Libreria delle risorse

Contattaci

Lo stato dell’adozione e della sicurezza del cloud

Sicurezza e conformità sono più importanti che mai. Scopri in che modo i professionisti della sicurezza informatica di tutto il mondo pensano di proteggere i propri cloud.

Cerca nella nostra libreria

Scopri come sfruttare al meglio i prodotti McAfee che possiedi già, o trova la soluzione più adatta alle tue attuali esigenze business. Usa i filtri qui sotto per restringere la ricerca.

Filters

Reset FiltersClear
Caso di studio

U.S. Insurance Company

Intelligent, collaborative endpoint security improves detection and protection for this insurance company and reduces user impact.

Caso di studio

INAIL

INAIL secures data and services, with the integrated security approach from McAfee.

Caso di studio

Vidant Health

Vidant Health shifted from security alert overload to automated detection and correction.

White paper

SIEM Orchestration

How McAfee Enterprise Security Manager drives action, automates remediation, and optimizes incident response

Caso di studio

University Fortifies Protection with Integrated Threat Defense Case Study

With tightly integrated McAfee defenses, Utrecht University in the Netherlands enhanced zero-day threat protection, shrank time from encounter to containment, and simplified security operations.

Documentazione

Achieve Advanced Security for your Microsoft Windows 10 Platforms with McAfee Endpoint Security — Solution Brief

McAfee Endpoint Protection software will keep your security aligned and your business fully protected during Windows 10 updates as a result of Microsoft’s newly established operating system release schedule.

Caso di studio

Canadian Retailer Embraces an Integrated Defense (LCBO) Case Study

The Liquor Board of Ontario embraces an adaptable threat defense infrastructure from McAfee, allowing it to efficiently and effectively manage security, including finding and responding to cyberthreats in minutes across its extended enterprise.

Caso di studio

Service public de Wallonie

With an integrated security framework, the government of Wallonia, Belgium has dramatically increased its ability to protect against cyberthreats today as well as in the future.

Caso di studio

MAUSER Group

Global manufacturer MAUSER realizes its dream of interconnected, adaptive security.

Scheda tecnica

McAfee Threat Intelligence Exchange

Per un riassunto tecnico sui prodotti McAfee elencati qui sopra, vedere la scheda tecnica del prodotto.

Documentazione

La messa in opera delle informazioni sulle minacce

Behind just about every legitimate alert your IT security receives is an adversary using multiple attack techniques to penetrate your infrastructure and compromise your vital data assets or systems. Today’s targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.

White paper

Security that Plays Well with Others

Organizations need a way to orchestrate security components so that they to work together and present a unified coordinated defense. McAfee’s open, integrated architecture can help legacy point products play well together, optimize the effectiveness of your entire security infrastructure, and simplify, unify, and advance the threat defense lifecycle.

Documentazione

McAfee Threat Intelligence Exchange and Endpoint Protection

McAfee Threat Intelligence Exchange delivers innovative endpoint protection with a system that adapts and learns from threat encounters, and immediately neutralizes emerging attacks.

Documentazione

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange

Deliver context-aware, prioritized threat intelligence across your enterprise.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs