attacker Advantage with McAfee Endpoint Security

McAfee Endpoint Security provides what today's security practitioners need to overcome the attackers' advantages: intelligent, collaborative defenses and a framework that simplifies complex environments.

Resumo de solução

Redefining Next-Generation Endpoint Security Solutions

In this technology brief, research firm Enterprise Strategy Group (ESG) shares their perspective on the increasing importance of next-generation endpoint security solutions, like McAfee Dynamic Endpoint Threat Defense, to improve security efficacy while streamlining security operations.

Data sheet

McAfee Endpoint Threat Protection

McAfee Endpoint Threat Protection delivers integrated threat prevention, firewall, web, email and device control defenses that work together in real time to analyze and collaborate against threats.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs