Bibliothèque de ressources


Le point sur l'adoption et la sécurité du cloud

La sécurité et la conformité sont deux considérations primordiales pour une entreprise. Découvrez comment les responsables de la sécurité informatique du monde entier sécurisent leurs clouds.

Rechercher dans notre bibliothèque

Apprenez à tirer le meilleur parti des produits McAfee que vous possédez déjà ou découvrez les solutions susceptibles de répondre aux besoins actuels de votre entreprise. Utilisez les filtres ci-dessous pour affiner votre recherche.


Reset FiltersClear
Fiche technique

NSS Labs DCIPS Test Report McAfee Network Security Platform NS9100

NSS Labs performed an independent test of the McAfee Network Security Platform NS9100 Appliance v9.1.5.3.

Étude de cas

Major U.S. State Government

This large state government trusts McAfee for IT consolidation under a single, centralized security management solution.

Présentation de solution

Address GDPR Compliance with Pervasive Data Protection

In response to GDPR, McAfee data protection solutions are uniquely positioned to help your organization in two critical areas: discovery and classification of personal data and protection of this vital information wherever it resides. This brief outlines how we can help create positive outcomes for the benefit and growth of your business.

Présentation de solution

Enhance Threat Detection and Response with Increased Accuracy and Speed

Integration of the IBM Resilient IRP with DXL, McAfee Threat Intelligence Exchange, and McAfee ePO software enables IR teams to optimize threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.

Présentation graphique

Five Reasons to Migrate to McAfee ENS

Infographic to describe the top five reasons to upgrade to McAfee Endpoint Security.


McAfee Labs Threats Report March 2018

The McAfee Labs Threat Report: March 2018 highlights news and statistics gathered by the McAfee® Advanced Threat Research and McAfee Labs teams in Q4 of 2017. This quarter focuses on PowerShell malware, cryptocurrency mining, and increasing attacks targeting the health care sector.

Fiche technique

NIST 800-171 Product Mapping

This guide maps McAfee products to NIST 800-171 standards for Controlled Unclassified Information (CUI).

Fiche technique

NIST 800-53 Compliance Controls

This guide will aid McAfee, its partners, and its customers, in aligning to the NIST 800-53 controls with McAfee capabilities. The control families are mapped to corresponding products.

Fiche technique

NIST Cybersecurity Framework Mapping

This data sheet maps out both McAfee and integrated partner solutions for the NIST Cybersecurity Framework.

Questions fréquentes (FAQ)

Upgrading to McAfee Endpoint Security? It's easier than you think.

Upgrading to McAfee Endpoint Security? It's easier than you think.

Présentation de solution

Securing Your Microsoft Azure Virtual Networks

Many organizations do not realize that the virtual networks that are part of Azure workloads need to be protected. McAfee understands the complexity of the public cloud and has designed a security architecture specifically for Azure.

Livre blanc

Driving Toward a Better Understanding of Machine Learning White Paper

This white paper draws an analogy between machine learning and analysis of the behaviors and characteristics of autonomous cars in various scenarios.

Questions fréquentes (FAQ)

McAfee Endpoint Security FAQ

McAfee Endpoint Security provides a framework that allows multiple endpoint defense technologies to communicate in real time to analyze and collaborate against new and advanced threats. This doc has answers to frequently asked questions.

Questions fréquentes (FAQ)

Data Exchange Layer (DXL) FAQ

This in-depth FAQ explains how DXL and OpenDXL serve as bidirectional communications fabrics that unite data and actions across multiple applications from different vendors, both McAfee and non-McAfee, as well as from internally developed applications.

Étude de cas

Public University Automates Security to Mitigate Risk

With a layered defense consisting of McAfee Endpoint Security, McAfee SIEM solutions, McAfee ePO, and other products, all based on a McAfee integrated security architecture backbone, Florida International University is shrinking the gap to containment and mitigating risk without adding staff.


Mobile Threat Report

The 2018 Mobile Threat Report examines the continuing evolution and expansion of the mobile threat landscape, including Internet of Things attacks, mobile ransomware into mobile and connected devices, and dead mobile apps.

Livre blanc

Lumeta and McAfee

Eliminating 100% of Your Blind Spots to Secure the Entire Network and Optimize Security Operations Across the Entire Threat Defense Lifecycle.

Étude de cas

Faster Time to Protection and Time Savings at Multinational Bank

This large, multinational bank improved its overall security posture, including accelerating time from detection to protection, thanks to McAfee Endpoint Security other complementary McAfee solutions that are part of their integrated security platform.

Étude de cas

Federal Court System in Chile Benefits from Automation and Stronger Protection

The Poder Judicial (Judicial Authority) for the nation of Chile upgraded its existing McAfee solutions—including the management console and endpoint security—to ensure stronger and faster detection and prevention of ransomware attacks, to do more with fewer resources, and to gain visibility to threats and endpoint security posture.

Présentation de solution

Enterprise-Class Data Loss Prevention for Mobile Devices

Integration of McAfee DLP Prevent with MobileIron Core and MobileIron Sentry results a solution that extends robust content classification and data loss prevention to mobile devices for security beyond the network boundary.

View McAfee Forums

Access our support community powered by McAfee users.


Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.