Biblioteca de recursos

Contáctenos

El nivel de adopción de la nube y su seguridad

La seguridad y el cumplimiento con las normativas son más relevantes que nunca. Vea cómo profesionales de seguridad de TI de todo el mundo han planificado la protección de sus nubes.

Buscar en la biblioteca

Aprenda a sacar el máximo partido a los productos McAfee que ya tiene o descubra las soluciones que responden a las necesidades actuales de su empresa. Utilice los siguientes filtros para restringir su búsqueda.

Filters

Reset FiltersClear
Ficha técnica

McAfee Enterprise Security Manager for Engineers-II Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Engineers to understand, communicate, and use the solution’s features.

Ficha técnica

McAfee SIEM Supported Device List

McAfee Enterprise Security Manager can integrate with a wide range of third-party security tools to provide a powerful security information and event management (SIEM) platform. This data sheet provides details about McAfee ESM third-party support.

Ficha técnica

McAfee Enterprise Security Manager for Analysts-I Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Analysts to understand, communicate, and use the solution’s features.

Ficha técnica

McAfee Enterprise Security Manager for Engineers-I Course Description

McAfee Enterprise Security Manager provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This course prepares the Enterprise Security Manager Engineers to understand, communicate, and use the solution’s features.

Caso de estudio

Berkshire Health Systems

Making the Job of Security Operations Easier at Berkshire Health Systems.

Caso de estudio

Regional Commercial Bank

After attempting to rely on unintegrated point solutions, a CISO at Regional Commercial Bank found a more efficient way to tackle the ever-morphing advanced threat landscape through Intel Security solutions.

Caso de estudio

Cut-e GmbH

This company achieved transparent security status with McAfee Enterprise Security Manager.

Caso de estudio

Universidad de Las Américas Puebla (UDLAP)

Leading Latin American university, UDLAP, fortified security for its assets and for those of its students.

Caso de estudio

China Pacific Insurance Group

China Pacific Insurance protects its business and customers with our security management system.

Caso de estudio

Government Statistics Agency

Large South American government agency embraces enterprise integrated security approach.

Caso de estudio

Thwarting Ransomware and Easing Security Administration by Migrating to McAfee Endpoint Security (Norrköpings Kommun) Case Study

The small IT team for this Swedish town of 90,000 has reduced its security administration burden with more robust protection and more streamlined management, thanks to McAfee Endpoint Security and McAfee ePolicy Orchestrator® (McAfee ePO) software.

Caso de estudio

Vidant Health

Vidant Health shifted from security alert overload to automated detection and correction.

Ficha técnica

McAfee Solution Services for SIEM

Essential Services for McAfee SIEM Solutions

Ficha técnica

SIEM Solutions Overview

Continuously monitor, identify, investigate, and resolve threats.

Libro blanco

10 Ways to Accelerate Time to Detection and Response

Malware dwell times a top concern for IT executives and practitioners at every level. This white paper shows you 10 ways to add speed and intelligence to your incident detection and response and regain time.

Libro blanco

Integrating SIEM into Your Threat Hunting Strategy

The smart use of an intelligent SIEM is the key to managing the strategic, tactical and operational aspects of threat hunting. In today's threatscape we cannot ignore any of the three. Effective integration of SIEM as the hub and an arsenal of threat investigation tools as the spokes is critical to gaining enhanced visibility of the hazards coming down the road.

Resumen de la solución

Operationalizing Threat Intelligence

Behind just about every legitimate alert your IT security receives is an adversary using multiple attack techniques to penetrate your infrastructure and compromise your vital data assets or systems. Today’s targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.

Reporte

Securosis Report: Security Analytics Team of Rivals

As new security analytics technologies appear, learn how these technologies can work together for you.

Libro blanco

SIEM Orchestration

How McAfee Enterprise Security Manager drives action, automates remediation, and optimizes incident response

Caso de estudio

Accarda

Migration to McAfee Endpoint Security lets small security staff provide more robust protection, more easily.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top