리소스 라이브러리

연락처

클라우드 채택 및 보안 상태

보안과 컴플라이언스가 그 어느 때보다 중요해짐에 따라 전 세계의 IT 보안 전문가들이 클라우드 보안을 어떻게 계획하고 있는지를 알아보십시오.

라이브러리 검색

이미 보유하고 있는 McAfee 제품을 최대한 효율적으로 활용할 수 있는 방법을 알아보거나 현재 비즈니스 요구 사항에 적합한 솔루션을 검색해 보십시오. 아래의 필터를 사용해 검색 결과의 범위를 좁혀보십시오.

Filters

Reset FiltersClear
솔루션 개요

Operationalizing Threat Intelligence

Behind just about every legitimate alert your IT security receives is an adversary using multiple attack techniques to penetrate your infrastructure and compromise your vital data assets or systems. Today’s targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.

백서

Unmask Evasive Threats: McAfee-Real Protect and Dynamic Application Containment Stop Zero-Day Malware in its Tracks

McAfee draws on machine learning analysis and application containment tools to help organization unmask hidden threats and stop them in their tracks—more quickly and with less effort.

보고서

Busting the Myth of the Malware “Silver Bullet” Executive Summary

Malware threats continue to evolve, and no single “silver bullet” solution can protect you against all of them. Juggling multiple solutions that operate in silos means more time, resources, and complexity for already-strained security teams. It’s time for a smarter approach.

보고서

Mastering the Endpoint: Forrester Technology Adoption Profile

Forrester conducted an online survey of 252 IT security decision makers from the US, the UK, France, and Germany, and our findings suggest that organizations are significantly challenged by overly manual security tools and desire connected security solutions that are fast, accurate, and integrated.

솔루션 개요

Defend Against the Unknown with McAfee Endpoint Threat Defense Solutions

Learn how McAfee Endpoint Threat Defense solutions help organizations stay ahead of the savviest adversaries.

솔루션 개요

Integrate and Accelerate Endpoint Threat Defense

McAfee Dynamic Endpoint Threat Defense integrates endpoint defenses into a unified, adaptive defense fabric, with tools that share information and coordinate threat response in near real time.

백서

McAfee Dynamic Endpoint Threat Defense

McAfee Dynamic Endpoint Threat Defense offers a new kind of endpoint protection built for a new generation of threats.

솔루션 개요

Redefining Next-Generation Endpoint Security Solutions

In this technology brief, research firm Enterprise Strategy Group (ESG) shares their perspective on the increasing importance of next-generation endpoint security solutions, like McAfee Dynamic Endpoint Threat Defense, to improve security efficacy while streamlining security operations.

백서

Neutralize Threats with Collaborative Security Fabric

Staying ahead of emerging threats is getting harder. Learn how a holistic endpoint defense fabric continually evaluates and adapts your environment to neutralize threats.

사례 연구

Computer Sciences Corporation

This global service provider defends its many clients easily and effectively thanks to the centralized management of ePO and ISecG unified platform.

백서

Threat Defense Isn't Just About Detection: It's How You Respond

Discover how endpoint detection and response (EDR) is critical to proactively preventing threats before they hit your endpoint systems.

솔루션 개요

Disrupt Targeted Attacks

McAfee recommends that you unify the protect, detect, and correct stages of managing threats so you can build a comprehensive security model to combat targeted attacks. While each stage has its own unique set of tactics, they all work together to provide context and leverage insights. This concept—an adaptive security model—applies learning immediately throughout a collaborative architecture and provides the overall cyber-resilience required to outmaneuver adversaries, contain intrusions quickly, and avoid excessive financial damage.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs