Библиотека материалов

Свяжитесь с нами

Ситуация с внедрением облачных технологий и безопасность

Сегодня, когда вопросы безопасности и нормативно-правового соответствия становятся более важными, чем прежде, профессионалы в области информационной безопасности по всему миру начинают планировать меры защиты своих облаков.

Поиск по библиотеке

Здесь вы сможете узнать, как получить полную отдачу от уже имеющихся у вас продуктов McAfee, а также найдете решения, отвечающие текущим потребностям вашей компании. Для сужения поиска воспользуйтесь приведенными ниже фильтрами.

Filters

Reset FiltersClear
Краткие обзоры решений

Operationalizing Threat Intelligence

Behind just about every legitimate alert your IT security receives is an adversary using multiple attack techniques to penetrate your infrastructure and compromise your vital data assets or systems. Today’s targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.

Информационные документы

Unmask Evasive Threats: McAfee-Real Protect and Dynamic Application Containment Stop Zero-Day Malware in its Tracks

McAfee draws on machine learning analysis and application containment tools to help organization unmask hidden threats and stop them in their tracks—more quickly and with less effort.

Отчеты

Busting the Myth of the Malware “Silver Bullet” Executive Summary

Malware threats continue to evolve, and no single “silver bullet” solution can protect you against all of them. Juggling multiple solutions that operate in silos means more time, resources, and complexity for already-strained security teams. It’s time for a smarter approach.

Отчеты

Mastering the Endpoint: Forrester Technology Adoption Profile

Forrester conducted an online survey of 252 IT security decision makers from the US, the UK, France, and Germany, and our findings suggest that organizations are significantly challenged by overly manual security tools and desire connected security solutions that are fast, accurate, and integrated.

Краткие обзоры решений

Defend Against the Unknown with McAfee Endpoint Threat Defense Solutions

Learn how McAfee Endpoint Threat Defense solutions help organizations stay ahead of the savviest adversaries.

Краткие обзоры решений

Integrate and Accelerate Endpoint Threat Defense

McAfee Dynamic Endpoint Threat Defense integrates endpoint defenses into a unified, adaptive defense fabric, with tools that share information and coordinate threat response in near real time.

Информационные документы

McAfee Dynamic Endpoint Threat Defense

McAfee Dynamic Endpoint Threat Defense offers a new kind of endpoint protection built for a new generation of threats.

Краткие обзоры решений

Redefining Next-Generation Endpoint Security Solutions

In this technology brief, research firm Enterprise Strategy Group (ESG) shares their perspective on the increasing importance of next-generation endpoint security solutions, like McAfee Dynamic Endpoint Threat Defense, to improve security efficacy while streamlining security operations.

Информационные документы

Neutralize Threats with Collaborative Security Fabric

Staying ahead of emerging threats is getting harder. Learn how a holistic endpoint defense fabric continually evaluates and adapts your environment to neutralize threats.

Анализ конкретных примеров

Computer Sciences Corporation

This global service provider defends its many clients easily and effectively thanks to the centralized management of ePO and ISecG unified platform.

Информационные документы

Threat Defense Isn't Just About Detection: It's How You Respond

Discover how endpoint detection and response (EDR) is critical to proactively preventing threats before they hit your endpoint systems.

Краткие обзоры решений

Disrupt Targeted Attacks

McAfee recommends that you unify the protect, detect, and correct stages of managing threats so you can build a comprehensive security model to combat targeted attacks. While each stage has its own unique set of tactics, they all work together to provide context and leverage insights. This concept—an adaptive security model—applies learning immediately throughout a collaborative architecture and provides the overall cyber-resilience required to outmaneuver adversaries, contain intrusions quickly, and avoid excessive financial damage.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs