Biblioteca de recursos

Contáctenos

El nivel de adopción de la nube y su seguridad

La seguridad y el cumplimiento de normativas son más relevantes que nunca. Vea cómo profesionales de seguridad de TI de todo el mundo han planificado la protección de sus nubes.

Buscar en la biblioteca

Aprenda a sacar el máximo partido a los productos McAfee que ya tiene o descubra las soluciones que responden a las necesidades actuales de su empresa. Utilice los siguientes filtros para restringir su búsqueda.

Filters

Reset FiltersClear
Libro blanco

Unmask Evasive Threats: McAfee-Real Protect and Dynamic Application Containment Stop Zero-Day Malware in its Tracks

McAfee draws on machine learning analysis and application containment tools to help organization unmask hidden threats and stop them in their tracks—more quickly and with less effort.

Libro blanco

Busting the Myth of the Malware “Silver Bullet”

Unlike security strategies based on isolated point products, our dynamic endpoint threat defense solution combines multiple layers of protection to make threat management simpler, faster, and more effective.

Resumen de la solución

Achieve Advanced Security for your Microsoft Windows 10 Platforms with McAfee Endpoint Security — Solution Brief

McAfee Endpoint Protection software will keep your security aligned and your business fully protected during Windows 10 updates as a result of Microsoft’s newly established operating system release schedule.

Caso de estudio

Canadian Retailer Embraces an Integrated Defense (LCBO) Case Study

The Liquor Board of Ontario embraces an adaptable threat defense infrastructure from McAfee, allowing it to efficiently and effectively manage security, including finding and responding to cyberthreats in minutes across its extended enterprise.

Resumen de la solución

Defend Against the Unknown with McAfee Endpoint Threat Defense Solutions

Learn how McAfee Endpoint Threat Defense solutions help organizations stay ahead of the savviest adversaries.

Resumen de la solución

Integrate and Accelerate Endpoint Threat Defense

McAfee Dynamic Endpoint Threat Defense integrates endpoint defenses into a unified, adaptive defense fabric, with tools that share information and coordinate threat response in near real time.

Fichas técnica

McAfee Endpoint Threat Defense and Response Family

McAfee Endpoint Threat Defense uses behavioral analysis, shared threat intelligence, and simplified workflows to prevent threats from infecting endpoints.

Resumen de la solución

Overcome the Attacker Advantage with McAfee Endpoint Security

McAfee Endpoint Security provides what today's security practitioners need to overcome the attackers' advantages: intelligent, collaborative defenses and a framework that simplifies complex environments.

Resumen de la solución

Redefining Next-Generation Endpoint Security Solutions

In this technology brief, research firm Enterprise Strategy Group (ESG) shares their perspective on the increasing importance of next-generation endpoint security solutions, like McAfee Dynamic Endpoint Threat Defense, to improve security efficacy while streamlining security operations.

Libro blanco

Sustainable Security Operations

Adopt an optimized approach to security infrastructure that encourages collaboration and visibility across the enterprise.

Fichas técnica

McAfee Threat Intelligence Exchange

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

Libro blanco

Threat Defense Isn't Just About Detection: It's How You Respond

Discover how endpoint detection and response (EDR) is critical to proactively preventing threats before they hit your endpoint systems.

Resumen de la solución

Monitor Continuously. Respond Swiftly.

McAfee Active Response enhances ATA detection and remediation.

Fichas técnica

McAfee ePolicy Orchestrator

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top