Bibliothèque de ressources

Contacter

Le point sur l'adoption et la sécurité du cloud

La sécurité et la conformité sont deux considérations primordiales pour une entreprise. Découvrez comment les responsables de la sécurité informatique du monde entier sécurisent leurs clouds.

Rechercher dans notre bibliothèque

Apprenez à tirer le meilleur parti des produits McAfee que vous possédez déjà ou découvrez les solutions susceptibles de répondre aux besoins actuels de votre entreprise. Utilisez les filtres ci-dessous pour affiner votre recherche.

Filters

Reset FiltersClear
Rapports

The Show Must Go On! 2017 SANS Incident Response Survey

Incident response is seeing a pivotal industry shift, as continuous consumption of threat intelligence and automated endpoint detection and remediation take hold.

Etudes de cas

Gothenburg

Learn how the Swedish city of Gothenburg saves 40 hours per week after deploying a lightweight, yet powerful, security client solution—McAfee Endpoint Security.

Présentations de solution

McAfee Certification Program FAQ

Learn about certification paths, training prerequisites, exam registration, and more.

Présentations de solution

Achieve Advanced Security for your Microsoft Windows 10 Platforms with McAfee Endpoint Security — Solution Brief

McAfee Endpoint Protection software will keep your security aligned and your business fully protected during Windows 10 updates as a result of Microsoft’s newly established operating system release schedule.

Rapports

L'apprentissage automatique pour renforcer l'efficacité des équipes de sécurité

While machine learning can detect patterns hidden in the data at rapid speeds, the less obvious value of machine learning is providing enough automation to allow humans the time and focus to initiate creative responses when responses are less obvious.

Livres blancs

How to Get the Most Value from Your Midmarket Security Spend

Midmarket companies face many of the same security issues as large enterprises—from greyware and ransomware to the specter of crippling data loss and exposure to low-and-slow attacks.

Présentations de solution

Detect and Stop Advanced Email Threats (Cisco) Solution Brief

Cisco Email Security Appliance forwards email attachments to McAfee Advanced Threat Defense to for analysis and identification of potential zero-day threats, enabling the Cisco solution to remediate based on policy.

Fiches techniques

McAfee Advanced Threat Defense: Configurable operating system and application support

McAfee Advanced Threat Defense supports a broad range of operating systems and applications, making it ideal for generating relevant indicators of compromise that can be used to support investigation and threat hunting throughout the organization.

Rapports

Closing the Cybersecurity Gaps in Financial Services

In a survey conducted by Ovum, financial institutions, including retail and investment banks across North America, Europe, and Asia Pacific share their concerns around the cloud, web, and the ability to detect threats faster.

Présentations de solution

Top 10: Connect to the Cloud for Security

Changing work habits mean that security needs to be everywhere. Find out how it can work for you, automating manual steps that bogged your team down before. This list of top 10 security challenges can be improved by connecting your endpoints to the cloud.

Présentations de solution

SIA Solution Brief: Demisto

The integration of Demisto Enterprise Platform, McAfee Enterprise Security Manager, and McAfee ePolicy Orchestrator results in an enterprise-grade solution to manage and automate incident investigation and remediation tasks.

Présentations de solution

SIA Solution Brief: Lumeta

McAfee ePolicy Orchestrator software and Lumeta Spectre together provide IT with the real-time visibility required to identify, manage, and respond to endpoint security issues and threats across dynamic cloud, virtual, mobile, and physical networks.

Rapports

McAfee Labs – Rapport sur le paysage des menaces – Juin 2017

Les chercheurs de McAfee Labs s'intéressent ce trimestre à l'évolution des techniques de contournement utilisées par les logiciels malveillants, à l'emploi de la stéganographie numérique par les cyberpirates et à Fareit, le plus célèbre logiciel voleur de mots de passe.

Infographics

McAfee Labs – Rapport sur le paysage des menaces – Juin 2017 - Infographic

Les chercheurs de McAfee Labs s'intéressent ce trimestre à l'évolution des techniques de contournement utilisées par les logiciels malveillants, à l'emploi de la stéganographie numérique par les cyberpirates et à Fareit, le plus célèbre logiciel voleur de mots de passe.

Présentations de solution

Protection contre les logiciels malveillants furtifs

Stratégies et procédures recommandées, et comment les solutions McAfee peuvent vous protéger contre les menaces furtives actuelles.

Présentations de solution

SIA Solution Brief: MobileIron

McAfee and MobileIron deliver an integrated solution that extends web protection to mobile devices, to ensure that users are complying with corporate internet policies, even when they’re using smartphones and tablets.

Présentations de solution

SIA Solution Brief: Rapid7

Rapid7 Nexpose integrates vulnerability management data and risk context into the McAfee ePO console and McAfee Data Exchange Layer.

Présentations de solution

Protection contre les menaces stéganographiques - Présentation de solution

En matière d'attaques stéganographiques, découvrez les stratégies et procédures recommandées, et la protection spécifique qu'offrent les solutions McAfee.

Etudes de cas

Accarda

Migration to McAfee Endpoint Security lets small security staff provide more robust protection, more easily.

Etudes de cas

California Department of Water Resources

State Agency bolsters Endpoint Protection, accelerates response time, and mitigates risk with McAfee Endpoint Security.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top