Bibliothèque de ressources

Contacter

Filters

Reset FiltersClear
Livres blancs

SDDC Executive Summary

A software-defined data center (SDDC) delivers cloud-ready infrastructure and improves the security of your data center. Osterman Research, together with McAfee and VMware, provides an overview of what an SDDC is, why it’s inevitable, and how it works.

Livres blancs

The Why, the What and the How of the SDDC

A software-defined data center (SDDC) delivers cloud-ready infrastructure and improves the security of your data center. Osterman Research, together with McAfee and VMware, provides an overview of what an SDDC is, why it’s inevitable, and how it works.

Etudes de cas

Thwarting Ransomware and Easing Security Administration by Migrating to McAfee Endpoint Security (Norrköpings Kommun) Case Study

The small IT team for this Swedish town of 90,000 has reduced its security administration burden with more robust protection and more streamlined management, thanks to McAfee Endpoint Security and McAfee ePolicy Orchestrator® (McAfee ePO) software.

Rapports

Market Quadrant: McAfee Advanced Threat Defense is Top Player

This edition of Radicati Market Quadrants reviews products that offer protection from advanced persistent threats.

Présentations de solution

Securing the Software-Defined Data Center Solution Brief

McAfee Virtual Network Security Platform provides a unique combination of deep visibility into software-defined data center traffic flows with automated security management.

Rapports

Gartner Market Guide for User and Entity Behavior Analytics

Security and risk management leaders should leverage user and entity behavior analytics to improve their organization's threat detection capabilities across a variety of use cases.

Rapports

Gartner’s Market Guide for Cloud Workload Protection Platforms

Like most global enterprises, your modern hybrid data center uses private and public cloud computing to deliver applications and workloads. This new infrastructure requires a protection strategy different from traditional server security. Elastic, cloud-native applications have unique security needs. Legacy on-premises security agents are not designed to perform at cloud scale and may have licensing models that are incompatible with elastic cloud workloads. Gartner provides their key findings and recommendations to security and risk management leaders for cloud workload protection platforms, including the use of risk-based models to prioritize evaluation criteria.

Présentations de solution

Mastering Modern Endpoint Protection Guide

This guide walks through six step to better endpoint protection drawing on research cited in the to the 2017 Forrester report, Mastering the Endpoint.

Fiches techniques

McAfee Advanced Threat Defense Appliance Specifications

This spec sheet provides technical specifications for two McAfee Advanced Threat Defense appliances: ATD-3100 and ATD-6100.

Fiches techniques

McAfee Complete Endpoint Protection — Business

Pour un compte rendu technique sur le produit McAfee présenté ci-dessus, veuillez consulter la fiche technique correspondante.

Fiches techniques

McAfee Enterprise Security Manager

Pour un compte rendu technique sur le produit McAfee présenté ci-dessus, veuillez consulter la fiche technique correspondante.

Présentations de solution

McAfee Total Protection for Data Loss Prevention

McAfee Total Protection for DLP safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on the network, in storage systems, or at the endpoint, while saving time and money with centralized deployment, management, and reporting.

Fiches techniques

McAfee Endpoint Security 10.5 Upgrade

Our McAfee® Endpoint Security 10.5 Upgrade course provides an in-depth introduction to the tasks crucial to set up and administer McAfee Endpoint Security. McAfee Endpoint Security combines threat prevention, firewall, and web control to take immediate action against potentially dangerous applications, downloads, websites, and files. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the McAfee Endpoint Security user interface, as well as detailed instructions for the integration of this solution.

Fiches techniques

McAfee Endpoint Security 10.5 Upgrade

Our McAfee Endpoint Security 10.5 Upgrade course provides an in-depth introduction to the tasks crucial to set up and administer McAfee Endpoint Security. McAfee Endpoint Security combines threat prevention, firewall, and web control to take immediate action against potentially dangerous applications, downloads, websites, and files.

Rapports

Le décalage des incitants, ou pourquoi les cybercriminels ont une longueur d'avance — Coup de projecteur sur le secteur des services financiers — Rapport de synth

Pour mieux cerner le décalage des incitants, nous avons interrogé 200 professionnels de l'informatique issus du secteur des services financiers, et comparé leurs réponses à celles de 600 responsables informatiques d'autres secteurs d'activité.

Fiches techniques

McAfee Advanced Threat Defense: Configurable operating system and application support

McAfee Advanced Threat Defense supports a broad range of operating systems and applications, making it ideal for generating relevant indicators of compromise that can be used to support investigation and threat hunting throughout the organization.

Questions fréquentes (FAQ)
Fiches techniques

Active Response Administration

Learn essential introductory aspects of the McAfee Active Response appliance to get your solution value in no time. This course offers an in-depth look into deployment, configuration, operation, and policy management.

Rapports

Pour en finir avec le mythe de la solution miracle en matière de lutte antimalware — Rapport de synthèse

Les logiciels malveillants continuent d'évoluer, et il n'existe aucune solution miracle capable de vous protéger contre l'intégralité de ces menaces. Jongler avec plusieurs solutions isolées exige plus de temps et de ressources et accroît la complexité pour des équipes de sécurité déjà mises à rude épreuve. L'heure est venue d'adopter une approche plus intelligente.

Rapports

Security Operations in Public Cloud Services: Going with Your Strengths

Aberdeen Group discusses the move to the public cloud and the security shared responsibility model that leverages the strengths of both the public cloud service providers (architecture and infrastructure at scale) and enterprises (applications and data) to provide the enterprise with stronger capabilities than could be achieved going at it alone.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top