Библиотека материалов

Свяжитесь с нами

Ситуация с внедрением облачных технологий и безопасность

Сегодня, когда вопросы безопасности и нормативно-правового соответствия становятся более важными, чем прежде, профессионалы в области информационной безопасности по всему миру начинают планировать меры защиты своих облаков.

Поиск по библиотеке

Здесь вы сможете узнать, как получить полную отдачу от уже имеющихся у вас продуктов McAfee, а также найдете решения, отвечающие текущим потребностям вашей компании. Для сужения поиска воспользуйтесь приведенными ниже фильтрами.

Filters

Reset FiltersClear
Технические описания

McAfee SIEM Supported Device List

McAfee Enterprise Security Manager can integrate with a wide range of third-party security tools to provide a powerful security information and event management (SIEM) platform. This data sheet provides details about McAfee ESM third-party support.

Технические описания

SIEM Solutions Overview

Continuously monitor, identify, investigate, and resolve threats.

Отчеты

Securosis Report: Security Analytics Team of Rivals

As new security analytics technologies appear, learn how these technologies can work together for you.

Информационные документы

SIEM Orchestration

How McAfee Enterprise Security Manager drives action, automates remediation, and optimizes incident response

Информационные документы

User and Entity Behavior Analytics for McAfee Enterprise Security Manager

This white paper provides an overview of core UEBA capabilities of McAfee Enterprise Security Manager and introduces partners whose products are tightly integrated and fully certified by the McAfee Innovation Alliance.

Технические описания

McAfee Enterprise Security Manager

Технические данные вышеуказанного продукта McAfee приведены в техническом описании этого продукта.

Информационные документы

Sustainable Security Operations

Adopt an optimized approach to security infrastructure that encourages collaboration and visibility across the enterprise.

Краткие обзоры решений

Advanced Threat Defense for SIEM

When advanced detection solutions, known as sandboxes, collaborate with SIEM solutions, enterprises can better understand and respond to unknown, advanced attacks. McAfee Advanced Threat Defense and McAfee Enterprise Security Manager work in concert to extract relevant data from advanced malware and dramatically reduce time to response by minimizing uncertainty and accelerating remediation.

Краткие обзоры решений

Security Information and Event Management and Integrated Endpoint Security

Responding to incidents as fast as possible is crucial to disrupting the attack and preventing extensive damage. Learn how to automate attack response and analysis to shorten incident response time.

Информационные документы

Security that Plays Well with Others

Organizations need a way to orchestrate security components so that they to work together and present a unified coordinated defense. McAfee’s open, integrated architecture can help legacy point products play well together, optimize the effectiveness of your entire security infrastructure, and simplify, unify, and advance the threat defense lifecycle.

Краткие обзоры решений

McAfee Enterprise Security Manager, Services Solutions for Managed Service Providers (MSPs)

McAfee Enterprise Security Manager offers the advanced scalability, flexibility, and control you need to protect your customers’ business, and grow yours.

Информационные документы

Achieving Security through Compliance

This paper will illustrate how a well-structured security governance program with fully developed and implemented policies, plans, and procedures will strengthen an organization’s security posture.

Краткие обзоры решений

McAfee Enterprise Security Manager and McAfee Threat Intelligence Exchange

Deliver context-aware, prioritized threat intelligence across your enterprise.

Краткие обзоры решений

Compliance Made Easy with SIEM

The McAfee SIEM solution, Enterprise Security Manager, addresses today’s complex compliance challenges by combining an established unified compliance framework with superior abilities to collect, retrieve, and protect the data required to assess and demonstrate compliance in real time. It’s tightly integrated log collection, management, analysis, and reporting improves an organization’s ability to meet compliance requirements through frameworks, streamlined workflow, and automation.

Информационные документы

Creating and Maintaining a SOC

Organizations are investing in the development of security operations centers (SOCs) to provide increased security and rapid response to events throughout their networks. But building a SOC can be a monumental task. This paper explains how strong people and well-defined processes can result in an operationally effective SOC.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs