리소스 라이브러리

연락처

클라우드 채택 및 보안 상태

보안과 컴플라이언스가 그 어느 때보다 중요해짐에 따라 전 세계의 IT 보안 전문가들이 클라우드 보안을 어떻게 계획하고 있는지를 알아보십시오.

라이브러리 검색

이미 보유하고 있는 McAfee 제품을 최대한 효율적으로 활용할 수 있는 방법을 알아보거나 현재 비즈니스 요구 사항에 적합한 솔루션을 검색해 보십시오. 아래의 필터를 사용해 검색 결과의 범위를 좁혀보십시오.

Filters

Reset FiltersClear
데이터시트

McAfee Enterprise Security Manager for Engineers-II Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Engineers to understand, communicate, and use the solution’s features.

데이터시트

McAfee SIEM Supported Device List

McAfee Enterprise Security Manager can integrate with a wide range of third-party security tools to provide a powerful security information and event management (SIEM) platform. This data sheet provides details about McAfee ESM third-party support.

데이터시트

McAfee Enterprise Security Manager for Analysts-I Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Analysts to understand, communicate, and use the solution’s features.

데이터시트

McAfee Enterprise Security Manager for Engineers-I Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Engineers to understand, communicate, and use the solution’s features.

사례 연구

Berkshire Health Systems

Making the Job of Security Operations Easier at Berkshire Health Systems.

사례 연구

Regional Commercial Bank

After attempting to rely on unintegrated point solutions, a CISO at Regional Commercial Bank found a more efficient way to tackle the ever-morphing advanced threat landscape through Intel Security solutions.

사례 연구

Cut-e GmbH

This company achieved transparent security status with McAfee Enterprise Security Manager.

사례 연구

Universidad de Las Américas Puebla (UDLAP)

Leading Latin American university, UDLAP, fortified security for its assets and for those of its students.

사례 연구

China Pacific Insurance Group

China Pacific Insurance protects its business and customers with our security management system.

사례 연구

Government Statistics Agency

Large South American government agency embraces enterprise integrated security approach.

사례 연구

Thwarting Ransomware and Easing Security Administration by Migrating to McAfee Endpoint Security (Norrköpings Kommun) Case Study

The small IT team for this Swedish town of 90,000 has reduced its security administration burden with more robust protection and more streamlined management, thanks to McAfee Endpoint Security and McAfee ePolicy Orchestrator® (McAfee ePO) software.

사례 연구

Vidant Health

Vidant Health shifted from security alert overload to automated detection and correction.

데이터시트

McAfee Solution Services for SIEM

Essential Services for McAfee SIEM Solutions

데이터시트

SIEM Solutions Overview

Continuously monitor, identify, investigate, and resolve threats.

백서

10 Ways to Accelerate Time to Detection and Response

Malware dwell times a top concern for IT executives and practitioners at every level. This white paper shows you 10 ways to add speed and intelligence to your incident detection and response and regain time.

백서

Integrating SIEM into Your Threat Hunting Strategy

The smart use of an intelligent SIEM is the key to managing the strategic, tactical and operational aspects of threat hunting. In today's threatscape we cannot ignore any of the three. Effective integration of SIEM as the hub and an arsenal of threat investigation tools as the spokes is critical to gaining enhanced visibility of the hazards coming down the road.

데이터시트

McAfee Database Activity Monitoring

For a technical summary on the McAfee product listed above, please view the product data sheet.

솔루션 개요

Operationalizing Threat Intelligence

Behind just about every legitimate alert your IT security receives is an adversary using multiple attack techniques to penetrate your infrastructure and compromise your vital data assets or systems. Today’s targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.

보고서

Securosis Report: Security Analytics Team of Rivals

As new security analytics technologies appear, learn how these technologies can work together for you.

백서

SIEM Orchestration

How McAfee Enterprise Security Manager drives action, automates remediation, and optimizes incident response

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top