View All Publications

Filter Content:

Petroleum Refiner Overhauls Security Infrastructure (HollyFrontier)

A petroleum refiner updated its security infrastructure with integrated McAfee solutions, transforming its ability to defend against cyberthreats and benefitting from simplified management, stronger protection, and faster detection and correction.

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

Busting the Myth of the Malware “Silver Bullet”

Unlike security strategies based on isolated point products, our dynamic endpoint threat defense solution combines multiple layers of protection to make threat management simpler, faster, and more effective.

Busting the Myth of the Malware “Silver Bullet”

Unlike security strategies based on isolated point products, our dynamic endpoint threat defense solution combines multiple layers of protection to make threat management simpler, faster, and more effective.

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

Tackling Insider Threats

Insiders are responsible for almost as many losses, breaches, and thefts of sensitive and confidential data as cybercriminals. This white paper shows you how to combat this problem through a system of data classification, policy development, and incident response, backed by a strong set of data loss prevention tools.