Библиотека материалов

Свяжитесь с нами

Ситуация с внедрением облачных технологий и безопасность

Сегодня, когда вопросы безопасности и нормативно-правового соответствия становятся более важными, чем прежде, профессионалы в области информационной безопасности по всему миру начинают планировать меры защиты своих облаков.

Поиск по библиотеке

Здесь вы сможете узнать, как получить полную отдачу от уже имеющихся у вас продуктов McAfee, а также найдете решения, отвечающие текущим потребностям вашей компании. Для сужения поиска воспользуйтесь приведенными ниже фильтрами.

Filters

Reset FiltersClear
Отчеты

Mobile Threat Report

The 2018 Mobile Threat Report examines the continuing evolution and expansion of the mobile threat landscape, including Internet of Things attacks, mobile ransomware into mobile and connected devices, and dead mobile apps.

Информационные документы

Lumeta and McAfee

Eliminating 100% of Your Blind Spots to Secure the Entire Network and Optimize Security Operations Across the Entire Threat Defense Lifecycle.

Анализ конкретных примеров

Faster Time to Protection and Time Savings at Multinational Bank

This large, multinational bank improved its overall security posture, including accelerating time from detection to protection, thanks to McAfee Endpoint Security other complementary McAfee solutions that are part of their integrated security platform.

Анализ конкретных примеров

Federal Court System in Chile Benefits from Automation and Stronger Protection

The Poder Judicial (Judicial Authority) for the nation of Chile upgraded its existing McAfee solutions—including the management console and endpoint security—to ensure stronger and faster detection and prevention of ransomware attacks, to do more with fewer resources, and to gain visibility to threats and endpoint security posture.

Краткие обзоры решений

Enterprise-Class Data Loss Prevention for Mobile Devices

Integration of McAfee DLP Prevent with MobileIron Core and MobileIron Sentry results a solution that extends robust content classification and data loss prevention to mobile devices for security beyond the network boundary.

Краткие обзоры решений

SIEM Advanced Threat Detection (Thales)

Vormetric Data Security Manager from Thales works with McAfee Enterprise Security Manager to provide you with visibility to what is happening behind the perimeter and to protect your cloud-based environment where there is no clear perimeter.

Часто задаваемые вопросы

McAfee Premier Success Plan FAQ

The McAfee Premier Success Plan combines consulting services, education, and technical support with personalized, proactive account management to deliver holistic, outcome-based deliverables throughout your product lifecycle.

Анализ конкретных примеров

Large Government Contractor Extends Security to AWS Public Cloud

By adding McAfee Cloud Workload Discovery to McAfee-integrated security architecture, this government contractor can now reap the benefits of leveraging the AWS public cloud platform.

Economic Impact of Cybercrime—No Slowing Down

In this third report, CSIS and McAfee explore the growth of cybercrime from an economic impact perspective. It’s estimated that cybercrime may now cost the world almost $600 billion, or 0.8% of the global GDP.

Часто задаваемые вопросы

FAQ - Endpoint Security 10.5.3 Training

McAfee Endpoint Security Training Frequently Asked Questions

Краткие обзоры решений

GDPR and Your Data Protection Transformation

In response to GDPR, McAfee supports and accelerates security transformation across your data protection lifecycle in an automated and integrated manner that reduces the skills and complexity burden. This brief outlines how we can help create positive outcomes for the benefit and growth of your business.

Технические описания

McAfee Endpoint Security 10.5 Upgrade eLearning Course Description

This course description explains how our McAfee Endpoint Security 10.5 Upgrade course provides an in-depth introduction to the tasks crucial to set up and administer McAfee Endpoint Security.

The Economic Impact of Cybercrime—No Slowing Down Executive Summary

CSIS and McAfee explore the growth of cybercrime from an economic impact perspective. It’s estimated that cybercrime may now cost the world almost $600 billion, or 0.8% of the global GDP.

Информационные документы

Load Balancing with McAfee Network Security Platform

This white paper describes how clusters of McAfee Network Security Platform sensors can some help load balance traffic to meet the throughput requirements of larger enterprises.

Инфографика

ESG A return to Endpoint Protection Platforms

In 2018 many organizations are prioritizing leveraging endpoint detection and response controls for greater visibility and machine learning for predictive prevention. View our latest insights.

Отчеты

Corporate Web Security - Market Quadrant 2017

An Analysis of the Market for Corporate Web Security Solutions, Revealing Top Players, Trail Blazers, Specialists and Mature Players.

Технические описания

McAfee Data Loss Prevention Endpoint Adminstration Course

This in-depth training provides the tools you need to design, implement, configure, and troubleshoot McAfee Data Loss Prevention (DLP) Endpoint.

Брошюры

About McAfee Corporate Fact Sheet

McAfee is one of the world’s leading independent cybersecurity companies. Inspired by the power of working together, McAfee creates business and consumer solutions that make the world a safer place for the benefit of all.

Краткие обзоры решений

Protecting the Internet of Things

This brief explains how the open, connected McAfee security ecosystem enables IoT device manufacturers to detect, protect, and correct threats faster; automate their defense with fewer resources; and accelerate time to market.

Брошюры

McAfee Product Entitlement Definitions

This document contains legal definitions that apply to McAfee products and solutions.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs