リソース ライブラリ

Contact us

ライブラリの検索

すでにご利用の McAfee 製品を活用するための情報や、ビジネス要件に最適なソリューションを探すことができます。フィルターで検索結果を絞り込む

Filters

Reset FiltersClear
ケーススタディ

McAfee Drives Next-Generation SCADA Security Case Study

TEPCO Power Grid of Japan worked closely with McAfee Professional Services to implement countermeasures in its next-generation SCADA platform and to launch a new security initiative across its own organization.

ケーススタディ

セキュリティを組み込んだ次世代SCADAの開発に向け、マカフィー® プロフェッショナル サービスを活用 - Case Study

東京電力パワーグリッド株式会社が、セキュリティを組み込んだ次世代SCADA の開発に向け、マカフィー® プロフェッショナル サービスを活用。変革の必要性を学び組織や人材を新たに設置。

ソリューション概要

Petroleum Refiner Overhauls Security Infrastructure (HollyFrontier)

A petroleum refiner updated its security infrastructure with integrated McAfee solutions, transforming its ability to defend against cyberthreats and benefitting from simplified management, stronger protection, and faster detection and correction.

ホワイトペーパー

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

ホワイトペーパー

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

レポート

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

レポート

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

ホワイトペーパー

Tackling Insider Threats

Insiders are responsible for almost as many losses, breaches, and thefts of sensitive and confidential data as cybercriminals. This white paper shows you how to combat this problem through a system of data classification, policy development, and incident response, backed by a strong set of data loss prevention tools.

ホワイトペーパー

Tackling Insider Threats

Insiders are responsible for almost as many losses, breaches, and thefts of sensitive and confidential data as cybercriminals. This white paper shows you how to combat this problem through a system of data classification, policy development, and incident response, backed by a strong set of data loss prevention tools.

ホワイトペーパー

TechTarget: A Cloud Security Primer

As diverse as your cloud environment may be, if you are involved in overseeing or deploying cloud services at your organization, there is one inviolable truism you must keep in mind at all times: No matter how simple or complex your cloud deployments, you can never allow the security of your data or applications to be compromised in any way.

ホワイトペーパー

TechTarget: A Cloud Security Primer

As diverse as your cloud environment may be, if you are involved in overseeing or deploying cloud services at your organization, there is one inviolable truism you must keep in mind at all times: No matter how simple or complex your cloud deployments, you can never allow the security of your data or applications to be compromised in any way.

ホワイトペーパー

Three Key Considerations in Securing the Software Defined Data Center (SDDC)

Here are three recommendations for incorporating security into the planning of an SDDC.

ホワイトペーパー

Three Key Considerations in Securing the Software Defined Data Center (SDDC)

Here are three recommendations for incorporating security into the planning of an SDDC.

ホワイトペーパー

User and Entity Behavior Analytics for McAfee Enterprise Security Manager White Paper

This white paper provides an overview of core UEBA capabilities of McAfee Enterprise Security Manager and introduces partners whose products are tightly integrated and fully certified by the Intel Security Innovation Alliance.

ケーススタディ

Desjardins

Canadian investment company, The Desjardins Group, views McAfee Enterprise Support with a McAfee Resident Support Account Manager (RSAM) as an invaluable resource for maintaining a stable, up-to-date infrastructure and strong security posture.

レポート

Executive Summary: 攻撃の阻止に必要なものはスキルかテクノロジか

サイバー犯罪者との戦いに終わりはありません。攻撃を妨害し、被害を回避するには、熟練した技能と高度な分析機能の両方を組み合わせる必要があります。

ソリューション概要

Comprehensive Database Security (Thales) Solution Brief

McAfee and Thales eSecurity provide an integrated solution that establishes comprehensive protection for sensitive database assets, physical or cloud-based. The solution provides multilayer defenses to guard against a wide range of threats.

ケーススタディ

Telefónica México Unifies Endpoint Protection Case Study

Telefónica Mexico relies on McAfee Endpoint Security—a low-impact, high-performance unified endpoint solution—to stay ahead of sophisticated threats like recent ransomware attacks, streamline management, and provide easy scalability.

ソリューション概要

Unified Least Privilege, Endpoint Security, and Threat Intelligence

Through the integration of network security data with multidimensional privileged user and behavioral analysis, McAfee and BeyondTrust collaborate to help increase visibility and improve detection of damaging breaches.

ソリューション概要

SIA Solution Brief: BeyondTrust

Through the integration of network security data with multidimensional privileged user and behavioral analysis, McAfee and BeyondTrust collaborate to help increase visibility and improve detection of damaging breaches.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top