Библиотека материалов

Свяжитесь с нами

Ситуация с внедрением облачных технологий и безопасность

Сегодня, когда вопросы безопасности и нормативно-правового соответствия становятся более важными, чем прежде, профессионалы в области информационной безопасности по всему миру начинают планировать меры защиты своих облаков.

Поиск по библиотеке

Здесь вы сможете узнать, как получить полную отдачу от уже имеющихся у вас продуктов McAfee, а также найдете решения, отвечающие текущим потребностям вашей компании. Для сужения поиска воспользуйтесь приведенными ниже фильтрами.

Filters

Reset FiltersClear
Анализ конкретных примеров

McAfee Drives Next-Generation SCADA Security Case Study

TEPCO Power Grid of Japan worked closely with McAfee Professional Services to implement countermeasures in its next-generation SCADA platform and to launch a new security initiative across its own organization.

Краткие обзоры решений

Petroleum Refiner Overhauls Security Infrastructure (HollyFrontier)

A petroleum refiner updated its security infrastructure with integrated McAfee solutions, transforming its ability to defend against cyberthreats and benefitting from simplified management, stronger protection, and faster detection and correction.

Информационные документы

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

Информационные документы

5 Tips to Help Protect Your Data

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

Информационные документы

Busting the Myth of the Malware “Silver Bullet”

Unlike security strategies based on isolated point products, our dynamic endpoint threat defense solution combines multiple layers of protection to make threat management simpler, faster, and more effective.

Информационные документы

Busting the Myth of the Malware “Silver Bullet”

Unlike security strategies based on isolated point products, our dynamic endpoint threat defense solution combines multiple layers of protection to make threat management simpler, faster, and more effective.

Информационные документы

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

Информационные документы

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.

Отчеты

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

Отчеты

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

Key findings on data exfiltration and recommendations on data loss prevention

Информационные документы

Tackling Insider Threats

Insiders are responsible for almost as many losses, breaches, and thefts of sensitive and confidential data as cybercriminals. This white paper shows you how to combat this problem through a system of data classification, policy development, and incident response, backed by a strong set of data loss prevention tools.

Информационные документы

Tackling Insider Threats

Insiders are responsible for almost as many losses, breaches, and thefts of sensitive and confidential data as cybercriminals. This white paper shows you how to combat this problem through a system of data classification, policy development, and incident response, backed by a strong set of data loss prevention tools.

Информационные документы

TechTarget: A Cloud Security Primer

As diverse as your cloud environment may be, if you are involved in overseeing or deploying cloud services at your organization, there is one inviolable truism you must keep in mind at all times: No matter how simple or complex your cloud deployments, you can never allow the security of your data or applications to be compromised in any way.

Информационные документы

TechTarget: A Cloud Security Primer

As diverse as your cloud environment may be, if you are involved in overseeing or deploying cloud services at your organization, there is one inviolable truism you must keep in mind at all times: No matter how simple or complex your cloud deployments, you can never allow the security of your data or applications to be compromised in any way.

Информационные документы

Three Key Considerations in Securing the Software Defined Data Center (SDDC)

Here are three recommendations for incorporating security into the planning of an SDDC.

Информационные документы

Three Key Considerations in Securing the Software Defined Data Center (SDDC)

Here are three recommendations for incorporating security into the planning of an SDDC.

Отчеты

Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity

Enterprises tend to focus on governance, processes, rules and structure that are slower and less nimble than the market forces that drive attackers. This report examines the differences in approaches and suggests how defenders can take lessons from the black hat community.

Информационные документы

User and Entity Behavior Analytics for McAfee Enterprise Security Manager White Paper

This white paper provides an overview of core UEBA capabilities of McAfee Enterprise Security Manager and introduces partners whose products are tightly integrated and fully certified by the Intel Security Innovation Alliance.

Анализ конкретных примеров

Desjardins

Canadian investment company, The Desjardins Group, views McAfee Enterprise Support with a McAfee Resident Support Account Manager (RSAM) as an invaluable resource for maintaining a stable, up-to-date infrastructure and strong security posture.

Отчеты

Executive Summary: Disrupting the Disruptors, Art or Science?

Get an overview of the key findings from the Disrupting the Disruptors report, and see how adding proactive threat hunting and advanced analytics can give you the edge over attackers.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top