Libreria delle risorse

Contattaci

Lo stato dell’adozione e della sicurezza del cloud

Sicurezza e conformità sono più importanti che mai. Scopri in che modo i professionisti della sicurezza informatica di tutto il mondo pensano di proteggere i propri cloud.

Cerca nella nostra libreria

Scopri come sfruttare al meglio i prodotti McAfee che possiedi già, o trova la soluzione più adatta alle tue attuali esigenze business. Usa i filtri qui sotto per restringere la ricerca.

Filters

Reset FiltersClear
Caso di studio

Umivale

We provide robust data loss prevention for Spain’s leading occupational non-profit health organization.

Documentazione

Keep Your Data Safe for Office 365

McAfee DLP offers expansive, yet flexible, polices and templates that can help address risky employee behavior by protecting sensitive data from day-today user actions.

Scheda tecnica

McAfee DLP Prevent

Per un riassunto tecnico sui prodotti McAfee elencati qui sopra, vedere la scheda tecnica del prodotto.

Documentazione

McAfee Data Loss Prevention for Healthcare

Learn how McAfee data protection solutions simplify data security and compliance, deliver flexible control, and help build the trust of your partners.

Documentazione

McAfee Data Protection for Energy

Whether your business is energy exploration, generation, or distribution, learn how to upgrade your data controls to advanced, flexible solutions from McAfee.

Documentazione

McAfee Data Protection for Retail

Whether you start with full disk encryption or choose Data Loss Prevention (DLP), learn how McAfee can help make sure sensitive data stays where it belongs.

Documentazione

McAfee Data Protection for the Biotech and Pharmaceutical Industry

Learn how both global pharmaceutical titans and boutique biotech teams turn to McAfee for protection of highly valued, highly regulated data.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs