Libreria delle risorse

Contattaci

Lo stato dell’adozione e della sicurezza del cloud

Sicurezza e conformità sono più importanti che mai. Scopri in che modo i professionisti della sicurezza informatica di tutto il mondo pensano di proteggere i propri cloud.

Cerca nella nostra libreria

Scopri come sfruttare al meglio i prodotti McAfee che possiedi già, o trova la soluzione più adatta alle tue attuali esigenze business. Usa i filtri qui sotto per restringere la ricerca.

Filters

Reset FiltersClear
Caso di studio

Regional Commercial Bank

After attempting to rely on unintegrated point solutions, a CISO at Regional Commercial Bank found a more efficient way to tackle the ever-morphing advanced threat landscape through McAfee solutions.

Scheda tecnica

McAfee Advanced Threat Defense: Configurable operating system and application support

McAfee Advanced Threat Defense supports a broad range of operating systems and applications, making it ideal for generating relevant indicators of compromise that can be used to support investigation and threat hunting throughout the organization.

Caso di studio

U.S. Insurance Company

Intelligent, collaborative endpoint security improves detection and protection for this insurance company and reduces user impact.

Caso di studio

INAIL

INAIL secures data and services, with the integrated security approach from McAfee.

Caso di studio

Vidant Health

Vidant Health shifted from security alert overload to automated detection and correction.

Documentazione

SIA Solution Brief: Trapx

DeceptionGrid from TrapX Security rapidly detects sophisticated attacks and passes captured malware to McAfee Advanced Threat Defense for analysis and response.

Scheda tecnica

McAfee Advanced Threat Defense Appliance Specifications

This spec sheet provides technical specifications for two McAfee Advanced Threat Defense appliances: ATD-3100 and ATD-6100.

White paper

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security

Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. Machine learning expands the scope of security analytics from diagnostic and descriptive to prescriptive and proactive, which leads to faster and more accurate detection and improved capabilities to act on threat intelligence today and in the future.

Caso di studio

University Fortifies Protection with Integrated Threat Defense Case Study

With tightly integrated McAfee defenses, Utrecht University in the Netherlands enhanced zero-day threat protection, shrank time from encounter to containment, and simplified security operations.

Caso di studio

Canadian Retailer Embraces an Integrated Defense (LCBO) Case Study

The Liquor Board of Ontario embraces an adaptable threat defense infrastructure from McAfee, allowing it to efficiently and effectively manage security, including finding and responding to cyberthreats in minutes across its extended enterprise.

Scheda tecnica

McAfee Advanced Threat Defense

Per un riassunto tecnico sui prodotti McAfee elencati qui sopra, vedere la scheda tecnica del prodotto.

Documentazione

Detect and Stop Advanced Email Threats (Cisco) Solution Brief

Cisco Email Security Appliance forwards email attachments to McAfee Advanced Threat Defense to for analysis and identification of potential zero-day threats, enabling the Cisco solution to remediate based on policy.

Caso di studio

California Department of Water Resources

State Agency bolsters Endpoint Protection, accelerates response time, and mitigates risk with McAfee Endpoint Security.

Caso di studio

Service public de Wallonie

With an integrated security framework, the government of Wallonia, Belgium has dramatically increased its ability to protect against cyberthreats today as well as in the future.

Documentazione

Advanced Threat Defense for Web Gateway

Social networks, cloud applications, and content-sharing sites have become essential business tools and IT organizations are struggling to make them safely accessible from inside and outside the corporate environment. Read this Solution Brief and see how McAfee Threat Defense for McAfee Web Gateway helps overcome the obstacles.

White paper

Sustainable Security Operations

Adopt an optimized approach to security infrastructure that encourages collaboration and visibility across the enterprise.

Caso di studio

MAUSER Group

Global manufacturer MAUSER realizes its dream of interconnected, adaptive security.

Report

How Collaboration Can Optimize Security Operations

The new secret weapon against advanced threats

Documentazione

La messa in opera delle informazioni sulle minacce

Behind just about every legitimate alert your IT security receives is an adversary using multiple attack techniques to penetrate your infrastructure and compromise your vital data assets or systems. Today’s targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.

White paper

Security that Plays Well with Others

Organizations need a way to orchestrate security components so that they to work together and present a unified coordinated defense. McAfee’s open, integrated architecture can help legacy point products play well together, optimize the effectiveness of your entire security infrastructure, and simplify, unify, and advance the threat defense lifecycle.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs