리소스 라이브러리

연락처

클라우드 채택 및 보안 상태

보안과 컴플라이언스가 그 어느 때보다 중요해짐에 따라 전 세계의 IT 보안 전문가들이 클라우드 보안을 어떻게 계획하고 있는지를 알아보십시오.

라이브러리 검색

이미 보유하고 있는 McAfee 제품을 최대한 효율적으로 활용할 수 있는 방법을 알아보거나 현재 비즈니스 요구 사항에 적합한 솔루션을 검색해 보십시오. 아래의 필터를 사용해 검색 결과의 범위를 좁혀보십시오.

Filters

Reset FiltersClear
사례 연구

McAfee Drives Next-Generation SCADA Security Case Study

TEPCO Power Grid of Japan worked closely with McAfee Professional Services to implement countermeasures in its next-generation SCADA platform and to launch a new security initiative across its own organization.

솔루션 개요

Petroleum Refiner Overhauls Security Infrastructure (HollyFrontier)

A petroleum refiner updated its security infrastructure with integrated McAfee solutions, transforming its ability to defend against cyberthreats and benefitting from simplified management, stronger protection, and faster detection and correction.

백서

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

백서

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

백서

Busting the Myth of the Malware “Silver Bullet”

Unlike security strategies based on isolated point products, our dynamic endpoint threat defense solution combines multiple layers of protection to make threat management simpler, faster, and more effective.

백서

Busting the Myth of the Malware “Silver Bullet”

Unlike security strategies based on isolated point products, our dynamic endpoint threat defense solution combines multiple layers of protection to make threat management simpler, faster, and more effective.

백서

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

백서

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

보고서

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

보고서

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

백서

Tackling Insider Threats

Insiders are responsible for almost as many losses, breaches, and thefts of sensitive and confidential data as cybercriminals. This white paper shows you how to combat this problem through a system of data classification, policy development, and incident response, backed by a strong set of data loss prevention tools.

백서

Tackling Insider Threats

Insiders are responsible for almost as many losses, breaches, and thefts of sensitive and confidential data as cybercriminals. This white paper shows you how to combat this problem through a system of data classification, policy development, and incident response, backed by a strong set of data loss prevention tools.

백서

TechTarget: A Cloud Security Primer

As diverse as your cloud environment may be, if you are involved in overseeing or deploying cloud services at your organization, there is one inviolable truism you must keep in mind at all times: No matter how simple or complex your cloud deployments, you can never allow the security of your data or applications to be compromised in any way.

백서

TechTarget: A Cloud Security Primer

As diverse as your cloud environment may be, if you are involved in overseeing or deploying cloud services at your organization, there is one inviolable truism you must keep in mind at all times: No matter how simple or complex your cloud deployments, you can never allow the security of your data or applications to be compromised in any way.

백서

Three Key Considerations in Securing the Software Defined Data Center (SDDC)

Here are three recommendations for incorporating security into the planning of an SDDC.

백서

Three Key Considerations in Securing the Software Defined Data Center (SDDC)

Here are three recommendations for incorporating security into the planning of an SDDC.

보고서

Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity

Enterprises tend to focus on governance, processes, rules and structure that are slower and less nimble than the market forces that drive attackers. This report examines the differences in approaches and suggests how defenders can take lessons from the black hat community.

백서

User and Entity Behavior Analytics for McAfee Enterprise Security Manager White Paper

This white paper provides an overview of core UEBA capabilities of McAfee Enterprise Security Manager and introduces partners whose products are tightly integrated and fully certified by the Intel Security Innovation Alliance.

사례 연구

Desjardins

Canadian investment company, The Desjardins Group, views McAfee Enterprise Support with a McAfee Resident Support Account Manager (RSAM) as an invaluable resource for maintaining a stable, up-to-date infrastructure and strong security posture.

보고서

Executive Summary: Disrupting the Disruptors, Art or Science?

Get an overview of the key findings from the Disrupting the Disruptors report, and see how adding proactive threat hunting and advanced analytics can give you the edge over attackers.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top