Bibliothèque de ressources

Contacter

Le point sur l'adoption et la sécurité du cloud

La sécurité et la conformité sont deux considérations primordiales pour une entreprise. Découvrez comment les responsables de la sécurité informatique du monde entier sécurisent leurs clouds.

Rechercher dans notre bibliothèque

Apprenez à tirer le meilleur parti des produits McAfee que vous possédez déjà ou découvrez les solutions susceptibles de répondre aux besoins actuels de votre entreprise. Utilisez les filtres ci-dessous pour affiner votre recherche.

Filters

Reset FiltersClear
Fiche technique

McAfee Cloud Enablement Services for McAfee ePO

By using industry best practices and proven methodologies, the McAfee cloud enablement services for McAfee ePO helps expedite your transition to the cloud and enjoy peace of mind, knowing that your deployment maximizes your security effectiveness and efficiency.

Fiche technique

McAfee Premier Success Plan

The McAfee Premier Success Program comprehensive roadmap that combines professional and solutions services, training, and technical support with personalized management to help you more effectively plan your strategy and maintain your solutions, manage your operational risk, and see a sustained value over time.

Brochure

Brochure: McAfee Product Security Practices

Learn about McAfee's agile security development lifecycle (SDL).

Présentation de solution

SIA Solution Brief: Interset

User and entity behavior analytics from Interset consumes the contextual data and rich security events collected in real time by McAfee Enterprise Security Manager.

Présentation de solution

Gaining Advanced Analytic Insights into Your Network Solution Brief

Leveraging the power of SAS Cybersecurity with the integrative capabilities of DXL from McAfee, organizations gain a new security perspective on the devices connecting to their networks and stay one step ahead of emerging threats.

Fiche technique

McAfee Advanced Threat Defense Appliance Specifications

This spec sheet provides technical specifications for two McAfee Advanced Threat Defense appliances: ATD-3100 and ATD-6100.

Fiche technique

McAfee Cloud Threat Detection

This paper explains how the McAfee Cloud Threat Detection service plugs into existing Intel Security solutions to convict advanced malware and expose evasive threats.

Fiche technique

McAfee Complete Endpoint Threat Protection

McAfee Complete Endpoint Threat Protection works with integrated machine learning and dynamic containment to detect zero-day threats, classifying and halting them before they can execute.

Fiche technique

McAfee Data Loss Prevention (DLP) 6600 Specifications Sheet

This data sheet contains detailed specifications for McAfee Data Loss Prevention (DLP) 6600.

Livre blanc

Protecting the Private Cloud with Integrated and Automated Security

Enterprises have evolved their data centers to include private clouds, and are now challenged to secure these environments. Breaches in these highly virtualized environments are difficult to detect and can go unnoticed far too long. Advanced analysis capabilities are needed to effectively improve detection of sophisticated advanced attacks within a private cloud. This technical whitepaper explains how.

Livre blanc

Questions to Ask Your Cloud Service Provider

These suggested questions should help in your process of identifying, evaluating, selecting, and working with CSPs.

Présentation de solution

Don't be Blinded by Encryption: Enable Compliance & Productivity (SSH)

CryptoAuditor from SSH Communications Security, when coupled with McAfee Web Gateway, stops both accidental and malicious data loss over encrypted channels in real time.

Présentation de solution

Securing the Software-Defined Data Center Solution Brief

McAfee Virtual Network Security Platform provides a unique combination of deep visibility into software-defined data center traffic flows with automated security management.

Fiche technique

Migration Table for IBM XGS and GX to McAfee NSP Data Sheet

IBM is leaving the network intrusion prevention arena effective December 31, 2017. This table will guide IBM XGS and IBM GX customers to an improved solution leveraging McAfee Network Security Platform technology.

Rapport

Au-delà du RGPD : Le point sur la résidence des données aux quatre coins du monde

Soumises à de nombreuses réglementations, les entreprises pensent que la confidentialité des données peut les aider à se démarquer de leurs concurrents. Mais sont-elles prêtes pour l'entrée en vigueur du nouveau règlement général sur la protection des données (RGPD) ? Vous trouverez ci-dessous un panorama des préoccupations et stratégies de plus de 800 dirigeants du monde entier issus de divers secteurs d'activité.

Rapport

Beyond the General Data Protection Regulation (GDPR): Data residency insights from around the world

As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new GDPR enforcement? Here are the concerns and strategies of 800+ senior executives from industries around the world.

Rapport

Beyond the General Data Protection Regulation Executive Summary

McAfee surveyed 800 senior business professionals across eight countries from a range of industry sectors to better understand the factors driving data decision-making and how organizations currently approach data management, protection and residency.

Présentation graphique

Automation and Orchestration Solution to SOC Overload

Market studies say automate first, then orchestrate. In lab tests, IDC validated that 50-100% of actions taken during integrated threat defense solution scenarios were fully automated.

Rapport

McAfee Labs Threats Report: September 2017

McAfee Labs researchers examine the WannaCry and Petya malware attacks, offer advice to threat hunters searching for indicators of compromise, and dig into script-based malware.

Rapport

Rapport de McAfee Labs sur le paysage des menaces: Septembre 2017

McAfee Labs researchers examine the WannaCry and Petya malware attacks, offer advice to threat hunters searching for indicators of compromise, and dig into script-based malware.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top