Bibliothèque de ressources

Contacter

Le point sur l'adoption et la sécurité du cloud

La sécurité et la conformité sont deux considérations primordiales pour une entreprise. Découvrez comment les responsables de la sécurité informatique du monde entier sécurisent leurs clouds.

Rechercher dans notre bibliothèque

Apprenez à tirer le meilleur parti des produits McAfee que vous possédez déjà ou découvrez les solutions susceptibles de répondre aux besoins actuels de votre entreprise. Utilisez les filtres ci-dessous pour affiner votre recherche.

Filters

Reset FiltersClear
Fiche technique

McAfee Collector Plug-in

For a technical summary on the McAfee product listed above, please view the product data sheet.

Étude de cas

Thwarting Ransomware and Easing Security Administration by Migrating to McAfee Endpoint Security (Norrköpings Kommun) Case Study

The small IT team for this Swedish town of 90,000 has reduced its security administration burden with more robust protection and more streamlined management, thanks to McAfee Endpoint Security and McAfee ePolicy Orchestrator® (McAfee ePO) software.

Présentation de solution

Identify Sensitive Data & Prevent Data Leaks

The interoperability between TITUS Document Classification software and McAfee Data Loss Prevention (DLP) further reduces your risk of data loss by capturing end users’ inherent knowledge about the sensitivity of documents and making that information available to McAfee host and network-based DLP as visual classification labels and corresponding metadata.

Présentation de solution

SIA Solution Brief: Check Point

The McAfee and Check Point joint solution delivers a simple, automated way to unify endpoint and network security, sharing threat intelligence in order to effectively detect and block cyberattacks.

Présentation de solution

SIA Solution Brief: Tenable

Tenable provides automatic infusion of vulnerability data into McAfee ePO software, with critical visibility and context on systems, assets, and data needed for an effective security program.

Fiche technique

McAfee ePO Cloud

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

Fiche technique

McAfee Cloud Enablement Services for McAfee ePO

By using industry best practices and proven methodologies, the McAfee cloud enablement services for McAfee ePO helps expedite your transition to the cloud and enjoy peace of mind, knowing that your deployment maximizes your security effectiveness and efficiency.

Livre blanc

SIEM Orchestration

How McAfee Enterprise Security Manager drives action, automates remediation, and optimizes incident response

Étude de cas

Telefónica México Unifies Endpoint Protection Case Study

Telefónica Mexico relies on McAfee Endpoint Security—a low-impact, high-performance unified endpoint solution—to stay ahead of sophisticated threats like recent ransomware attacks, streamline management, and provide easy scalability.

Présentation de solution

SIA Solution Brief: BeyondTrust

Through the integration of network security data with multidimensional privileged user and behavioral analysis, McAfee and BeyondTrust collaborate to help increase visibility and improve detection of damaging breaches.

Présentation de solution

Achieve Advanced Security for your Microsoft Windows 10 Platforms with McAfee Endpoint Security — Solution Brief

McAfee Endpoint Protection software will keep your security aligned and your business fully protected during Windows 10 updates as a result of Microsoft’s newly established operating system release schedule.

Étude de cas

Canadian Retailer Embraces an Integrated Defense (LCBO) Case Study

The Liquor Board of Ontario embraces an adaptable threat defense infrastructure from McAfee, allowing it to efficiently and effectively manage security, including finding and responding to cyberthreats in minutes across its extended enterprise.

Présentation de solution

SIA Solution Brief: Demisto

The integration of Demisto Enterprise Platform, McAfee Enterprise Security Manager, and McAfee ePolicy Orchestrator results in an enterprise-grade solution to manage and automate incident investigation and remediation tasks.

Présentation de solution

SIA Solution Brief: Lumeta

McAfee ePolicy Orchestrator software and Lumeta Spectre together provide IT with the real-time visibility required to identify, manage, and respond to endpoint security issues and threats across dynamic cloud, virtual, mobile, and physical networks.

Présentation de solution

SIA Solution Brief: Rapid7

Rapid7 Nexpose integrates vulnerability management data and risk context into the McAfee ePO console and McAfee Data Exchange Layer.

Étude de cas

Accarda

Migration to McAfee Endpoint Security lets small security staff provide more robust protection, more easily.

Présentation de solution

SIA Solution Brief: Aruba

The McAfee and HP Aruba integrated solution leverages network access control to maximize the efficiency and effectiveness of McAfee ePO software and McAfee Enterprise Security Manager.

Présentation de solution

SIA Solution Brief: Boldon James

Boldon James Classifier and McAfee Data Loss Prevention work together to reduce the risk of data loss by applying the insight of each knowledge worker to data loss prevention decisions.

Présentation de solution

SIA Solution Brief: Bufferzone

Bufferzone works seamlessly with McAfee ePolicy Orchestrator (McAfee ePO) software to isolate potentially malicious content from web browsers, email, and removable storage.

Livre blanc

Security that Plays Well with Others

Organizations need a way to orchestrate security components so that they to work together and present a unified coordinated defense. McAfee’s open, integrated architecture can help legacy point products play well together, optimize the effectiveness of your entire security infrastructure, and simplify, unify, and advance the threat defense lifecycle.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs