リソース ライブラリ

Filters

Reset FiltersClear
ホワイトペーパー

SDDC Executive Summary

A software-defined data center (SDDC) delivers cloud-ready infrastructure and improves the security of your data center. Osterman Research, together with McAfee and VMware, provides an overview of what an SDDC is, why it’s inevitable, and how it works.

ホワイトペーパー

The Why, the What and the How of the SDDC

A software-defined data center (SDDC) delivers cloud-ready infrastructure and improves the security of your data center. Osterman Research, together with McAfee and VMware, provides an overview of what an SDDC is, why it’s inevitable, and how it works.

ケーススタディ

Thwarting Ransomware and Easing Security Administration by Migrating to McAfee Endpoint Security (Norrköpings Kommun) Case Study

The small IT team for this Swedish town of 90,000 has reduced its security administration burden with more robust protection and more streamlined management, thanks to McAfee Endpoint Security and McAfee ePolicy Orchestrator® (McAfee ePO) software.

レポート

Market Quadrant: McAfee Advanced Threat Defense is Top Player

This edition of Radicati Market Quadrants reviews products that offer protection from advanced persistent threats.

ソリューション概要

Securing the Software-Defined Data Center Solution Brief

McAfee Virtual Network Security Platform provides a unique combination of deep visibility into software-defined data center traffic flows with automated security management.

レポート

Gartner Market Guide for User and Entity Behavior Analytics

Security and risk management leaders should leverage user and entity behavior analytics to improve their organization's threat detection capabilities across a variety of use cases.

レポート

Gartner’s Market Guide for Cloud Workload Protection Platforms

Like most global enterprises, your modern hybrid data center uses private and public cloud computing to deliver applications and workloads. This new infrastructure requires a protection strategy different from traditional server security. Elastic, cloud-native applications have unique security needs. Legacy on-premises security agents are not designed to perform at cloud scale and may have licensing models that are incompatible with elastic cloud workloads. Gartner provides their key findings and recommendations to security and risk management leaders for cloud workload protection platforms, including the use of risk-based models to prioritize evaluation criteria.

Mastering Modern Endpoint Protection Guide

This guide walks through six step to better endpoint protection drawing on research cited in the to the 2017 Forrester report, Mastering the Endpoint.

データシート

McAfee Advanced Threat Defense Appliance Specifications

This spec sheet provides technical specifications for two McAfee Advanced Threat Defense appliances: ATD-3100 and ATD-6100.

データシート

McAfee Complete Endpoint Protection — Business

上に表示されているマカフィー製品の技術概要は製品データシートをご参照ください

データシート

McAfee Enterprise Security Manager データシート

McAfee Enterprise Security Manager SIEM を使用すると、脅威データとレピュテーション情報をリアルタイムで分析し、企業内のシステム、データ、リスク、アクティビティの状態を把握できます。

McAfee Endpoint Security 10.5 Upgrade

Our McAfee® Endpoint Security 10.5 Upgrade course provides an in-depth introduction to the tasks crucial to set up and administer McAfee Endpoint Security. McAfee Endpoint Security combines threat prevention, firewall, and web control to take immediate action against potentially dangerous applications, downloads, websites, and files. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the McAfee Endpoint Security user interface, as well as detailed instructions for the integration of this solution.

McAfee Endpoint Security 10.5 Upgrade

Our McAfee Endpoint Security 10.5 Upgrade course provides an in-depth introduction to the tasks crucial to set up and administer McAfee Endpoint Security. McAfee Endpoint Security combines threat prevention, firewall, and web control to take immediate action against potentially dangerous applications, downloads, websites, and files.

レポート

Why Offense Beats Defense: Misaligned Incentives—a focus on the financial services sector Executive Summary

To better understand this misalignment of incentives, we surveyed 200 IT professionals from the financial services industry, and compared their responses to 600 IT professionals from other global industries.

データシート

McAfee Advanced Threat Defense: Configurable operating system and application support

McAfee Advanced Threat Defense supports a broad range of operating systems and applications, making it ideal for generating relevant indicators of compromise that can be used to support investigation and threat hunting throughout the organization.

FAQ
データシート

Active Response Administration

Learn essential introductory aspects of the McAfee Active Response appliance to get your solution value in no time. This course offers an in-depth look into deployment, configuration, operation, and policy management.

レポート

すべてのマルウェアに効く特効薬はない - 概要

マルウェアの脅威は進化を続けています。すべてのマルウェアに効く特効薬はありません。独立した複数のソリューションを継ぎ接ぎで使用すると、より多くの時間とリソースが必要になり、作業も複雑になります。セキュリティ チームにはさらなる負担がかかります。よりスマートな対策が必要です。

レポート

Security Operations in Public Cloud Services: Going with Your Strengths

Aberdeen Group discusses the move to the public cloud and the security shared responsibility model that leverages the strengths of both the public cloud service providers (architecture and infrastructure at scale) and enterprises (applications and data) to provide the enterprise with stronger capabilities than could be achieved going at it alone.

ホワイトペーパー

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top