联系我们

云利用和安全的状况

随着安全和合规比以往任何时候更加重要,必须了解世界各地的 IT 安全专业人员计划如何保护他们的云.

搜索我们的库

了解您如何全面利用已有 McAfee 产品,或者探索符合您当前业务需求的解决方案。使用下面的过滤器缩小搜索范围。

Filters

Reset FiltersClear
信息图
白皮书

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security

Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. Machine learning expands the scope of security analytics from diagnostic and descriptive to prescriptive and proactive, which leads to faster and more accurate detection and improved capabilities to act on threat intelligence today and in the future.

Building Trust in a Cloudy Sky - Healthcare Executive Summary

In August 2016, Intel Security surveyed over 2,000 professionals for its annual Cloud Security research study. The 2,009 respondents were drawn from third-party database to represent a diverse set of countries, industries, and organization sizes. After screening out those who were not using cloud services or not directly involved in decision making for cloud security initiatives, 1,400 senior technical professionals completed the study. This executive summary of the full cloud security report provides a brief overview of key findings, conclusions and recommendations.

报告

Building Trust in a Cloudy Sky Global views from the IT C-Suite

CIOs and CISOs are leading the way to cloud adoption. Trust in public cloud outweighs their trust in private cloud and most have a adopted a Cloud First stance with their application and service deployments. This executive summary dives into the CIO/CISO perspectives as compared to IT staff gathered from the Building Trust in a Cloudy Sky report.

解决方案简介

Mastering Modern Endpoint Protection Guide

This guide walks through six step to better endpoint protection drawing on research cited in the to the 2017 Forrester report, Mastering the Endpoint.

白皮书

Not Today Zero-Day: Block Zero-Day Threats Before They Hit Endpoints

This whitepaper provides data points on malware and stresses the importance on emulation, which reduces "firefighting" and dramatically lowers security costs and freeing up resources for more strategic initiatives such as endpoint detection and response.

白皮书

OpenDXL Idea Book

This guide provides multiple use cases for OpenDXL integrations, complete with technical details, to inspire more developers and organizations to come up with new applications for this powerful and versatile technology.

报告

Securosis Report: Security Analytics Team of Rivals

As new security analytics technologies appear, learn how these technologies can work together for you.

白皮书

SIEM Orchestration

How McAfee Enterprise Security Manager drives action, automates remediation, and optimizes incident response

白皮书

Threat Visibility and the Zero-Trust Virtual Data Center

This paper explores the benefits of zero-trust networking strategies in a VMware SDDC, and how both McAfee Network Security Platform and the Intel Security Controller can help make zero-trust networking practical.

信息图

Zero-Day Malware Prevention

This infographic provides data points on malware and stresses the importance of emulation -- which reduces “firefighting” -- dramatically lowering security costs and freeing up resources for more strategic initiatives such as endpoint detection and response.

案例研究

University Fortifies Protection with Integrated Threat Defense Case Study

With tightly integrated McAfee defenses, Utrecht University in the Netherlands enhanced zero-day threat protection, shrank time from encounter to containment, and simplified security operations.

报告

Automation and Analytics versus the Chaos of Cybersecurity Operations

Learn what high performing security organizations are doing to make measurable improvements in their cybersecurity analytics and operations architecture.

案例研究

McAfee Drives Next-Generation SCADA Security Case Study

TEPCO Power Grid of Japan worked closely with McAfee Professional Services to implement countermeasures in its next-generation SCADA platform and to launch a new security initiative across its own organization.

解决方案简介

Petroleum Refiner Overhauls Security Infrastructure (HollyFrontier)

A petroleum refiner updated its security infrastructure with integrated McAfee solutions, transforming its ability to defend against cyberthreats and benefitting from simplified management, stronger protection, and faster detection and correction.

白皮书

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

白皮书

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

报告

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

报告

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

白皮书

TechTarget: A Cloud Security Primer

As diverse as your cloud environment may be, if you are involved in overseeing or deploying cloud services at your organization, there is one inviolable truism you must keep in mind at all times: No matter how simple or complex your cloud deployments, you can never allow the security of your data or applications to be compromised in any way.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top