Libreria delle risorse

Contattaci

Lo stato dell’adozione e della sicurezza del cloud

Sicurezza e conformità sono più importanti che mai. Scopri in che modo i professionisti della sicurezza informatica di tutto il mondo pensano di proteggere i propri cloud.

Cerca nella nostra libreria

Scopri come sfruttare al meglio i prodotti McAfee che possiedi già, o trova la soluzione più adatta alle tue attuali esigenze business. Usa i filtri qui sotto per restringere la ricerca.

Filters

Reset FiltersClear
Scheda tecnica

McAfee SIEM Supported Device List

McAfee Enterprise Security Manager can integrate with a wide range of third-party security tools to provide a powerful security information and event management (SIEM) platform. This data sheet provides details about McAfee ESM third-party support.

Scheda tecnica

SIEM Solutions Overview

Continuously monitor, identify, investigate, and resolve threats.

Report

Securosis Report: Security Analytics Team of Rivals

As new security analytics technologies appear, learn how these technologies can work together for you.

White paper

SIEM Orchestration

How McAfee Enterprise Security Manager drives action, automates remediation, and optimizes incident response

White paper

User and Entity Behavior Analytics for McAfee Enterprise Security Manager

This white paper provides an overview of core UEBA capabilities of McAfee Enterprise Security Manager and introduces partners whose products are tightly integrated and fully certified by the McAfee Innovation Alliance.

Scheda tecnica

McAfee Enterprise Security Manager

Per un riassunto tecnico sui prodotti McAfee elencati qui sopra, vedere la scheda tecnica del prodotto.

White paper

Sustainable Security Operations

Adopt an optimized approach to security infrastructure that encourages collaboration and visibility across the enterprise.

Documentazione

Advanced Threat Defense for SIEM

When advanced detection solutions, known as sandboxes, collaborate with SIEM solutions, enterprises can better understand and respond to unknown, advanced attacks. McAfee Advanced Threat Defense and McAfee Enterprise Security Manager work in concert to extract relevant data from advanced malware and dramatically reduce time to response by minimizing uncertainty and accelerating remediation.

Documentazione

Security Information and Event Management and Integrated Endpoint Security

Responding to incidents as fast as possible is crucial to disrupting the attack and preventing extensive damage. Learn how to automate attack response and analysis to shorten incident response time.

White paper

Security that Plays Well with Others

Organizations need a way to orchestrate security components so that they to work together and present a unified coordinated defense. McAfee’s open, integrated architecture can help legacy point products play well together, optimize the effectiveness of your entire security infrastructure, and simplify, unify, and advance the threat defense lifecycle.

Documentazione

McAfee Enterprise Security Manager, Services Solutions for Managed Service Providers (MSPs)

McAfee Enterprise Security Manager offers the advanced scalability, flexibility, and control you need to protect your customers’ business, and grow yours.

White paper

Achieving Security through Compliance

This paper will illustrate how a well-structured security governance program with fully developed and implemented policies, plans, and procedures will strengthen an organization’s security posture.

Documentazione

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange

Deliver context-aware, prioritized threat intelligence across your enterprise.

Documentazione

Compliance Made Easy with SIEM

The McAfee SIEM solution, Enterprise Security Manager, addresses today’s complex compliance challenges by combining an established unified compliance framework with superior abilities to collect, retrieve, and protect the data required to assess and demonstrate compliance in real time. It’s tightly integrated log collection, management, analysis, and reporting improves an organization’s ability to meet compliance requirements through frameworks, streamlined workflow, and automation.

White paper

Creating and Maintaining a SOC

Organizations are investing in the development of security operations centers (SOCs) to provide increased security and rapid response to events throughout their networks. But building a SOC can be a monumental task. This paper explains how strong people and well-defined processes can result in an operationally effective SOC.

Scheda tecnica

McAfee Application Data Monitor

Per un riassunto tecnico sui prodotti McAfee elencati qui sopra, vedere la scheda tecnica del prodotto.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs