Kontakt

Der Stand der Dinge bei der Migration zur Cloud und der Bereitstellung der Sicherheit

Sicherheit und Compliance werden für Unternehmen wichtiger als je zuvor. Informieren Sie sich darüber, wie IT-Sicherheitsexperten aus aller Welt die Sicherheit ihrer Clouds gestalten wollen.

Suche in unserer Bibliothek

Erfahren Sie, wie Sie Ihre aktuellen McAfee-Produkte voll nutzen können, oder finden Sie Lösungen, die zu Ihren aktuellen Geschäftsanforderungen passen. Mit den folgenden Filtern können Sie Ihre Suche eingrenzen.

Filters

Reset FiltersClear
Datenblätter

McAfee Premier Success Plan

The McAfee Premier Success Program comprehensive roadmap that combines professional and solutions services, training, and technical support with personalized management to help you more effectively plan your strategy and maintain your solutions, manage your operational risk, and see a sustained value over time.

Broschüren

Brochure: McAfee Product Security Practices

Learn about McAfee's agile security development lifecycle (SDL).

Kurzvorstellungen

SIA Solution Brief: Interset

User and entity behavior analytics from Interset consumes the contextual data and rich security events collected in real time by McAfee Enterprise Security Manager.

Kurzvorstellungen

Gaining Advanced Analytic Insights into Your Network Solution Brief

Leveraging the power of SAS Cybersecurity with the integrative capabilities of DXL from McAfee, organizations gain a new security perspective on the devices connecting to their networks and stay one step ahead of emerging threats.

Datenblätter

McAfee Advanced Threat Defense Appliance Specifications

This spec sheet provides technical specifications for two McAfee Advanced Threat Defense appliances: ATD-3100 and ATD-6100.

Datenblätter

McAfee Data Loss Prevention (DLP) 6600 Specifications Sheet

This data sheet contains detailed specifications for McAfee Data Loss Prevention (DLP) 6600.

Kurzvorstellungen

Don't be Blinded by Encryption: Enable Compliance & Productivity (SSH)

CryptoAuditor from SSH Communications Security, when coupled with McAfee Web Gateway, stops both accidental and malicious data loss over encrypted channels in real time.

Kurzvorstellungen

Securing the Software-Defined Data Center Solution Brief

McAfee Virtual Network Security Platform provides a unique combination of deep visibility into software-defined data center traffic flows with automated security management.

Datenblätter

Migration Table for IBM XGS and GX to McAfee NSP Data Sheet

IBM is leaving the network intrusion prevention arena effective December 31, 2017. This table will guide IBM XGS and IBM GX customers to an improved solution leveraging McAfee Network Security Platform technology.

Berichte

Beyond the General Data Protection Regulation (GDPR): Data residency insights from around the world

As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new GDPR enforcement? Here are the concerns and strategies of 800+ senior executives from industries around the world.

Berichte

Beyond the General Data Protection Regulation Executive Summary

McAfee surveyed 800 senior business professionals across eight countries from a range of industry sectors to better understand the factors driving data decision-making and how organizations currently approach data management, protection and residency.

Infografik

Automation and Orchestration Solution to SOC Overload

Market studies say automate first, then orchestrate. In lab tests, IDC validated that 50-100% of actions taken during integrated threat defense solution scenarios were fully automated.

Berichte

McAfee Labs Threats Report: September 2017

McAfee Labs researchers examine the WannaCry and Petya malware attacks, offer advice to threat hunters searching for indicators of compromise, and dig into script-based malware.

Infografik

Threat Report September 2017 Key Findings

See a visual representation of our researchers’ key findings from the September 2017 report.

Kurzvorstellungen

Protecting Against Script-Based Malware

Read our recommended policies and procedures and how our products can protect against script-based code in malware attacks.

Kurzvorstellungen

Protecting Against WannaCry and Petya

Read our recommended policies and procedures and how McAfee products can protect systems and networks from WannaCry and Petya.

Whitepaper

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security

Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. Machine learning expands the scope of security analytics from diagnostic and descriptive to prescriptive and proactive, which leads to faster and more accurate detection and improved capabilities to act on threat intelligence today and in the future.

Berichte

Building Trust in a Cloudy Sky - Healthcare Executive Summary

In August 2016, Intel Security surveyed over 2,000 professionals for its annual Cloud Security research study. The 2,009 respondents were drawn from third-party database to represent a diverse set of countries, industries, and organization sizes. After screening out those who were not using cloud services or not directly involved in decision making for cloud security initiatives, 1,400 senior technical professionals completed the study. This executive summary of the full cloud security report provides a brief overview of key findings, conclusions and recommendations.

Berichte

Building Trust in a Cloudy Sky Global views from the IT C-Suite

CIOs and CISOs are leading the way to cloud adoption. Trust in public cloud outweighs their trust in private cloud and most have a adopted a Cloud First stance with their application and service deployments. This executive summary dives into the CIO/CISO perspectives as compared to IT staff gathered from the Building Trust in a Cloudy Sky report.

Whitepaper

No Signature Required: The Power of Emulation in Preventing Malware

This white paper discusses the flagship McAfee Gateway Anti-Malware technology, how it adapts to new threats, and sets the stage to protect against future threats with a modular design that allows for the easy addition of components for maximum flexibility.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top