Kontakt

Der Stand der Dinge bei der Migration zur Cloud und der Bereitstellung der Sicherheit

Sicherheit und Compliance werden für Unternehmen wichtiger als je zuvor. Informieren Sie sich darüber, wie IT-Sicherheitsexperten aus aller Welt die Sicherheit ihrer Clouds gestalten wollen.

Suche in unserer Bibliothek

Erfahren Sie, wie Sie Ihre aktuellen McAfee-Produkte voll nutzen können, oder finden Sie Lösungen, die zu Ihren aktuellen Geschäftsanforderungen passen. Mit den folgenden Filtern können Sie Ihre Suche eingrenzen.

Filters

Reset FiltersClear
Datenblätter

McAfee SIEM Supported Device List

McAfee Enterprise Security Manager can integrate with a wide range of third-party security tools to provide a powerful security information and event management (SIEM) platform. This data sheet provides details about McAfee ESM third-party support.

Datenblätter

SIEM Solutions Overview

Continuously monitor, identify, investigate, and resolve threats.

Berichte

Securosis Report: Security Analytics Team of Rivals

As new security analytics technologies appear, learn how these technologies can work together for you.

Whitepaper

SIEM Orchestration

How McAfee Enterprise Security Manager drives action, automates remediation, and optimizes incident response

Whitepaper

Whitepaper: Verhaltensanalyse von Benutzern und Entitäten mit McAfee Enterprise Security Manager

Dieses Whitepaper bietet einen Überblick über die grundlegenden UEBA-Funktionen von McAfee Enterprise Security Manager und stellt Partner vor, deren Produkte tief integriert und vollständig von der McAfee Security Innovation Alliance zertifiziert sind.

Datenblätter

McAfee Enterprise Security Manager

Eine technische Zusammenfassung zum oben genannten McAfee-Produkt finden Sie im entsprechenden Datenblatt.

Whitepaper

Sustainable Security Operations

Adopt an optimized approach to security infrastructure that encourages collaboration and visibility across the enterprise.

Kurzvorstellungen

Advanced Threat Defense for SIEM

When advanced detection solutions, known as sandboxes, collaborate with SIEM solutions, enterprises can better understand and respond to unknown, advanced attacks. McAfee Advanced Threat Defense and McAfee Enterprise Security Manager work in concert to extract relevant data from advanced malware and dramatically reduce time to response by minimizing uncertainty and accelerating remediation.

Kurzvorstellungen

Security Information and Event Management and Integrated Endpoint Security

Responding to incidents as fast as possible is crucial to disrupting the attack and preventing extensive damage. Learn how to automate attack response and analysis to shorten incident response time.

Whitepaper

Security that Plays Well with Others

Organizations need a way to orchestrate security components so that they to work together and present a unified coordinated defense. McAfee’s open, integrated architecture can help legacy point products play well together, optimize the effectiveness of your entire security infrastructure, and simplify, unify, and advance the threat defense lifecycle.

Kurzvorstellungen

McAfee Enterprise Security Manager, Services Solutions for Managed Service Providers (MSPs)

McAfee Enterprise Security Manager offers the advanced scalability, flexibility, and control you need to protect your customers’ business, and grow yours.

Kurzvorstellungen

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange

Deliver context-aware, prioritized threat intelligence across your enterprise.

Kurzvorstellungen

Compliance Made Easy with SIEM

The McAfee SIEM solution, Enterprise Security Manager, addresses today’s complex compliance challenges by combining an established unified compliance framework with superior abilities to collect, retrieve, and protect the data required to assess and demonstrate compliance in real time. It’s tightly integrated log collection, management, analysis, and reporting improves an organization’s ability to meet compliance requirements through frameworks, streamlined workflow, and automation.

Whitepaper

Creating and Maintaining a SOC

Organizations are investing in the development of security operations centers (SOCs) to provide increased security and rapid response to events throughout their networks. But building a SOC can be a monumental task. This paper explains how strong people and well-defined processes can result in an operationally effective SOC.

Datenblätter

McAfee Application Data Monitor

Eine technische Zusammenfassung zum oben genannten McAfee-Produkt finden Sie im entsprechenden Datenblatt.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs