Intel Security

Afficher toutes les publications

Filtrer le contenu :

Hide English Publications

Cybersecurity Maturity = Visibility + Automation (English)

Explore how cybersecurity teams in the sector are achieving more than most with integration and automation

Building Trust in a Cloudy Sky (English)

We surveyed 1,400 IT professionals from 11 countries for our annual cloud security research study. The results in this report offer a detailed understanding of the current state of global cloud adoption and security.

MOVE AntiVirus Advanced Security Integrated with VMware NSX (English)

McAfee MOVE for AntiVirus has a track record of providing optimized antivirus protection for the virtual environment without impacting performance and agility.
Sujets : Server & Storage Security

Securing the Hybrid Cloud (English)

Most data centers today have a hybrid infrastructure that spans physical, virtualized and cloud deployments, both on premises and off premises. Discover how to keep up with this evolving landscape and provide an agile IT infrastructure to help meet business expansion goals.

Sustainable Advantage in Security with Cloud Workload Discovery (English)

Intel Security's cloud workload security solutions are built and enhanced to provide sustainable advantage while optimizing investment. Cloud Workload Discovery increases this advantage to discover, assess, and remediate threats targeting the cloud.

Logiciels légitimes infectés par des chevaux de Troie

Cette présentation de solution explique comment configurer les solutions Intel Security pour bloquer les chevaux de Troie et empêcher leur propagation.
Sujets : McAfee Labs

McAfee Labs - Rapport sur le paysage des menaces - Décembre 2016

Une grande étude a été réalisée à la demande d'Intel Security pour mieux comprendre comment les entreprises utilisent les centres des opérations de sécurité (SOC), comment ces derniers ont évolué au fil du temps et à quoi ils ressembleront à l'avenir. Le second article dresse le bilan de l'année en matière de logiciels de demande de rançon (ransomware). L'année 2016 est caractérisée par une forte hausse des attaques de ransomware, mais aussi par quelques avancées techniques majeures. L'article décrit en détail quelques-uns des progrès réalisés. Enfin, le troisième article s'intéresse aux chevaux de Troie qui infectent le code légitime et s'y dissimulent dans le but de passer inaperçus le plus longtemps possible pour maximiser les gains. Il explique comment les pirates créent des logiciels malveillants persistants et impossibles à détecter.
Sujets : McAfee Labs

McAfee Labs Quarterly Threat Report December 2016 (English)

Intel Security commissioned a primary research study to gain a deeper understanding of the ways in which enterprises are using security operations centers, how they have changed over time, and what they will look like in the future. The second Key Topic summarizes the year in ransomware. Not only was there a huge jump in the number of ransomware attacks in 2016 but we saw significant technical advancements, too. We detail some of those advancements in this story. Finally, the third Key Topic digs into Trojans that infect legitimate code and hide out, hoping to go unnoticed as long as possible to maximize payouts. We show how attackers are creating long-lasting, fully undetectable malware.
Sujets : McAfee Labs

Building & Maintaining a Business Continuity Program (English)

Business continuity planning is a critical function that involves many different personnel and departments over multiple phases. As with many business continuity programs, an iterative process is most effective in developing a refined set of procedures and plans.
Sujets : Foundstone

McAfee Labs 2017 Threat Predictions Report (French (FR))

The number of cyberattacks is growing, driven by trends like the cloud and the Internet of Things. As the digital landscape evolves, so will threats. In this report, Intel Security experts share their predictions about how threats will change.
Sujets : McAfee Labs