Libreria delle risorse

Contattaci

Lo stato dell’adozione e della sicurezza del cloud

Sicurezza e conformità sono più importanti che mai. Scopri in che modo i professionisti della sicurezza informatica di tutto il mondo pensano di proteggere i propri cloud.

Cerca nella nostra libreria

Scopri come sfruttare al meglio i prodotti McAfee che possiedi già, o trova la soluzione più adatta alle tue attuali esigenze business. Usa i filtri qui sotto per restringere la ricerca.

Filters

Reset FiltersClear
White paper

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

White paper

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

Report

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

Report

"Unifying Data Protection with McAfee "

This ESG report examines how McAfee data protection solutions help discover and protect data on premises and in cloud applications and services.

White paper

When Visibility Is Not Enough

Visibility is essential to any data security framework, but organizations also must focus on stopping critical data from leaving the enterprise.

White paper

Safeguarding Vital Data Is a Battle You Can Win

Safeguarding vital data has emerged as one of the most significant threats to effective corporate process. This white paper discusses the many options for planning and executing responses to this widespread threat.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs