Ver todas las publicaciones

Filtrar contenido:

Hide English Publications

Automation and Analytics versus the Chaos of Cybersecurity Operations (English)

Learn what high performing security organizations are doing to make measurable improvements in their cybersecurity analytics and operations architecture.

Petroleum Refiner Overhauls Security Infrastructure (HollyFrontier) (English)

A petroleum refiner updated its security infrastructure with integrated McAfee solutions, transforming its ability to defend against cyberthreats and benefitting from simplified management, stronger protection, and faster detection and correction.

5 Tips to Help Protect Your Data (English)

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

5 Tips to Help Protect Your Data (English)

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

Busting the Myth of the Malware “Silver Bullet” (English)

Unlike security strategies based on isolated point products, our dynamic endpoint threat defense solution combines multiple layers of protection to make threat management simpler, faster, and more effective.

Busting the Myth of the Malware “Silver Bullet” (English)

Unlike security strategies based on isolated point products, our dynamic endpoint threat defense solution combines multiple layers of protection to make threat management simpler, faster, and more effective.

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats (English)

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats (English)

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection (English)

Key findings on data exfiltration and recommendations on data loss prevention

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection (English)

Key findings on data exfiltration and recommendations on data loss prevention