Biblioteca de recursos

Contáctenos

El nivel de adopción de la nube y su seguridad

La seguridad y el cumplimiento con las normativas son más relevantes que nunca. Vea cómo profesionales de seguridad de TI de todo el mundo han planificado la protección de sus nubes.

Buscar en la biblioteca

Aprenda a sacar el máximo partido a los productos McAfee que ya tiene o descubra las soluciones que responden a las necesidades actuales de su empresa. Utilice los siguientes filtros para restringir su búsqueda.

Filters

Reset FiltersClear
Resumen de la solución

Identify Sensitive Data & Prevent Data Leaks

The interoperability between TITUS Document Classification software and McAfee Data Loss Prevention (DLP) further reduces your risk of data loss by capturing end users’ inherent knowledge about the sensitivity of documents and making that information available to McAfee host and network-based DLP as visual classification labels and corresponding metadata.

Ficha técnica

McAfee ePO Cloud

For a technical summary on the McAfee product integration listed above, please view the product data sheet.

Resumen de la solución

Operationalizing Threat Intelligence

Behind just about every legitimate alert your IT security receives is an adversary using multiple attack techniques to penetrate your infrastructure and compromise your vital data assets or systems. Today’s targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.

Libro blanco

SIEM Orchestration

How McAfee Enterprise Security Manager drives action, automates remediation, and optimizes incident response

Ficha técnica

McAfee Threat Intelligence Exchange

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

Libro blanco

Security that Plays Well with Others

Organizations need a way to orchestrate security components so that they to work together and present a unified coordinated defense. Intel Security’s open, integrated architecture can help legacy point products play well together, optimize the effectiveness of your entire security infrastructure, and simplify, unify, and advance the threat defense lifecycle.

Resumen de la solución

Create a Least Risk Microsoft Windows Desktop

Avecto Privilege Guard and McAfee ePolicy Orchestrator (ePO) software enable organizations worldwide to deploy secure and compliant desktops—without compromising a user's ability to perform their day to day tasks.

Resumen de la solución

McAfee Threat Intelligence Exchange and Endpoint Protection

McAfee Threat Intelligence Exchange delivers innovative endpoint protection with a system that adapts and learns from threat encounters, and immediately neutralizes emerging attacks.

Caso de estudio

DearBytes

This Dutch Managed Service Provider specializes in securing a wide range of medium-sized businesses with McAfee Enterprise Security Manager.

Resumen de la solución

Seguridad en conjunto

McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threat response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top