Библиотека материалов

Свяжитесь с нами

Ситуация с внедрением облачных технологий и безопасность

Сегодня, когда вопросы безопасности и нормативно-правового соответствия становятся более важными, чем прежде, профессионалы в области информационной безопасности по всему миру начинают планировать меры защиты своих облаков.

Поиск по библиотеке

Здесь вы сможете узнать, как получить полную отдачу от уже имеющихся у вас продуктов McAfee, а также найдете решения, отвечающие текущим потребностям вашей компании. Для сужения поиска воспользуйтесь приведенными ниже фильтрами.

Filters

Reset FiltersClear
Отчеты

The Show Must Go On! 2017 SANS Incident Response Survey

Incident response is seeing a pivotal industry shift, as continuous consumption of threat intelligence and automated endpoint detection and remediation take hold.

Анализ конкретных примеров

Gothenburg

Learn how the Swedish city of Gothenburg saves 40 hours per week after deploying a lightweight, yet powerful, security client solution—McAfee Endpoint Security.

Краткие обзоры решений

McAfee Certification Program FAQ

Learn about certification paths, training prerequisites, exam registration, and more.

Краткие обзоры решений

Achieve Advanced Security for your Microsoft Windows 10 Platforms with McAfee Endpoint Security — Solution Brief

McAfee Endpoint Protection software will keep your security aligned and your business fully protected during Windows 10 updates as a result of Microsoft’s newly established operating system release schedule.

Отчеты

Pathfinder Report: Machine Learning Raises Security Teams to the Next Level

While machine learning can detect patterns hidden in the data at rapid speeds, the less obvious value of machine learning is providing enough automation to allow humans the time and focus to initiate creative responses when responses are less obvious.

Информационные документы

How to Get the Most Value from Your Midmarket Security Spend

Midmarket companies face many of the same security issues as large enterprises—from greyware and ransomware to the specter of crippling data loss and exposure to low-and-slow attacks.

Краткие обзоры решений

Detect and Stop Advanced Email Threats (Cisco) Solution Brief

Cisco Email Security Appliance forwards email attachments to McAfee Advanced Threat Defense to for analysis and identification of potential zero-day threats, enabling the Cisco solution to remediate based on policy.

Технические описания

McAfee Advanced Threat Defense: Configurable operating system and application support

McAfee Advanced Threat Defense supports a broad range of operating systems and applications, making it ideal for generating relevant indicators of compromise that can be used to support investigation and threat hunting throughout the organization.

Отчеты

Closing the Cybersecurity Gaps in Financial Services

In a survey conducted by Ovum, financial institutions, including retail and investment banks across North America, Europe, and Asia Pacific share their concerns around the cloud, web, and the ability to detect threats faster.

Краткие обзоры решений

Top 10: Connect to the Cloud for Security

Changing work habits mean that security needs to be everywhere. Find out how it can work for you, automating manual steps that bogged your team down before. This list of top 10 security challenges can be improved by connecting your endpoints to the cloud.

Краткие обзоры решений

SIA Solution Brief: Demisto

The integration of Demisto Enterprise Platform, McAfee Enterprise Security Manager, and McAfee ePolicy Orchestrator results in an enterprise-grade solution to manage and automate incident investigation and remediation tasks.

Краткие обзоры решений

SIA Solution Brief: Lumeta

McAfee ePolicy Orchestrator software and Lumeta Spectre together provide IT with the real-time visibility required to identify, manage, and respond to endpoint security issues and threats across dynamic cloud, virtual, mobile, and physical networks.

Отчеты

McAfee Labs Quarterly Threat Report June 2017

McAfee Labs researchers examine the most powerful malware evasion techniques past, present, and future; the use of digital steganography in malware; and Fareit, the most famous password stealer.

Infographics

McAfee Labs Quarterly Threat Report June 2017 - Infographic

McAfee Labs researchers examine the most powerful malware evasion techniques past, present, and future; the use of digital steganography in malware; and Fareit, the most famous password stealer.

Краткие обзоры решений

Protecting Against Evasive Malware

Recommended policies and procedures and how McAfee solutions can combat the most evasive modern threats.

Краткие обзоры решений

SIA Solution Brief: MobileIron

McAfee and MobileIron deliver an integrated solution that extends web protection to mobile devices, to ensure that users are complying with corporate internet policies, even when they’re using smartphones and tablets.

Краткие обзоры решений

SIA Solution Brief: Rapid7

Rapid7 Nexpose integrates vulnerability management data and risk context into the McAfee ePO console and McAfee Data Exchange Layer.

Краткие обзоры решений

Protecting Against Steganographic Threats

Recommended policies and procedures and how McAfee solutions can protect against steganographic code in malware attacks.

Анализ конкретных примеров

Accarda

Migration to McAfee Endpoint Security lets small security staff provide more robust protection, more easily.

Анализ конкретных примеров

California Department of Water Resources

State Agency bolsters Endpoint Protection, accelerates response time, and mitigates risk with McAfee Endpoint Security.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top