Kontakt

Der Stand der Dinge bei der Migration zur Cloud und der Bereitstellung der Sicherheit

Sicherheit und Compliance werden für Unternehmen wichtiger als je zuvor. Informieren Sie sich darüber, wie IT-Sicherheitsexperten aus aller Welt die Sicherheit ihrer Clouds gestalten wollen.

Suche in unserer Bibliothek

Erfahren Sie, wie Sie Ihre aktuellen McAfee-Produkte voll nutzen können, oder finden Sie Lösungen, die zu Ihren aktuellen Geschäftsanforderungen passen. Mit den folgenden Filtern können Sie Ihre Suche eingrenzen.

Filters

Reset FiltersClear
Anwenderberichte

McAfee Drives Next-Generation SCADA Security Case Study

TEPCO Power Grid of Japan worked closely with McAfee Professional Services to implement countermeasures in its next-generation SCADA platform and to launch a new security initiative across its own organization.

Kurzvorstellungen

Petroleum Refiner Overhauls Security Infrastructure (HollyFrontier)

A petroleum refiner updated its security infrastructure with integrated McAfee solutions, transforming its ability to defend against cyberthreats and benefitting from simplified management, stronger protection, and faster detection and correction.

Whitepaper

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

Whitepaper

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

Berichte

Building Trust in a Cloudy Sky

We surveyed over 2,000 professionals for our annual cloud security research study. The results in this report offer a detailed understanding of the current state of cloud adoption and security.

Berichte

Building Trust in a Cloudy Sky

We surveyed over 2,000 professionals for our annual cloud security research study. The results in this report offer a detailed understanding of the current state of cloud adoption and security.

Berichte

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

Berichte

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

Whitepaper

Tackling Insider Threats

Insiders are responsible for almost as many losses, breaches, and thefts of sensitive and confidential data as cybercriminals. This white paper shows you how to combat this problem through a system of data classification, policy development, and incident response, backed by a strong set of data loss prevention tools.

Whitepaper

Tackling Insider Threats

Insiders are responsible for almost as many losses, breaches, and thefts of sensitive and confidential data as cybercriminals. This white paper shows you how to combat this problem through a system of data classification, policy development, and incident response, backed by a strong set of data loss prevention tools.

Whitepaper

Three Key Considerations in Securing the Software Defined Data Center (SDDC)

Here are three recommendations for incorporating security into the planning of an SDDC.

Whitepaper

Three Key Considerations in Securing the Software Defined Data Center (SDDC)

Here are three recommendations for incorporating security into the planning of an SDDC.

Berichte

Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity

Enterprises tend to focus on governance, processes, rules and structure that are slower and less nimble than the market forces that drive attackers. This report examines the differences in approaches and suggests how defenders can take lessons from the black hat community.

Whitepaper

User and Entity Behavior Analytics for McAfee Enterprise Security Manager White Paper

This white paper provides an overview of core UEBA capabilities of McAfee Enterprise Security Manager and introduces partners whose products are tightly integrated and fully certified by the Intel Security Innovation Alliance.

Anwenderberichte

Desjardins

Canadian investment company, The Desjardins Group, views McAfee Enterprise Support with a McAfee Resident Support Account Manager (RSAM) as an invaluable resource for maintaining a stable, up-to-date infrastructure and strong security posture.

Berichte

KURZFASSUNG: Störenfriede stören – Kunst oder Wissenschaft?

Die Jagd nach Cyber-Kriminellen ist mit einem Rennen vergleichbar. Können Sicherheitsexperten die Störenfriede stören? Durch zusätzliche proaktive Bedrohungssuche und hochentwickelte Analysen, bei denen Kunst und Wissenschaft miteinander verschmelzen, können sie Angreifer aus dem Gleichgewicht bringen.

Kurzvorstellungen

Comprehensive Database Security (Thales) Solution Brief

McAfee and Thales eSecurity provide an integrated solution that establishes comprehensive protection for sensitive database assets, physical or cloud-based. The solution provides multilayer defenses to guard against a wide range of threats.

Anwenderberichte

Telefónica México Unifies Endpoint Protection Case Study

Telefónica Mexico relies on McAfee Endpoint Security—a low-impact, high-performance unified endpoint solution—to stay ahead of sophisticated threats like recent ransomware attacks, streamline management, and provide easy scalability.

Kurzvorstellungen

Unified Least Privilege, Endpoint Security, and Threat Intelligence

Through the integration of network security data with multidimensional privileged user and behavioral analysis, McAfee and BeyondTrust collaborate to help increase visibility and improve detection of damaging breaches.

Kurzvorstellungen

SIA Solution Brief: BeyondTrust

Through the integration of network security data with multidimensional privileged user and behavioral analysis, McAfee and BeyondTrust collaborate to help increase visibility and improve detection of damaging breaches.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top