Biblioteca de recursos

Contáctenos

El nivel de adopción de la nube y su seguridad

La seguridad y el cumplimiento con las normativas son más relevantes que nunca. Vea cómo profesionales de seguridad de TI de todo el mundo han planificado la protección de sus nubes.

Buscar en la biblioteca

Aprenda a sacar el máximo partido a los productos McAfee que ya tiene o descubra las soluciones que responden a las necesidades actuales de su empresa. Utilice los siguientes filtros para restringir su búsqueda.

Filters

Reset FiltersClear
Reportes

The Show Must Go On! 2017 SANS Incident Response Survey

Incident response is seeing a pivotal industry shift, as continuous consumption of threat intelligence and automated endpoint detection and remediation take hold.

Casos de estudio

Gothenburg

Learn how the Swedish city of Gothenburg saves 40 hours per week after deploying a lightweight, yet powerful, security client solution—McAfee Endpoint Security.

Resúmenes de soluciones

McAfee Certification Program FAQ

Learn about certification paths, training prerequisites, exam registration, and more.

Resúmenes de soluciones

Achieve Advanced Security for your Microsoft Windows 10 Platforms with McAfee Endpoint Security — Solution Brief

McAfee Endpoint Protection software will keep your security aligned and your business fully protected during Windows 10 updates as a result of Microsoft’s newly established operating system release schedule.

Reportes

Pathfinder Report: Machine Learning Raises Security Teams to the Next Level

While machine learning can detect patterns hidden in the data at rapid speeds, the less obvious value of machine learning is providing enough automation to allow humans the time and focus to initiate creative responses when responses are less obvious.

Reportes

Disrupting the Disruptors, Art or Science?

It’s a race to track down cyber criminals. Can security professionals disrupt the disruptors? By adding proactive threat hunting and advanced analytics, they can throw attackers off their footing, blending art and science along the way.

Reportes

Executive Summary: Disrupting the Disruptors, Art or Science?

Get an overview of the key findings from the Disrupting the Disruptors report, and see how adding proactive threat hunting and advanced analytics can give you the edge over attackers.

Resúmenes de soluciones

Securing Your Amazon Web Services Virtual Networks

Many organizations do not realize that the virtual networks that are part of Amazon Web Services (AWS) workloads need to be protected. McAfee understands the complexity of the public cloud and has designed a security architecture specifically for AWS.

Libros blancos

How to Get the Most Value from Your Midmarket Security Spend

Midmarket companies face many of the same security issues as large enterprises—from greyware and ransomware to the specter of crippling data loss and exposure to low-and-slow attacks.

Resúmenes de soluciones

Detect and Stop Advanced Email Threats (Cisco) Solution Brief

Cisco Email Security Appliance forwards email attachments to McAfee Advanced Threat Defense to for analysis and identification of potential zero-day threats, enabling the Cisco solution to remediate based on policy.

Fichas técnicas

McAfee Advanced Threat Defense: Configurable operating system and application support

McAfee Advanced Threat Defense supports a broad range of operating systems and applications, making it ideal for generating relevant indicators of compromise that can be used to support investigation and threat hunting throughout the organization.

Reportes

Closing the Cybersecurity Gaps in Financial Services

In a survey conducted by Ovum, financial institutions, including retail and investment banks across North America, Europe, and Asia Pacific share their concerns around the cloud, web, and the ability to detect threats faster.

Resúmenes de soluciones

Top 10: Connect to the Cloud for Security

Changing work habits mean that security needs to be everywhere. Find out how it can work for you, automating manual steps that bogged your team down before. This list of top 10 security challenges can be improved by connecting your endpoints to the cloud.

Resúmenes de soluciones

SIA Solution Brief: Demisto

The integration of Demisto Enterprise Platform, McAfee Enterprise Security Manager, and McAfee ePolicy Orchestrator results in an enterprise-grade solution to manage and automate incident investigation and remediation tasks.

Resúmenes de soluciones

SIA Solution Brief: Lumeta

McAfee ePolicy Orchestrator software and Lumeta Spectre together provide IT with the real-time visibility required to identify, manage, and respond to endpoint security issues and threats across dynamic cloud, virtual, mobile, and physical networks.

Reportes

McAfee Labs Quarterly Threat Report June 2017

McAfee Labs researchers examine the most powerful malware evasion techniques past, present, and future; the use of digital steganography in malware; and Fareit, the most famous password stealer.

Infographics

McAfee Labs Quarterly Threat Report June 2017 - Infographic

McAfee Labs researchers examine the most powerful malware evasion techniques past, present, and future; the use of digital steganography in malware; and Fareit, the most famous password stealer.

Resúmenes de soluciones

Protecting Against Evasive Malware

Recommended policies and procedures and how McAfee solutions can combat the most evasive modern threats.

Resúmenes de soluciones

SIA Solution Brief: MobileIron

McAfee and MobileIron deliver an integrated solution that extends web protection to mobile devices, to ensure that users are complying with corporate internet policies, even when they’re using smartphones and tablets.

Resúmenes de soluciones

SIA Solution Brief: Rapid7

Rapid7 Nexpose integrates vulnerability management data and risk context into the McAfee ePO console and McAfee Data Exchange Layer.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top