McAfee Security Innovation Alliance partners deliver joint solutions that address the customers' most critical needs. This expanded portfolio of solutions is part of an integrated security system which helps protect, detect, and correct threats faster and more effectively than any single solution.
In this webcast series, you will learn how security ISVs work with McAfee to help customers maximize current investments, lower operational costs, and reduce time to resolution. Each webcast highlights the unique key aspects and value of a “McAfee Compatible” McAfee partner’s joint solution.
You will be required to complete a one-time registration. BrightTALK provides webinars and videos for professionals and their communities. You will need to subscribe as a member to the McAfee Connected Channel in order to view the replay webcasts.
Title | Description | Live/On Demand* |
---|---|---|
How UBA and Machine Learning Can Turbocharge SIEM McAfee, 451 Group, and Niara |
With the introduction of big data scale, machine learning-based analytics, and instantly-accessible forensic data, network and user behavior analytics is a terrific complement to SIEM. Learn how these new capabilities can be seamlessly introduced to SIEM. | Register |
Six Pillars of an Effective Endpoint Security Strategy McAfee, Forrester, and Avecto |
Discover core endpoint security needs critical to an enterprise security strategy along with practical advice on how to build a smart and simple strategy that fits with your existing McAfee ePolicy Orchestrator infrastructure. | Register |
Vormetric and EMA Present: The Data Security Offense Playbook McAfee, EMA, and Vormetric |
Learn how to deploy effective security that leverages and works in conjunction with your existing environment and provides a great user experience for IT and the business. | Register |
Database Security: Don’t Forget to Lock the Back Door McAfee and Vormetric |
Vormetric has partnered with McAfee to integrate with McAfee Database Activity Monitoring and McAfee Enterprise Security Manager to extend data-security coverage. Vormetric adds another layer of security to McAfee Database Activity Monitoring by preventing unauthorized users and processes from accessing or viewing the database files through transparent encryption. | Register |
User-Driven Classification: Adding a New Dimension to McAfee DLP McAfee and Boldon James |
The combination of Boldon James Classifier and McAfee DLP reduces the likelihood of data loss by providing the DLP solution with predictable, meaningful classification metadata that greatly improves the reliability of decision making, system effectiveness, and reduces false positives. | Register |
Accelerating Incident Response and Breach McAfee and Guidance Software's EnCase |
In today’s post-breach world, organizations need technology aligned with new strategies to accelerate and automate incident response and breach investigation workflows to reduce mean time to resolution. | Register |
Virtualize More While Improving Your Risk Posture from Bare Metal to Endpoint McAfee and HyTrust |
Gain insights into the virtualization security landscape, and understand how McAfee, Intel, and HyTrust can help you scale your VMware infrastructure while staying compliant and secure. | Register |
Target and Eliminate Privileged Account Security Threats McAfee and Lieberman Software |
Learn how McAfee ePolicy Orchestrator and Lieberman Software provide a model in which sensitive logins are controlled and passwords automatically revoked immediately after delegated IT personnel complete their work. | Register |
Protecting Against IP Theft –- Fighting an Effective Battle McAfee and Securonix |
Learn how using data loss prevention technologies and a powerful layer of in-context intelligence provide real-time detection of theft by leveraging behavioral profiling and accurate comparative algorithms. | Register |
Privileged Identity Management: Combine McAfee Security with Privileged User Access Control and Activity Monitoring McAfee and Cyber-Ark |
Learn how McAfee and Cyber-Ark work together to manage and continuously monitor privileged account usage across IT environments. | Register |
Understand the Business Impact of Endpoint Risk McAfee and WCK |
Learn how McAfee and WCK can help you gain business visibility into your risk and compliance and prioritize remediation efforts based on business criticality. | Register |