联系我们

云利用和安全的状况

随着安全和合规比以往任何时候更加重要,必须了解世界各地的 IT 安全专业人员计划如何保护他们的云.

搜索我们的库

了解您如何全面利用已有 McAfee 产品,或者探索符合您当前业务需求的解决方案。使用下面的过滤器缩小搜索范围。

Filters

Reset FiltersClear
产品简介

McAfee Enterprise Security Manager for Engineers-II Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Engineers to understand, communicate, and use the solution’s features.

产品简介

McAfee SIEM Supported Device List

McAfee Enterprise Security Manager can integrate with a wide range of third-party security tools to provide a powerful security information and event management (SIEM) platform. This data sheet provides details about McAfee ESM third-party support.

产品简介

McAfee Enterprise Security Manager for Analysts-I Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Analysts to understand, communicate, and use the solution’s features.

产品简介

McAfee Enterprise Security Manager for Engineers-I Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Engineers to understand, communicate, and use the solution’s features.

案例研究

Berkshire Health Systems

Making the Job of Security Operations Easier at Berkshire Health Systems.

案例研究

Regional Commercial Bank

After attempting to rely on unintegrated point solutions, a CISO at Regional Commercial Bank found a more efficient way to tackle the ever-morphing advanced threat landscape through Intel Security solutions.

案例研究

Cut-e GmbH

This company achieved transparent security status with McAfee Enterprise Security Manager.

案例研究

Universidad de Las Américas Puebla (UDLAP)

Leading Latin American university, UDLAP, fortified security for its assets and for those of its students.

案例研究

China Pacific Insurance Group

China Pacific Insurance protects its business and customers with our security management system.

案例研究

Government Statistics Agency

Large South American government agency embraces enterprise integrated security approach.

案例研究

Thwarting Ransomware and Easing Security Administration by Migrating to McAfee Endpoint Security (Norrköpings Kommun) Case Study

The small IT team for this Swedish town of 90,000 has reduced its security administration burden with more robust protection and more streamlined management, thanks to McAfee Endpoint Security and McAfee ePolicy Orchestrator® (McAfee ePO) software.

案例研究

Vidant Health

Vidant Health shifted from security alert overload to automated detection and correction.

产品简介

McAfee Solution Services for SIEM

Essential Services for McAfee SIEM Solutions

产品简介

SIEM Solutions Overview

Continuously monitor, identify, investigate, and resolve threats.

白皮书

10 Ways to Accelerate Time to Detection and Response

Malware dwell times a top concern for IT executives and practitioners at every level. This white paper shows you 10 ways to add speed and intelligence to your incident detection and response and regain time.

白皮书

将 SIEM 集成到威胁追踪策略中

有效利用智能 SIEM 是管理威胁追踪的战略、战术和操作方面的关键所在。在当今威胁形势下,这三个方面缺一不可。将 SIEM 有效集成为枢纽,并将一系列威胁调查工具作为信息来源,对增强安全威胁监控至关重要。

报告

Securosis Report: Security Analytics Team of Rivals

As new security analytics technologies appear, learn how these technologies can work together for you.

白皮书

SIEM Orchestration

How McAfee Enterprise Security Manager drives action, automates remediation, and optimizes incident response

案例研究

Accarda

Migration to McAfee Endpoint Security lets small security staff provide more robust protection, more easily.

产品简介

McAfee Enterprise Security Manager

有关上面所列迈克菲产品的技术摘要,请查看产品简介。

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top