リソース ライブラリ

Contact us

ライブラリの検索

すでにご利用の McAfee 製品を活用するための情報や、ビジネス要件に最適なソリューションを探すことができます。フィルターで検索結果を絞り込む

Filters

Reset FiltersClear
ホワイトペーパー

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security

Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. Machine learning expands the scope of security analytics from diagnostic and descriptive to prescriptive and proactive, which leads to faster and more accurate detection and improved capabilities to act on threat intelligence today and in the future.

ホワイトペーパー

McAfee Behavioral Analytics Data Source and Use Case Coverage

Learn more about the built-in use cases that can alert you to high-risk behaviors in your environment.

ソリューション概要

The Threat Inside Can’t Hide

McAfee Behavioral Analytics helps transform data and security events into a handful of prioritized leads on which security teams can focus their efforts. Using machine learning and advanced mathematical models, it dynamically learns what is normal and what is not.

レポート

Securosis Report: Security Analytics Team of Rivals

As new security analytics technologies appear, learn how these technologies can work together for you.

ホワイトペーパー

ホワイトペーパー: クラウド セキュリティの基本

クラウド上のサーバーを保護する基本戦略を説明します。

データシート

McAfee Advanced Threat Defense

上に表示されているマカフィー製品の技術概要は製品データシートをご参照ください

レポート

Market Quadrant: McAfee Advanced Threat Defense is Top Player

This edition of Radicati Market Quadrants reviews products that offer protection from advanced persistent threats.

レポート

クラウド環境の信頼性の向上

2016 年 9 月、Intel Security は 2,000 人以上の専門家を対象にクラウド セキュリティに関連する調査を実施しました。国、業界、組織の規模に偏りがでないように、サードパーティのデータベースから調査対象を 2,009 人抽出しました。この中からクラウド サービスを利用していない担当者、クラウド セキュリティに関する意思決定に直接関係のない担当者を除き、1,400 人の上級管理者で調査を行いました。その結果、クラウドの利用とセキュリティについて詳しい状況が明らかになりました。

ソリューション概要

Advanced Threat Defense for Web Gateway

Social networks, cloud applications, and content-sharing sites have become essential business tools and IT organizations are struggling to make them safely accessible from inside and outside the corporate environment. Read this Solution Brief and see how McAfee Threat Defense for McAfee Web Gateway helps overcome the obstacles.

ホワイトペーパー

Sustainable Security Operations

Adopt an optimized approach to security infrastructure that encourages collaboration and visibility across the enterprise.

レポート

How Collaboration Can Optimize Security Operations

The new secret weapon against advanced threats

ソリューション概要

脅威情報を効果的に 利用する方法

Behind just about every legitimate alert your IT security receives is an adversary using multiple attack techniques to penetrate your infrastructure and compromise your vital data assets or systems. Today’s targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.

ホワイトペーパー

Security that Plays Well with Others

Organizations need a way to orchestrate security components so that they to work together and present a unified coordinated defense. McAfee’s open, integrated architecture can help legacy point products play well together, optimize the effectiveness of your entire security infrastructure, and simplify, unify, and advance the threat defense lifecycle.

ソリューション概要

McAfee Advanced Threat Defense: Services solutions for Managed Service Providers (MSP)

IT organizations are focused on shifting budgets from capital expenditures (CAPEX) to operational expenditures (OPEX) in an environment where in-house investments can easily get outpaced by an increasingly sophisticated cybercrime ecosystem. McAfee Advanced Threat Defense can help you to differentiate your services and protect customers against zero-day attacks by offering the industry’s most comprehensive threat protection.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs