Libreria delle risorse

Contattaci

Lo stato dell’adozione e della sicurezza del cloud

Sicurezza e conformità sono più importanti che mai. Scopri in che modo i professionisti della sicurezza informatica di tutto il mondo pensano di proteggere i propri cloud.

Cerca nella nostra libreria

Scopri come sfruttare al meglio i prodotti McAfee che possiedi già, o trova la soluzione più adatta alle tue attuali esigenze business. Usa i filtri qui sotto per restringere la ricerca.

Filters

Reset FiltersClear
Brochure

Brochure: McAfee Product Security Practices

Learn about McAfee's agile security development lifecycle (SDL).

Documentazione

SIA Solution Brief: Interset

User and entity behavior analytics from Interset consumes the contextual data and rich security events collected in real time by McAfee Enterprise Security Manager.

Documentazione

Gaining Advanced Analytic Insights into Your Network Solution Brief

Leveraging the power of SAS Cybersecurity with the integrative capabilities of DXL from McAfee, organizations gain a new security perspective on the devices connecting to their networks and stay one step ahead of emerging threats.

Scheda tecnica

McAfee Advanced Threat Defense Appliance Specifications

This spec sheet provides technical specifications for two McAfee Advanced Threat Defense appliances: ATD-3100 and ATD-6100.

Scheda tecnica

McAfee Data Loss Prevention (DLP) 6600 Specifications Sheet

This data sheet contains detailed specifications for McAfee Data Loss Prevention (DLP) 6600.

White paper

Protecting the Private Cloud with Integrated and Automated Security

Enterprises have evolved their data centers to include private clouds, and are now challenged to secure these environments. Breaches in these highly virtualized environments are difficult to detect and can go unnoticed far too long. Advanced analysis capabilities are needed to effectively improve detection of sophisticated advanced attacks within a private cloud. This technical whitepaper explains how.

White paper

Questions to Ask Your Cloud Service Provider

These suggested questions should help in your process of identifying, evaluating, selecting, and working with CSPs.

Documentazione

Don't be Blinded by Encryption: Enable Compliance & Productivity (SSH)

CryptoAuditor from SSH Communications Security, when coupled with McAfee Web Gateway, stops both accidental and malicious data loss over encrypted channels in real time.

Documentazione

Securing the Software-Defined Data Center Solution Brief

McAfee Virtual Network Security Platform provides a unique combination of deep visibility into software-defined data center traffic flows with automated security management.

Scheda tecnica

Migration Table for IBM XGS and GX to McAfee NSP Data Sheet

IBM is leaving the network intrusion prevention arena effective December 31, 2017. This table will guide IBM XGS and IBM GX customers to an improved solution leveraging McAfee Network Security Platform technology.

Report

Beyond the General Data Protection Regulation (GDPR): Data residency insights from around the world

As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new GDPR enforcement? Here are the concerns and strategies of 800+ senior executives from industries around the world.

Report

Beyond the General Data Protection Regulation Executive Summary

McAfee surveyed 800 senior business professionals across eight countries from a range of industry sectors to better understand the factors driving data decision-making and how organizations currently approach data management, protection and residency.

Infografica

Automation and Orchestration Solution to SOC Overload

Market studies say automate first, then orchestrate. In lab tests, IDC validated that 50-100% of actions taken during integrated threat defense solution scenarios were fully automated.

Report

Report sulle minacce McAfee Labs: Settembre 2017

McAfee Labs researchers examine the WannaCry and Petya malware attacks, offer advice to threat hunters searching for indicators of compromise, and dig into script-based malware.

Infografica

Threat Report September 2017 Key Findings

See a visual representation of our researchers’ key findings from the September 2017 report.

Documentazione

Protecting Against Script-Based Malware

Read our recommended policies and procedures and how our products can protect against script-based code in malware attacks.

Documentazione

Protecting Against WannaCry and Petya

Read our recommended policies and procedures and how McAfee products can protect systems and networks from WannaCry and Petya.

Infografica
White paper

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security

Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. Machine learning expands the scope of security analytics from diagnostic and descriptive to prescriptive and proactive, which leads to faster and more accurate detection and improved capabilities to act on threat intelligence today and in the future.

Report

Building Trust in a Cloudy Sky - Healthcare Executive Summary

In August 2016, Intel Security surveyed over 2,000 professionals for its annual Cloud Security research study. The 2,009 respondents were drawn from third-party database to represent a diverse set of countries, industries, and organization sizes. After screening out those who were not using cloud services or not directly involved in decision making for cloud security initiatives, 1,400 senior technical professionals completed the study. This executive summary of the full cloud security report provides a brief overview of key findings, conclusions and recommendations.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top