Bibliothèque de ressources

Contacter

Le point sur l'adoption et la sécurité du cloud

La sécurité et la conformité sont deux considérations primordiales pour une entreprise. Découvrez comment les responsables de la sécurité informatique du monde entier sécurisent leurs clouds.

Rechercher dans notre bibliothèque

Apprenez à tirer le meilleur parti des produits McAfee que vous possédez déjà ou découvrez les solutions susceptibles de répondre aux besoins actuels de votre entreprise. Utilisez les filtres ci-dessous pour affiner votre recherche.

Filters

Reset FiltersClear
Rapport

Corporate Web Security - Market Quadrant 2017

An Analysis of the Market for Corporate Web Security Solutions, Revealing Top Players, Trail Blazers, Specialists and Mature Players.

Fiche technique

McAfee Data Loss Prevention Endpoint Adminstration Course

This in-depth training provides the tools you need to design, implement, configure, and troubleshoot McAfee Data Loss Prevention (DLP) Endpoint.

Brochure

About McAfee Corporate Fact Sheet

McAfee is one of the world’s leading independent cybersecurity companies. Inspired by the power of working together, McAfee creates business and consumer solutions that make the world a safer place for the benefit of all.

Présentation de solution

Protecting the Internet of Things

This brief explains how the open, connected McAfee security ecosystem enables IoT device manufacturers to detect, protect, and correct threats faster; automate their defense with fewer resources; and accelerate time to market.

Solutions SIEM : cinq impératifs pour résoudre les grands défis des entreprises d'aujourd'hui

Dans cette présentation de solution, McAfee examine les cinq principaux problèmes qui préoccupent les utilisateurs de solutions SIEM : la sécurité basée sur les grands volumes de données, la connaissance situationnelle, le contexte en temps réel, la facilité de gestion et la sécurité intégrée.

Brochure

McAfee Product Entitlement Definitions

This document contains legal definitions that apply to McAfee products and solutions.

A propos de McAfee

McAfee Vulnerability Manager and McAfee Total Protection for Compliance, Desktops End of Life Product

Get answers to frequently asked questions about the end of life of McAfee Vulnerability Manager and McAfee Total Protection for Compliance.

Livre blanc

Seven Steps to Ease the Pain of Managing a SOC

Running a security operations center (SOC) requires staying ahead of threats, whether you head a vast army of security professionals or operate as a one-person band. As threats mount, expand, and increase in complexity, velocity, and frequency, this checklist can be utilized to turn chaos into order and confusion into confidence.

Livre blanc

Protecting McAfee ePolicy Orchestrator Database with McAfee Database Security

This white paper also provides an overview of McAfee Database Security Activity Monitoring and highlights specific policy requirements to secure McAfee ePO software.

Livre blanc

Unisys ClearPath MCP

This document provides a detailed security review of the MCP operating system.

Livre blanc

Sécurité du cloud : les défenses passées au crible

Le SANS Institute analyse les tendances en matière de sécurité du cloud en s'appuyant sur son enquête 2017 auprès des professionnels informatiques.

Rapport

McAfee Labs Threat Report: December 2017

McAfee Labs unveils statistics measuring recent threats and reporting on security incidents, malware, mobile, ransomware, fileless, web, and network threats.

Présentation graphique

McAfee Labs Threat Report: December 2017 Infographic

See a visual representation of our key findings from the December 2017 report.

Rapport

McAfee Labs — Rapport sur le paysage des menaces, décembre 2017

Le rapport de McAfee Labs témoigne d'une augmentation de diverses menaces entre le 2 et le 3 trimestre : logiciels malveillants (57,5 millions de nouveaux échantillons), logiciels malveillants sur mobiles (+60 %), ransomwares (+36 %), attaques basées sur PowerShell (+119 %), etc.

Présentation graphique

McAfee Labs — Rapport sur le paysage des menaces, décembre 2017

Le rapport de McAfee Labs témoigne d'une augmentation de diverses menaces entre le 2 et le 3 trimestre : logiciels malveillants (57,5 millions de nouveaux échantillons), logiciels malveillants sur mobiles (+60 %), ransomwares (+36 %), attaques basées sur PowerShell (+119 %), etc.

Présentation de solution

SIA Solution Brief: Interset & Atos

McAfee, Interset, and Atos work together to narrow down billions of real-time security events to a handful of actionable leads in order to minimize the attacker advantage.

Critical Capabilities for Security Information and Event Management

If you are looking for a SIEM solution, leverage this research from Gartner to help evaluate use cases, requirements, and vendor offerings.

[Gartner Critical Capabilities for Security Information and Event Management, Toby Bussa, Kelly M. Kavanagh, 6 December 2017. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]


Rapport

Market Guide for Endpoint Detection and Response Solutions

The EDR market is rapidly converging with the endpoint protection platform market; however, both areas will continue to coexist for the next three years. Security and risk management leaders need platform-based solutions that provide all aspects of adaptive security architecture.


Présentation graphique

2018 Threats Predictions

Learn about our threats predictions for 2018.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs